CN1697379A - Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification - Google Patents

Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification Download PDF

Info

Publication number
CN1697379A
CN1697379A CN 200510077335 CN200510077335A CN1697379A CN 1697379 A CN1697379 A CN 1697379A CN 200510077335 CN200510077335 CN 200510077335 CN 200510077335 A CN200510077335 A CN 200510077335A CN 1697379 A CN1697379 A CN 1697379A
Authority
CN
China
Prior art keywords
user
sign
cryptocenter
application
registration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510077335
Other languages
Chinese (zh)
Other versions
CN1697379B (en
Inventor
程朝辉
王李琰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ao Lian Information Security Technology Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200510077335 priority Critical patent/CN1697379B/en
Publication of CN1697379A publication Critical patent/CN1697379A/en
Application granted granted Critical
Publication of CN1697379B publication Critical patent/CN1697379B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

When requesting registration, user transfers service id such as Email address and user id for fee collecting such as number of handset to cryptographic center. The said center sends token 1 and token 2 to Email address and handset respectively. User returns tokens to acknowledge registration application. Receiving the feedback returned from the user, the cryptographic center validates the effective application. The invention binds two authentication modes, eliminates other invalid applications, and features simple method and easy of implementation.

Description

A kind of authentication method of public network secure communication service user identity of the cryptographic technique based on sign
Technical field
The invention belongs to networking technology area, specifically a kind of authentication method of public network secure communication service user identity of the cryptographic technique based on sign.
Background technology
Many safety systems based on the conventional public-key cryptosystem are being extensive use of.Such as important internet, applications: Email just has corresponding safety system PGP (Pretty GoodPrivacy) system etc.IETF (Internet Engineering Task Force) also has the corresponding standard S/MIME (Secure/Multipurpose Internet MailExtensions) of formulation.But this type systematic all depends on complicated certificate authority system: PKI (PublicKey Infrastructure).In calendar year 2001, two U.S. cryptologist Boneh and Franklin have proposed the encryption system IBE based on sign of the practicality that first fail safe can prove, be that Identity based encryption is (referring to document D.Boneh and M.Franklin.Identity based encryption from the Weil pairing.In Proceedings ofAdvances in Cryptology-Crypto 2001, LNCS 2139, pp.213-229, Springer-Verlag, 2001.).Cryptographic system based on sign no longer needs PKI, but directly uses the PKI of user's sign as the user, thereby has removed the dependence to PKI.
As the latest development of field of cryptography, have only Very few companies to provide in the world based on the password product that identifies.Topmost product is provided by Voltage company.But the said firm only provides the product of enterprise-level, and promptly product only provides security service for the communication between the employee of enterprise.Product line comprises: email encryption gateway, desktop software, file encryption, the instant messaging of safety etc.These products all are based on the application of enterprise-level, are doing a lot of work aspect the security strategy service, and the user mainly is in the face of user in the enterprise, also takes into account the casual user outside the minority enterprise.In the cryptographic system based on sign an important step is arranged, i.e. authentification of user (claiming subscription authentication again), and at the private key of authentication success back distribution corresponding to user ID.The product of Voltage is that universal method by enterprise-level software realizes for user's authentication, such as Windows system account number, Email system account etc.Indivedual casual users to the enterprise outside also can adopt the mode of mail answer to authenticate.
Fig. 1 is a common IBE process of Voltage product description: Li Si sends the privacy enhanced mail of an envelope based on identification technology to Zhang San.First step Li Si as sign (being Zhang San's PKI), sends privacy enhanced mail to Zhang San with Zhang San's Email address (Zhang San @b.com); Second after the step, Zhang San got the mail, and removed to apply for private key corresponding to Zhang San @b.com to cipher server; The 3rd goes on foot Zhang San deciphers mail after server obtains private key.
This is the process of a common IBE, and 2. step relates to the user to the cipher server verification process.The product of Voltage adopts following several authentication mode checking user:
A) the Exchange2000 server uses the Windows domain authentication,
B) the Exchange5.5 server uses the Windows domain authentication,
C) Light Directory Access Protocol (LDAP),
D) PKI customer's certificate,
E) smart card,
F) SecureID of RSA company card,
G) POP3 mail protocol authentication,
H) mail is replied authentication.
These methods are not all considered identity how to confirm a common common user, do not consider the payment methods based on public users yet, thereby the public network secure communication service can't be provided.Concretely a) and b) in method use the domain authentication method of Exchange mail server and Windows, obviously the common user can be in identical Windows territory.C) method needs the user all to a ldap directory registration, and this is unrealistic to the common user.D) method requires the user all to have the certificate of a PKI, and this is unrealistic equally to the common user, and the demand of PKI certificate just is being based on the cryptographic system of sign will remove.Attention is in enterprise uses, and the user may have one as the certificate of other purposes.E) and the method f) all need the common user to obtain smart card from certain hair fastener unit, and use these cards also to be difficult to carry out on the internet remote validation.G) method requires the mail service login password of all mail service provider sharing users of cipher server and common user, and mail service provider can not be ready and other party is shared these sensitive informations.H) method the checking user of safety but only use this method can't avoid personation, malice application, misoperation etc. to the ownership of Email address, also can't provide the public charging service.
Summary of the invention
The objective of the invention is to for adopting public network secure communication service that a kind of method for authenticating user identity is provided based on the cryptographic technique that identifies.This method is simple, can solve common user's authentication reliably, thereby makes the public network based on the cryptographic technique of sign to provide secure communication service to the common user easily, can also solve the charging problem when serving towards the public simultaneously.
