Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for identity authentication on blockchain

A block chain, technology to be certified, applied in the field of block chain, can solve the problems of low security level, copying and embezzlement, no fixed storage, etc.

Active Publication Date: 2022-04-01
FEITIAN TECHNOLOGIES
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing identity authentication generally uses a combination of software certificates and authorization mechanisms. Since soft certificates are displayed in the form of file certificates and are not fixedly stored in a certain hardware medium, they are prone to being copied and stolen by others for identity authentication. In the case of low security level
Moreover, in the existing technology, the identity authentication methods of different enterprises cannot achieve mutual authentication and trust, which is not conducive to the mutual benefit and reciprocity between enterprises, and also greatly affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for identity authentication on blockchain
  • A method and system for identity authentication on blockchain
  • A method and system for identity authentication on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] This embodiment provides a method for identity authentication on a blockchain, which is applicable to a system including an authentication device, an application program, a server, and a blockchain network. The blockchain network includes multiple blockchain nodes, each A blockchain node corresponds to a member of an alliance organization; methods include:

[0036] Step s1: the application obtains the device identifier and data to be authenticated of the connected authentication device;

[0037] Step s2: the application program sends the device identifier and data to be authenticated to the server;

[0038] Step s3: The server sends a request for querying the ledger of the blockchain node to any blockchain node in the blockchain network; the request for querying the ledger of the blockchain node includes the device identifier;

[0039] Step s4: The block chain node obtains the authentication associated data corresponding to the device identifier in the query block chai...

Embodiment 2

[0101] The second embodiment provides a method for identity authentication on the block chain, such as figure 1 Shown:

[0102] Step 101, the application program obtains the device identifier of the authentication device and the signature result of the device identifier;

[0103] Example: DT is 1000 0000 0000 0000.

[0104] After step 101, it may also include: the application program uses the device identifier to query whether there is an authentication status identifier that matches the device identifier in the program database, and obtains the authentication status of the authentication device according to the authentication status identifier, if the first preset authentication status identifier If the data at the position is the first preset value, it is determined that the authentication device has completed the authentication, and the process ends; otherwise, it is determined that the authentication device has not completed the authentication, and step 102 is performed. ...

Embodiment 3

[0134] The third embodiment provides a method for identity authentication on the block chain, such as figure 2 Shown:

[0135] Step 201, the application program obtains the device identifier of the authentication device and the signature result of the device identifier;

[0136] In this embodiment, the device identifier can be: 2000 0000 0000 0000;

[0137] After step 201, it may also include: the application program uses the device identifier to query whether there is an authentication status identifier that matches the device identifier in the program database, and obtains the authentication status of the authentication device according to the authentication status identifier, if the first preset authentication status identifier If the data at the position is the first preset value, it is determined that the authentication device has completed the authentication, and the process ends; otherwise, it is determined that the authentication device has not completed the authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for identity authentication on a block chain, and relates to the block chain field. The system includes: an authentication device, an application program, a server, and a block chain network; the block chain network includes multiple block chain nodes; each block chain node corresponds to a member of an alliance organization; the method and system provided in this embodiment enable the authentication device to participate in identity authentication, and at the same time combine block chain related technologies to record on the block chain node The block chain node ledger data of the alliance organization members' respective identity authentication forms a unified alliance authentication, which realizes the mutual trust between the identity authentication of members of different alliance organizations.

Description

technical field [0001] The present invention relates to the field of blockchain, in particular to a method and system for identity authentication on the blockchain. Background technique [0002] Blockchain technology (Blockchain technology, referred to as BT), is an Internet database technology, which is characterized by decentralization, openness and transparency, allowing everyone to participate in database records; at the same time, blockchain technology is also called distributed Ledger technology, where the ledger records the data written by each blockchain node to the blockchain; when the information of a blockchain node changes, the information of other blockchain nodes will also change accordingly. [0003] Existing identity authentication is generally carried out by combining software certificates and authorization mechanisms. Since soft certificates are displayed in the form of file certificates and are not fixedly stored in a certain hardware medium, it is easy to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/32H04L9/40H04L67/10
CPCH04L9/0643H04L9/3236H04L9/3263H04L63/08H04L63/0823H04L63/083H04L63/0869H04L63/0876H04L67/10
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products