Identity authentication method, system and device and computer readable storage medium

A technology for identity authentication and pending authentication, applied in the field of user identity authentication in the blockchain, which can solve the problems of low efficiency and cumbersome verification process.

Active Publication Date: 2021-03-09
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the above identity authentication process requires the participation of multiple blockchain nodes, the verification process is cumbersome, and each blockchain node needs to perform identity authentication operations, which is inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, system and device and computer readable storage medium
  • Identity authentication method, system and device and computer readable storage medium
  • Identity authentication method, system and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] Next, the technical scheme in the present application embodiment will be described in the present application, and it is understood that the described embodiments are intended to be described herein, not all of the embodiments of the present application. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without making creative labor premises, all of the present application protected.

[0057] See figure 1 , figure 1 A first flow diagram of an identity authentication method provided by the embodiment of the present application.

[0058] An identity authentication method provided by the embodiment of the present application, applied to the identity authentication node in the block chain, which may include the following steps:

[0059] Step S101: Get the first hidden identity information of the zipper chain to be authenticated to the node and the first encrypted secret shared share; hidden identity infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method, system and device, and a computer readable storage medium, which are applied to an identity authentication node in a block chain. The methodcomprises the steps of: obtaining first hidden identity information and a first encrypted secret sharing share of a to-be-authenticated node in the block chain; obtaining second hidden identity information and a second encrypted secret sharing share of a target number of other nodes in the block chain; based on the first hidden identity information, the first encrypted secret sharing share, the second hidden identity information and the second encrypted secret sharing share, judging whether a preset condition of a preset secret sharing method is satisfied or not; and if the preset condition issatisfied, passing the identity authentication of the to-be-authenticated node. The identity information is hidden, the real identity information of the target node cannot be leaked, anonymous identity authentication can be realized, only the encrypted master key can be obtained after secret recovery is performed on the encrypted secret sharing share according to the preset secret sharing method,and the method security can be ensured; and only one-time verification is needed, so that the efficiency is high.

Description

Technical field [0001] The present application relates to the field of user identity authentication in the block chain, and more particularly to an identity authentication method, system, device, and computer readable storage medium. Background technique [0002] The block chain provides a distributed data sharing mode with detrimentary (point-to-point network communication), non-tampered, full mark, back inquiry, collective maintenance, open transparent and other features. These features ensure the "honest" and "transparency" of the block chain, laying the foundation for the creation of the block chain. The block chain application requires group users to log in to the online and participate in system activity. In this process, the block chain nodes need to be authenticated. For example, any online user in the block is received after the login request verifies the legality and broadcasts. Verify results, set the threshold parameters of the legal login, which allows the user to lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06G06F16/27G06F21/31G06F21/45
CPCH04L9/085H04L63/0421H04L63/08G06F16/27G06F21/31G06F21/45
Inventor 李仁刚赵雅倩李雪雷张闯李茹杨
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products