Heterogeneous identity alliance user trust management system based on class block chain technology

A trust management and blockchain technology, applied in the field of heterogeneous identity alliance user trust management system, can solve the problems of no other data, high cost, no trust management system, etc., to reduce the risk of damage and reduce costs. Effect

Inactive Publication Date: 2019-10-11
CHENGDU UNIV OF INFORMATION TECH
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) At present, there is no trust management system specifically for the heterogeneous identity alliance system
[0009] (2) Existing user trust management systems are all centralized management. Once the centralized management trust management center is invaded, even if the data is changed, there will be n

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Heterogeneous identity alliance user trust management system based on class block chain technology
  • Heterogeneous identity alliance user trust management system based on class block chain technology
  • Heterogeneous identity alliance user trust management system based on class block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0096] Addition of user trust chain: such as Figure 5-Figure 6 As shown, when all subsystems of the heterogeneous identity alliance have established a trust chain system, if a subsystem needs to add new users, follow the steps below to add the user trust chain:

[0097] (1) Create a database for users of the alliance subsystem to store user trust chain information.

[0098] (2) Perform user trust value evaluation according to the existing trust value evaluation of the system.

[0099] (3) Use the evaluation value to build the first node of the trust chain and the initial trust block. The initial trust block specifically includes: the user identity information is an ID value for uniform identification of the user in the alliance. The timestamp is the timestamp when the information was written. The initial value of the trust value is a value calculated by evaluating the user trust value according to the existing trust value evaluation of the system. And use random value ins...

Embodiment 2

[0104] Alliance subsystem added: as Figure 7 As shown, when the heterogeneous identity federation adds subsystems, it is necessary to add all users' trust chains for the added subsystems. It is necessary to ensure that no repeated and different trust chains are added for the same user.

[0105] Specific steps are as follows:

[0106] (1) Broadcast user information to other subsystems of the alliance.

[0107] (2) If the trust chain already exists in other subsystems, copy the existing trust chain to the trust chain database of the user.

[0108] (3) If the user does not exist in all subsystems, calculate the trust value for the user and establish a new trust chain for it.

Embodiment 3

[0110] Introduction of trust chain system: When introducing the trust chain system for the first time, first select one of the systems in the heterogeneous identity alliance to add the process of trust chain for all users, and then switch to the next step when all users are added The introduction of a subsystem can avoid the situation that the same user repeatedly establishes different trust chains caused by the simultaneous introduction of multiple systems.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of confidential or secure communication, and discloses a heterogeneous identity alliance user trust management system based on class block chain technology. A user trust chain management module is used for managing a user trust chain; An alliance subsystem trust chain management module is used for managing a heterogeneous identity alliance subsystem. Atrust chain system introduction module is used for introducing a trust chain system, and a user trust value change module is used for changing a user trust value. A trust alarm module is used for setting an alarm threshold value for the trust value of the user, and broadcasting the alarm threshold value to each subsystem in an alliance when any subsystem finds that the trust value of the user is reduced to be equal to or less than the threshold value. According to the invention, the decentralization of the existing heterogeneous identity alliance is greatly ensured not to be damaged. Meanwhile, the apportioning cost and the trust management cost of each system in the alliance can be greatly reduced.

Description

technical field [0001] The invention belongs to the technical field of confidentiality or security communication, and in particular relates to a heterogeneous identity alliance user trust management system based on similar block chain technology. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] Heterogeneous identity federation is an emerging identity management system. Existing identity management systems exist primarily in silos. Existing identity management systems in which multiple systems share identities mainly use a central system to manage user identities, and such systems are called centralized systems. In a centralized system, the identity authenticated by the central system can be used in other subsystems, and the identity authenticated by the subsystem itself cannot be used universally. Identity federation is the common use of identity information and authorization mechanisms by multiple...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/20H04L63/1441H04L9/3297H04L9/50
Inventor 刘宁杨敏张仕斌张航赵杨甘建超杨晨
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products