A network identity protection method, device, electronic equipment and storage medium

A network identity and network technology, applied in the field of network security, can solve the problems of lack of security assurance of identity information, cumbersome procedures, and low degree of trust.

Active Publication Date: 2021-07-06
GUANGDONG UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the above scheme, each user’s identity insurance is limited to its own application and only protects the property account. The claim settlement process is cumbersome, and the claim settlement certificate data is stored in the central database, which has a low degree of trustworthiness.
And most of the application or website identity information that users use every day is not secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network identity protection method, device, electronic equipment and storage medium
  • A network identity protection method, device, electronic equipment and storage medium
  • A network identity protection method, device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0047] In order to facilitate the understanding of the network identity protection method provided by this application, the system used by it is introduced below. see figure 1 , which shows an architecture diagram of a network identity protection system provided by an embodiment of the present application, as shown in figure 1 As shown, include clients, password managers, blockchain networks, application or website server nodes, application or website servers, distributed databases, insura...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a network identity protection method and device, an electronic device and a computer-readable storage medium. The method includes: after receiving a claim settlement request for the target account information, obtaining all information corresponding to the target account information from the smart contract. The first transaction certificate; wherein, the target account information is used to log in to the target application or website, and the first transaction certificate is used to record the login information corresponding to all login requests uploaded by the server of the target application or website; from the block in the blockchain network The chain node obtains all the second transaction certificates corresponding to the target account information; wherein, the second transaction certificates are used to record the login information corresponding to the login request normally authorized to log in to the target application or website; by comparing all the first transaction certificates with all the second transaction certificates Credentials respond to claims requests. It can be seen that the network identity protection method provided by the present application realizes insurance application and automatic claim settlement for the user's network identity.

Description

technical field [0001] The present application relates to the technical field of network security, and more specifically, to a network identity protection method and device, an electronic device, and a computer-readable storage medium. Background technique [0002] In the field of Internet insurance, 360 Security Company has launched a search compensation plan, which assumes the first compensation responsibility for the direct property losses incurred by users caused by 360 search promotion applications or websites due to phishing, fraud, or fake official websites, authorized applications or websites. Major banks have also launched account banks, online banking, and fund insurance to provide users with protection against theft. Tencent, Alipay, and Suning Finance have also launched account security insurance accordingly. If the security card online banking and security card mobile banking bound in their applications are stolen and cause losses, they will be compensated. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q40/08G06Q20/38
CPCG06Q40/08G06Q20/3829G06Q20/3827G06Q20/3825H04L63/08G06Q20/02G06Q20/3821G06Q20/389H04L63/083H04L63/108
Inventor 刘文印麦超
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products