Identity authentication method based on Hyperledger network

An identity authentication and authentication algorithm technology, applied in the blockchain field, can solve the problems of reducing communication efficiency, increasing communication costs and energy consumption, and achieving the effect of ensuring non-tampering and authentication security

Inactive Publication Date: 2019-12-13
河南戎磐网络科技有限公司
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (2) Data transmission problem
When transmitting data in different networks, different communication protocols need to be used, resulting in the need to convert formats between different protocols, resulting in a large amount of communication overhead and reducing communication efficiency
[0010] (3) The cost of equipment
Invisibly, increase the cost of communication and energy consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on Hyperledger network
  • Identity authentication method based on Hyperledger network
  • Identity authentication method based on Hyperledger network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0028] (1), user registration:

[0029] (1.1), the user generates a public key and a private key when registering for the first time, and initiates a registration request to the application system;

[0030] (1.2), the user submits the real name information, public key, private key and signature information on the above real name information, public key and private key to the application system;

[0031] (1.3), the application system performs real-name authentication on the user through the authoritative identity authentication source;

[0032] (1.4), the application system calculates the real-name information, public key, and the signature of the application system on the above-mentioned real-name information and public key to generate user attribute card information. The user attribute card information includes: user ID, real-name information, source of real-name authentication, public key, The identity of the attribute card issuing institution, the public key of the attribu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method based on a Hyperleder network. The identity authentication method is used for carrying out identity authentication on a terminal node in a block chain network. The method comprises the following steps that: enabling a terminal to receive signed body registration information and register identity information to preset contract equipment in ablock chain; and returning the registered information to the original equipment, performing calculation of an authentication algorithm on the returned data and the originally requested registration information by the original equipment, and then determining whether the identity authentication information is passed or not according to a calculated result. According to the invention, on the basis of blockchain identity authentication, the authentication security and the credit degree of the authentication process are improved.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to an identity authentication method based on a Hyperledger network. Background technique [0002] When we use some networked devices for more convenient and quick operations, we need to go through the process of registration, login, authentication and transmission of various network identities. Now our online identities are basically real-name, which contains our important basic information. [0003] In recent years, cyber fraud, infringement and other identity-related illegal activities have urgently needed to build a complete and feasible identity authentication management system to protect citizens' information and property security. Similar to some network transaction application scenarios, there is an entity behind it. How to make it correspond to the network identity is the scope of the identity authentication management system. Without a good solution, a series of prob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06F21/31
CPCH04L63/08H04L9/3247G06F21/31H04L9/50
Inventor 王峰章丽娟刘旭胡漪逸孟凯强王亚龙赵治博朱晓贝李维超
Owner 河南戎磐网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products