CN107864149A - A kind of computer network authentication system - Google Patents

A kind of computer network authentication system Download PDF

Info

Publication number
CN107864149A
CN107864149A CN201711218526.7A CN201711218526A CN107864149A CN 107864149 A CN107864149 A CN 107864149A CN 201711218526 A CN201711218526 A CN 201711218526A CN 107864149 A CN107864149 A CN 107864149A
Authority
CN
China
Prior art keywords
authentication
identifying code
computer network
module
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711218526.7A
Other languages
Chinese (zh)
Inventor
殷华伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou East Hao Computer System Engineering Co Ltd
Original Assignee
Suzhou East Hao Computer System Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou East Hao Computer System Engineering Co Ltd filed Critical Suzhou East Hao Computer System Engineering Co Ltd
Priority to CN201711218526.7A priority Critical patent/CN107864149A/en
Publication of CN107864149A publication Critical patent/CN107864149A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords

Abstract

The application is related to a kind of computer network authentication system, and described authentication system includes, information receiving module, for receiving the identifying code of user's input, and is sent to described authentication module and is verified;Authentication module, described authentication module include multiple presupposed informations, and described authentication module is used for multiple identifying codes respectively with presupposed information compared with pair, after each identifying code is with described multiple presupposed informations one-to-one corresponding, is proved to be successful, otherwise authentication failed;Computer network enters module, for after authentication module is proved to be successful, into computer network.A kind of computer network authentication system described herein, can carry out multifactor authentication, wherein after gravidity part authentication failed, will be unable to enter network system, security performance is higher.

