Unlock instant, AI-driven research and patent intelligence for your innovation.

Block chain-based identity authentication method, authentication server and user terminal

An authentication server and identity authentication technology, applied to authentication servers and user terminals, in the field of blockchain-based identity authentication methods, can solve the problems of information leakage users and application servers, and achieve both security and efficiency, and a simple verification structure. Efficient and safe effect

Active Publication Date: 2019-10-01
JIANGSU PAYEGIS TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the inventor found in the process of implementing the present invention that at least the following problems exist in the methods in the prior art: in the traditional third-party identity authentication system, the third-party authentication server will receive the information that the user logs in to the application server. Information leakage in the three-party authentication server will cause major risks to users and application servers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based identity authentication method, authentication server and user terminal
  • Block chain-based identity authentication method, authentication server and user terminal
  • Block chain-based identity authentication method, authentication server and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] figure 2 It is a flow chart of a blockchain-based identity authentication method provided in Embodiment 1 of this application. Such as figure 2 As shown, the method includes:

[0025] Step S210: Sign the identity registration information sent by the user terminal, and provide the signed identity registration information to the user terminal.

[0026] In this embodiment, in order to prevent the identity authentication request of the user terminal from being hijacked or impersonated, the user terminal needs to be registered in the smart contract in the block chain before performing the authentication operation. Therefore, it is necessary to sign the identity registration information sent by the user terminal to ensure the accuracy and authenticity of the identity registration information, and then provide the signed identity registration information to the user terminal so that it can send the signed identity registration information to Smart contracts in the blockch...

Embodiment 2

[0037] image 3 It is a flowchart of a blockchain-based identity authentication method provided in Embodiment 2 of the present application, and the execution body of the method is preferably an authentication server. Such as image 3 As shown, the method includes:

[0038] Step S310: Broadcast the preset smart contract to the blockchain.

[0039] Specifically, the preset smart contract is broadcast to the blockchain network in the form of blockchain transactions, and after verification by most nodes, the smart contract reaches a consensus on the blockchain network, and then the smart contract can run on the blockchain network. Among them, the structure of the above-mentioned smart contract is divided into four parts, which are the smart contract blockchain account address, the pre-stored public key of the authentication server, the data part and the program part, and the program part of the smart contract can realize two functions, one It is to write data to the data part,...

Embodiment 3

[0052] Figure 4 is a flow chart of a blockchain-based identity authentication method provided in Embodiment 3 of the present application, Figure 4 The execution subject of the shown method may be a user terminal. Such as Figure 4 As shown, the method includes:

[0053] Step S410: Send the identity registration information to the authentication server, and receive the signed identity registration information returned by the authentication server after signing the identity registration information.

[0054] In this embodiment, in order to prevent the identity authentication request of the user terminal from being hijacked or impersonated, the user terminal needs to be registered in the smart contract in the block chain before performing the authentication operation. Therefore, the user terminal needs to send identity registration information to the authentication server, and receive the identity registration information signed by the authentication server. The signature o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention disclose a block chain-based identity authentication method, an authentication server and a user terminal, relating to the technical field of identity identification. The method comprises the steps of signing identity registration information sent by the user terminal, and providing the signed identity registration information for the user terminal; receiving an identity authentication request sent by the user terminal after identity registration to a preset smart contract in a block chain according to the signed identity registration information; returning identity authentication information to the user terminal according to the identity authentication request; and receiving a program running result generated by the smart contract according to the identity authentication information provided by the user terminal, and verifying the identity of the user terminal according to the program running result. Through adoption of the identity authentication method, both security and efficiency of the information are ensured.

Description

technical field [0001] The embodiment of the present application relates to the technical field of identification, and in particular to a blockchain-based identity authentication method, authentication server, and user terminal. Background technique [0002] Identity authentication refers to the process of confirming the identity of the operator in the computer and computer network system, so as to determine whether the user has access and use rights to a certain resource, so that the access policy of the computer and network system can be implemented reliably and effectively , to prevent attackers from posing as legitimate users to gain access to resources, to ensure the security of systems and data, and to protect the legitimate interests of authorized visitors. [0003] Such as figure 1 As shown, in the traditional third-party identity authentication system, assuming that application server A needs to confirm the identity of user B, the main process is as follows: 1.1. U...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 汪德嘉郭宇王少凡柴泉
Owner JIANGSU PAYEGIS TECH CO LTD