A trusted authentication system and method based on block chain

An identity verification method and identity verification technology, applied in the direction of instruments, electrical digital data processing, digital data protection, etc., can solve problems such as being vulnerable to attack and tampering, user identity being easily used fraudulently, and passwords being easily intercepted in the middle, to achieve Guaranteeing security and reliability, effective management and information protection, and the effect of large-scale interaction

Inactive Publication Date: 2019-01-04
武汉笑脸科技有限公司
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In most network application processes, authentication is required between the client and the server operated by the user, but there are security risks due to the security flaws of the client itself, and various computer viruses or malicious programs are easy to control the client's authority. Therefore, when a password is used for verification between the client and the server, the password is easily intercepted by the middleman, and the user identity is easily used by fraudulent use. Moreover, this verification method requires a central server, which is controlled by viruses, hackers or malicious programs. security risks, and the data is easy to be tampered with. The identity information of the students is important information that accompanies the students throughout their lives, and is especially vulnerable to attacks and tampering. The blockchain technology is a method that combines data blocks in sequence in chronological order. A chained data structure, and a non-tamperable and non-forgeable distributed ledger guaranteed by cryptography. The use of blockchain technology can be decentralized, non-tamperable and non-forgeable. Therefore, a block-based Chain decentralization and tamper-proof trusted identity verification system and method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trusted authentication system and method based on block chain
  • A trusted authentication system and method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Such as figure 1 Shown, a kind of trusted identity verification method based on block chain of the present invention, it comprises the following steps:

[0036] S101. Establish a virtual node for each school, training institution, association and local education bureau;

[0037] S102. Build a blockchain identity management module for each virtual node that stores trusted identity information of users, connect the identity information of each organization node to the blockchain identity management system through the blockchain identity management module, and provide Establish a trust relationship between nodes, and each node connects to form an alliance chain;

[0038] S103. A node initiates an information modification application, and waits for the pre-selected node selected within the alliance chain to verify the identity information of the node;

[0039] S104. When the pre-selected node recognizes the node's identity information, the node enters the trusted identity...

Embodiment 2

[0046] Such as figure 2 As shown, a trusted identity verification system based on blockchain of the present invention includes a login module, an identity management module, an identity verification module and an authentication server;

[0047] The identity management module stores the user's initial identity information, uses an encryption algorithm to protect the user's identity information, and automatically updates the user's identity information on a regular basis. The identity management module includes: a storage unit and a trusted identity card generation unit; the storage unit stores the user's identity information; the trusted identity card generation unit automatically generates a trusted identity card according to the user's identity information. The storage unit is signally connected with the trusted identity card generation unit and the identity verification module respectively.

[0048] The identity verification module verifies the user's identity information ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trusted authentication system and a trusted authentication method based on a block chain, the method comprising steps: by using block chain technology instead of traditional data storage and verification methods, decentralization is realized, that is, a centralized agent is not needed, a high efficiency and large-scale interaction mode is directly realized, and users can not easily tamper with the correct information, once the information of a node changes, the entire 'block chain' of each node will perceive the behavior to ensure the authenticity and uniqueness of therelevant data; by using authentication server, different users can be assigned different application privileges to achieve effective management and information protection; the whole system can prevent user information from being tampered with, ensure the authenticity and uniqueness of the relevant data, assign different application rights to different users, and ensure the security and reliability of the system.

Description

technical field [0001] The invention relates to the field of education management, in particular to a blockchain-based trusted identity verification system and method. Background technique [0002] In most network application processes, authentication is required between the client and the server operated by the user, but there are security risks due to the security flaws of the client itself, and various computer viruses or malicious programs are easy to control the client's authority. Therefore, when a password is used for verification between the client and the server, the password is easily intercepted by the middleman, and the user identity is easily used by fraudulent use. Moreover, this verification method requires a central server, which is controlled by viruses, hackers or malicious programs. security risks, and the data is easy to be tampered with. The identity information of the students is important information that accompanies the students throughout their lives...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06Q50/20
CPCG06F21/6245G06F2221/2141G06Q50/205
Inventor 聂晶潘浩周洁
Owner 武汉笑脸科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products