WO2022040950A1 - Anonymous real-name authentication method - Google Patents

Anonymous real-name authentication method Download PDF

Info

Publication number
WO2022040950A1
WO2022040950A1 PCT/CN2020/111199 CN2020111199W WO2022040950A1 WO 2022040950 A1 WO2022040950 A1 WO 2022040950A1 CN 2020111199 W CN2020111199 W CN 2020111199W WO 2022040950 A1 WO2022040950 A1 WO 2022040950A1
Authority
WO
WIPO (PCT)
Prior art keywords
real
authentication
name authentication
user
name
Prior art date
Application number
PCT/CN2020/111199
Other languages
French (fr)
Chinese (zh)
Inventor
黄策
Original Assignee
黄策
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 黄策 filed Critical 黄策
Priority to PCT/CN2020/111199 priority Critical patent/WO2022040950A1/en
Publication of WO2022040950A1 publication Critical patent/WO2022040950A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the invention relates to a real-name authentication method.
  • the present invention proposes a brand-new real-name authentication method. This method is based on the real-name authentication information of the network service operator, and indirectly completes the real-name authentication. In this anonymous real-name authentication process, the user's real-name information will not be exposed on the network, and the application service provider that needs to be based on real-name authentication is provided. There is no real-name information of the user in the server.
  • This authentication method provides advantages: 1) It can effectively block the leakage of offline personal identity information and the false real-name authentication completed online after being stolen. 2) Various hacking activities and criminal activities that steal real-name authentication information from servers that provide services based on real-name authentication can be completely suppressed.
  • the present invention provides an anonymous real-name authentication method.
  • the anonymous real-name authentication method of the present invention is realized through the following steps:
  • the user enters the online real-name authentication code on the Internet terminal connected to the Internet access device and obtains the second-level online real-name authentication code from the network service provider.
  • the network service provider establishes the user's real-name authentication code and second-level online real-name authentication code.
  • the server of the service provider will then receive the second-level online real-name authentication code, the MAC code of the user's Internet terminal, the electronic ID of the user's Internet device, the MAC code of all routers from the entrance device to the public network exit, and the public network.
  • the network IP address is submitted to the network service provider for authentication routing information fingerprint comparison;
  • the network service provider compares the received authentication routing information fingerprint with the saved authentication routing information fingerprint, and returns the comparison result (Yes or No) to the service provider;
  • the service provider completes anonymous real-name authentication or rejects anonymous service authentication according to the result returned by the network service provider.
  • the MAC code of the user's surfing terminal and the electronic ID of the user's surfing device are the fingerprint parameters that the user can select, that is, the user can select one or all of the two parameters as valid parameters or invalid parameters.
  • the validity of the secondary real-name authentication code can be set by the user as: one-time valid, valid for a certain period of time or permanent valid.
  • the user can also authenticate other Internet terminals owned by the user.
  • the device authentication process is to exchange data with the server through other Internet access terminals that need to be authenticated.
  • the server collects the MAC codes or other electronic IDs of the other Internet terminals of the user to be authenticated, or implants a specific electronic ID into the terminal.
  • at least one information exchange occurs in the aforementioned It is carried out in the authentication channel formed in the anonymous authentication process.
  • the real-name authentication completed through the above steps can achieve the following purposes: 1) The real-name information leaked by users offline cannot be transmitted online, thus avoiding the leakage of offline real-name information and being stolen online. 2) The real-name authentication information will not be leaked during the authentication process. 3) There is no real-name information in the server of the service provider that provides online services based on the real-name authentication information, which can effectively avoid various hackers and criminal activities aimed at stealing the real-name information in the server.
