Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and device and computer readable storage medium

A technology of identity authentication and equipment, applied in user identity/authority verification, digital data authentication, encryption device with shift register/memory, etc., to ensure real-time and uniqueness, improve credibility, and realize traceability Effect

Inactive Publication Date: 2021-03-26
广东投盟科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, the present invention aims to provide an identity authentication method, device and computer-readable storage medium to overcome the defects of existing centralized or decentralized identity authentication methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device and computer readable storage medium
  • Identity authentication method and device and computer readable storage medium
  • Identity authentication method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0040] see figure 1 , this embodiment provides an identity authentication method, including:

[0041] The first node sends an endorsement request of the user to be authenticated to at least one second node logged in by the authenticated user, wherein the endorsement request includes self-signed identity information of the user to be authenticated, and the identity information also includes a public key of the user to be authenticated;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are an identity authentication method and device and a computer readable storage medium, an authenticated user on a chain endorses a user to be authenticated, endorsement information is synchronized to nodes of the whole network, and the problem that the authenticity of the endorsement information cannot be guaranteed through a decentralized identity authentication method in the prior art is solved; endorsement information is broadcasted and synchronized to other nodes on the chain in the whole network, the current state of the user to be authenticated is synchronized in real time, and the real-time performance and uniqueness of the user state are ensured; the endorsement information is packaged into the block to be broadcasted in the whole network, traceability of the endorsement information is achieved, and credibility of authentication is improved.

Description

technical field [0001] The invention belongs to the field of Internet identity authentication, and in particular relates to an identity authentication method, equipment and a computer-readable storage medium. Background technique [0002] Identity authentication is the core basis of many trusted applications and has been widely used in all aspects of real life, but it is still a difficult problem in Internet user interaction. Traditional Internet projects use a multi-level authentication center CA for identity authentication. The PKIX (Internet X.509 Public Key Infrastructure) model is common, but there are problems such as single point of failure, insufficient system robustness, and unsupervised central nodes, especially when it comes to core The reliability of Internet interaction during data transmission and processing cannot be guaranteed. [0003] In addition to several mainstream identity authentication methods, PGP’s decentralized identity authentication model has al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06H04L9/08G06F21/45
CPCG06F21/45H04L9/0643H04L9/0825H04L9/3226H04L9/3247H04L9/3297
Inventor 陈胜俭马利平
Owner 广东投盟科技有限公司