Authorization verification method and device and storage medium

A verification method and authorized technology, applied in the direction of protocol authorization, instruments, payment systems, etc., can solve the problems of authorization invalidation, insufficient disclosure of authorization information, and heavy certificate management burden, so as to avoid unreliability and reduce the risk of authorization flooding. Effect

Pending Publication Date: 2020-06-30
SOUTH UNIVERSITY OF SCIENCE AND TECHNOLOGY OF CHINA
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the present invention provides an authorization verification method, which can solve the problems of heavy certificate management burden in the data center, insufficient disclosure of authorization information, authorization invalidation caused by loss of user private key and fraudulent authorization caused by leakage of user private key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization verification method and device and storage medium
  • Authorization verification method and device and storage medium
  • Authorization verification method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] see figure 1 , this embodiment provides an authorization verification method, specifically, the method includes the following steps:

[0029] S110. Obtain an authorization result of the authorized user group, where the authorization result includes the first public key of the authorized user group, the signature of the authorized user of the authorized user group, and a preset authorized number threshold.

[0030] The authorized user group is a set composed of all authorized users. Each user in the authorized user group has a pair of public key and private key. There is no restriction on the user form here, which can be an individual or an organization. This embodiment does not limit the specific generation algorithm of the public-private key pair. For example, algorithms such as RSA and ECDSA can be used to generate a public-private key pair. The set composed of the public keys of all users in the user group is called the first public key. In this embodiment, the spec...

Embodiment 2

[0048] This embodiment further explains and exemplifies some processes in the authorization verification method on the basis of the first embodiment, specifically as figure 2 shown, including:

[0049] S210. Obtain an authorization result of the authorized user group, where the authorization result includes the first public key of the authorized user group, the signature of the authorized user of the authorized user group, and a preset authorized number threshold.

[0050] Step S210 is identical to step S110.

[0051] S220. Generate a first public key address according to the first public key and the authorized number threshold.

[0052] Specifically including: generating a public key combination according to the first public key, generating a first public key address and a first hash value according to the preset authorized number threshold, the total number of authorized user groups and the public key combination .

[0053] This embodiment does not limit the specific way...

Embodiment 3

[0075] image 3 A schematic structural diagram of an authorization verification device provided in Embodiment 3 of the present invention, as shown in image 3 As stated, the device includes:

[0076] The first acquiring module 310 is configured to acquire an authorization result of the authorized user group, where the authorization result includes the first public key of the authorized user group, the signature of the authorized user of the authorized user group, and a preset authorized number threshold.

[0077] Authorization module 320, configured to determine first authorization information according to the authorization result and store it in the block chain, the first authorization information includes the first transaction index, the first public key address and the first transaction value, and the The first authorization information is sent to the authorized party.

[0078] Specifically, in some embodiments, the authorization module 320 includes:

[0079] A public ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authorization verification method, device and equipment and a storage medium. The method comprises the following steps: acquiring an authorization result of an authorized user group, wherein the authorization result comprises a first public key of the authorized user group, an authorized user signature of the authorized user group and a preset authorized people number threshold; determining first authorization information according to the authorization result, storing the first authorization information in the blockchain, and sending the first authorization information to the authorized party; acquiring second authorization information to be verified, wherein the second authorization information comprises a second transaction index, a second public key address and a second transaction attached value; verifying whether the second authorization information is valid according to the first authorization information, and if so, passing the authorization verification. According to the authorization verification method provided by the embodiment of the invention, the first authorization information is stored through the decentralized blockchain, so the unreliability caused by the attack of the central server is avoided, and the preset authorization number threshold is set for reducing the risk of authorization flooding caused by leakage ofprivate keys of a few users in the authorized user group.

Description

technical field [0001] The invention belongs to the technical field of cryptography and software engineering, and in particular relates to an authorization verification method, device, equipment and storage medium. Background technique [0002] With the development of society, there are more and more scenarios for user authorization and verification. The user here can be a single person or an organization. The traditional authorization verification system faces many problems, such as the identity verification method and device proposed in patent 201410079876.X. The server receives the service acquisition request sent by the first terminal device, initiates the identity verification of the first terminal device, Finally, through a series of verification links, the legality of the identity is finally judged, and then the service requested by the first terminal is provided. Traditional authentication methods such as this can be abstracted into an end-to-end verification method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/40
CPCG06Q20/3829G06Q20/3825G06Q20/4014
Inventor 王琦毛玉莲李汝佳柳枫
Owner SOUTH UNIVERSITY OF SCIENCE AND TECHNOLOGY OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products