User authentication method and system

A user authentication and user technology, applied in the blockchain field, can solve problems such as low user authentication efficiency, central server vulnerability, data leakage, etc., achieve fast query and response speed, improve authentication efficiency, and improve system performance Effect

Inactive Publication Date: 2017-10-17
BEIJING HUITONG JINCAI INFORMATION TECH +2
View PDF6 Cites 70 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Through the two technical solutions, it can be found that if the central server technical solution is used for user creation and user identity authentication, because the central server is vulnerable to attack, data is easy to leak and easy to be tampered with, the authentication security is threatened; if the blockchain technology is used solution, since the account data and transaction data are stored on the same blockchain, the efficiency of user authentication will be low, and the number of concurrent accesses supported by users will be low
Moreover, both of the above two technical solutions have the disadvantages of long corresponding system delay time and low performance as the number of users increases and the amount of business increases.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and system
  • User authentication method and system
  • User authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] see figure 1 It is a schematic flowchart of a user authentication method provided by Embodiment 1 of the present invention, the method includes the following steps:

[0047] S11. Create a user blockchain;

[0048] Specifically, the purpose of creating the user blockchain is to store user account data, that is, user-related information data, separately from transaction data, so that user account data and transaction data are stored on different chains, making account query and response speed faster. Fast, improved system performance.

[0049] S12. Obtain information data provided by the user;

[0050] Specifically, when the user's information data is obtained through the user blockchain, all the user information data can be obtained, and then the hash value of the combined data can be used for authentication, and some key feature information data of the user can also be obtained. Authentication is performed by the hash value of the key characteristic information data....

Embodiment 2

[0057] Referring to embodiment one of the present invention and figure 1 The specific process of steps S11 to S14 described in , and see figure 2 The schematic diagram of the process of creating a user block chain corresponding to the above, the steps of creating a user block chain specifically include:

[0058] S111. Obtain the registration information data of the user, wherein the registration information data includes the basic information of the user and the biometric information of the user;

[0059] Specifically, the user's registration information data includes user basic information and user biometric information. Among them, user basic information may include user name, ID number, unit and city, and user biometric information may include fingerprints, iris, DNA, etc. Information, behavioral feature information, face information and retinal information.

[0060] S112. Determine whether the user corresponding to the registration information data is a new user, and if...

Embodiment 3

[0076] Corresponding to the user authentication method disclosed in Embodiment 1 and Embodiment 2 of the present invention, Embodiment 3 of the present invention also provides a user authentication system, see Fig. Figure 4 A schematic structural diagram of a user authentication system provided by Embodiment 3 of the present invention, the system includes:

[0077] Create module 1 for creating user blockchains;

[0078] The obtaining module 2 is used to obtain the information data provided by the user;

[0079] The encryption module 3 is used to encrypt the hash value of the user's information data by using digital signature technology, and send the encrypted hash value and the information data to the user block chain node;

[0080] The authentication module 4 is used to judge whether the user is a registered user in the user block chain by using a smart contract according to the information data and the hash value, and if so, complete the identity authentication of the user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user authentication method and system. The method comprises the steps of: creating a user block chain; obtaining information data provided by a user; encrypting the hash value of the information data of the user by adopting a digital signature technology, and sending the encrypted hash value and the information data to a user block chain node; and, according to the information data and the hash value, judging whether the user is a user registered in the user block chain or not, and if so, completing identity authentication of the user. By means of the user authentication method and system disclosed by the invention, the purpose of ensuring security of the user information and relatively high authentication efficiency can be achieved.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a user authentication method and system based on block chains. Background technique [0002] At present, in the existing technical understanding, user creation refers to the process of storing new user information into the system, and user identity authentication refers to the process of confirming whether the user exists in the system, so as to confirm whether the user has access to data or the system, etc. The process of accessing, manipulating, and using permissions for resources. Currently, there are mainly two schemes for user creation and identity authentication, one is the central server technical scheme, and the other is the blockchain technical scheme. The central server technical solution mainly adopts the central server storage and authentication, that is, when the user registers, the data is stored in the central database; when the user is authenticated,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/32
CPCG06F21/32H04L9/3247H04L63/0428H04L63/08H04L63/0861
Inventor 朱兴雄何清素王俊生
Owner BEIJING HUITONG JINCAI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products