Identity authentication method and system, and computer readable storage medium

An identity authentication and identity management technology, applied in the fields of identity authentication methods, systems and computer-readable storage media, can solve the problems of heavy design of identity authentication systems and complicated authentication processes, etc.

Inactive Publication Date: 2018-01-05
CHINA MERCHANTS BANK
View PDF6 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide an identity authentication method, system and computer-readable storag

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system, and computer readable storage medium
  • Identity authentication method and system, and computer readable storage medium
  • Identity authentication method and system, and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0042] Due to the heavy design of most consortium chain and private chain identity authentication systems in the existing technology, the authentication system is more complicated than the business application on the chain, especially for systems with high security requirements, multi-layer authentication will be set up, which will easily lead to the entire The system cannot run, which indirectly affects the application of the blockchain.

[0043] In order to solve the above technical problems, the present invention proposes an identity authentication method. The transaction member sends a registration request to the identity management system, and the identity management system performs verification according to the registration request. , the identity management system generates registration information and sends it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method. The method comprises the following steps: transmitting a registration request to an identity management system by a transaction member; verifying by the identity management system according to the registration request; and when the registration request passes the verification, generating registration information and sending the registration information to a block chain node by the identity management system, so as to enable the block chain node to write the registration information into a block chain. The invention further discloses anidentity authentication system and a computer readable storage medium. The invention can simplify the design of the identity authentication system and an identity authentication process.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an identity authentication method, system and computer-readable storage medium. Background technique [0002] Blockchain is a new application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. The so-called consensus mechanism is a mathematical algorithm to establish trust and obtain rights and interests between different nodes in the blockchain system. [0003] Blockchains are divided into public chains, consortium chains and private chains according to the scope of their audience. In addition to public chains, consortium chains and private chains require identity authentication, and only authorized users can join. At present, most consortium chains and private chain identity authentication systems are heavily designed, and the authentication process is complicated, which in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/31H04L9/32
Inventor 侯庭伟黄丽标李俊孙建平胡辉林常林
Owner CHINA MERCHANTS BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products