Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for performing bidirectional identity authentication in block chain

A two-way authentication and block chain technology, applied in the block chain for two-way identity authentication, identity authentication field, can solve problems such as unable to manage data

Active Publication Date: 2018-11-09
SUNWAVE COMM
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to aim at the disadvantage that once a user submits data in the existing Internet environment, the data can no longer be managed, and through identity authentication and data encryption, the privacy of the user is protected in the big data environment, specifically through Blockchain technology protects the interaction between users and servers through two-way identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing bidirectional identity authentication in block chain
  • Method for performing bidirectional identity authentication in block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Below in conjunction with accompanying drawing and specific embodiment, further illustrate the present invention, should be understood that these embodiments are only for illustrating the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various aspects of the present invention Modifications of equivalent forms fall behind the scope defined by the appended claims of this application.

[0023] Such as figure 2 As shown, the privacy protection between the end user (U) and the server (S) is realized through a third-party blockchain network. Each user on the blockchain network sets at least a pair of public / private keys, where the end user (U) has a public-private key pair p U / s U , the server (S) has a public-private key pair p s / s s . And use the above public key p to form a transaction digital address A(p) through the agreed blockchain network, wher...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for performing bidirectional identity authentication in a block chain. Bidirectional authentication is performed on the both sides requiring to perform data interaction and recorded in the block chain network through the method of proof-of-existence. The invention belongs to the field of block chain and privacy protection innovation. According to the bidirectionalmethod in the block chain, the method can be applied to the data application environment requiring privacy protection, and the implementation mode is simple and easy to operate.

Description

technical field [0001] The invention relates to the technical field of block chain and identity authentication technology, and mainly relates to a method for two-way identity authentication in block chain. Background technique [0002] Blockchain is a distributed ledger technology. The transactions in the ledger are guaranteed not to be tampered with according to cryptographic signature and hash algorithm, and all transactions are traceable in the ledger. In the public blockchain, user account information and transaction content are public, and user privacy is only protected through "pseudo-anonymity". But in the case of data as an asset, on the one hand, users do not want all data resources to be open to the public network environment; on the other hand, service businesses do not want data to be used by other users unlimited times after one authorization, so it is necessary Use encryption technology to protect data privacy, and at the same time ensure that authorized servi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3239H04L9/3247H04L9/3273H04L63/0869
Inventor 徐劲松严军荣
Owner SUNWAVE COMM