CN107864149A - A kind of computer network authentication system - Google Patents
A kind of computer network authentication system Download PDFInfo
- Publication number
- CN107864149A CN107864149A CN201711218526.7A CN201711218526A CN107864149A CN 107864149 A CN107864149 A CN 107864149A CN 201711218526 A CN201711218526 A CN 201711218526A CN 107864149 A CN107864149 A CN 107864149A
- Authority
- CN
- China
- Prior art keywords
- authentication
- identifying code
- computer network
- module
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
Abstract
The application is related to a kind of computer network authentication system, and described authentication system includes, information receiving module, for receiving the identifying code of user's input, and is sent to described authentication module and is verified;Authentication module, described authentication module include multiple presupposed informations, and described authentication module is used for multiple identifying codes respectively with presupposed information compared with pair, after each identifying code is with described multiple presupposed informations one-to-one corresponding, is proved to be successful, otherwise authentication failed;Computer network enters module, for after authentication module is proved to be successful, into computer network.A kind of computer network authentication system described herein, can carry out multifactor authentication, wherein after gravidity part authentication failed, will be unable to enter network system, security performance is higher.
Description
Technical field
The application is related to a kind of computer network authentication system.
Background technology
In the prior art, after the checking system of computer network identity generally only needs an identifying code input correct i.e.
Network system can be entered, but when the network system security rank is very high, common checking system can not meet needs, therefore
It is badly in need of inventing a kind of higher authentication system of safety coefficient.
The content of the invention
The main purpose of the application is to provide a kind of computer network authentication system, to overcome prior art etc. to ask
Topic.
To realize aforementioned application purpose, the technical scheme that the application uses includes:
The application is related to a kind of computer network authentication system, and described authentication system includes, information receiving module,
For receiving the identifying code of user's input, and it is sent to described authentication module and is verified;Authentication module, described checking mould
Block includes multiple presupposed informations, and described authentication module is used for by multiple identifying codes respectively compared with presupposed information pair, when every
After individual identifying code corresponds with described multiple presupposed informations, it is proved to be successful, otherwise authentication failed;Computer network enters mould
Block, for after authentication module is proved to be successful, into computer network.
Preferably, described authentication module includes multiple authentication units, and each authentication unit includes a presupposed information.
Preferably, described authentication module includes the first authentication unit, the second authentication unit, the 3rd authentication unit, described
The first authentication unit, the second authentication unit, the 3rd authentication unit be respectively arranged with the first presupposed information, the second presupposed information,
3rd presupposed information.
Preferably, the first described authentication unit is used to verify the first identifying code, after the checking of the first identifying code is correct, enters
Enter the checking of the second authentication unit, otherwise authentication failed;The second described authentication unit is used for after the first identifying code is proved to be successful,
The second identifying code is verified, after the checking of the second identifying code is correct, into the 3rd authentication unit, no positive authentication failed;Described
Three authentication units are used for after the second described authentication unit is proved to be successful, and the 3rd identifying code are verified, when the 3rd identifying code is tested
After card is correct, identifying code is proved to be successful, into computer network, otherwise authentication failed.
Preferably, described authentication module is additionally operable to after identifying code authentication failed, send feedback information to user terminal.
Preferably, described authentication module is additionally operable to when sending feedback information, and described feedback information, which includes prompting, to be believed
Breath, described prompt message prompt the errors validity code in multiple identifying codes.
Technical scheme more than, the beneficial effect of the application are:
A kind of computer network authentication system described herein, can carry out multifactor authentication, wherein a gravidity part
After authentication failed, it will be unable to enter network system, security performance is higher.
With reference to following explanation and accompanying drawing, the particular implementation of the application is disclose in detail, specifies the original of the application
Reason can be in a manner of adopted.It should be understood that presently filed embodiment is not so limited in scope.In appended power
In the range of the spirit and terms that profit requires, presently filed embodiment includes many changes, modifications and is equal.
The feature for describing and/or showing for a kind of embodiment can be in a manner of same or similar one or more
Used in individual other embodiment, it is combined with the feature in other embodiment, or substitute the feature in other embodiment.
It should be emphasized that term "comprises/comprising" refers to the presence of feature, one integral piece, step or component when being used herein, but simultaneously
It is not excluded for the presence or additional of one or more further features, one integral piece, step or component.
Brief description of the drawings
Accompanying drawing described here is only used for task of explanation, and is not intended in any way to limit model disclosed in the present application
Enclose.In addition, shape and proportional sizes of each part in figure etc. are only schematical, the understanding to the application is used to help, and
It is not the specific shape and proportional sizes for limiting each part of the application.Those skilled in the art, can under teachings of the present application
To select various possible shapes and proportional sizes to implement the application as the case may be.In the accompanying drawings:
Accompanying drawing 1 is a kind of module map of computer network authentication system.
