Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain-based anonymous identity authentication method and device

An anonymous authentication and identity authentication technology, applied in the Internet field, can solve the problems of personal identity theft and leakage, and achieve the effect of avoiding leakage and realizing anonymous verification

Active Publication Date: 2018-11-13
FEITIAN TECHNOLOGIES
View PDF13 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, in order to pursue higher speed and lower cost, the verification party usually compares the personal information entered by the user with the information pre-collected in the database, and the personal information may be stored in hundreds or thousands of different verification parties. If any one of the authenticating parties in the database collects, stores, transmits or processes the data, there is a data breach due to technical or procedural flaws, then millions of personal identities are at risk of theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based anonymous identity authentication method and device
  • Blockchain-based anonymous identity authentication method and device
  • Blockchain-based anonymous identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] This embodiment provides a blockchain-based anonymous identity authentication method, specifically including: a user identity registration method, a user identity authentication method, and a user identity revocation method;

[0037] User identity registration method, such as figure 1 shown, including:

[0038] Step 101, the client obtains the preset parent public key as the registration address, receives the user information input by the user, and generates a registration request according to the user information and the registration address;

[0039] Specifically, the parent key pair is preset in the client, and it should be noted that each parent key pair uniquely corresponds to one user; obtain the parent public key in the parent key pair as the registration address;

[0040] User information includes: user information such as user name, user's date of birth, and user's residential address / business address;

[0041] Step 102, the client sends a registration reques...

Embodiment 2

[0113] This embodiment provides a device for anonymous identity authentication based on blockchain, such as Figure 4 As shown, including: third-party application 1, client 2 and authentication service system 3;

[0114] Third-party apps1 include:

[0115] The first receiving module 11 is used to receive the login request initiated by the user through the client 2; it is also used to receive the anonymous authentication address sent by the client 2; it is also used to receive the identity authentication success response sent by the authentication service system 3; it is also used for Receiving an authentication failure response sent by the authentication service system 3;

[0116] The first sending module 12 is used to send to the client 2 a request for obtaining an anonymous authentication address after the first receiving module 11 receives the login request; it is also used to send the anonymous authentication address sent by the client 2 when the first receiving module 11...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of Internet, and particularly relates to a blockchain-based anonymous identity authentication method and device. The method includes the following steps: when a third-party application receives a login request initiated by a user through a client, acquiring an anonymous authentication address from the client; enabling the third-party application to sendan authentication request including the anonymous authentication address to an authentication service system, and simultaneously enabling the client to generate a message value, signing the message value by using a sub-private key saved corresponding to the anonymous authentication address to obtain a signature value, generating authentication data according to the signature value and the anonymous authentication address, and broadcasting the authentication data to networks; and when an authentication server monitors the authentication data including the anonymous authentication address, performing signature verification on the signature value by using the anonymous authentication address; and when the signature verification is successful, writing the authentication data to a blockchain,sending an identity authentication success response to the third-party application, and ending the process. By adopting the technical scheme provided by the invention, the anonymous verification of user information performed by a verifier can be achieved.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a method and device for anonymous identity authentication based on blockchain. Background technique [0002] Identity authentication, also known as "identity verification" or "identity authentication", refers to the process of confirming the identity of the operator in the computer and computer network system, so as to determine whether the user has access and use rights to certain resources, and then make the computer And the access policy of the network system can be implemented reliably and effectively, preventing attackers from posing as legitimate users to gain access to resources, ensuring the security of the system and data and the legitimate interests of authorized visitors. [0003] In the existing technology, in order to pursue higher speed and lower cost, the verification party usually compares the personal information entered by the user with the informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0421H04L63/08H04L63/0876
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products