Check patentability & draft patents in minutes with Patsnap Eureka AI!

A blockchain-based identity authentication method and system thereof

A technology for identity authentication and identity authentication results, applied in the field of blockchain-based identity authentication methods and systems, and can solve problems such as poor security of unified authentication technology

Active Publication Date: 2021-06-04
朗新数据科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The distributed and decentralized solution of the application of blockchain can solve the problem of poor security of the existing unified authentication technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based identity authentication method and system thereof
  • A blockchain-based identity authentication method and system thereof
  • A blockchain-based identity authentication method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] see figure 1 As shown, the technical solution of this embodiment adopts block chain to carry out unified identity authentication, and its steps are:

[0051] The client receives the preset password x input by the user, and calculates E(f(x)) and E(g(x)) locally according to the preset homomorphic encryption algorithm E;

[0052] The client sends a service request to the server, the service request includes the user public key and E(f(x)), E(g(x)), and the matters to be handled by the client; where f(x)=H 1 (x), g(x)=H 2 (x), where the function H 1 with H 2 are two different one-way hash functions, and H 1 with H 2 The output digits are the same, and the output length is above 256bit;

[0053] The server receives the service request sent by the client, and performs identity authentication through the block chain, and responds to the service request of the client according to the identity authentication result returned by the block chain;

[0054] Specifically, the...

Embodiment 2

[0074] In this example, see image 3 As shown in , after the server obtains the authentication certificate from the blockchain, it performs identity authentication on the authentication server of the server.

[0075]Specifically, the server receives the service request sent by the client, the service request includes the user public key and E(f(x)), E(g(x)), the E(f(x)) and E( g(x)) is calculated by the client according to the preset homomorphic encryption algorithm E, where f(x)=H 1 (x), g(x)=H 2 (x), where the function H 1 with H 2 are two different one-way hash functions, and H 1 with H 2 The output digits are the same, and the output length is above 256 bits; the server sends an authentication credential acquisition request to the smart contract of the blockchain, and the authentication credential acquisition request includes the user public key; the smart contract searches for the user authentication credential through the user public key And return to the server; t...

Embodiment 3

[0078] This embodiment provides a blockchain-based identity authentication system, including a client, a server, and a blockchain. The identity authentication system uses the identity authentication method in Embodiment 1 for unified identity authentication. I won't repeat them here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a block chain-based identity authentication method and system thereof. The block chain-based identity authentication method of the present invention includes the following steps, the block chain smart contract receives the identity authentication request sent by the server, and the identity authentication request includes the user public key and E(f(x)), E(g( x)), E(f(x)) and E(g(x)) are calculated by the client according to the preset homomorphic encryption algorithm E; the smart contract queries the user's authentication certificate Ea on the blockchain according to the user's public key , and calculate and verify according to E(f(x)), E(g(x)), and the homomorphic property of the homomorphic encryption algorithm E, if the homomorphic property is satisfied, the identity authentication is passed; the smart contract will pass the identity authentication result Return to the server. Its beneficial effect is: based on the characteristics of the blockchain itself, it can resist the threat of replay attacks and brute force cracking, resulting in increased attack costs. Using the property equation of homomorphic encryption, nizk can be constructed to prove that the user has his credentials without revealing the original credentials of the user's identity authentication, thereby proving his identity.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a blockchain-based identity authentication method and system thereof, which can be applied in application scenarios requiring unified identity authentication. Background technique [0002] With the rapid development of Internet technology, there are more and more electronic identity authentication services. In order to solve the problem of users entering passwords in one place, it has become a trend to quickly and safely perform unified identity authentication in multiple services. The current unified authentication relies on a centralized authentication server. There may be a single point of failure, and because the centralized rights are controlled by a certain server, there are security risks when multiple different organizations use the unified authentication method. [0003] Therefore, providing a block chain-based identity authentication method and its system wit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/00
Inventor 程威李静唐肖旅
Owner 朗新数据科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More