Identity authorization method and device, storage medium and equipment
An authorizing party and identity technology, applied in the field of data processing, can solve problems such as information incompatibility, manipulation, and malicious attacks by certificate authorities
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0221] Embodiments of the present application are described below in conjunction with the accompanying drawings.
[0222] At present, the certificate authority used for identity authorization may be maliciously attacked or manipulated, which may authorize the identity of two parties that do not have any relationship, resulting in an untrustworthy identity authorization relationship.
[0223] To this end, the embodiment of the present application provides an identity authorization system, which effectively improves the security and reliability of identity authorization between the authorizing party and the authorized party based on the advantages of blockchain decentralization and the advantage that the outside world cannot tamper with it. sex. Next, the identity authorization system provided by the embodiment of this application will be introduced.
[0224] see figure 1 , the figure shows a flow chart of an identity authorization method provided by the embodiment of the pres...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com