Block chain identity system

A block chain and identity technology, applied in the transmission system, digital transmission system, encryption device with shift register/memory, etc., can solve the problems that the general public users are not easy to accept, user personal information leakage, etc., to improve reliability performance and security, and the effect of preventing replay attacks

Active Publication Date: 2017-05-31
SHANGHAI WEILIAN INFORMATION TECH CO LTD
View PDF5 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the current environment, if you have to accept your own fingerprint and other biometric information to be collected and saved by a third-party system before identity authentication, it is not easy for an ordinary user to accept. information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain identity system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Example 1: Workflow of the authentication system

[0040] The working process of the authentication system is as follows: the user enters the user name and password on the login window displayed on the touch screen module of the client terminal to log in to the system. After entering the authentication system, the card reading authentication interface is displayed on the touch screen module. The reading module reads the information in the user's smart identity card. After the identity of the smart identity card is read into the computing platform, the processing platform performs corresponding cryptographic operations according to the identity authentication protocol to obtain encrypted authentication request information. , the communication module transmits the encrypted authentication request information to the authentication server in the cloud through network communication, and after a series of authentication interaction processes between the client and the cloud, t...

Embodiment 2

[0041] Embodiment 2: Identity authentication protocol design

[0042] As the key to the security of the identity authentication system, the design of the identity authentication protocol is a key component of the whole system. First introduce the notational conventions used in this article:

[0043] U means user;

[0044] S means a third-party authentication server;

[0045] ID represents the identity information read by the radio frequency reading module;

[0046] UserN and Password respectively represent the user name and corresponding login password;

[0047] KuR and KuS respectively represent the public key and private key of the mobile user;

[0048] KsR and Kss respectively represent the public key and private key of the authentication server;

[0049] EK(m) means to encrypt plaintext m with key k;

[0050] DK(C) means to decrypt the ciphertext c with the key k;

[0051] R1 and N2 are random numbers generated by the system;

[0052] K is used as the session key a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A block chain identity system comprises a client and a cloud, wherein the client consists of a radio frequency reading module, a computing platform, a touch screen module, a communication module and an intelligent identity card, the cloud consists of a block chain multi-node network which comprises a data block chain and a multi-node network, and the multi-node network takes charge of coordination with the client to complete an identity generation process and an identity authentication process. The authentication system uses an intelligent identity card to guarantee safety of a user identity, transmitted information is transmitted after being encrypted and cannot be leaked in the transmission process, the validity of two times of authentication is guaranteed, and unnecessary attacks in the authentication process are avoided.

Description

technical field [0001] The invention relates to identity generation and authentication on the Internet, a block chain identity system. Background technique [0002] On the Internet, blockchain identities need to be issued in the form of network data. Unlike traditional identities, identities on the Internet are more difficult to generate and authenticate. For the currently widely used authentication mechanism based on passwords or identity authentication based on short messages, if the password is leaked or the mobile phone is accidentally lost, other users can also use the terminal to conduct authentication transactions. In addition, technologies that combine biometric information (such as fingerprints, irises, etc.) to increase authentication security have begun to appear in recent years. However, in the current environment, if you have to accept your fingerprint and other biometric information to be collected and saved by a third-party system before identity authenticati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08H04L9/06
CPCH04L9/0618H04L9/0869H04L63/0428H04L63/0807H04L63/0853H04L67/10H04L67/01
Inventor 钱德君
Owner SHANGHAI WEILIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products