Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method, system and device based on block chain and computer equipment

A technology of identity authentication and blockchain, which is applied in the field of computer equipment and storage media, systems, devices, and identity authentication methods based on blockchain, which can solve the problems of information security incidents, data leakage, and the inability to effectively guarantee the accuracy and other issues to achieve the effect of ensuring data security, avoiding authentication failures, and strengthening rigor

Active Publication Date: 2020-11-17
卓尔智联(武汉)研究院有限公司
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in existing identity authentication schemes, centralized identity authentication relies on the stability of a single system. Once downtime or data leakage occurs in the centralized organization, it is easy to cause information security incidents, and the existing authentication usually uses SMS verification codes. Or based on event authentication (handwriting or face recognition) and other methods
[0004] In the above authentication methods, SMS verification codes are easy to be intercepted or forged, and the accuracy of event-based authentication cannot be effectively guaranteed. Therefore, the existing identity authentication schemes have problems in which the authentication accuracy cannot be fully guaranteed, which may easily lead to user information security and even economic loss. security threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, system and device based on block chain and computer equipment
  • Identity authentication method, system and device based on block chain and computer equipment
  • Identity authentication method, system and device based on block chain and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0058] The blockchain-based identity authentication method provided by this application can be applied to such as figure 1 shown in the application environment. Among them, the user terminal 102 communicates with the block chain node 104 through the network. When the user initiates a login request of the application program through the user terminal 102, the service provider of the application program forwards the login request to any blockchain node through the user terminal 102, and the blockchain node 104 receives the login request sent by the user terminal, and the lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method, system and device based on a block chain, computer equipment and a storage medium. The method comprises the following steps: receiving a login request sent by a user terminal, the login request carrying private key signature data; responding to the login request, obtaining public key data; obtaining equipment identification data of the user terminal when verification of the private key signature data is completed according to the public key data, and generating key data according to the equipment identification data, and sending the key data to the user terminal, receiving authentication data submitted by the user terminal for the key data, and when the authentication data submitted by the user terminal passes the verification, determining that the identity authentication is passed. According to the scheme, decentration is carried out in a blockchain mode, so that authentication failure caused by downtime of the central node is avoided; by introducing a double-authentication mechanism of equipment authentication and key data based on equipment identification data and private key authentication, behaviors such as signaturedenial can be avoided, the identity authentication accuracy is improved, and the data security is guaranteed.

Description

technical field [0001] The present application relates to the technical field of blockchain data, in particular to a blockchain-based identity authentication method, system, device, computer equipment and storage medium. Background technique [0002] With the popularity of the mobile Internet, more and more users cannot do without the Internet in their daily activities. The basis of activities on the Internet is digital identity, which is the user's identity in the virtual life of the network and can correspond to the ID card in real life. In the blockchain, it is particularly important to authenticate the user's identity and ensure the authenticity and reliability of the user's identity. Only by ensuring the user's identity can a series of subsequent transactions and activities generated by the user take effect, and data integrity and privacy can be guaranteed. [0003] However, in existing identity authentication schemes, centralized identity authentication relies on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/44
CPCG06F21/31G06F21/44G06F2221/2151G06F21/107G06F21/1078
Inventor 吴良顺
Owner 卓尔智联(武汉)研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products