Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unified identity authentication method based on blockchain

A technology of identity authentication and blockchain, applied in the transmission system, electrical components, etc., can solve the problems of unforgeability, unlinkability, convenience, anonymity, etc., and achieve the effect of ensuring privacy

Active Publication Date: 2019-03-19
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, a set of key derivation algorithm is designed to protect user privacy and solve the problems of unforgeability, confidentiality, anonymity, unlinkability and convenience in the use of user identity information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified identity authentication method based on blockchain
  • Unified identity authentication method based on blockchain
  • Unified identity authentication method based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] This patent designs a method for unified identity authentication of users based on the blockchain platform, which solves the problems of difficult verification and easy disclosure of privacy in current identity authentication.

[0024] In this method, there are six types of participants, users, annual ring server (referred to as server), basic identity provider (referred to as PSD), attribute provider (referred to as IDP), relying party (referred to as RP), and district blockchain. Among them, the annual ring server manages the application, serves as the medium of contact between the user and other participants, and is responsible for performing the comparison between the user's face and the user's identity information during the identity binding process. The underlying identity provider provides the underlying authentication of users. The attribute provider provides users with various attribute verifications. The relying party is the object to be presented as a user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a unified identity authentication method based on a block chain, comprising the following four stages: 1. phase of user registration: a user registering with an annual ring server using his mobile phone number to obtain the certificate issued by the annual ring server CA; 2. phase of user binding identity: the annual ring server cooperating with a public security departmentto verify the identity of the user online with face, and recording the user identity verification result on the block chain; 3. phase of user attribute binding: the user initiating a binding requestfor the attribute to the annual ring server, and the annual ring server binding various attributes of the user to the block chain; 4. phase of user attribute presentation: the user presenting the successfully bound property to a relying party. Compared with the prior art, the positive effects of the present invention are that: the block chain technology ensures the incomprehensible modification ofvarious identity information of the user, and on the other hand, the cryptographic means is used to ensure the privacy of the user identity.

Description

technical field [0001] The invention relates to a block chain-based unified identity authentication method. Background technique [0002] Traditional identity authentication is mainly offline identity authentication and center-based electronic identity authentication. [0003] Offline identity authentication is currently supported only by citizen ID cards, and card readers are used to verify and obtain ID card information. There is currently no good verification support for other documents. At the same time, offline identity authentication has brought great changes to users carrying various documents. At the same time, there are problems such as leakage of private information and excessive acquisition of user information by merchants. [0004] The center-based electronic identity authentication greatly relies on the credibility of the center, and the user's identity data is stored in the central server. There is a great possibility of user privacy information leakage and ce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L63/083H04L63/0861H04L63/0876
Inventor 范佳白健安红章王震
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products