Identity authentication method and device based on block chain

An identity authentication device and identity authentication technology, which are applied in the field of identity authentication methods and devices based on blockchain, can solve the problem of poor user experience when the identity card authentication certificate is not around, the bank card authentication is not very friendly to minors, and the threshold is high. question

Active Publication Date: 2019-12-20
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF16 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current real-name authentication mainly includes bank card authentication and ID card authentication. Among them, bank card authentication is not very friendly to some minors who do not have a bank card. The threshold is high and the experience is poor; The experience of users who are not around is poor. It can be seen that there are certain defects in the two existing real-name authentication methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device based on block chain
  • Identity authentication method and device based on block chain
  • Identity authentication method and device based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementation disclosed below.

[0100] Terms used in one or more embodiments of this specification are for the purpose of describing specific embodiments only, and are not intended to limit one or more embodiments of this specification. As used in one or more embodiments of this specification and the appended claims, the singular forms "a", "the", and "the" are also intended to include the plural forms unless the context clearly dictates otherwise. It should also be understood that the term "and / or" used in one or more embodiments of the present sp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method and device based on a block chain. The identity authentication method based on the block chain is applied to a block chain node in a block chain. The method comprises the steps of receiving an identity authentication request sent by an authentication server, carrying out identity authentication on a to-be-authenticated user by calling an intelligent contract deployed by the block chain node; returning the identity authentication result to the authentication server, receiving a confirmation instruction submitted by the authentication server for the identity authentication result under the condition that the authentication is passed, and finally uploading the authentication information of the to-be-authenticated user to the block chainaccording to the confirmation instruction.

Description

technical field [0001] The present application relates to the technical field of identity authentication, in particular to a block chain-based identity authentication method and device. Background technique [0002] With the continuous development of Internet technology, electronic payment has become popular in the daily life of users. Fund accounts are stolen, which puts higher requirements on the security of user accounts. A feasible method is to conduct real-name authentication on users. Real-name authentication is a verification review of the authenticity of user data, which can Prevent the user's electronic fund account from being stolen. [0003] The current real-name authentication mainly includes bank card authentication and ID card authentication. Among them, bank card authentication is not very friendly to some minors who do not have a bank card. The threshold is high and the experience is poor; The experience of users who are not around is poor. It can be seen t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q40/04
CPCG06Q20/4014G06Q40/04
Inventor 张超朱通孙传亮赵华
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products