Embodiment
Below in conjunction with the accompanying drawing in the application embodiment, the technical scheme in the application embodiment is carried out clear
Chu, it is fully described by, it is clear that described embodiment is only a part of embodiment of the application, rather than whole realities
Apply mode.Based on the embodiment in the application, those of ordinary skill in the art institute under the premise of creative work is not made
The every other embodiment obtained, belong to the scope of the application protection.
It should be noted that when element is referred to as " being arranged at " another element, it can be directly on another element
Or there may also be element placed in the middle.When an element is considered as " connection " another element, it can be directly connected to
To another element or it may be simultaneously present centering elements.Term as used herein " vertical ", " horizontal ", " left side ",
For illustrative purposes only, it is unique embodiment to be not offered as " right side " and similar statement.
Unless otherwise defined, all of technologies and scientific terms used here by the article and the technical field of the application is belonged to
The implication that technical staff is generally understood that is identical.The term used in the description of the present application is intended merely to description tool herein
The purpose of the embodiment of body, it is not intended that in limitation the application.Term as used herein "and/or" includes one or more
The arbitrary and all combination of related Listed Items.
As illustrated, the application is related to a kind of computer network authentication system, described authentication system includes,
Information receiving module, for receiving the identifying code of user's input, and it is sent to described authentication module and is verified;Verify mould
Block, described authentication module include multiple presupposed informations, and described authentication module is used for multiple identifying codes respectively with presetting
Information after each identifying code corresponds with described multiple presupposed informations, is proved to be successful, otherwise authentication failed compared to Dui;
Computer network enters module, for after authentication module is proved to be successful, into computer network.Described authentication module includes
Multiple authentication units, each authentication unit include a presupposed information.Described authentication module includes the first authentication unit, second
Authentication unit, the 3rd authentication unit, the first described authentication unit, the second authentication unit, the 3rd authentication unit are respectively arranged with
First presupposed information, the second presupposed information, the 3rd presupposed information.The first described authentication unit is used to verify the first identifying code,
After the checking of the first identifying code is correct, verified into the second authentication unit, otherwise authentication failed;The second described authentication unit is used
In after the first identifying code is proved to be successful, the second identifying code is verified, it is single into the 3rd checking after the checking of the second identifying code is correct
Member, no positive authentication failed;The 3rd described authentication unit is used for after the second described authentication unit is proved to be successful, checking the 3rd
Identifying code, when the 3rd identifying code is verified it is correct after, identifying code is proved to be successful, into computer network, otherwise authentication failed.Institute
The authentication module stated is additionally operable to after identifying code authentication failed, send feedback information to user terminal.Described authentication module is also used
In when sending feedback information, described feedback information includes prompt message, and described prompt message is prompted in multiple identifying codes
Errors validity code.
A kind of computer network authentication system described herein, can carry out multifactor authentication, wherein a weight
After authentication failure, it will be unable to enter network system, security performance is higher.
It should be noted that in the description of the present application, in the description of the present application, unless otherwise indicated, " multiples' "
It is meant that two or more.
All articles and reference disclosed, including patent application and publication, for various purposes by quoting knot
Together in this.Describe the term " substantially by ... forms " of combination should include determined by element, composition, part or step and reality
Other elements, composition, part or the step of the basic novel feature of the combination are not influenceed in matter.Using term "comprising" or
" comprising " describes the combination of element here, composition, part or step it is also contemplated that substantially by these elements, composition, part
Or the embodiment that step is formed.Here by using term " can with ", it is intended to which illustrate that " can with " include is described any
Attribute is all optional.
Multiple element, composition, part or step can be provided by single integrated component, composition, part or step.It is alternative
Ground, single integrated component, composition, part or step can be divided into multiple element, composition, part or the step of separation.It is used for
The open "a" or "an" for describing element, composition, part or step is not said to exclude other elements, composition, part
Or step.
It should be understood that above description is to illustrate rather than to be limited.By reading above-mentioned retouch
State, many embodiments and many applications outside the example provided all will be aobvious and easy for a person skilled in the art
See.Therefore, the scope of this teaching should not determine with reference to foregoing description, but should with reference to preceding claims and this
The four corner of the equivalent that a little claims are possessed determines.It is for comprehensive purpose, all articles and special with reference to including
The disclosure of profit application and bulletin is all by reference to being incorporated herein.Theme disclosed herein is omitted in preceding claims
Any aspect is not intended to abandon the body matter, also should not be considered as applicant the theme is not thought of as it is disclosed
Apply for a part for theme.
Claims (6)
- A kind of 1. computer network authentication system, it is characterised in that:Described authentication system includes, and information receives mould Block, for receiving the identifying code of user's input, and it is sent to described authentication module and is verified;Authentication module, described tests Card module includes multiple presupposed informations, described authentication module for by multiple identifying codes respectively compared with presupposed information pair, After each identifying code corresponds with described multiple presupposed informations, it is proved to be successful, otherwise authentication failed;Computer network enters Enter module, for after authentication module is proved to be successful, into computer network.