  • This embodiment takes the process of someone going to an e-commerce website for real-name authentication as an example.
  • Step 1 A person goes to the mobile company's business office to apply for online account opening. After the staff of the mobile business office completes the verification of the ID card and the account holder's personal ID according to the national regulations, he will give him the online device and the real-name authentication code, and put the ID card. The information, the MAC code of the Internet device, and the Internet real-name authentication code are registered and then transferred to the secondary Internet authentication code generation server in the background.
  • Step 2 Someone at home on the Internet terminal connected to the Internet device, enters the Internet real-name authentication code, and applies for the secondary Internet access authentication code to the mobile secondary Internet access authentication code generation server.
  • a person can set one or all of the MAC code of the Internet terminal or the electronic ID of the Internet terminal to be valid parameters in the authentication routing information fingerprint, and can also set the secondary Internet authentication code for this application. It is valid for a single time or for a certain period of time or permanently.
  • the mobile secondary Internet access authentication code generation server transmits the generated secondary Internet access authentication code to someone, and transmits the corresponding generated authentication routing information fingerprint to the authentication routing information fingerprint query server.
  • Step 3 A person's home is connected to the Internet terminal of the Internet device, logs in to an e-commerce website, enters the second-level Internet access authentication code, and submits an authentication application to the website.
  • the website sends the received secondary Internet access authentication code, extracted routing information, the MAC code and electronic ID of the Internet terminal to the mobile authentication routing information fingerprint query server to apply for authentication.
  • Step 4 The authentication routing information fingerprint query server compares the received authentication routing information fingerprint with the stored authentication routing information fingerprint, and returns the comparison result (Yes or No) to an e-commerce website.
  • Step 5 An e-commerce website completes the current authentication service or rejects the current authentication service according to the returned result.
  • Step 6 Someone proceeds with device authentication for both phones in the home.
  • a person uses these two mobile phones to interact with an e-commerce website.
  • an e-commerce website reads the MAC codes and electronic IDs of the two mobile phones, and implants the electronic IDs automatically generated by the website respectively. Enter both phones to complete device authentication for someone's two phones.
  • step 6 the device authentication of a person's two mobile phones at home is carried out under the condition that anonymous real-name authentication has been completed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Internet applications have been deeply embedded in all aspects of people's daily life, and real-name authentication is used in many Internet applications. However, currently due to a wide variety of reasons, real-name authentication is merely a formality and does not have the desired effect of real-name authentication. Moreover, there is a large amount of user authentication information in a server of an application service provider having real-name authentication, thereby causing the application service providers to become attack targets for various hackers and criminal activities. Provided is a new real-name authentication method. The method is for indirectly completing, on the basis of real-name authentication information of a network service operator, real-name authentication. The method has the advantages of: 1) the leakage of personal identity information off-line can be effectively blocked, and false real-name authentication completed online after same is stolen by a person can be effectively blocked; and 2) various hacker activities and criminal activities of the theft of personal information in a provider server having real-name authentication information may be totally deterred and prevented.

