Identity authentication method, identity authentication device, and computer-readable medium

An identity authentication and identity technology, applied in the blockchain field, can solve the problems that cannot be enjoyed by ordinary users, low efficiency, security, and cheap public key distribution services

Active Publication Date: 2018-12-21
PING AN TECH (SHENZHEN) CO LTD
View PDF7 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the cost of the current PKI model is very high. At present, only a few certificate authorities in the world can issue certificates (public keys), and the issuance fees are very high. At present, only large organizations, companies, and websites can afford it;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, identity authentication device, and computer-readable medium
  • Identity authentication method, identity authentication device, and computer-readable medium
  • Identity authentication method, identity authentication device, and computer-readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0035] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0036] It should also be understood that the terminology used in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application discloses an identity authentication method,an identity authentication device and a computer-readable medium. The method comprises the following steps: the second user node obtains the first identity mapping information corresponding to the first user address identification from the block chain according to the first user address identification of the first user, the first identity mapping information including the first user address identification, the first public key and the first identity fingerprint; the second user node obtains the first identitymapping information corresponding to the first user address identification from the block chain according to the first user address identification. Encrypting the second public key of the second userby using the first public key, obtaining an authentication request, and broadcasting the authentication request to the whole network; receiving identity feedback information; the feedback informationis verified according to the second user private key and the first identity fingerprint, and if the verification is passed, it is determined that the first user address identification is the user address identification of the first user. As shown in the embodiment of the present application, the user's public key can be distributed securely, efficiently and inexpensively, and the user's identitycan be effectively verified.

Description

technical field [0001] The present application relates to the technical field of blockchain, and in particular to an identity authentication method, an identity authentication device, and a computer-readable medium. Background technique [0002] Blockchain is a series of data blocks associated with cryptographic methods. Each data block contains network transaction information of all blockchain networks in the past for a certain period of time, which is used to verify the validity of its information and generate laundry songs. blocks. In recent years, blockchain technology has received extensive attention and development. Blockchain technology, also known as "distributed ledger technology", is decentralized in essence, and resides in the method of data storage, transmission and certification in a distributed structure, and a distributed database system in which multiple nodes collectively participate. It is not a single technology, but the result of the integration of mult...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/0823H04L63/0861H04L63/0876
Inventor 褚秋实左龙龙
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products