Trusted distributed identity authentication method and system, storage medium and application

An identity authentication and distributed technology, applied in the field of information security authentication, can solve problems such as inability to solve user privacy issues, achieve the effect of protecting user identity privacy, improving practicability, and expanding the scope of use

Active Publication Date: 2021-07-09
XIDIAN UNIV +1
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Cryptography technologies such as ordinary encryption cannot solve user privacy issues. It is a new challenge to find new cryptography technologies, establish credible distributed identity authentication, and realize authentication under the premise of protecting user information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted distributed identity authentication method and system, storage medium and application
  • Trusted distributed identity authentication method and system, storage medium and application
  • Trusted distributed identity authentication method and system, storage medium and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0067] Aiming at the problems existing in the prior art, the present invention provides a trusted distributed identity authentication method, system, storage medium and application. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0068] Such as figure 1 As shown, the trusted distributed identity authentication method provided by the present invention includes the following steps:

[0069] S101: The user, the certificate issuer, and the application call the digital identity application module to create their own digital identity on the blockchain;

[0070] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security authentication, and discloses a trusted distributed identity authentication method and system, a storage medium and application, and the method comprises the steps that: a digital identity application module is called to create a digital identity on a block chain; a request identity credential module is called to request a credential issuing party for a credential; the voucher issuing party calls a voucher issuing module to issue an identity voucher to the user; a user calls a privacy protection module to select attributes needing to be verified by an application party, encrypts the attributes in the identity credentials or constructs attribute certification by using different cryptographic technologies according to privacy requirements of different attributes of the user, and puts the processed credentials on a block chain; and the application side obtains the voucher processed by the user from the block chain, calls a verification module, verifies the attribute or attribute proof in the user voucher, and verifies whether the attribute of the user meets a condition or not. And while the identity privacy of the user is protected, the practicability of the digital identity authentication is improved, and the application range of the digital identity authentication is expanded.

Description

technical field [0001] The invention belongs to the technical field of information security authentication, and in particular relates to a trusted distributed identity authentication method, system, storage medium and application. Background technique [0002] At present: With the emergence and popularization of the Internet, traditional identities have another form of expression, that is, digital identities generated based on cryptographic algorithms. The evolution of digital identity has gone through three stages, namely: centralized identity, alliance identity, and distributed decentralized identity. In the traditional identity system based on PKI (Public Key Infrastructure), user identity data is controlled by a single centralized authority, and there are problems such as identity information leakage, unclear definition of data ownership, and loss of control of data subjects. At the same time, on the one hand, due to the scenario-based and fragmented user data, data sou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L63/0807H04L9/321H04L67/1097H04L9/3247H04L9/3236H04L9/3221
Inventor 刘雪峰王春云裴庆祺
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products