Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed trusted identity storage method and system based on block chain

A blockchain and distributed technology, applied in the transmission system, electrical components, etc., can solve the problems of identity information redundant key management security and privacy, and achieve the effect of strong versatility of the method

Inactive Publication Date: 2019-07-23
NANJING UNIV OF SCI & TECH
View PDF5 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to propose a blockchain-based distributed trusted identity storage method to overcome the problems of identity information redundancy, key management security, and privacy faced in identity authentication and management in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed trusted identity storage method and system based on block chain
  • Distributed trusted identity storage method and system based on block chain
  • Distributed trusted identity storage method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0022] Such as figure 1 , 2 As shown, a blockchain-based distributed trusted identity storage method, the specific steps are:

[0023] Step 1. Connect the trusted hardware with the smart terminal, write the user's digital identity information in the trusted hardware into the blockchain through the smart terminal, and upload the user's digital identity information to the server of the third-party platform for registration through the smart terminal.

[0024] Among them, the trusted hardware stores the user's private key separately in a chip through mnemonic words, isolating from the Internet, and realizes plug-and-play through the USB interface. Such as image 3 As shown, the specific workflow of trusted hardware is as follows:

[0025] 1. After the trusted hardware is started, it is first necessary to determine whether the user’s public ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed credible identity storage method and system based on a block chain. The method mainly comprises the steps that identity information is packaged and stored by means of tamper-proofing and decentralization characteristics of block chain storage; identity information capitalization is completed through trusted hardware, personal information is stored in a block chain, a private key is archived in a user terminal, and a third-party platform achieves identity authority authentication by calling hardware equipment. The method has the advantages of high security,strong privacy, wide universality and the like, and can provide a more efficient and credible identity authentication environment.

Description

technical field [0001] The invention belongs to the technical field of cyberspace security, and specifically relates to a block chain-based distributed trusted identity certificate storage method and system. Background technique [0002] Nowadays, people are more and more dependent on cyberspace, user behavior space has extended from offline physical society to online cyberspace, information exchange and interaction in cyberspace are also increasing, and the Internet has become a driving force for society. important tool for development. However, with the rapid development of cyberspace, it is also facing security issues such as the difficulty of identifying network subjects and unauthorized access to network resources. Realizing the authentication of network identities and the traceability of network behaviors, establishing a trusted network identity is the premise and basis for people to enjoy various Internet information services, and it is also an inevitable requirement...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/08
Inventor 魏松杰王佳贺徐臻李帅
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products