- A kind of 2. computer network authentication system according to claim 1, it is characterised in that:Described authentication module Including multiple authentication units, each authentication unit includes a presupposed information.
- A kind of 3. computer network authentication system according to claim 2, it is characterised in that:Described authentication module Including the first authentication unit, the second authentication unit, the 3rd authentication unit, the first described authentication unit, the second authentication unit, Three authentication units are respectively arranged with the first presupposed information, the second presupposed information, the 3rd presupposed information.
- A kind of 4. computer network authentication system according to claim 3, it is characterised in that:The first described checking Unit is used to verify the first identifying code, after the checking of the first identifying code is correct, is verified into the second authentication unit, otherwise checking is lost Lose;The second described authentication unit is used for after the first identifying code is proved to be successful, and the second identifying code is verified, when the second identifying code is tested After card is correct, into the 3rd authentication unit, no positive authentication failed;The 3rd described authentication unit is used for when the second described checking After unit is proved to be successful, the 3rd identifying code is verified, after the 3rd identifying code is verified correctly, identifying code is proved to be successful, into meter Calculation machine network, otherwise authentication failed.
- A kind of 5. computer network authentication system according to claim 4, it is characterised in that:Described authentication module It is additionally operable to after identifying code authentication failed, send feedback information to user terminal.
- A kind of 6. computer network authentication system according to claim 5, it is characterised in that:Described authentication module It is additionally operable to when sending feedback information, described feedback information includes prompt message, and described prompt message prompts multiple checkings Errors validity code in code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711218526.7A CN107864149A (en) | 2017-11-28 | 2017-11-28 | A kind of computer network authentication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711218526.7A CN107864149A (en) | 2017-11-28 | 2017-11-28 | A kind of computer network authentication system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107864149A true CN107864149A (en) | 2018-03-30 |
Family
ID=61702725
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711218526.7A Pending CN107864149A (en) | 2017-11-28 | 2017-11-28 | A kind of computer network authentication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107864149A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060282893A1 (en) * | 2005-06-10 | 2006-12-14 | D-Link Corporation | Network information security zone joint defense system |
CN101895542A (en) * | 2010-07-05 | 2010-11-24 | 北京畅游时空软件技术有限公司 | Verification code acquiring method and device |
CN104038502A (en) * | 2014-06-24 | 2014-09-10 | 五八同城信息技术有限公司 | Verification method and system |
-
2017
- 2017-11-28 CN CN201711218526.7A patent/CN107864149A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060282893A1 (en) * | 2005-06-10 | 2006-12-14 | D-Link Corporation | Network information security zone joint defense system |
CN101895542A (en) * | 2010-07-05 | 2010-11-24 | 北京畅游时空软件技术有限公司 | Verification code acquiring method and device |
CN104038502A (en) * | 2014-06-24 | 2014-09-10 | 五八同城信息技术有限公司 | Verification method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106294821A (en) | A kind of BIM model verification method | |
CN106790034B (en) | A kind of method of internet of things equipment certification and secure accessing | |
CN101808092B (en) | Multi-certificate sharing method and system as well as intelligent card | |
CN103973711A (en) | Verification method and device | |
CN104767714A (en) | Method, terminal and system for associating user resource information | |
CN103593799A (en) | Method and system for natural-person information setting and corresponding method and system for friend recommending | |
CN105515781A (en) | Login system of application platform and login method thereof | |
CN106304264A (en) | A kind of wireless network access method and device | |
CN107368719A (en) | A kind of E-commerce transaction platform login authentication system | |
CN107864149A (en) | A kind of computer network authentication system | |
CN105320873B (en) | A kind of unlocking method of terminal applies, device, terminal and SIM card | |
CN106576040B (en) | Error rate control method for device-specific information | |
CN105306577A (en) | Data sharing system and method between handheld devices based on APP | |
CN106156996A (en) | Work management service system | |
CN104239772B (en) | A kind of information processing method and electronic equipment | |
CN108171024A (en) | A kind of encryption method of computer system | |
CN109726370A (en) | A kind of configurable verification rule packaging method and device | |
CN103237032A (en) | Consumption management system and method | |
CN109242414A (en) | A kind of contract management system | |
CN105991276A (en) | Key transmission system, method and apparatus for integrated circuit card | |
Artés et al. | Global configurations of singularities for quadratic differential systems with exactly two finite singularities of total multiplicity four | |
CN103927497B (en) | NDM document protection methods and device | |
Artes et al. | Global configurations of singularities for quadratic differential systems with exactly three finite singularities of total multiplicity four | |
CN110232293A (en) | Based on maximum delay subchain and the minimum delay cascade APUF circuit of subchain | |
CN108446980A (en) | A kind of mutual insurance system of year electric power bilateral contract and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180330 |