Network identity protection method and device, electronic equipment and storage medium

A network identity and network technology, applied in the field of network security, can solve the problems of low degree of trust, cumbersome procedures, and lack of security guarantee for identity information.

Active Publication Date: 2020-06-30
GUANGDONG UNIV OF TECH
View PDF10 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the above scheme, each user’s identity insurance is limited to its own application and only protects the property account. The claim settlement process is cumbersome, and the claim settlement certificate data is stored in the central database, which has a low degree of trustworthiness.
And most of the application or website identity information that users use every day is not secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network identity protection method and device, electronic equipment and storage medium
  • Network identity protection method and device, electronic equipment and storage medium
  • Network identity protection method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0047] In order to facilitate the understanding of the network identity protection method provided by this application, the system used by it is introduced below. see figure 1 , which shows an architecture diagram of a network identity protection system provided by an embodiment of the present application, as shown in figure 1 As shown, include clients, password managers, blockchain networks, application or website server nodes, application or website servers, distributed databases, insura...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network identity protection method and device, electronic equipment and a computer readable storage medium, and the method comprises the steps: obtaining all first transaction certificates corresponding to target account information from an intelligent contract after a claim settlement request of the target account information is received, wherein the target account information is used for logging in a target application or website, and the first transaction certificate is used for recording login information corresponding to all login requests uploaded by a server ofthe target application or website; obtaining all second transaction certificates corresponding to the target account information from a blockchain node in the blockchain network, wherein the second transaction voucher is used for recording login information corresponding to a login request of normally authorizing to log in the target application or the website; and responding to the claim settlement request by comparing all the first transaction certificates with all the second transaction certificates. Therefore, according to the network identity protection method provided by the invention,insurance buying and automatic claim settlement are carried out on the network identity of the user.

Description

technical field [0001] The present application relates to the technical field of network security, and more specifically, to a network identity protection method and device, an electronic device, and a computer-readable storage medium. Background technique [0002] In the field of Internet insurance, 360 Security Company has launched a search compensation plan, which assumes the first compensation responsibility for the direct property losses incurred by users caused by 360 search promotion applications or websites due to phishing, fraud, or fake official websites, authorized applications or websites. Major banks have also launched account banks, online banking, and fund insurance to provide users with protection against theft. Tencent, Alipay, and Suning Finance have also launched account security insurance accordingly. If the security card online banking and security card mobile banking bound in their applications are stolen and cause losses, they will be compensated. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/08G06Q20/38
CPCG06Q40/08G06Q20/3829G06Q20/3827G06Q20/3825H04L63/08G06Q20/02G06Q20/3821G06Q20/389H04L63/083H04L63/108
Inventor 刘文印麦超
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products