Unified identity management and authentication method based on blockchain

An authentication method and identity management technology, applied in digital data authentication, electrical digital data processing, special data processing applications, etc., can solve problems such as difficulty in meeting heterogeneous networks, and achieve the effect of ensuring privacy

Active Publication Date: 2020-03-31
CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
View PDF13 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Current technologies are difficult to meet the requirements for identity management of heterogeneous networks, which are open, diverse, dynamic, and large-scale, and lack id

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified identity management and authentication method based on blockchain
  • Unified identity management and authentication method based on blockchain
  • Unified identity management and authentication method based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] A blockchain-based unified identity management and authentication method, including the following:

[0020] The heterogeneous identity alliance maintains the identity alliance chain through distributed joint management. Each identity provider stores its own entity ID and corresponding hash through the connection on the chain, and different entity IDs of the same user cannot be associated, realizing the privacy of user identity information Protect. In addition, the entire alliance chain will not store the plaintext information of the user's identity, but provide credible verification in the form of a hash summary, which not only protects user privacy, but also provides unified identity management services to the outside world.

[0021] The public key signature algorithm used in the present invention is the SM2 signature algorithm (GM / T 0003), and the hash algorithm used is the SM3 hash algorithm (GM / T 0004).

[0022] The technical solution of the present invention is di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a unified identity management and authentication method based on a blockchain. The unified identity management and authentication method comprises the following three stages: stage 1, institution registration; stage 2, user identity attribute trusted registration; and stage 3, user identity credit checking. Compared with the prior art, the method has the positive effects that (1) the sensitive fields of the user identity information are not linked, and the linked information cannot be associated, so that the privacy of the user identity information is ensured; (2) an information barrier is broken, and credible and safe sharing of user identity information is realized; and (3) the credible checking algorithm is based on a MerkleTree privacy protection technology, andsafe and convenient credible checking is realized.

Description

technical field [0001] The invention relates to a block chain-based unified identity management and authentication method. Background technique [0002] Current technologies are difficult to meet the requirements for identity management of heterogeneous networks, which are open, diverse, dynamic, and large-scale, and lack identity management, cross-domain mutual trust evaluation, and heterogeneous identity information for heterogeneous network entities in heterogeneous environments. aspects of support. The unified identity management of the heterogeneous identity alliance is composed of multiple identity management platforms across the architecture and application fields, providing unified, safe and credible, and full-life cycle identity management and authentication services, and is an important way to improve cyberspace supervision and governance capabilities. , An effective way to protect the privacy of online identities is the strategic cornerstone for promoting the sou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/27G06F21/30G06F21/31G06F21/62
CPCG06F21/31G06F21/30G06F16/27G06F21/6254
Inventor 李亚荣白健王震安红章
Owner CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products