User identity authentication method and device in network

A user identity authentication and network technology, which is applied in the field of user identity authentication methods and devices in the network, can solve the problems of low authentication efficiency and enlarged demand, and achieve the effect of increasing reliability and accuracy and preventing false authentication

Active Publication Date: 2020-05-12
ADVANCED NEW TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing B To C authentication mode adopts a centralized authentication method, which leads to the absolute power of the B-side of the certification organization, which often enlarges the demand and asks users for unnecessary information; and in terms of authentication efficiency, because each C-side user Each certification needs to submit government or third-party certificates, and then the B-side of the certification organization will review them one by one. Limited by the number of platform reviewers, this type of certification is relatively inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method and device in network
  • User identity authentication method and device in network
  • User identity authentication method and device in network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The exemplary embodiments will be described in detail here, and examples thereof are shown in the accompanying drawings. When the following description refers to the accompanying drawings, unless otherwise indicated, the same numbers in different drawings represent the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with one or more embodiments of this specification. On the contrary, they are merely examples of devices and methods consistent with some aspects of one or more embodiments of this specification as detailed in the appended claims.

[0045] It should be noted that in other embodiments, the steps of the corresponding method are not necessarily executed in the order shown and described in this specification. In some other embodiments, the method includes more or fewer steps than described in this specification. In addition, a single step described in this...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided by one or more embodiments of the present description are a method and device for user identity authentication in a network, which are applied to a block chain network comprising a plurality of authenticated user nodes and a user node to be authenticated, the method comprising: acquiring identity information to be authenticated of a user node to be authenticated; sending a set of identity reference information related to the user node to be authenticated, wherein the set of identity reference information comprises the identity information to be authenticated and identity comparison information generated on the basis of the identity information to be authenticated; acquiring a determination result put forth by an authenticated user node on the basis of the set of identity reference information, wherein the identity information of the authenticated user node is at least partially the same as the identity information to be authenticated; and determining whether the identity information to be authenticated passes the authentication of the authenticated node according to the comparison relationship between the determination result and the identity information to be authenticated.

Description

Technical field [0001] This specification relates to the field of network information processing technology, and in particular to a method and device for user identity authentication in a network. Background technique [0002] The existing network platform usually adopts the B To C (organization to individual) model for user identity authentication, that is, the personal identity information submitted by the user is audited and authenticated by an organization with identity authentication qualification, and the authentication validity is based on business requirements. Different, the above-mentioned organizations with identity authentication qualifications may include CA organizations, organizations with high credit, such as banks, large state-owned enterprises, and network platform operators. The existing B To C certification model adopts a centralized certification method, which leads to the absolute power of the certification organization on the B side, which often amplifies t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/12
Inventor 蒋吉麟钮清锋朱琳全恩如董宵群
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products