Identity authentication method and device based on block chain

An identity authentication and blockchain technology, applied in digital data authentication, instruments, electrical digital data processing, etc., can solve the problems of low authentication efficiency and poor security.

Pending Publication Date: 2020-10-09
HAINAN UNIVERSITY
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the embodiment of the present invention provides a block chain-based identity authentication method and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device based on block chain
  • Identity authentication method and device based on block chain
  • Identity authentication method and device based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer" etc. The indicated orientation or positional relationship is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing the present invention and simplifying the description, rather than indicating or implying that the referred device or element must have a specific orientation, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and device based on a block chain. The method is applied to any edge server in an edge server block chain, and comprises the following steps:receiving an identity authentication request of a terminal node, wherein the identity authentication request comprises the identity information of the terminal node; querying identity authentication data of the terminal node in an edge server block chain according to the identity authentication request of the terminal node; and responding to the identity authentication request according to the identity authentication data. Through the implementation of the method and the device, the flexibility of terminal node identity authentication in a loose coupling environment and the availability undera distributed request are realized, so that the high-efficiency availability of an identity authentication function is ensured; and according to the embodiment of the invention, the transparency and traceability characteristics of the block chain are combined with the two-layer architecture of the edge computing, so that the terminal node is transparent to one-way information of the edge server and traceable to one-way data, and the security and credibility of an identity authentication function are ensured.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a block chain-based identity authentication method and device. Background technique [0002] The censorship system refers to the review and screening of various events or resources by a specific organization to achieve the desired purpose. The online review system is used in all aspects, for example, the review of insurance claims. In order to ensure the fairness of the review, a review team can generally be composed of multiple members to conduct simultaneous online review of various events or resources. In order to ensure the legitimacy of the reviewers, identity authentication is generally required before entering the review. In related technologies, a centralized identity authentication method is generally adopted, which has low authentication efficiency and poor security. Contents of the invention [0003] In view of this, the embodiments of the present invention pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/45
CPCG06F21/31G06F21/45G06F21/107
Inventor 程杰仁叶光亮唐湘滟张渊余升国
Owner HAINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products