Description

A kind of computer network authentication system
Technical field
The application is related to a kind of computer network authentication system.
Background technology
In the prior art, after the checking system of computer network identity generally only needs an identifying code input correct i.e. Network system can be entered, but when the network system security rank is very high, common checking system can not meet needs, therefore It is badly in need of inventing a kind of higher authentication system of safety coefficient.
The content of the invention
The main purpose of the application is to provide a kind of computer network authentication system, to overcome prior art etc. to ask Topic.
To realize aforementioned application purpose, the technical scheme that the application uses includes:
The application is related to a kind of computer network authentication system, and described authentication system includes, information receiving module, For receiving the identifying code of user's input, and it is sent to described authentication module and is verified;Authentication module, described checking mould Block includes multiple presupposed informations, and described authentication module is used for by multiple identifying codes respectively compared with presupposed information pair, when every After individual identifying code corresponds with described multiple presupposed informations, it is proved to be successful, otherwise authentication failed;Computer network enters mould Block, for after authentication module is proved to be successful, into computer network.
Preferably, described authentication module includes multiple authentication units, and each authentication unit includes a presupposed information.
Preferably, described authentication module includes the first authentication unit, the second authentication unit, the 3rd authentication unit, described The first authentication unit, the second authentication unit, the 3rd authentication unit be respectively arranged with the first presupposed information, the second presupposed information, 3rd presupposed information.
Preferably, the first described authentication unit is used to verify the first identifying code, after the checking of the first identifying code is correct, enters Enter the checking of the second authentication unit, otherwise authentication failed;The second described authentication unit is used for after the first identifying code is proved to be successful, The second identifying code is verified, after the checking of the second identifying code is correct, into the 3rd authentication unit, no positive authentication failed;Described Three authentication units are used for after the second described authentication unit is proved to be successful, and the 3rd identifying code are verified, when the 3rd identifying code is tested After card is correct, identifying code is proved to be successful, into computer network, otherwise authentication failed.
Preferably, described authentication module is additionally operable to after identifying code authentication failed, send feedback information to user terminal.
Preferably, described authentication module is additionally operable to when sending feedback information, and described feedback information, which includes prompting, to be believed Breath, described prompt message prompt the errors validity code in multiple identifying codes.
Technical scheme more than, the beneficial effect of the application are:
A kind of computer network authentication system described herein, can carry out multifactor authentication, wherein a gravidity part After authentication failed, it will be unable to enter network system, security performance is higher.
With reference to following explanation and accompanying drawing, the particular implementation of the application is disclose in detail, specifies the original of the application Reason can be in a manner of adopted.It should be understood that presently filed embodiment is not so limited in scope.In appended power In the range of the spirit and terms that profit requires, presently filed embodiment includes many changes, modifications and is equal.
The feature for describing and/or showing for a kind of embodiment can be in a manner of same or similar one or more Used in individual other embodiment, it is combined with the feature in other embodiment, or substitute the feature in other embodiment.
It should be emphasized that term "comprises/comprising" refers to the presence of feature, one integral piece, step or component when being used herein, but simultaneously It is not excluded for the presence or additional of one or more further features, one integral piece, step or component.
Brief description of the drawings
Accompanying drawing described here is only used for task of explanation, and is not intended in any way to limit model disclosed in the present application Enclose.In addition, shape and proportional sizes of each part in figure etc. are only schematical, the understanding to the application is used to help, and It is not the specific shape and proportional sizes for limiting each part of the application.Those skilled in the art, can under teachings of the present application To select various possible shapes and proportional sizes to implement the application as the case may be.In the accompanying drawings:
Accompanying drawing 1 is a kind of module map of computer network authentication system.
Embodiment
Below in conjunction with the accompanying drawing in the application embodiment, the technical scheme in the application embodiment is carried out clear Chu, it is fully described by, it is clear that described embodiment is only a part of embodiment of the application, rather than whole realities Apply mode.Based on the embodiment in the application, those of ordinary skill in the art institute under the premise of creative work is not made The every other embodiment obtained, belong to the scope of the application protection.
It should be noted that when element is referred to as " being arranged at " another element, it can be directly on another element Or there may also be element placed in the middle.When an element is considered as " connection " another element, it can be directly connected to To another element or it may be simultaneously present centering elements.Term as used herein " vertical ", " horizontal ", " left side ", For illustrative purposes only, it is unique embodiment to be not offered as " right side " and similar statement.
Unless otherwise defined, all of technologies and scientific terms used here by the article and the technical field of the application is belonged to The implication that technical staff is generally understood that is identical.The term used in the description of the present application is intended merely to description tool herein The purpose of the embodiment of body, it is not intended that in limitation the application.Term as used herein "and/or" includes one or more The arbitrary and all combination of related Listed Items.
As illustrated, the application is related to a kind of computer network authentication system, described authentication system includes, Information receiving module, for receiving the identifying code of user's input, and it is sent to described authentication module and is verified;Verify mould Block, described authentication module include multiple presupposed informations, and described authentication module is used for multiple identifying codes respectively with presetting Information after each identifying code corresponds with described multiple presupposed informations, is proved to be successful, otherwise authentication failed compared to Dui; Computer network enters module, for after authentication module is proved to be successful, into computer network.Described authentication module includes Multiple authentication units, each authentication unit include a presupposed information.Described authentication module includes the first authentication unit, second Authentication unit, the 3rd authentication unit, the first described authentication unit, the second authentication unit, the 3rd authentication unit are respectively arranged with First presupposed information, the second presupposed information, the 3rd presupposed information.The first described authentication unit is used to verify the first identifying code, After the checking of the first identifying code is correct, verified into the second authentication unit, otherwise authentication failed;The second described authentication unit is used In after the first identifying code is proved to be successful, the second identifying code is verified, it is single into the 3rd checking after the checking of the second identifying code is correct Member, no positive authentication failed;The 3rd described authentication unit is used for after the second described authentication unit is proved to be successful, checking the 3rd Identifying code, when the 3rd identifying code is verified it is correct after, identifying code is proved to be successful, into computer network, otherwise authentication failed.Institute The authentication module stated is additionally operable to after identifying code authentication failed, send feedback information to user terminal.Described authentication module is also used In when sending feedback information, described feedback information includes prompt message, and described prompt message is prompted in multiple identifying codes Errors validity code.
A kind of computer network authentication system described herein, can carry out multifactor authentication, wherein a weight After authentication failure, it will be unable to enter network system, security performance is higher.
It should be noted that in the description of the present application, in the description of the present application, unless otherwise indicated, " multiples' " It is meant that two or more.
All articles and reference disclosed, including patent application and publication, for various purposes by quoting knot Together in this.Describe the term " substantially by ... forms " of combination should include determined by element, composition, part or step and reality Other elements, composition, part or the step of the basic novel feature of the combination are not influenceed in matter.Using term "comprising" or " comprising " describes the combination of element here, composition, part or step it is also contemplated that substantially by these elements, composition, part Or the embodiment that step is formed.Here by using term " can with ", it is intended to which illustrate that " can with " include is described any Attribute is all optional.
Multiple element, composition, part or step can be provided by single integrated component, composition, part or step.It is alternative Ground, single integrated component, composition, part or step can be divided into multiple element, composition, part or the step of separation.It is used for The open "a" or "an" for describing element, composition, part or step is not said to exclude other elements, composition, part Or step.
It should be understood that above description is to illustrate rather than to be limited.By reading above-mentioned retouch State, many embodiments and many applications outside the example provided all will be aobvious and easy for a person skilled in the art See.Therefore, the scope of this teaching should not determine with reference to foregoing description, but should with reference to preceding claims and this The four corner of the equivalent that a little claims are possessed determines.It is for comprehensive purpose, all articles and special with reference to including The disclosure of profit application and bulletin is all by reference to being incorporated herein.Theme disclosed herein is omitted in preceding claims Any aspect is not intended to abandon the body matter, also should not be considered as applicant the theme is not thought of as it is disclosed Apply for a part for theme.

