Check patentability & draft patents in minutes with Patsnap Eureka AI!

Efficient double-factor cross-domain authentication method based on block chain technology

An authentication method and blockchain technology, applied in the field of efficient two-factor cross-domain authentication, can solve the problems of biometric leakage, unfavorable system promotion, uneven equipment, etc., and achieve the effect of strong reliability and information security.

Active Publication Date: 2019-07-30
梧桐链数字科技研究院(苏州)有限公司
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, the schemes of Zhou, Zhang and others are not completely applicable to the system designed in this paper. There are three main reasons for this. First, there are many users involved in the electric vehicle time-sharing rental sharing platform, and the equipment used by users is uneven. There is no uniform biometric collection equipment; second, biometrics are different from other characteristics and cannot be changed by the individual user. When it comes to biometric collection, users will worry about biometric leakage, which is not conducive to the promotion of the system. ; The third is that fuzzy extraction technology and recovery algorithm need to be frequently used in the authentication process, and the efficiency is low in the case of a large number of users with high concurrent requests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient double-factor cross-domain authentication method based on block chain technology
  • Efficient double-factor cross-domain authentication method based on block chain technology
  • Efficient double-factor cross-domain authentication method based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0067] An efficient two-factor cross-domain authentication method based on blockchain technology, comprising the following steps:

[0068] Step 1: Overall system architecture design;

[0069] Step 2: System workflow;

[0070] Step 21: User registration process;

[0071] Step 22: User local authentication:

[0072] Step 23: User remote cross-domain authentication.

[0073] Such as figure 2 As shown, the overall architecture design of the system, according to the Diffie-Hellman algorithm A, B session key agreement mechanism steps are:

[0074] Step 11: Randomly select a large prime number n and the original root g, the two pieces of information are made public, and A and B have agreed on the two pieces of information;

[0075] Step 12: A randomly generates a number x, and calculates X=g x modn, then send X to B;

[0076] Step 13: B randomly generates a number y, and calculates Y=g y modn, then send Y to B;

[0077] Step 14: A calculates K=Y x modn;

[0078] Step 15: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an efficient double-factor cross-domain authentication method based on a block chain technology, which is characterized by comprising the following steps: 1, designing an overall architecture of a system; 2, realizing a system workflow; step 21, carrying out a user registration process; 22, performing local authentication on the user; and step 23, performing cross-domain authentication on the user remotely. According to the equipment number and password double-factor cross-domain authentication scheme provided by the invention, the cross-domain authentication efficiency of the user is improved, and the safety of cross-domain authentication of the user is ensured.

Description

technical field [0001] The invention belongs to the field of PKI authentication cross-domain authentication, in particular to an efficient two-factor cross-domain authentication method based on block chain technology. Background technique [0002] In the electric vehicle time-sharing rental sharing platform, users are required to use vehicles across platforms, that is, users of A electric vehicle time-sharing rental company can use vehicles operated by all other companies B, C, D, etc. in the alliance, which can satisfy users to the greatest extent. For daily travel needs, users no longer need to use the apps of multiple electric car rental companies and pay multiple deposits, and companies such as B, C, and D can obtain the car rental business of users of Company A without spending high customer acquisition costs. [0003] However, in a distributed environment, for the convenience of managing users, each company and department sets up a corresponding resource access control...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/46G06F21/60G06F21/62G06Q30/06H04L9/08H04L29/06
CPCG06F21/46G06F21/602G06F21/6245G06Q30/0645H04L9/0841H04L9/0861H04L63/083H04L63/0876
Inventor 马小峰徐晶晶
Owner 梧桐链数字科技研究院(苏州)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More