Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authorization method and device, storage medium and equipment

An authorizing party and identity technology, applied in the field of data processing, can solve problems such as information incompatibility, manipulation, and malicious attacks by certificate authorities

Active Publication Date: 2021-01-29
BEIJING HUAHONG INTEGRATED CIRCUIT DESIGN
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in actual scenarios, the certificate authority may be maliciously attacked or manipulated, which may authorize the identity of two parties that do not have any relationship, resulting in an untrustworthy identity authorization relationship.
Traditional platform account authentication and third-party account authentication have problems such as too many registered accounts, information leakage, or information incompatibility, resulting in poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authorization method and device, storage medium and equipment
  • Identity authorization method and device, storage medium and equipment
  • Identity authorization method and device, storage medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0221] Embodiments of the present application are described below in conjunction with the accompanying drawings.

[0222] At present, the certificate authority used for identity authorization may be maliciously attacked or manipulated, which may authorize the identity of two parties that do not have any relationship, resulting in an untrustworthy identity authorization relationship.

[0223] To this end, the embodiment of the present application provides an identity authorization system, which effectively improves the security and reliability of identity authorization between the authorizing party and the authorized party based on the advantages of blockchain decentralization and the advantage that the outside world cannot tamper with it. sex. Next, the identity authorization system provided by the embodiment of this application will be introduced.

[0224] see figure 1 , the figure shows a flow chart of an identity authorization method provided by the embodiment of the pres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authorization method and device, a storage medium and equipment, and the method comprises the steps of: enabling an authorized party to obtain the declaration information of an authorization party from a registration system, and requesting the authorization party to carry out the identity verification of the authorized party according to the stored identity identification of the authorized party, generating an identity authorization request according to the declaration information of the authorizing party and sending the identity authorization request to theauthorizing party when the identity verification result of the authorizing party to the authorized party is passed; enabling the authorization party to generate verifiable voucher data according to the identity authorization request and send an identifier of the verifiable voucher data to the registration system, so that the registration system updates according to the identifier of the verifiable voucher data; and enabling the authorizing party to send the verifiable credential data to the authorized party so that the authorized party can store the verifiable credential data. Therefore, based on the advantages of decentralization of the blockchain and incapability of being tampered by the outside of the registration system, the security and reliability of identity authorization between the authorizing party and the authorized party can be effectively improved.

Description

technical field [0001] The present application relates to the field of data processing, in particular to an identity authorization system method, device, storage medium and equipment. Background technique [0002] At present, the identity authorization method between the authorizing party and the authorized party is usually based on a key pair, in order to improve the security and reliability of identity authorization. For example: for the media platform (authorizing party) to authorize the identity of the user (authorized party), after they respectively issue corresponding digital certificates through the certification authority (Certification Authority, CA), the identity between them can be determined based on the certification authority. relationship for identity authorization. Among them, a certificate authority is an international name for a certification authority, which is an organization that issues, manages, and cancels digital certificates to applicants for digita...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08G06F21/33G06F21/46
CPCH04L63/0876H04L9/0866H04L9/0869H04L9/0891G06F21/33G06F21/46
Inventor 尹子栋孙春桂何江王丽红于佳良
Owner BEIJING HUAHONG INTEGRATED CIRCUIT DESIGN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products