Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A blockchain-based trust service architecture and method

A block chain and architecture technology, applied in the direction of secure communication devices, payment architecture, instruments, etc., can solve problems such as failure to effectively realize information security, loss of user privacy, infrastructure disasters, etc., to achieve trust transfer and simplify authentication The effect of the process

Active Publication Date: 2021-06-11
CETC BIGDATA RES INST CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The mainstream identity authentication is an online authentication technology based on passwords, but the diversification of terminal applications makes trust services more and more important. People have multiple applications on the Internet and have multiple virtual identities; with the increasing number of IoT devices, these devices Handing over data to a centralized identity provider is becoming more and more untenable. Once data leaks, it will not only cause a loss of privacy for a large number of users, but also have catastrophic consequences for the tangible infrastructure, and users do not know that their data is in the center. Who uses, modifies, deletes, etc. the database
[0003] OAuth sets up an authorization layer between the user end and the service provider, allowing third-party websites to access the user's data stored in the service provider under the authorization of the user, but still use the centralized database; FIDO uses the UAF standard and two-factor experience without password experience The U2F standard can reduce the user's dependence on passwords and authentication risks, such as excessive concentration and inconvenient input, but it also fails to solve the problem of centralized database
[0004] In the prior art, a variety of protection methods are provided for information security, but information security cannot be effectively realized, such as the Chinese patent "A Method for Autonomous Interconnection of Internet of Things Devices Based on Blockchain (Publication No.: CN107819848A, Publication Date: 2018.3.20) "public self-governing interconnection method, which uses smart contracts to issue device identities, and realizes the expansion of trust anchors (smart contracts) and trust expansion methods without a center. There is no mention of any possible solutions in this patent. Centralized database management pressure, technology to protect user privacy needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based trust service architecture and method
  • A blockchain-based trust service architecture and method
  • A blockchain-based trust service architecture and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] As mentioned above, such as figure 2 As shown, the specific application process of registration is as follows:

[0043] ① The identity provider receives the registration application initiated by the user through the terminal application;

[0044] ②The identity provider selects the registration requirements and relevant policies for this registration and sends them back to the user;

[0045] ③The user's terminal generates a new pair of public and private keys, which are unique to the user, identity provider, and blockchain;

[0046] ④ The user selects the required attributes, his own public key and other freely selected attributes according to the policy requirements and sends them back to the identity provider, and presents relevant certification materials;

[0047] ⑤The identity provider verifies the user's certification materials, and saves the user's public key and associated users after passing the verification, but does not save the user data locally, but hashes...

Embodiment 2

[0051] As mentioned above, such as image 3 and Figure 4 As shown, the specific application process of certification is as follows:

[0052] ①The merchant sends a random number challenge to the user, requiring the user to authenticate the required data according to the policy;

[0053] ② The data attributes authenticated by the identity provider when the user registers before the terminal selection according to the policy required by the authentication;

[0054] ③The user signs the challenge value, encrypts the attribute materials required by the merchant with the public key, and provides the public key and associated information of the identity provider to send to the merchant;

[0055]④ According to the identity provider information provided, the merchant goes to the identity provider to find the user's public key, associated information, and blockchain "proof" location information;

[0056] ⑤ The identity provider returns the information requested by the merchant;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a blockchain-based trust service architecture, including an identity authentication interface layer and a service layer; the identity authentication interface layer is connected to the service layer; the identity authentication interface layer is used to provide a blockchain operation interface, It can provide basic identity registration and authentication functions externally, and interface with the identity provider to realize initial identity registration, identification, registration and subsequent authentication; the service layer triggers the internal collaborative work of the service layer through the event flow to provide blockchain services . In the present invention, the valid personal data of the user is stored in the user terminal after authentication, and there is no risk of a central database; when the merchant authenticates the user, whether the user shares information and what information to share is determined by the user; The certification does not need to carry the original certification materials, which simplifies the certification process and realizes the transfer of trust.

Description

technical field [0001] The invention relates to a blockchain-based trust service architecture and method, and belongs to the technical field of blockchain applications. Background technique [0002] Trust service is one of the key technologies of information security. The mainstream identity authentication is an online authentication technology based on passwords, but the diversification of terminal applications makes trust services more and more important. People have multiple applications on the Internet and have multiple virtual identities; with the increasing number of IoT devices, these devices It is becoming more and more untenable to hand over data to a centralized identity provider. Once data leaks, it will not only cause a loss of privacy for a large number of users, but also have catastrophic consequences for the tangible infrastructure, and users do not know that their data is in the center. Who uses, modifies, deletes, etc. the database. [0003] OAuth sets up ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08G06Q20/38G06Q40/04
CPCG06Q20/3829G06Q40/04H04L9/3236H04L9/3247H04L63/08H04L67/1097
Inventor 董贵山陈宇翔曹扬胥月
Owner CETC BIGDATA RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products