Identity authentication method based on block chain network, server and terminal device

A technology of identity authentication and user identity authentication, applied in the direction of protocol authorization, payment system, etc., can solve the problems of fraudulent authentication records, tampered authentication records, and low security, so as to prevent credential stuffing attacks, improve convenience, and improve security sexual effect

Active Publication Date: 2017-02-01
JIANGSU PAYEGIS TECH CO LTD
View PDF3 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the prior art, there are situations where the server falsifies the authentication record or the authentication record stored in the server is tampered with, and the user name and password are easy to be stolen. Once the user name and password are stolen, the authentication can be passed, so this authentication The security of the method is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on block chain network, server and terminal device
  • Identity authentication method based on block chain network, server and terminal device
  • Identity authentication method based on block chain network, server and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0037] figure 1 A flow chart of an identity authentication method based on a blockchain network according to an embodiment of the present invention is shown. figure 1 The execution subject of the shown method can be a server, which is used to authenticate the nodes in the blockchain network, such as figure 1 As shown, the identity authentication method based on the blockchain network of this embodiment may specifically include the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an identity authentication method based on a block chain network, a server and a terminal device. The objective of the invention is to perform identity authentication of nodes in the block chain network. The method comprises: receiving a registration request carrying user names sent by nodes; obtaining a first block chain account address associated with the user names according to the corresponding relation between the stored user names in advance and the first block chain account address; sending a transaction request carrying the first block chain account address and assigned second block chain account address in advance to the node to allow the nodes to construct a first transaction according to the transaction request and send the first transaction information to the block chain network after the first transaction is constructed, wherein the transaction request shows the operation of performing payment from the first block chain account address to the second block chain account address; determining whether the block chain has the first transaction information of performing payment from the first block chain account address to the second block chain account address or not; and if block chain has the first transaction information of performing payment from the first block chain account address to the second block chain account address, confirming the successful user identity authentication to improve the safety of the authentication.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to an identity authentication method, server, terminal equipment and system based on a block chain network. Background technique [0002] With the development of the Internet and e-commerce, computer network applications have penetrated into all walks of life, and global informatization has become a major trend in human development. Moreover, many websites or applications will require to log in to the website account before performing corresponding operations. For example, if a user wants to buy clothes on the XX website, the user is generally required to log in to the website with an existing account and then purchase. When a user logs in to a website or application, the identity of the user needs to be authenticated. There are many methods for identity authentication in the prior art, but most of the authentication methods use the user name and password to authenticat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40
Inventor 汪德嘉郭宇王少凡姜中正
Owner JIANGSU PAYEGIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products