Method for performing identity authentication on user node in block chain and related equipment

A user node and identity authentication technology, applied in the field of transaction verification, can solve problems such as sensitive information leakage

Active Publication Date: 2019-07-26
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this process, even if the identity information of the user node is protected, since all transactions are public on the entire blockchain, anyone can determine which CA is a specific CA through the digital certificate in the transaction. The user has issued a digital certificate, so it can be furth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing identity authentication on user node in block chain and related equipment
  • Method for performing identity authentication on user node in block chain and related equipment
  • Method for performing identity authentication on user node in block chain and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solutions have not bee...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for performing identity authentication on user nodes in a block chain and related equipment, and relates to the field of transaction verification, and the method comprises the steps: obtaining a group certificate distributed by a CA group administrator; when an authentication request of a user node in the block chain is received, obtaining identity identification information of the user node and a public key of the user node; encrypting the group certificate, the identity identification information of the user node and the public key of the user node by using the private key of the CA based on a predetermined encryption algorithm to generate a digital certificate of the user node; and sending the digital certificate and the public key of the CA to the usernode. According to the method, hiding of CA identity information of the certificate authority is achieved, and protection of transaction privacy is enhanced.

Description

technical field [0001] The invention relates to the field of transaction verification, in particular to a method and related equipment for identity authentication of user nodes in a block chain. Background technique [0002] In the blockchain, when transactions are made between user nodes, digital certificates issued by CAs are used to prove their identities. In this process, even if the identity information of the user node is protected, since all transactions are public on the entire blockchain, anyone can determine which CA is a specific CA through the digital certificate in the transaction. The user has issued a digital certificate, so it can be further inferred: the number of customers of the CA; there is a certain connection between the user nodes that issue digital certificates from the same CA, and hidden information can be obtained further... In this Under such circumstances, sensitive information is leaked, which poses a considerable threat to user nodes and CAs. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3268H04L9/3263H04L63/0442H04L63/0823H04L9/50
Inventor 何伟林
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products