Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Whole-network unified online authentication method and system based on block chain

An authentication method and block chain technology, applied in the field of block chain-based unified online authentication method and system, can solve problems such as incomplete security, increased user overhead, and complicated processes, and achieve the goal of enhancing authority Effect

Active Publication Date: 2019-02-12
BEIJING INFORMATION SCI & TECH UNIV
View PDF9 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, PKI introduces a trusted third-party CA, which brings the cost of certificate management, storage and calculation:
[0003] 1. The issuance, issuance, acquisition, verification, and revocation of certificates are complicated procedures;
[0004] 2. An online certificate directory is required to provide users with certificate download and status query services at any time, which increases maintenance costs;
[0005] 3. If the user communicates with many objects, the user must store and manage these certificates locally, which increases the usage cost of the user end;
[0006] 4. The problem of large-scale key management is generally to use the method of physically adding CA, and there are also problems of cross-certification and trust management between users of each CA
Research shows that the process of creating multiple digital identities is inconvenient and cumbersome from a user experience perspective as users have to repeat the same sign-up process over and over and remember multiple passwords for different services
And the provider's central server is a prime target for hackers, and those user data are vulnerable to hacking
[0015] In addition, the management of the CA certificate system is chaotic, and each enterprise sets up its own CA core organization, which makes the certificate itself not authoritative enough and not completely secure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Whole-network unified online authentication method and system based on block chain
  • Whole-network unified online authentication method and system based on block chain
  • Whole-network unified online authentication method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0037] figure 1 It shows a schematic structural diagram of a blockchain-based unified online authentication system for the entire network provided by an embodiment of the present invention, see figure 1, the blockchain-based unified online authentication system for the entire network provided by the embodiment of the present invention includes:

[0038] Set N servers in the whole network divided into S areas 10, set at least one server in each area as data storage node 101, and set other servers as authentication service nodes 102, where S≥1, N≥1.

[0039] The first data storage node 101 is configured to receive the first user request information sent by the client; generate first response information according to the first user request information, and send the first response information to the client; obtain and link the first response information a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a whole-network unified online authentication method and system based on a block chain. The method comprises the following steps that N servers are arranged in the whole networkdivided into S areas, and at least one server is arranged in each area to serve as a data storage node, wherein other servers are set as authentication service nodes; a first data storage node receives first user request information sent by a user side; the first data storage node generates first response information according to the first user request information, and sends the first response information to the user side; the first data storage node acquires block chain information corresponding to a first user according to the first response information, stores the block chain information corresponding to the first user in a block, and sends the block chain information corresponding to the first user to other data storage nodes; and the first authentication service node receives a second user request sent by the user side, and verifies the second user request.

Description

technical field [0001] The present invention relates to the field of communications, in particular to a blockchain-based unified online authentication method and system for the entire network. Background technique [0002] Under the public key cryptography system, the public key digital signature technology needs to rely on the CA certificate issued by the public key infrastructure (PKI) to bind the identity of the entity and the public key to ensure the authenticity of the public key of the entity. Binding the user's public key and user identity in the form of a public key certificate forms a mature solution to network security issues. However, PKI introduces a trusted third-party CA, which brings the cost of certificate management, storage and calculation: [0003] 1. The issuance, issuance, acquisition, verification, and revocation of certificates are complicated procedures; [0004] 2. An online certificate directory is required to provide users with certificate downlo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0807H04L67/1097H04L67/60
Inventor 蒋文保章峰
Owner BEIJING INFORMATION SCI & TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products