Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unified identity authentication method based on block chain

A technology of identity authentication and blockchain, which is applied in the transmission system, digital transmission system, encryption device with shift register/memory, etc., can solve the problems of lack of guarantee of transaction security and leakage of user identity information, and achieve the goal of solving the problem of encryption The effect of key distribution, ensuring continuity, and ensuring security

Active Publication Date: 2021-06-29
ZHEJIANG GONGSHANG UNIVERSITY
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is, the existing blockchain identity authentication method generally adopts conventional digital signature and public key verification, which is easy to leak the user's identity information during the transaction process, and the security of the transaction is not guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified identity authentication method based on block chain
  • Unified identity authentication method based on block chain
  • Unified identity authentication method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0026] A unified identity authentication method based on the block chain, the block chain includes a primary node (kgc) and the secondary node, the main node is equivalent to the miners in the block chain, the secondary node is the user in the block chain, when two Before the user is transaction, it is necessary to effectively and reliably verify each other, and it is not possible to disclose your identity. In order to realize the security and confidentiality of the identity authentication of the transaction in the block chain, it provides the following methods:

[0027] Step 1, the first node A and the second node B initiate and create a transaction N AB (Ie the transaction information required between A and B), both sides verify the transaction N AB The legality (including the price of the transaction), after the certification of both parties, bo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a unified identity authentication method based on a block chain, and belongs to the technical field of block chains. The method comprises the following steps: after receiving a transaction request, all main nodes jointly generate two verification keys and respectively send the two verification keys to a primary node A and a secondary node B, and after receiving the transaction request, each main node respectively generates two keys containing identity information of the main node and respectively sends the two keys to the primary node A and the secondary node B; the first node A and the second node B respectively generate a key eA and a key eB according to respective ID numbers and transaction nAB information, the first node A generates an authentication key SA according to the key eA and the received verification key, the second node B generates an authentication key SB according to the eB and the received verification key, and the SA and the SB are mutually sent to verify whether the identities of the SA and the SB are legal or not. According to the invention, identities of two transaction parties in the block chain can be effectively authenticated, and the security of the transaction and the confidentiality of node identities are ensured at the same time.

Description

Technical field [0001] The present invention relates to the field of block chains, and more particularly to a unified identity authentication method based on a block chain. Background technique [0002] Block Chain Technology is built on the Internet, using P2P, distributed storage, and distributed key ideas, the data blocks arranged in time sequential order into a particular data structure in the chain. The chain structure of the block chain uses an encrypted signature to ensure that the links of the data are not tampered or forged. It can store a large number of optical time series fingerprint data. The block chain can be used as a data log database, and the database is shared by the network node. Unlike the existing database, when the node updates the data, they submit data records, and ensure consistency between nodes data, and after the consistency is determined, the recording of the block chain will not be changed or delete. The block chain is a distributed book technology:...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/06H04L29/08G06Q40/04
CPCH04L63/08H04L63/0414H04L9/0866H04L9/0861H04L9/0643H04L67/1095G06Q40/04H04L67/1097H04L9/50
Inventor 李姝玥张俞佳沈仲华黄雯静琚春华鲍福光
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products