Description

匿名式的实名认证方法Anonymous real-name authentication method 技术领域technical field
本发明涉及一种实名认证方法。The invention relates to a real-name authentication method.
背景技术Background technique
互联网应用已深深的嵌入到人们日常生活的方方面面,实名认证在很多的互联网应用中都有使用。但目前因各种各样的原因,使得很多的实名认证流于形式,从而使得实名认证并没有取得应有的效力。同时因在提供需要实名认证的服务商的服务器中,有大量的用户的实名认证信息,从而使得这些提供需要实名认证的服务商服务器成为各种黑客和犯罪活动的攻击目标。Internet applications have been deeply embedded in all aspects of people's daily life, and real-name authentication is used in many Internet applications. But at present, due to various reasons, many real-name authentications are mere formalities, so that real-name authentication has not achieved its due effect. At the same time, because there are a large number of users' real-name authentication information in the servers of service providers that require real-name authentication, these servers of service providers that require real-name authentication have become targets of various hackers and criminal activities.
本发明提出了一种全新的实名认证方法。该方法是基于网络服务运行商的实名认证信息,间接完成实名认证,在这个匿名的实名认证过程中,用户的实名信息不会暴露在网络上,而提供需要以实名认证为基础的应用服务商的服务器中,也没有用户的实名信息。The present invention proposes a brand-new real-name authentication method. This method is based on the real-name authentication information of the network service operator, and indirectly completes the real-name authentication. In this anonymous real-name authentication process, the user's real-name information will not be exposed on the network, and the application service provider that needs to be based on real-name authentication is provided. There is no real-name information of the user in the server.
该认证方法的好处是:1)可有效阻断线下个人身份信息泄露,被人盗用后在网上完成的虚假的实名认证。2)可完全遏阻以盗取以实名认证为基础提供服务的服务器中的实名认证信息的各种黑客活动和犯罪活动。The advantages of this authentication method are: 1) It can effectively block the leakage of offline personal identity information and the false real-name authentication completed online after being stolen. 2) Various hacking activities and criminal activities that steal real-name authentication information from servers that provide services based on real-name authentication can be completely suppressed.
该认证方法的大规模商用,将会有效遏阻当下日益猖獗的以盗取实名认证信息的各种黑客和犯罪活动。The large-scale commercial use of this authentication method will effectively curb the increasingly rampant hacking and criminal activities of stealing real-name authentication information.
发明内容SUMMARY OF THE INVENTION
为有效遏阻当下日益猖獗的以盗取实名认证信息的各种黑客和犯罪活动,本发明提供了一种匿名式的实名认证方法。In order to effectively curb the current increasingly rampant hackers and criminal activities for stealing real-name authentication information, the present invention provides an anonymous real-name authentication method.
本发明的匿名式的实名认证方法通过以下步骤实现:The anonymous real-name authentication method of the present invention is realized through the following steps:
1)用户在网络服务商处完成实名认证,并获得上网入口设备以及同该设备一一对应的网上实名认证代码;1) The user completes the real-name authentication at the network service provider, and obtains the Internet access device and the online real-name authentication code corresponding to the device one-to-one;
2)用户在上网入口设备端处连接的上网终端上输入网上实名认证代码并从网络服务商处获得二级网上实名认证代码,网络服务商建立由该用户的以实名认证代码、二级网上实名认证代码、用户的上网终端的MAC码、用户的上网设备的电子ID、该入口设备端到公网出口的所有路由器设备MAC码、公网IP地址所构成的认证路由信息指纹;2) The user enters the online real-name authentication code on the Internet terminal connected to the Internet access device and obtains the second-level online real-name authentication code from the network service provider. The network service provider establishes the user's real-name authentication code and second-level online real-name authentication code. Authentication code, the MAC code of the user's Internet terminal, the electronic ID of the user's Internet device, the MAC code of all routers from the entrance device to the public network exit, and the authentication routing information fingerprint formed by the public network IP address;
3)用户在上网入户设备端,输入二级上网实名认证代码,向需要实名认证的服务商的服务器提交实名认证请求;3) The user enters the second-level real-name authentication code on the Internet access device, and submits a real-name authentication request to the server of the service provider that requires real-name authentication;