Claims (6)

  1. A kind of 1. computer network authentication system, it is characterised in that:Described authentication system includes, and information receives mould Block, for receiving the identifying code of user's input, and it is sent to described authentication module and is verified;Authentication module, described tests Card module includes multiple presupposed informations, described authentication module for by multiple identifying codes respectively compared with presupposed information pair, After each identifying code corresponds with described multiple presupposed informations, it is proved to be successful, otherwise authentication failed;Computer network enters Enter module, for after authentication module is proved to be successful, into computer network.
  2. A kind of 2. computer network authentication system according to claim 1, it is characterised in that:Described authentication module Including multiple authentication units, each authentication unit includes a presupposed information.
  3. A kind of 3. computer network authentication system according to claim 2, it is characterised in that:Described authentication module Including the first authentication unit, the second authentication unit, the 3rd authentication unit, the first described authentication unit, the second authentication unit, Three authentication units are respectively arranged with the first presupposed information, the second presupposed information, the 3rd presupposed information.
  4. A kind of 4. computer network authentication system according to claim 3, it is characterised in that:The first described checking Unit is used to verify the first identifying code, after the checking of the first identifying code is correct, is verified into the second authentication unit, otherwise checking is lost Lose;The second described authentication unit is used for after the first identifying code is proved to be successful, and the second identifying code is verified, when the second identifying code is tested After card is correct, into the 3rd authentication unit, no positive authentication failed;The 3rd described authentication unit is used for when the second described checking After unit is proved to be successful, the 3rd identifying code is verified, after the 3rd identifying code is verified correctly, identifying code is proved to be successful, into meter Calculation machine network, otherwise authentication failed.
  5. A kind of 5. computer network authentication system according to claim 4, it is characterised in that:Described authentication module It is additionally operable to after identifying code authentication failed, send feedback information to user terminal.
  6. A kind of 6. computer network authentication system according to claim 5, it is characterised in that:Described authentication module It is additionally operable to when sending feedback information, described feedback information includes prompt message, and described prompt message prompts multiple checkings Errors validity code in code.
CN201711218526.7A 2017-11-28 2017-11-28 A kind of computer network authentication system Pending CN107864149A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711218526.7A CN107864149A (en) 2017-11-28 2017-11-28 A kind of computer network authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711218526.7A CN107864149A (en) 2017-11-28 2017-11-28 A kind of computer network authentication system

Publications (1)

Publication Number Publication Date
CN107864149A true CN107864149A (en) 2018-03-30

Family

ID=61702725

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711218526.7A Pending CN107864149A (en) 2017-11-28 2017-11-28 A kind of computer network authentication system

Country Status (1)

Country Link
CN (1) CN107864149A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060282893A1 (en) * 2005-06-10 2006-12-14 D-Link Corporation Network information security zone joint defense system
CN101895542A (en) * 2010-07-05 2010-11-24 北京畅游时空软件技术有限公司 Verification code acquiring method and device
CN104038502A (en) * 2014-06-24 2014-09-10 五八同城信息技术有限公司 Verification method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060282893A1 (en) * 2005-06-10 2006-12-14 D-Link Corporation Network information security zone joint defense system
CN101895542A (en) * 2010-07-05 2010-11-24 北京畅游时空软件技术有限公司 Verification code acquiring method and device
CN104038502A (en) * 2014-06-24 2014-09-10 五八同城信息技术有限公司 Verification method and system

Similar Documents

Publication Publication Date Title
CN106294821A (en) A kind of BIM model verification method
CN106790034B (en) A kind of method of internet of things equipment certification and secure accessing
CN101808092B (en) Multi-certificate sharing method and system as well as intelligent card
CN103973711A (en) Verification method and device
CN104767714A (en) Method, terminal and system for associating user resource information
CN103593799A (en) Method and system for natural-person information setting and corresponding method and system for friend recommending
CN105515781A (en) Login system of application platform and login method thereof
CN106304264A (en) A kind of wireless network access method and device
CN107368719A (en) A kind of E-commerce transaction platform login authentication system
CN107864149A (en) A kind of computer network authentication system
CN105320873B (en) A kind of unlocking method of terminal applies, device, terminal and SIM card
CN106576040B (en) Error rate control method for device-specific information
CN105306577A (en) Data sharing system and method between handheld devices based on APP
CN106156996A (en) Work management service system
CN104239772B (en) A kind of information processing method and electronic equipment
CN108171024A (en) A kind of encryption method of computer system
CN109726370A (en) A kind of configurable verification rule packaging method and device
CN103237032A (en) Consumption management system and method
CN109242414A (en) A kind of contract management system
CN105991276A (en) Key transmission system, method and apparatus for integrated circuit card
Artés et al. Global configurations of singularities for quadratic differential systems with exactly two finite singularities of total multiplicity four
CN103927497B (en) NDM document protection methods and device
Artes et al. Global configurations of singularities for quadratic differential systems with exactly three finite singularities of total multiplicity four
CN110232293A (en) Based on maximum delay subchain and the minimum delay cascade APUF circuit of subchain
CN108446980A (en) A kind of mutual insurance system of year electric power bilateral contract and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180330