Core concept of the present invention is the application at IBE, the first, confirm what the sign that the user will use is; The second, confirm what to have corresponding to the user of this sign; The 3rd, realize the subscriber authorisation that control is arranged that continues according to the result of preceding two steps, thereby realize that the user remembers expense.
The objective of the invention is to be achieved through the following technical solutions, it is characterized in that:
1) during user's request registration, transmit Email address or instant communication number or sign or the audio frequency that cryptographic service need be provided to cryptocenter by the Internet, video audio communication number or sign, transmit its phone number that has or fixed telephone number or facsimile machine number or other the common payment service terminals that can receive information sign simultaneously, and set a log-in password, its Email address or instant communication number or sign or sound, video audio communication number or sign will be used as user's sign, this sign will be used as PKI
2) after above-mentioned application for registration was received by cryptocenter, promptly the validity of the information that as follows user is provided was verified:
1. send the combination that 1, one token of a token is a string random digit or character or numeral and character to this user's Email address or QQ number or sound, video audio communication number,
2. phone number that has to this user or fixed telephone number or facsimile machine number or other terminals that can receive information send another token 2,
3. after this user receives these two tokens,, two tokens are fed back to cryptocenter, confirm its application for registration according to channel identical when collecting or the Requisition Validation homepage by cryptocenter,
3) after two tokens corresponding to same user of feedback are received by cryptocenter, confirm that promptly this user identity is effective, its application for registration is a live application.
After having authenticated the personal really part of user as stated above, cryptocenter confirms that user identity is effective, its application for registration is a live application, cryptocenter promptly can be it respective service (generating user's the private key and the client software of customization) is provided, and can collect corresponding cost to this user by the operator of this user mobile phone or fixed telephone or facsimile machine or other the common payment service terminals that can receive information sign or by the credit card that this user provides.The client obtains security service by the client software that uses customization.
This invention another one important content is the mandate that control is arranged that the user who uses service continued according to the user profile behind the authentication and the method for collection of charges.This invention uses the online user to verify that activating software service method authorized user uses service.User's client software need be verified to obtain to cryptocenter and authorize and activate respective service under following situation:
1. one month do not fix one day and carry out the automatic on-line checking.
2. when using the certain number of times of client software, verify automatically.
3. (deciphering has the file of specifying the deciphering time as needs) subsidiary checking when the user applies special password.
4. manual checking.The client can verify with the manual authentication function of client software.
If the user does not pay, cryptocenter will instruct client software to stop to provide service, after user charges, after reusing the manual checking of client software and passing through, recover service.
The present invention is owing to adopted checking step by step, the authentication mode of two kinds of checkings of binding, promptly issue tokens and require two tokens all to be replied and authenticate the validity that a common common user applies for the registration of by different channels, got rid of for various purposes or invalid application that misoperation causes, successfully provide a kind of simple method for authenticating user identity for public network secure communication service based on the cryptographic technique that identifies, common user's Verify Your Identity questions have been solved reliably, thereby make public network to provide employing (to comprise the public safety mailing system, public safety instantaneous communication system and sound to the common user easily based on the secure communication service of the cryptographic technique of sign, video sound information system etc.).Simultaneously, the present invention adopts the online user to verify and activates the service safe in utilization of service method authorized user, thereby realization continues authorization of service and note is taken.
Put it briefly, the present invention is that (or other closely links to each other with project that needs are provided services on the Internet by Email (or other sign that need provide services on the Internet)+mobile phone, be easy to checking, being easy to the means of toll administration) whether the checking user register effective method, thereby can be easily, assert any domestic consumer exactly, and by mobile phone (or landline telephone etc.) binding Fare Collection System, collect the charges by existing common carrier or credit card, form extraordinary payment mode, successfully solved the charging problem when serving towards the public, thereby the service that makes cryptographic technique based on sign form towards the public becomes a reality based on the public network secure communication of cryptographic technique of sign.With regard to authentication method, charge is an important step in the verification process.
Method of the present invention is simple, easy row, and reliable operation is applicable to the authenticating user identification of the public network secure communication service of various cryptographic techniques based on sign
Description of drawings
The present invention has following accompanying drawing:
The IBE process schematic diagram that Fig. 1 is common.
Fig. 2 authentication schematic flow sheet.
Fig. 3 authentication embodiment schematic diagram
Embodiment
Below in conjunction with specific embodiment the present invention is described in further detail.
Method of the present invention proposes at following problems: existing secure communication of network service system based on the cryptographic technique that identifies, owing to do not solve public's client identity authentication authentication question and charging problem, thereby can't carry out service to common customer, limited applying of this advanced technology on a large scale.The present invention makes up two kinds in the requisite existing communication technique of common user, combination by these two kinds of means, both solved identified problems, solved unique, the effective problem of public user identity again based on the public network secure communication service system of the cryptographic technique that identifies.The concrete authentication method that the present invention provides is:
1) during user's request registration, at first transmit Email address that cryptographic service need be provided or instant messaging sign (as the QQ number) or audio frequency, video labeling by the Internet to cryptocenter, its Email address or instant messaging sign (as the QQ number) or audio frequency, video labeling will be used as user's the sign based on the public network secure communication service system of the cryptographic technique of sign.Said Email address can be any legal valid email address, for example myibe001@yahoo.com, eric@cfdrive.com etc.Said instant messaging sign can be the given number of instant messaging service provider, for example the given number 59387321 (QQ number) of company of Tengxun.Said audio frequency, video labeling can be IP telephone numbers or account number, for example certain network account myapn001 of Skype company.
The user simultaneously transmits its phone number that has (for example 13501234567) or fixed telephone number (for example 67123456) to cryptocenter, or facsimile machine number (for example 67654321, be equivalent to special-purpose telephone number), or other the common payment service terminal that can receive information signs (for example Personal Handy-phone System number 60000999), the strange land application time should add area code (for example 010,0512), and sets a log-in password (for example 09873655).The number or the sign of these two kinds of means of communication that must provide is provided in the present invention, is the basis that public user identity is assert, wherein Email address or QQ number or sound, video labeling are the service object, is again one of authentication channel; Phone number or fixed telephone number or facsimile machine number etc. then are another authentication channels.
2) after above-mentioned application for registration was received by cryptocenter, promptly the validity of the information that as follows user is provided was verified:
1. send a token 1 to this user's Email address or QQ number or sound, video labeling.Token 1 is that cryptocenter is the combination of a string random digit of being sent of authenticated user identity or character or numeral and character, for example 7720889, axd43056 etc.,
2. phone number that has to this user or fixed telephone number or facsimile machine number or other the common payment service terminals that can receive information send another token 2.Token 2 is that cryptocenter is another string random digit or the character that sent of authenticated user identity or the combination of numeral and character, for example qscghu6809,1025798 etc.The use schematic diagram of token is referring to Fig. 3.For fixed telephone, so-called transmission token also can be a direct language notice, and whether inquiry has been registered, applied for certain cryptographic service and required the language that the sign etc. of service can the authenticated user identity.Token passing between cryptocenter and the user can be a mobile phone to mobile phone, mobile phone to landline telephone (fax telephone), facsimile machine to the server-ISP gateway of facsimile machine, cryptocenter to the information exchange system between mobile phone or other the common payment service terminals that can receive information and technical these several meanss of communication that can implement.
3. after this user receives these two tokens, can confirm its registration by dual mode.Method one: in time it is fed back to cryptocenter according to channel identical when collecting, confirm its application for registration." identical channel is confirmed when collecting " guaranteed that token sends and the equity of feedback channel, and then provides physics (as the Requisition Validation fax) or third party's voucher (telecommunications note record etc.) for application process.Method two: the user can use the Requisition Validation homepage of two token access cryptocenters that obtain.Finish application process by importing two tokens.Specific embodiment is referring to Fig. 3.Fig. 3 is for feeding back the embodiment schematic diagram of two tokens authentications by the Requisition Validation homepage of cryptocenter among the present invention, the addresses of items of mail sign that security service need be provided is filled on first hurdle, the token 1 that obtains by mail is filled on second hurdle, third column is filled in the token 2 that obtains by the mobile phone news in brief, the log-in password that last hurdle input user sets is submitted authentication then to.
The affirmation step of two tokens has been got rid of for various purposes the invalid application that (comprising malice) or misoperation cause, and has guaranteed the reliability of authenticating user identification.
3) after two tokens corresponding to same user of feedback are received by cryptocenter, confirm that promptly this user identity is effective, its application for registration is a live application.Because the present invention has sent two tokens from two different channels, only provide the applicant of these two channels can obtain this two tokens, and just understand these two tokens of feedback when having only this application people to determine to apply for the registration of really, thereby guaranteed the reliability of authentication method of the present invention, towards the public service and corresponding charge are implemented.
After having authenticated the personal really part of user as stated above, cryptocenter promptly can be this user corresponding service is provided, and can collect corresponding cost to this user by the operator of this user mobile phone or fixed telephone or facsimile machine or by the credit card that this user provides.
4) user uses the security service that the client software of customization provides, and client software is only obtaining just to provide service after corresponding the mandate from cryptocenter.Client software adopts the mode of online verification to authorize to cryptocenter's application.Cryptocenter is only just authorized definite user effective (being after the user normally pays).Except traditional charge method, this system supports the mobile phone Fare Collection System automatically, does not need by artificial or third party's authentication/billing system, can be directly and mobile phone or fixed-line telecom carrier's binding.
Above-mentioned verification process can this Figure illustrates in the present invention referring to Fig. 2, authenticated user and binding note charge system, thereby for the process of subscription authentication is provided based on the cryptographic system that identifies.
The method that the present invention provides is simple, and is easy to implement, and can obtain higher social efficiency and economic benefit.

