A method and apparatus for authenticate user identity in a network

A user identity authentication and network technology, which is applied in the field of user identity authentication methods and devices in the network, can solve the problems of enlarged demand and low authentication efficiency, and achieve the effect of preventing false authentication and increasing reliability and accuracy

Active Publication Date: 2018-12-21
ADVANCED NEW TECH CO LTD
View PDF10 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing B To C authentication mode adopts a centralized authentication method, which leads to the absolute power of the B-side of the certification organization, which often enlarges the demand and asks users for unnecessary information; and in terms of authentication efficiency, because each C-side user Each certification needs to submit government or third-party certificates, and then the B-side of the certification organization will review them one by one. Limited by the number of platform reviewers, this type of certification is relatively inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and apparatus for authenticate user identity in a network
  • A method and apparatus for authenticate user identity in a network
  • A method and apparatus for authenticate user identity in a network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. Implementations described in the following exemplary embodiments do not represent all implementations consistent with one or more embodiments of this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of one or more embodiments of the present specification as recited in the appended claims.

[0045] It should be noted that in other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described in this specification. In some other embodiments, the method may include more or less steps than those described in this specification. In addition, a single step described in this...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

One or more embodiments of the present specification provide a user identity authentication method and apparatus in a network, which are applied to a block chain network including a plurality of authenticated user nodes and a user node to be authenticated. The method comprises the following steps of: obtaining identity information to be authenticated of the user node to be authenticated; sending aset of identity reference information about a user node to be authenticated, wherein the set of identity reference information comprises the identity information to be authenticated and comparison identity information generated based on the identity information to be authenticated; acquiring a determination result made by an authenticated user node based on the set of identity reference information, wherein the identity information of the authenticated user node is at least partially the same as the identity information to be authenticated; determining whether the identity information to be authenticated passes the authentication of the authentication node according to the comparison relationship between the identification result and the identity information to be authenticated.

Description

technical field [0001] This specification relates to the technical field of network information processing, and in particular to a method and device for user identity authentication in a network. Background technique [0002] Existing network platforms usually adopt the B To C (organization-to-individual) model for user identity authentication, that is, organizations with identity authentication qualifications review and authenticate the personal identity information submitted by users, and verify the effectiveness of authentication based on business needs. Differently, the above-mentioned organizations with identity authentication qualifications may include CA institutions, organizations with high credit, such as banks, large state-owned enterprise organizations, and network platform operator organizations. The existing B To C authentication mode adopts a centralized authentication method, which leads to the absolute power of the B-side of the certification organization, wh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/12
Inventor 蒋吉麟钮清锋朱琳全恩如董宵群
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products