Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block chain-based identity authentication method, system, device and computer equipment

An identity authentication, blockchain technology

Active Publication Date: 2021-10-22
卓尔智联(武汉)研究院有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in existing identity authentication schemes, centralized identity authentication relies on the stability of a single system. Once downtime or data leakage occurs in the centralized organization, it is easy to cause information security incidents, and the existing authentication usually uses SMS verification codes. Or based on event authentication (handwriting or face recognition) and other methods
[0004] In the above authentication methods, SMS verification codes are easy to be intercepted or forged, and the accuracy of event-based authentication cannot be effectively guaranteed. Therefore, the existing identity authentication schemes have problems in which the authentication accuracy cannot be fully guaranteed, which may easily lead to user information security and even economic loss. security threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based identity authentication method, system, device and computer equipment
  • Block chain-based identity authentication method, system, device and computer equipment
  • Block chain-based identity authentication method, system, device and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0058] The blockchain-based identity authentication method provided by this application can be applied to such as figure 1 shown in the application environment. Among them, the user terminal 102 communicates with the block chain node 104 through the network. When the user initiates a login request of the application program through the user terminal 102, the service provider of the application program forwards the login request to any blockchain node through the user terminal 102, and the blockchain node 104 receives the login request sent by the user terminal, and the lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to a block chain-based identity authentication method, system, device, computer equipment and storage medium. The method includes: receiving a login request sent by a user terminal, the login request carrying private key signature data, responding to the login request, obtaining public key data, and obtaining the device of the user terminal when the verification of the private key signature data is completed according to the public key data. Identify the data, and generate key data according to the device identification data, send the key data to the user terminal, receive the authentication data submitted by the user terminal for the key data, and when the authentication data submitted by the user terminal passes the verification, it is determined that the identity authentication has passed . The above scheme is decentralized through the blockchain to avoid authentication failures caused by the downtime of the central node; by introducing the dual authentication mechanism of device authentication and key data based on device identification data and private key authentication, it is possible to avoid repudiation of signatures Such behaviors improve the accuracy of identity authentication and ensure data security.

Description

technical field [0001] The present application relates to the technical field of blockchain data, in particular to a blockchain-based identity authentication method, system, device, computer equipment and storage medium. Background technique [0002] With the popularity of the mobile Internet, more and more users cannot do without the Internet in their daily activities. The basis of activities on the Internet is digital identity, which is the user's identity in the virtual life of the network and can correspond to the ID card in real life. In the blockchain, it is particularly important to authenticate the user's identity and ensure the authenticity and reliability of the user's identity. Only by ensuring the user's identity can a series of subsequent transactions and activities generated by the user take effect, and data integrity and privacy can be guaranteed. [0003] However, in existing identity authentication schemes, centralized identity authentication relies on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/44
CPCG06F21/31G06F21/44G06F2221/2151G06F21/107G06F21/1078
Inventor 吴良顺
Owner 卓尔智联(武汉)研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products