Claims (2)

1. authentication method of public network secure communication service user identity based on the cryptographic technique of sign is characterized in that:
1) during user's request registration, transmit Email address or instant communication number or sign or the audio frequency that cryptographic service need be provided to cryptocenter by the Internet, video audio communication number or sign, transmit its phone number that has or fixed telephone number or facsimile machine number or other the common payment service terminals that can receive information sign simultaneously, and set a log-in password, its Email address or instant communication number or sign or sound, video audio communication number or sign will be used as user's sign, this sign will be used as PKI
2) after above-mentioned application for registration was received by cryptocenter, promptly the validity of the information that as follows user is provided was verified:
1. send the combination that 1, one token of a token is a string random digit or character or numeral and character to this user's Email address or QQ number or sound, video audio communication number,
2. phone number that has to this user or fixed telephone number or facsimile machine number or other terminals that can receive information send another token 2,
3. after this user receives these two tokens,, two tokens are fed back to cryptocenter, confirm its application for registration according to channel identical when collecting or the Requisition Validation homepage by cryptocenter,
3) after two tokens corresponding to same user of feedback are received by cryptocenter, confirm that promptly this user identity is effective, its application for registration is a live application.
2. method for authenticating user identity as claimed in claim 1, it is characterized in that cryptocenter confirms that user identity is effective, after its application for registration is live application, collect corresponding cost to this user by the operator of this user mobile phone or fixed telephone or facsimile machine or other the common payment service terminals that can receive information sign or by the credit card that this user provides.
CN 200510077335 2005-06-22 2005-06-22 Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification Active CN1697379B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510077335 CN1697379B (en) 2005-06-22 2005-06-22 Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510077335 CN1697379B (en) 2005-06-22 2005-06-22 Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification

Publications (2)

Publication Number Publication Date
CN1697379A true CN1697379A (en) 2005-11-16
CN1697379B CN1697379B (en) 2011-04-20

Family

ID=35349920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510077335 Active CN1697379B (en) 2005-06-22 2005-06-22 Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification

Country Status (1)

