Block chain technology-based network digital identity authentication method

A technology of digital identity and authentication method, applied in the field of computer network, to achieve the effect of ensuring security, solving information leakage, and shortening confirmation time

Inactive Publication Date: 2017-09-19
兰考同心互联数据管理有限公司
View PDF6 Cites 121 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be used for services such as clie

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain technology-based network digital identity authentication method
  • Block chain technology-based network digital identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the drawings and specific embodiments.

[0039] figure 1 It is the main architecture of digital identity authentication based on blockchain technology, as shown in the figure. Digital identity authentication based on blockchain technology is mainly for natural person users, legal person users, and device users. All user information is recorded on our distributed network. Currently, it mainly provides identity authentication services, attribute authorization services, and signature services. , "Other certificates" for third-party credit, users "self-certification", public "co-certification", etc. The certification center also integrates the blockchain's identity log, attribute log, signature information and other functions.

[0040] Identity authentication service: The vLink protocol is used fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a block chain technology-based network digital identity authentication method. The method comprises the steps of 1) user registration: conducting the identity authentication service based on the vLink protocol, uploading a block chain if the identity of a user is legal, broadcasting the information of the user to the whole network by the block chain, and adding the information of the user into a corresponding block at each node, wherein blocks are mutually verified; 2) obtaining the information of the user, searching the information of the user through the vKey attribute authorization service, returning the user name, the gender and the age information of the user and returning a particular opened at the same time for distinguishing different users; 3) subjecting data to signature treatment during the digital identity authentication process based on the above block chain technology. According to the technical scheme of the invention, the personal data of a user are stored in a block chain, so that the occurrence of information leakage and internet fraud behaviors is radically avoided. The data security is ensured. During the data transmission process, the digital signature treatment is adopted. Therefore, the sensitive information is not tampered during the digital signature transmission process.

Description

Technical field [0001] The invention relates to computer network technology, in particular to a network digital identity management system, which completes the processes of registration, login, authentication and transmission of networked devices. Background technique [0002] When we use some networked devices to perform more convenient and quick operations, we need to go through the process of registration, login, authentication and transmission of various network identities. Now our network identities have basically real-name system, which contains our important basic information. [0003] In recent years, network frauds, infringements and other illegal activities related to identity have urgently needed to build a complete and feasible digital identity management system to protect citizens' information and property security. Similar to some online transaction application scenarios, there is an entity behind it. How to make it correspond to the online identity is the scope of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06F21/62
CPCH04L63/08G06F21/6218G06F21/6245H04L9/3247H04L63/0823
Inventor 焦继佩
Owner 兰考同心互联数据管理有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products