Distributed trusted identity authentication method and system, storage medium and terminal

An identity authentication and distributed technology, applied in user identity/authority verification, transmission system, digital transmission system, etc., can solve problems such as single point failure, attack, interception, etc., to ensure security and consistency, and avoid time overhead , the effect of reducing time overhead

Pending Publication Date: 2020-07-31
XIDIAN UNIV
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Users often use weak passwords such as phone numbers and birthdays as their static passwords, which are easy to be cracked by attackers, and static passwords will also face threats such as leakage, interception, man-in-the-middle attacks, and brute force cracking, with low security
[0006] (2) Since the mobile phone verification code is provided by the operator, there is a risk of being stolen by hackers; the digital certificate USBKey relies on a centralized third-party CA server to provide services, and a single point of failure will cause the identity authentication service to fail
[0007] (3) The biometric identification method technology is not yet fully mature, and once the biometric information is stolen in database storage or n

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed trusted identity authentication method and system, storage medium and terminal
  • Distributed trusted identity authentication method and system, storage medium and terminal
  • Distributed trusted identity authentication method and system, storage medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0062] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0063] In view of the problems in the prior art, the present invention provides a distributed trusted identity authentication method, system, storage medium, and terminal. The present invention will be described in detail below with reference to the accompanying drawings.

[0064] Such as figure 1 As shown, the distributed trusted identity authentication method provided by the present invention includes the following steps:

[0065] S101: The user registers with the distributed trusted identity authentication system and provides personal information;

[0066] S102: The distributed trusted identity authentication system gener...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of cloud computing trusted identity authentication, and discloses a distributed trusted identity authentication method and a system, a storage medium and aterminal, a certificate management system and a certificate release system in the identity authentication system are decoupled, a blockchain account book is used for replacing a certificate release and revocation list and a distributed certificate validity query service, and a single-point fault of a centralized authentication server is avoided; a blockchain structure suitable for a distributed trusted identity authentication system is designed, a digital certificate and an operation type are stored in a block, and malicious nodes are prevented from tampering certificate content and validity;by aiming at the blockchain certificate validity quick query method, a filter bucket is dynamically maintained by adopting double cuckoo filters, so that the certificate query speed is increased, and the block-by-block query efficiency of the blockchain is prevented from being low. The certificate issuing function of the distributed trusted identity authentication system is issued to each participation node of the system, the digital certificates and effectiveness are stored in a distributed mode, and high availability of the identity authentication system is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of cloud computing trusted identity authentication, and in particular relates to a distributed trusted identity authentication method, system, storage medium and terminal. Background technique [0002] At present, cloud computing is the basic support of key national industries such as smart cities, finance and military, and medical education. Cloud computing identity authentication is the process for cloud computing service providers to verify the identity of service users. In the digital world of the Internet, users have a The digital identity represented by group-specific data, and the service provider also authenticates and authorizes this digital identity. How to securely and credibly authenticate and authorize user identities in the network has become an important bottleneck restricting its large-scale development. [0003] At present, the commonly used existing technologies in the industry include: (1)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08G06F16/27
CPCG06F16/27H04L9/0825H04L9/32H04L9/3263H04L63/0823H04L67/10
Inventor 沈玉龙何昶辉王博赵迪张志为何嘉洪康晓宇刘家继许王哲
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products