Country Link
CN (1) CN1697379B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100574524C (en) * 2006-07-19 2009-12-23 王李琰 A kind of verifying SMS and reliable sorted transmission method based on the cryptographic technique that identifies
CN1980226B (en) * 2005-12-08 2010-08-11 腾讯科技(深圳)有限公司 Safety protection method for subscriber information in instant communication, and system therefor
CN101030855B (en) * 2006-03-02 2011-01-12 腾讯科技(深圳)有限公司 Method and server for verifying account register information
CN1859081B (en) * 2006-02-17 2011-04-06 华为技术有限公司 Immediate news enciphering transmission method and system
WO2011120357A1 (en) * 2010-03-30 2011-10-06 腾讯科技(深圳)有限公司 System, method and server for input verification
CN101741851B (en) * 2009-12-23 2012-06-20 北京交通大学 Token updating method for enhancing guarantee of source address authenticity
CN102811228A (en) * 2012-08-31 2012-12-05 中国联合网络通信集团有限公司 Network business login method, equipment and system
CN102044094B (en) * 2009-10-10 2014-04-09 中国移动通信集团福建有限公司 Line polling management system and method
CN104009850A (en) * 2014-06-09 2014-08-27 中国联合网络通信集团有限公司 User identity authentication method and system
CN104200154A (en) * 2014-09-22 2014-12-10 上海众人科技有限公司 Identity based installation package signing method and identity based installation package signing device
CN109379194A (en) * 2018-12-11 2019-02-22 西安慧博习兆信息技术有限公司 With the safe encryption and decryption of tagged keys, signature, the network system for transmitting file
CN110033359A (en) * 2013-08-15 2019-07-19 斯吾普知识产权控股有限责任公司 The system and method for safety is improved using the SMTP Email by SPF/DKIM flow verification
CN112334879A (en) * 2019-06-04 2021-02-05 思杰系统有限公司 Computing system providing direct routing of desktop as a service (DaaS) sessions to private networks and related methods
CN113132317A (en) * 2019-12-31 2021-07-16 中移互联网有限公司 Identity authentication method, system and device
CN114938361A (en) * 2022-05-30 2022-08-23 阿里云计算有限公司 Media service providing method, system, device and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1394032A (en) * 2001-06-25 2003-01-29 深圳市清华深讯科技发展有限公司 Internet charge method by communication terminal to perform identity authentication
CN1416073A (en) * 2002-11-05 2003-05-07 戚滨宏 Method for authenticating self idetification
CN1571453A (en) * 2003-07-18 2005-01-26 英华达(南京)科技有限公司 Method for implementing network trade safety certification
CN1601537A (en) * 2003-09-25 2005-03-30 徐国庆 Segment cipher anti-fraud method

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980226B (en) * 2005-12-08 2010-08-11 腾讯科技(深圳)有限公司 Safety protection method for subscriber information in instant communication, and system therefor
CN1859081B (en) * 2006-02-17 2011-04-06 华为技术有限公司 Immediate news enciphering transmission method and system
CN101030855B (en) * 2006-03-02 2011-01-12 腾讯科技(深圳)有限公司 Method and server for verifying account register information
CN100574524C (en) * 2006-07-19 2009-12-23 王李琰 A kind of verifying SMS and reliable sorted transmission method based on the cryptographic technique that identifies
CN102044094B (en) * 2009-10-10 2014-04-09 中国移动通信集团福建有限公司 Line polling management system and method
CN101741851B (en) * 2009-12-23 2012-06-20 北京交通大学 Token updating method for enhancing guarantee of source address authenticity
WO2011120357A1 (en) * 2010-03-30 2011-10-06 腾讯科技(深圳)有限公司 System, method and server for input verification
CN102811228A (en) * 2012-08-31 2012-12-05 中国联合网络通信集团有限公司 Network business login method, equipment and system
CN102811228B (en) * 2012-08-31 2016-07-06 中国联合网络通信集团有限公司 Network login method, equipment and system
CN110033359A (en) * 2013-08-15 2019-07-19 斯吾普知识产权控股有限责任公司 The system and method for safety is improved using the SMTP Email by SPF/DKIM flow verification
CN110033359B (en) * 2013-08-15 2020-08-07 斯吾普知识产权控股有限责任公司 System and method for improving security using SMTP emails verified by SPF/DKIM flow
CN104009850A (en) * 2014-06-09 2014-08-27 中国联合网络通信集团有限公司 User identity authentication method and system
CN104009850B (en) * 2014-06-09 2017-08-25 中国联合网络通信集团有限公司 A kind of method for authenticating user identity and system
CN104200154A (en) * 2014-09-22 2014-12-10 上海众人科技有限公司 Identity based installation package signing method and identity based installation package signing device
CN109379194A (en) * 2018-12-11 2019-02-22 西安慧博习兆信息技术有限公司 With the safe encryption and decryption of tagged keys, signature, the network system for transmitting file
CN112334879A (en) * 2019-06-04 2021-02-05 思杰系统有限公司 Computing system providing direct routing of desktop as a service (DaaS) sessions to private networks and related methods
CN113132317A (en) * 2019-12-31 2021-07-16 中移互联网有限公司 Identity authentication method, system and device
CN113132317B (en) * 2019-12-31 2023-03-21 中移互联网有限公司 Identity authentication method, system and device
CN114938361A (en) * 2022-05-30 2022-08-23 阿里云计算有限公司 Media service providing method, system, device and storage medium

