Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method, device and system based on blockchain

An identity authentication device and identity authentication technology, applied in the field of devices and systems, and blockchain-based identity authentication methods, can solve problems such as low security and achieve the effect of improving security

Inactive Publication Date: 2019-11-15
BEIJING CHINA POWER INFORMATION TECH +2
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of this application is to provide a block chain-based identity authentication method, device and system, which are used to solve the problem of low security when performing identity authentication in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system based on blockchain
  • Identity authentication method, device and system based on blockchain
  • Identity authentication method, device and system based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056] This application provides a blockchain-based identity authentication method, which stores user information and second identity information in the blockchain, and performs user identity authentication after receiving the user information and first identity information sent by the client , search the blockchain for the same user information as the user information sent by the client, obtain the second identity information corresponding to the user informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method, device and system based on a block chain. The method includes: storing the user information and the second identity information in a block chain,; after ruser information and first identity information sent by a client is received, when identity authentication is carried out on a user, searching user information identical to the user information sent by the client in the block chain, obtaining second identity information corresponding to the user information after the same user information is searched, and performing identity authentication on the first identity information by utilizing the second identity information to obtain an identity authentication result. Since the blockchain performs data storage based on a distributed system and does not depend on centralized hardware to realize data storage, an illegal user is not easy to acquire stored data, and the security of identity authentication is improved.

Description

technical field [0001] The present application belongs to the technical field of identity authentication, and in particular relates to a block chain-based identity authentication method, device and system. Background technique [0002] In order to ensure the security of the system, the identity of the user is usually authenticated. Only the authenticated users have access and use rights to the system resources, preventing illegal users from pretending to be legitimate users, and ensuring the security of the system. [0003] In the prior art, the methods for authenticating the user's identity include: using a static password to authenticate the user's identity, using an electronic token, a short message dynamic password, etc. to authenticate the user's identity, but whether the static password is used to authenticate the user Whether to authenticate the identity of the user or to use electronic tokens and SMS dynamic passwords to authenticate the user's identity, there is a r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/32
CPCG06F21/31G06F21/32
Inventor 黄琪王大帝张珊珊李炎蔡启煌吕亚男诸金洪
Owner BEIJING CHINA POWER INFORMATION TECH