Block chain-based identity authentication method, authentication server and user terminal
An authentication server and identity authentication technology, applied to authentication servers and user terminals, in the field of blockchain-based identity authentication methods, can solve the problems of information leakage users and application servers, and achieve both security and efficiency, and a simple verification structure. Efficient and safe effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] figure 2 It is a flow chart of a blockchain-based identity authentication method provided in Embodiment 1 of this application. Such as figure 2 As shown, the method includes:
[0025] Step S210: Sign the identity registration information sent by the user terminal, and provide the signed identity registration information to the user terminal.
[0026] In this embodiment, in order to prevent the identity authentication request of the user terminal from being hijacked or impersonated, the user terminal needs to be registered in the smart contract in the block chain before performing the authentication operation. Therefore, it is necessary to sign the identity registration information sent by the user terminal to ensure the accuracy and authenticity of the identity registration information, and then provide the signed identity registration information to the user terminal so that it can send the signed identity registration information to Smart contracts in the blockch...
Embodiment 2
[0037] image 3 It is a flowchart of a blockchain-based identity authentication method provided in Embodiment 2 of the present application, and the execution body of the method is preferably an authentication server. Such as image 3 As shown, the method includes:
[0038] Step S310: Broadcast the preset smart contract to the blockchain.
[0039] Specifically, the preset smart contract is broadcast to the blockchain network in the form of blockchain transactions, and after verification by most nodes, the smart contract reaches a consensus on the blockchain network, and then the smart contract can run on the blockchain network. Among them, the structure of the above-mentioned smart contract is divided into four parts, which are the smart contract blockchain account address, the pre-stored public key of the authentication server, the data part and the program part, and the program part of the smart contract can realize two functions, one It is to write data to the data part,...
Embodiment 3
[0052] Figure 4 is a flow chart of a blockchain-based identity authentication method provided in Embodiment 3 of the present application, Figure 4 The execution subject of the shown method may be a user terminal. Such as Figure 4 As shown, the method includes:
[0053] Step S410: Send the identity registration information to the authentication server, and receive the signed identity registration information returned by the authentication server after signing the identity registration information.
[0054] In this embodiment, in order to prevent the identity authentication request of the user terminal from being hijacked or impersonated, the user terminal needs to be registered in the smart contract in the block chain before performing the authentication operation. Therefore, the user terminal needs to send identity registration information to the authentication server, and receive the identity registration information signed by the authentication server. The signature o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