Also Published As

Publication number Publication date
CN1697379B (en) 2011-04-20

Similar Documents

Publication Publication Date Title
CN1697379B (en) Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification
US9882728B2 (en) Identity-based certificate management
US7865173B2 (en) Method and arrangement for authentication procedures in a communication network
CN1212716C (en) Method of sharing subscriber confirming information in different application systems of internet
CN103020825B (en) A kind of secure payment authentication method based on software client
US20060123476A1 (en) System and method for warranting electronic mail using a hybrid public key encryption scheme
CN105407079A (en) Novel terminal safety soft secret key management method
CN102946603B (en) Based on the unified identity authentication method of social characteristic in power cloud system
KR101532109B1 (en) Signature method and device
CN101674304A (en) Network identity authentication system and method
JP2006260538A5 (en)
CN100558034C (en) A kind of email authentication and reliable sorted transmission method based on the cryptographic technique that identifies
CN101207482A (en) System and method for implementation of single login
CN102457507A (en) Secure sharing method, device and system for cloud computing resources
CN101242269B (en) Mobile communication terminal, service provider terminal, system and method for subscribing telecommunication service
EP2748963A1 (en) Method, system and apparatus for a communications client program and an associated transfer server for onymous and secure communications
CN103077461A (en) System and method for applying for financial document using mobile communication device
WO2008046246A1 (en) System and method for preventing spam by using pay-charge-contribution and authentication means
CN110321682B (en) Unified identity authentication method and device based on UAF (Universal authentication framework) and IBC (identity based communication)
CN104869000B (en) One kind is based on the cross-domain safety communicating method of id password and system
CN106921639A (en) Mobile digital certificate application method and device
CN114866255A (en) Multi-factor authentication method oriented to multi-IDP aggregation by taking user as center
CN103986724A (en) Real-name authentication method and system for e-mail
JP2015226137A (en) Terminal authentication method using client certificate, terminal authentication system, and program
KR20030042789A (en) A trust model for an authentication of a roaming user

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: SHENZHEN AOLIAN TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: WANG LIYAN

Effective date: 20140120

Free format text: FORMER OWNER: CHENG CHAOHUI

Effective date: 20140120

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 518048 SHENZHEN, GUANGDONG PROVINCE TO: 518000 SHENZHEN, GUANGDONG PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20140120

Address after: 518000. Guangdong, Shenzhen, Baoan District, Xin'an street, Xincheng Road, Fortis, Mong Kok, 1 shopping malls, 334, sixteen

Patentee after: Shenzhen OLYM Technology Co., Ltd.

Address before: 518048 Guangdong city of Shenzhen province Futian District Yitian Lu Fu Le Graceland 2-304

Patentee before: Wang Liyan

Patentee before: Cheng Chaohui

DD01 Delivery of document by public notice

Addressee: Wang Liyan

Document name: Notification of Passing Examination on Formalities

ASS Succession or assignment of patent right

Owner name: SHENZHEN AOLIAN INFORMATION SECURITY TECHNOLOGY CO

Free format text: FORMER OWNER: SHENZHEN AOLIAN TECHNOLOGY CO., LTD.

Effective date: 20150108

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150108

Address after: 518000 Guangdong City, Shenzhen Province, Xin'an street, Metro Avenue, Mong Kok, Mong Kok, Mong Kok, 1 shopping malls, 334 of the Seventeen of the

Patentee after: Shenzhen Ao Lian information security technology Co., Ltd

Address before: 518000. Guangdong, Shenzhen, Baoan District, Xin'an street, Xincheng Road, Fortis, Mong Kok, 1 shopping malls, 334, sixteen

Patentee before: Shenzhen OLYM Technology Co., Ltd.