Identity information management method and system based on block chain technology

A technology for identity information and management methods, applied in the field of identity information management methods and systems based on blockchain technology, can solve problems such as low security, lack of audit accountability mechanisms, and privacy protection, and achieve the effect of strong security protection

Active Publication Date: 2019-02-15
宁波图灵奇点智能科技有限公司
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

, to solve the problems of poor privacy protection, low security, and lack of audit accountability mechanism in the existing technology of identity verification and authorization technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity information management method and system based on block chain technology
  • Identity information management method and system based on block chain technology
  • Identity information management method and system based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the present invention will be described in detail below with reference to the accompanying drawings. It should be understood that the following descriptions are only specific illustrations of the embodiments of the present invention, and should not limit the protection scope of the present invention.

[0048] The main purpose of the present invention is to build a strong privacy protection identity management infrastructure (Privacy Preserving Identification Management Infrastructure, PPIMI for short) based on blockchain, zero-knowledge proof and other technologies.

[0049] see figure 1 , figure 1 It is a flowchart of an identity information management method based on blockchain technology provided by an embodiment of the present invention. The identity information management method includes steps S1-S2:

[0050] S1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity information management method and system based on block chain technology. The method comprises the following steps: identifying user identity through a block chainnetwork so as to protect personal privacy information; and performing identity verification on a user according to the identified user identity through the block chain network and the user module. Theidentity information management method disclosed by the invention has the advantages that unified identity management infrastructure with strong privacy protection, strong security protection and strong audit accountability is constructed based on the block chain network, and the unified identity management infrastructure can provide identity identification, identity verification, authorization,audit accountability and like services.

Description

technical field [0001] The present invention relates to the field of access control technology and blockchain technology, in particular to an identity information management method and system based on blockchain technology. Background technique [0002] The primary role of access control is to control how users and systems communicate and interact with other systems and resources. Access control is the first line of defense in information security management and the foundation of other security mechanisms. At the heart of access control is identity management. Referring to the "AAA" design requirements (Authentication, Authorization, Accounting), identity management mainly involves four key steps: identity identification, identity verification, authorization, and audit accountability. Among them, the main identification technologies are: static password authentication, token authentication (U-shield, SMS verification code, etc.), Challenge / Respond authentication, biometric...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 梅彦铮郭成翟翌华夏博王桂艳
Owner 宁波图灵奇点智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products