Identity authentication method and system based on block chain

A technology of identity authentication and blockchain, applied in transmission systems, electrical components, etc., can solve problems such as information tampering, information leakage, loss of users and application servers, etc., and achieve the effect of increasing credibility and convenient identity authentication

Active Publication Date: 2020-02-21
JIANGSU PAYEGIS TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the third-party authentication server leaks or tampers with information, it may bring huge losses to users and application servers on the terminal device side.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system based on block chain
  • Identity authentication method and system based on block chain
  • Identity authentication method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure, and to fully convey the scope of the present disclosure to those skilled in the art.

[0024] figure 1 Shows a signaling flow chart of a block chain-based identity authentication method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0025] Step S100, the terminal device sends an identity authentication request to the application server.

[0026] Wherein, the identity authentication request includes an authentication factor. Specifically, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and system based on a block chain. The method includes the steps of a terminal device sending an identity authentication request including an authentication factor to an application server, an application server receiving the identity authentication request and generating first transaction information according to the authentication factor in the identity authentication request, the application server broadcasting the first transaction information to a block chain network, the application server sending the first transaction number information of the first transaction information to the terminal device, the terminal device receiving the first transaction number information, generating second transaction information according to the first transaction number information and the authentication factor and broadcasting the second transaction information to the block chain network, and the block chain network conducting identity authentication for the terminal device according to the first transaction information and the second transaction information to obtain the authentication result. According to the technical scheme of the invention, identity authentication for a terminal device can be safety and conveniently carried out through a block chain network.

Description

technical field [0001] The present invention relates to the field of Internet technology, in particular to a blockchain-based identity authentication method and system. Background technique [0002] In Internet technology, when a user logs in to an application server, the application server often needs to authenticate the user to determine whether the user has the right to access certain resources and use certain resources, that is, to determine whether the user is authorized Users, and then enable Internet access policies to be implemented reliably and effectively, prevent attackers from impersonating authorized users to obtain resource access and use rights, and ensure data security and legitimate interests of authorized users. [0003] In the prior art, identity authentication can be performed through a third-party authentication server, and the specific process is as follows: The user sends an identity authentication request to the third-party authentication server throu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 汪德嘉郭宇王少凡柴泉
Owner JIANGSU PAYEGIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products