A method for secure transmission and storage of digital identity authentication data

A digital identity and authentication data technology, applied in the field of computer networks, can solve the problems of consuming blockchain storage resources, too long data, tampering and misappropriation of data on the chain, and achieve the effect of solving information leakage and ensuring security

Active Publication Date: 2022-04-29
上海黔易数据科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing technology, the data completed by the user through client authentication is encrypted by the central server, which may cause tampering and embezzlement before the data is uploaded to the chain, and the data after asymmetric encryption is too long, consuming blockchain storage resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following clearly and completely describes the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0023] In describing the present invention, it is to be understood that the terms "opening", "upper", "lower", "thickness", "top", "middle", "length", "inner", "surrounding" etc. Indicating orientation or positional relationship is only for the convenience of describing the present invention and simplifying the description, and does not indicate or imply that the components or elements referred to must have a specific orientation, be constructed and operated in a specific orientation, and therefore cannot be construed as limiting the pres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for secure transmission and storage of digital identity authentication data. The user performs digital identity authentication through the client, and the digital identity data that is authenticated at the client is encrypted and processed by the SM2 algorithm and then directly transmitted to the block chain network. , After going to the chain, the data is reorganized through the data compression algorithm, and the storage logic is executed. By storing the user's personal data in the blockchain instead of the server, no organization or individual can obtain personal data without personal authorization. Solve the current information leakage and network fraud from the root cause, and ensure the security of the data. During the data transmission process, the SM2 algorithm is used to encrypt the processing, so that the sensitive information will not be tampered with during the transmission. The original data cannot be seen, which plays a role in keeping sensitive data confidential in the transmission of digital identity authentication data.

Description

technical field [0001] The invention belongs to the technical field of computer network, relates to a network digital identity management system, in particular to a method for secure transmission and storage of digital identity authentication data Background technique [0002] When we use some networked devices for more convenient and quick operations, we need to go through the process of registration, login, authentication and transmission of various network identities. Now our online identities are basically real-name, which contains our important basic information. [0003] Identity authentication, also known as "identity verification" or "identity authentication", refers to the process of confirming the identity of the operator in the computer and computer network system, so as to determine whether the user has access and use rights to certain resources, and then make the computer And network system access policies can be implemented reliably and effectively, preventing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/30H04L69/04
CPCH04L63/0442H04L63/08H04L9/3066H04L69/04
Inventor 陶卓延赵琪
Owner 上海黔易数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products