4)服务商的服务器再将收到的二级网上实名认证代码、用户的上网终端的MAC码、用户的上网设备的电子ID、该入口设备端到公网出口的所有路由器设备MAC码、公网IP地址提交给网络服务商进行认证路由信息指纹比对;4) The server of the service provider will then receive the second-level online real-name authentication code, the MAC code of the user's Internet terminal, the electronic ID of the user's Internet device, the MAC code of all routers from the entrance device to the public network exit, and the public network. The network IP address is submitted to the network service provider for authentication routing information fingerprint comparison;
5)网络服务商将收到的认证路由信息指纹同已保存的认证路由信息指纹进行比对,并将比对结果(是或否)返回给服务商;5) The network service provider compares the received authentication routing information fingerprint with the saved authentication routing information fingerprint, and returns the comparison result (Yes or No) to the service provider;
6)服务商根据网络服务商返回的结果完成匿名式的实名认证或拒绝匿名式的服务认证。6) The service provider completes anonymous real-name authentication or rejects anonymous service authentication according to the result returned by the network service provider.
在认证过程中,用户的上网终端的MAC码、用户的上网设备的电 子ID为用户可选择的指纹参数,即用户可选择两个参数中的一个或全部为有效参数或无效参数。而二次实名认证代码的实效性可由用户自行设定为:单次有效、在某个时段内有效或永久有效。在所述的认证过程中,用户还可以对其所拥有的其他上网终端进行认证,所述的设备认证过程就是通过需要认证的其他上网终端同所述的服务器进行数据交互,在交互过程中,服务器采集所述需认证的用户其他上网终端的MAC码或其他的电子ID或将特定的电子ID植入该终端中,在整个的认证信息交互过程中,最少有一次的信息交互是在前述的匿名式认证过程中形成的认证通道中进行。In the authentication process, the MAC code of the user's surfing terminal and the electronic ID of the user's surfing device are the fingerprint parameters that the user can select, that is, the user can select one or all of the two parameters as valid parameters or invalid parameters. The validity of the secondary real-name authentication code can be set by the user as: one-time valid, valid for a certain period of time or permanent valid. In the authentication process, the user can also authenticate other Internet terminals owned by the user. The device authentication process is to exchange data with the server through other Internet access terminals that need to be authenticated. In the interaction process, The server collects the MAC codes or other electronic IDs of the other Internet terminals of the user to be authenticated, or implants a specific electronic ID into the terminal. During the entire authentication information exchange process, at least one information exchange occurs in the aforementioned It is carried out in the authentication channel formed in the anonymous authentication process.
通过以上步骤完成的实名认证,可达到以下目的:1)用户在线下泄露的实名信息,无法传到线上,从而避免了线下的实名信息泄露,被人在线上盗用。2)认证过程中不会产生实名认证信息的泄露。3)以实名认证信息为基础提供网上服务的服务商的服务器中,没有实名信息,从而可以有效避免了以盗取服务器中的实名信息为目的的各种黑客和犯罪活动。The real-name authentication completed through the above steps can achieve the following purposes: 1) The real-name information leaked by users offline cannot be transmitted online, thus avoiding the leakage of offline real-name information and being stolen online. 2) The real-name authentication information will not be leaked during the authentication process. 3) There is no real-name information in the server of the service provider that provides online services based on the real-name authentication information, which can effectively avoid various hackers and criminal activities aimed at stealing the real-name information in the server.
具体实施方式detailed description
下面结合具体的实施例对本发明内容进行详细说明:Below in conjunction with specific embodiment, the content of the present invention is described in detail:
本实施例以某人要到某电子商务网站上进行实名认证的过程为例。This embodiment takes the process of someone going to an e-commerce website for real-name authentication as an example.
全部过程描述如下:The whole process is described as follows:
步骤1:某人到移动公司营业点申请上网开户,移动营业点的工作人员按国家规定完成身份证同开户人的人证校验后,给其上网设备 和上网实名认证代码,并将身份证信息、上网设备的MAC码、上网实名认证代码进行登记后传入后台的二级上网认证代码生成服务器。Step 1: A person goes to the mobile company's business office to apply for online account opening. After the staff of the mobile business office completes the verification of the ID card and the account holder's personal ID according to the national regulations, he will give him the online device and the real-name authentication code, and put the ID card. The information, the MAC code of the Internet device, and the Internet real-name authentication code are registered and then transferred to the secondary Internet authentication code generation server in the background.
