A smart contract-based authentication authority evaluation method and device

A smart contract and authentication authority technology, applied in the field of identity authentication, can solve the problems that users cannot obtain authority in time, the application and review process is cumbersome, time-consuming and labor-intensive, etc., to improve credibility, reduce intentional or unintentional causes, and reduce security risks Effect

Active Publication Date: 2020-05-05
JIANGSU PAYEGIS TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of realizing the present invention, the inventor found that there are at least the following problems in the prior art: In daily life, it often happens that some users urgently need temporary authentication authority to perform related operations
In the existing technology, the user needs to apply to the system administrator for permission, and can obtain temporary permission only after the review is passed. Such an application and review process is cumbersome, time-consuming and laborious, and the user generally cannot obtain the required permission in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A smart contract-based authentication authority evaluation method and device
  • A smart contract-based authentication authority evaluation method and device
  • A smart contract-based authentication authority evaluation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] figure 1 It is a flow chart of a smart contract-based authentication authority evaluation method provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the method includes:

[0019] Step S110: Send the user information of the guaranteed user terminal to the preset smart contract, so that the smart contract can be updated according to the user information.

[0020] In this step, the user terminal with identity authority (such as access control authority, login authority, etc.) acts as a guarantor and grants a certain temporary authority to the guaranteed user in the form of guarantee. After receiving the above information, the smart contract saves the above information To its own storage area, it is used in the steps of the guaranteed user terminal to apply for permission. Wherein, the user information includes at least the identity of the guaranteed user terminal, the identity of the guaranteed user terminal, and the content of the temporary au...

Embodiment 2

[0030] figure 2 It is a flow chart of a smart contract-based authentication authority evaluation method provided in Embodiment 2 of the present invention. The execution subject of the method may be a guarantee user terminal with identity authority in the blockchain network for realizing the guarantee function. Such as figure 2 As shown, the method includes:

[0031] Step S210: create a smart contract, and broadcast the smart contract to the blockchain through a blockchain transaction.

[0032] A smart contract is a collection of code and data that can automatically execute some functions driven by time or events. The smart contract combined with the blockchain can be deployed and run on the blockchain network. It has its own blockchain account and can automatically perform some functions under the drive of preset conditions, such as transmitting information between nodes and modifying the status of the blockchain such as account information. The biggest feature of smart ...

Embodiment 3

[0054] image 3 It is a schematic structural diagram of an authentication authority evaluation device based on a smart contract provided by Embodiment 3 of the present invention. Such as image 3 As shown, the device includes: a sending module 310 , an acquiring module 320 and a determining module 330 .

[0055] The sending module 310 is configured to send the user information of the guaranteed user terminal to a preset smart contract, so that the smart contract can be updated according to the user information.

[0056] A user terminal with identity authority (such as access control authority, login authority, etc.) acts as a guarantor and grants a certain temporary authority to the guaranteed user in the form of guarantee. The sending module 310 sends the above information to the smart contract, and the smart contract receives the above information. Afterwards, the above information is saved in its own storage area, and used for the operation of the guaranteed user terminal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication permission evaluation method and device based on a smart contract, which relate to the technical field of identity authentication. The method comprises the following steps: sending user information of a guaranteed user terminal to a preset smart contract, and updating the smart contract according to the user information; after acquiring authentication permission by the guaranteed user terminal according to the updated smart contract, acquiring a voting result sent to the guaranteed user terminal and received by the smart contract within a preset validity period of the contract; determining an evaluation result corresponding to the voting result. Therefore, the method and the system disclosed by the invention have the advantages that the complex process of temporal authorization is simplified, and the potential safety hazard of the prior art is reduced.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to an authentication authority evaluation method and device based on a smart contract. Background technique [0002] Identity authentication, also known as "identity verification" or "identity authentication", refers to the process of confirming the identity of the operator in the computer and computer network system, so as to determine whether the user has access and use rights to certain resources, and then make the computer And network system access policies can be implemented reliably and effectively, preventing attackers from posing as legitimate users to gain access to resources, ensuring the security of systems and data, and the legitimate interests of authorized visitors. [0003] In the process of implementing the present invention, the inventors have found at least the following problems in the prior art: In daily life, it often happens that some users urge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/30
CPCG06F21/30
Inventor 汪德嘉郭宇王少凡
Owner JIANGSU PAYEGIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products