Unlock instant, AI-driven research and patent intelligence for your innovation.

Alliance chain-based registration method, application server, user side and system

An application server and client technology, applied in the computer field, can solve problems such as security risks

Active Publication Date: 2019-09-13
浪潮卓数大数据产业发展有限公司
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then only the public-private key pair is used to encrypt or sign, and the user's transaction information or written data still has security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alliance chain-based registration method, application server, user side and system
  • Alliance chain-based registration method, application server, user side and system
  • Alliance chain-based registration method, application server, user side and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0096] Randomly generate a fourth character string for retrieving the login password request; send an event-triggered challenge carrying the fourth character string to the user end to instruct the user end to respond to the challenge, and generate a fourth response message; receive the fourth character string sent by the user end Response message, and verify the signature of the fourth response message, wherein the fourth response message includes the new signature obtained by signing the fourth character string with the first private key and the first public key; when the signature verification result indicates that the signature verification is successful , send the login password to the client.

Embodiment approach 2

[0098] Randomly generate a fifth character string for retrieving the login password request; send an event-triggered challenge carrying the fifth character string to the user terminal to instruct the user terminal to respond to the challenge of modifying the account, and generate a fifth response message; receive the message sent by the user terminal The fifth response message, and verify the signature of the fifth response message, wherein the fifth response message includes the splicing result of the new login password and the fifth character string, the first public key and the new login password; when the signature verification result indicates When signing successfully, replace the original user login account with the new login password. The splicing result of the above-mentioned new user login account and the second character string is that the new login password and the fifth character string are concatenated to form a new character string, and the new character string i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an alliance chain-based registration method, an application server, a user side and system, and the method comprises the steps: receiving a registration request sent by a client, wherein the registration request includes a first public key in the first public-private key pair generated by the client, a user login account, and a login password signed with the first private key in the first public-private key pair; checking the registration request; when the verification result indicates that the verification is successful, generating the corresponding alliance chain registration identifier for the user end, broadcasted to the alliance chain network; and acquiring the registration result from the alliance chain network; parsing a second public-private key pair assignedby the authentication authority in the alliance chain to the client from the registration result, and storing the registration message and the second public-private key pair, So that the first public-private key pair and the second public-private key pair jointly encrypt the network interaction data related to the client end. The solution provided by the invention can effectively improve the security of the transaction information or the written data of the user.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a registration method based on alliance chain, an application server, a client terminal and a system. Background technique [0002] Consortium chain is a type of blockchain, which internally designates multiple pre-selected nodes as bookkeepers, and the generation of each block is jointly decided by all pre-selected nodes. That is, the alliance chain has set up an access mechanism, and its certification authority (CertificateAuthority, CA) is composed of multiple pre-selected nodes. In addition, the nodes of the alliance chain are in the hands of a small number of organizations or individuals. Most ordinary users do not have their own nodes. When ordinary users register, participate in transactions, or write data to the alliance chain, they need to use a node as an intermediary. to obtain permission from all pre-selected nodes in the certificate authority. [0003] At...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/06
CPCH04L9/0643H04L9/0863H04L9/0891H04L63/08H04L63/083
Inventor 张岚庞松涛商广勇王伟兵马岩堂赵树林姜鑫陶鑫刘伟巍
Owner 浪潮卓数大数据产业发展有限公司