Credible identity authentication method based on block chain

An identity authentication and blockchain technology, applied in the field of cyberspace security, can solve the problems such as the difficulty of revoking the entity identity of the IBC system

Inactive Publication Date: 2020-04-03
NANJING UNIV OF SCI & TECH +1
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present invention provides a trusted identity authentication method based

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible identity authentication method based on block chain
  • Credible identity authentication method based on block chain
  • Credible identity authentication method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0048] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0049] See attached figure 1 The embodiment of the present invention discloses a blockchain-based trusted identity authentication method, which specifically includes the following steps:

[0050] Step 1: The first blockchain certificate server BCCA 1 Receive the identity authentication request for the cross-domain information service entity initiated by the client, and communicate with the second blockchain certificate server BCCA 2 Comple...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted identity authentication method based on a block chain. A blockchain certificate server transmits trust through a cross-domain model based on a block chain and realizes an authentication process of a client and an information service entity in different trust domains, and the information service entity obtains a complete signature through an arbitration entity communication server and realizes authentication of the complete signature through an identity authentication server. Only partial keys are stored in the information service entity; the rest secret keys are stored in the arbitration entity communication server; the information service entity obtains a complete signature of the message through the arbitration entity communication server; according to the invention, the capability of revoking the decryption or signature of the arbitration entity communication server can be realized by stopping sending signaling through the arbitration entity communication serve , the problem that the entity identity in the IBC system is difficult to cancel is solved, the problems of many certificate checking times, low cross-domain authentication and the like are also solved, and the decentralization and higher security of the block chain system are ensured.

Description

Technical field [0001] The invention relates to the technical field of cyberspace security, and more specifically to a trusted identity authentication method based on blockchain. Background technique [0002] In a heterogeneous network environment, for users, due to the continuous expansion of the application domain of providing network resources and services, the information interaction between different application domains has become extremely frequent. In order to ensure that when users access network service resources in the same or different trust domains, they will not bring additional identity authentication overhead and burdens, and at the same time can achieve access control and authority management between different domains, then it is necessary to adopt a global-oriented approach The cross-domain identity authentication mechanism fundamentally prevents the risk of illegal access to network resources. Therefore, it is also very promising to study the cross-domain authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/083H04L63/0442H04L9/3297H04L9/3247H04L2209/72H04L9/50
Inventor 魏松杰李莎莎崔聪吕伟龙王佳贺
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products