Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed trusted identity authentication method and system, storage medium and terminal

An identity authentication and distributed technology, applied in user identity/authority verification, transmission system, digital transmission system, etc., can solve problems such as single point failure, attack, interception, etc., to ensure security and consistency, and avoid time overhead , the effect of reducing time overhead

Pending Publication Date: 2020-07-31
XIDIAN UNIV
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Users often use weak passwords such as phone numbers and birthdays as their static passwords, which are easy to be cracked by attackers, and static passwords will also face threats such as leakage, interception, man-in-the-middle attacks, and brute force cracking, with low security
[0006] (2) Since the mobile phone verification code is provided by the operator, there is a risk of being stolen by hackers; the digital certificate USBKey relies on a centralized third-party CA server to provide services, and a single point of failure will cause the identity authentication service to fail
[0007] (3) The biometric identification method technology is not yet fully mature, and once the biometric information is stolen in database storage or network transmission, the attacker can perform some kind of identity deception attack, and the attack object will involve all information device
[0008] The difficulty of solving the above problems and defects is: the existing identity authentication is a centralized service provider model, and digital certificates are issued and revoked through the abolition list, but such centralized certificate issuance systems are vulnerable to attacks and lead to single point failures The problem that the entire identity authentication system cannot correctly verify the validity of the certificate, and querying the validity of the certificate through the Internet will also bring additional time overhead and security issues such as man-in-the-middle attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed trusted identity authentication method and system, storage medium and terminal
  • Distributed trusted identity authentication method and system, storage medium and terminal
  • Distributed trusted identity authentication method and system, storage medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0063] Aiming at the problems existing in the prior art, the present invention provides a distributed trusted identity authentication method, system, storage medium, and terminal. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0064] Such as figure 1 As shown, the distributed trusted identity authentication method provided by the present invention includes the following steps:

[0065] S101: The user registers with the distributed trusted identity authentication system and provides personal information;

[0066] S102: The distributed trusted identity authentication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of cloud computing trusted identity authentication, and discloses a distributed trusted identity authentication method and a system, a storage medium and aterminal, a certificate management system and a certificate release system in the identity authentication system are decoupled, a blockchain account book is used for replacing a certificate release and revocation list and a distributed certificate validity query service, and a single-point fault of a centralized authentication server is avoided; a blockchain structure suitable for a distributed trusted identity authentication system is designed, a digital certificate and an operation type are stored in a block, and malicious nodes are prevented from tampering certificate content and validity;by aiming at the blockchain certificate validity quick query method, a filter bucket is dynamically maintained by adopting double cuckoo filters, so that the certificate query speed is increased, and the block-by-block query efficiency of the blockchain is prevented from being low. The certificate issuing function of the distributed trusted identity authentication system is issued to each participation node of the system, the digital certificates and effectiveness are stored in a distributed mode, and high availability of the identity authentication system is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of cloud computing trusted identity authentication, and in particular relates to a distributed trusted identity authentication method, system, storage medium and terminal. Background technique [0002] At present, cloud computing is the basic support of key national industries such as smart cities, finance and military, and medical education. Cloud computing identity authentication is the process for cloud computing service providers to verify the identity of service users. In the digital world of the Internet, users have a The digital identity represented by group-specific data, and the service provider also authenticates and authorizes this digital identity. How to securely and credibly authenticate and authorize user identities in the network has become an important bottleneck restricting its large-scale development. [0003] At present, the commonly used existing technologies in the industry include: (1)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08G06F16/27
CPCG06F16/27H04L9/0825H04L9/32H04L9/3263H04L63/0823H04L67/10
Inventor 沈玉龙何昶辉王博赵迪张志为何嘉洪康晓宇刘家继许王哲
Owner XIDIAN UNIV
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More