步骤2:某人在家中在连接于上网设备后的上网终端上,输入上网实名认证代码,向移动的二级上网认证代码生成服务器,申请二级上网认证代码。在此过程中,某人可以设定其上网终端的MAC码或上网终端的电子ID中的一个或全部为认证路由信息指纹中的有效参数,还可以设定本次申请的二级上网认证代码是单次有效或某一个时段有效或永久有效。移动的二级上网认证代码生成服务器,将生成的二级上网认证代码传给某人,将对应生成的认证路由信息指纹,传到认证路由信息指纹查询服务器上。Step 2: Someone at home on the Internet terminal connected to the Internet device, enters the Internet real-name authentication code, and applies for the secondary Internet access authentication code to the mobile secondary Internet access authentication code generation server. In this process, a person can set one or all of the MAC code of the Internet terminal or the electronic ID of the Internet terminal to be valid parameters in the authentication routing information fingerprint, and can also set the secondary Internet authentication code for this application. It is valid for a single time or for a certain period of time or permanently. The mobile secondary Internet access authentication code generation server transmits the generated secondary Internet access authentication code to someone, and transmits the corresponding generated authentication routing information fingerprint to the authentication routing information fingerprint query server.
步骤3:某人家中连接于上网设备的上网终端上,登陆某电子商务网站,输入二级上网认证代码,向该网站提出认证申请。该网站将收到的二级上网认证代码、提取出的路由信息、上网终端的MAC码和电子ID,送到移动的认证路由信息指纹查询服务器上申请认证。Step 3: A person's home is connected to the Internet terminal of the Internet device, logs in to an e-commerce website, enters the second-level Internet access authentication code, and submits an authentication application to the website. The website sends the received secondary Internet access authentication code, extracted routing information, the MAC code and electronic ID of the Internet terminal to the mobile authentication routing information fingerprint query server to apply for authentication.
步骤4:认证路由信息指纹查询服务器对收到的认证路由信息指纹同保存的认证路由信息指纹进行比对,并将比对结果(是或否),返回到某电子商务网站上。Step 4: The authentication routing information fingerprint query server compares the received authentication routing information fingerprint with the stored authentication routing information fingerprint, and returns the comparison result (Yes or No) to an e-commerce website.
步骤5:某电子商务网站根据返回的结果,完成本次的认证服务或拒绝本次的认证服务。Step 5: An e-commerce website completes the current authentication service or rejects the current authentication service according to the returned result.
步骤6:某人继续进行家中的两部手机的设备认证。某人用这两部手机同某电子商务网站进行数据交互,在交互的过程中,某电子商务网站读取这两部手机的MAC码和电子ID,并将该网站自动生成的 电子ID分别植入这两部手机,从而完成对某人的两部手机的设备认证。Step 6: Someone proceeds with device authentication for both phones in the home. A person uses these two mobile phones to interact with an e-commerce website. During the interaction, an e-commerce website reads the MAC codes and electronic IDs of the two mobile phones, and implants the electronic IDs automatically generated by the website respectively. Enter both phones to complete device authentication for someone's two phones.
这样某人可以用这两部手机,在该电子商务网站上进行相应的消费、转帐、提现等行为。而当这两部手机中的一部丢失后,某人或某人的家人可立刻用其所持有的未丢失的手机进行对另外一部手机的支付权利进行禁止处理,以阻止偷盗人用这部偷盗来的手机在该电子商务网站上进行的消费、转帐等行为。In this way, someone can use the two mobile phones to conduct corresponding consumption, transfer, and cash withdrawal on the e-commerce website. When one of the two mobile phones is lost, someone or someone's family can immediately use the mobile phone that they have not lost to prohibit the payment right of the other mobile phone, so as to prevent the thief from using it. Consumption, transfer and other behaviors of the stolen mobile phone on the e-commerce website.
注意:Notice:
1)步骤6某人对其家中的两部手机的设备认证,是在完成了匿名式的实名认证的条件下进行。1) In step 6, the device authentication of a person's two mobile phones at home is carried out under the condition that anonymous real-name authentication has been completed.
2)两部手机在设备认证过程中,手机同某电子商务网站的数据交互,最少有一次是在通过前5个步骤过程中,已经建立的认证通道上,完成数据交互。2) During the device authentication process of the two mobile phones, the data exchange between the mobile phones and an e-commerce website is completed at least once on the authentication channel that has been established during the first 5 steps.

Claims (4)

  1. 匿名式的实名认证方法,其特征在于:匿名式的实名认证按以下步骤完成:1)用户在网络服务商处完成实名认证,并获得上网入口设备以及同该设备一一对应的网上实名认证代码;2)用户在上网入口设备端处连接的上网终端上输入网上实名认证代码以获得二级网上实名认证代码,网络服务商建立由该用户的以实名认证代码、二级网上实名认证代码、用户的上网终端的MAC码、用户的上网设备的电子ID、该入口设备端到公网出口的所有路由器设备MAC码、公网IP地址所构成的认证路由信息指纹;3)用户在连接在上网入口设备端后的上网终端上,输入二级上网实名认证代码,向需要实名认证的服务商的服务器提交实名认证请求;4)服务商的服务器将收到的二级网上实名认证代码、用户的上网终端的MAC码、用户的上网设备的电子ID、该入口设备端到公网出口的所有路由器设备MAC码、公网IP地址提交给网络服务商进行认证路由信息指纹比对;5)网络服务商将收到的认证路由信息指纹同已保存的认证路由信息指纹进行比对,并将比对结果(是或否)返回给服务商;6)服务商根据网络服务商返回的结果完成匿名式的实名认证或拒绝匿名式的服务认证。The anonymous real-name authentication method is characterized in that: the anonymous real-name authentication is completed according to the following steps: 1) the user completes the real-name authentication at the network service provider, and obtains an online access device and an online real-name authentication code corresponding to the device one-to-one. 2) The user enters the online real-name authentication code on the Internet terminal connected to the Internet access device end to obtain the second-level online real-name authentication code, and the network service provider establishes the user's real-name authentication code, second-level online real-name authentication code, user The authentication routing information fingerprint composed of the MAC code of the Internet terminal, the electronic ID of the user's Internet device, the MAC code of all router devices from the entrance device to the public network exit, and the public network IP address; 3) When the user is connected to the Internet entrance On the Internet terminal behind the device, enter the second-level online real-name authentication code, and submit a real-name authentication request to the server of the service provider that requires real-name authentication; 4) The server of the service provider will receive the second-level online real-name authentication code, the user's online authentication The MAC code of the terminal, the electronic ID of the user's Internet access device, the MAC code of all router devices from the entrance device to the public network exit, and the public network IP address are submitted to the network service provider for authentication and routing information fingerprint comparison; 5) The network service provider Compare the received authentication routing information fingerprint with the saved authentication routing information fingerprint, and return the comparison result (Yes or No) to the service provider; 6) The service provider completes the anonymous authentication according to the result returned by the network service provider. Real-name authentication or reject anonymous service authentication.
  2. 根据权利要求1所述的匿名式的实名认证方法,其特征在于:所述的认证路由信息指纹中的上网终端的MAC码、用户的上网设备的电子ID为用户可选择的指纹参数,即用户可选择两个参数中的一个或全部为有效参数或无效参数。The anonymous real-name authentication method according to claim 1, characterized in that: the MAC code of the Internet terminal and the electronic ID of the user's Internet device in the authentication routing information fingerprint are user-selectable fingerprint parameters, that is, the user Either or both of the two parameters can be selected to be valid or invalid.
  3. 根据权利要求1所述的匿名式的实名认证方法,其特征在 于:所述的二级实名认证代码的时效性可由用户自行设定为:单次有效、在某个时段内有效、永久有效。Anonymous real-name authentication method according to claim 1, is characterized in that: the timeliness of described second-level real-name authentication code can be set by user as: single effective, effective in a certain period of time, permanently effective.
  4. 根据权利要求1-3任一所述的匿名式的实名认证方法,其特征在于:在所述的认证过程中,用户还可以对其所拥有的其他上网终端进行设备认证,所述的设备认证就是通过需认证的其他上网终端同所述的服务器进行数据交互,在交互过程中,服务器采集所述需认证上网终端的MAC码或其他的电子ID或将特定的电子ID植入该终端中,在整个设备认证信息的交互过程中,最少有一次的信息交互是在前述的匿名式认证过程中形成的认证通道中进行。The anonymous real-name authentication method according to any one of claims 1-3, characterized in that: in the authentication process, the user can also perform device authentication on other Internet terminals owned by the user, and the device authentication It is to exchange data with the server through other Internet terminals that need to be authenticated. During the interaction process, the server collects the MAC code or other electronic ID of the Internet terminal that needs to be authenticated or implants a specific electronic ID into the terminal. In the entire exchange process of device authentication information, at least one information exchange is performed in the authentication channel formed in the aforementioned anonymous authentication process.
PCT/CN2020/111199 2020-08-26 2020-08-26 Anonymous real-name authentication method WO2022040950A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/111199 WO2022040950A1 (en) 2020-08-26 2020-08-26 Anonymous real-name authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/111199 WO2022040950A1 (en) 2020-08-26 2020-08-26 Anonymous real-name authentication method

Publications (1)

Publication Number Publication Date
WO2022040950A1 true WO2022040950A1 (en) 2022-03-03

Family

ID=80352389

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/111199 WO2022040950A1 (en) 2020-08-26 2020-08-26 Anonymous real-name authentication method

Country Status (1)

Country Link
WO (1) WO2022040950A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090171982A1 (en) * 1999-12-21 2009-07-02 Thomas Hagan Privacy and Security Method and System for a World-Wide-Web Site
US20130036459A1 (en) * 2011-08-05 2013-02-07 Safefaces LLC Methods and systems for identity verification
CN104683306A (en) * 2013-12-03 2015-06-03 中国人民公安大学 Safe and controllable internet real-name certification mechanism
CN107094154A (en) * 2017-06-08 2017-08-25 北京帕斯沃得科技有限公司 A kind of intelligent cipher Real-name Registration identity management method and platform
CN107835176A (en) * 2017-11-10 2018-03-23 中汇通联科技有限公司 A kind of network authentication method and platform based on eID
CN108322430A (en) * 2017-03-02 2018-07-24 黄策 The real-name authentication method of anonymous formula

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090171982A1 (en) * 1999-12-21 2009-07-02 Thomas Hagan Privacy and Security Method and System for a World-Wide-Web Site
US20130036459A1 (en) * 2011-08-05 2013-02-07 Safefaces LLC Methods and systems for identity verification
CN104683306A (en) * 2013-12-03 2015-06-03 中国人民公安大学 Safe and controllable internet real-name certification mechanism
CN108322430A (en) * 2017-03-02 2018-07-24 黄策 The real-name authentication method of anonymous formula
CN107094154A (en) * 2017-06-08 2017-08-25 北京帕斯沃得科技有限公司 A kind of intelligent cipher Real-name Registration identity management method and platform
CN107835176A (en) * 2017-11-10 2018-03-23 中汇通联科技有限公司 A kind of network authentication method and platform based on eID

Similar Documents

Publication Publication Date Title
US8528076B2 (en) Method and apparatus for authenticating online transactions using a browser and a secure channel with an authentication server
US8132243B2 (en) Extended one-time password method and apparatus
US8156335B2 (en) IP address secure multi-channel authentication for online transactions
US8578457B2 (en) Process of remote user authentication in computer networks to perform the cellphone-assisted secure transactions
US20080318548A1 (en) Method of and system for strong authentication and defense against man-in-the-middle attacks
US20070056022A1 (en) Two-factor authentication employing a user's IP address
US20080181380A1 (en) Proxy for authenticated caller name
CA2557143C (en) Trust inheritance in network authentication
US20140075525A1 (en) Strong authentication by presentation of the number
WO2008008014A1 (en) Method and arrangement for authentication procedures in a communication network
WO2012004640A1 (en) Transaction authentication
CN109769003A (en) Mobile telephone registration method, system and the server for preventing phone number from revealing
CN111294796A (en) Smart phone login management system based on zero-knowledge proof
US8635454B2 (en) Authentication systems and methods using a packet telephony device
US8619962B2 (en) High-assurance teleconference authentication
CN109587683B (en) Method and system for preventing short message from being monitored, application program and terminal information database
CN101207483A (en) Bidirectional double factor authentication method
US20080282331A1 (en) User Provisioning With Multi-Factor Authentication
US20110022844A1 (en) Authentication systems and methods using a packet telephony device
CN101465733A (en) Identity authentication method based on telephone
KR101133167B1 (en) Method and apparatus for user verifing process with enhanced security
CN108322430B (en) Anonymous real name authentication method
WO2022040950A1 (en) Anonymous real-name authentication method
CN115118454A (en) Cascade authentication system and method based on mobile application
CN101483520A (en) Identity authentication method based on telephone

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20950623

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20950623

Country of ref document: EP

Kind code of ref document: A1