Decentralized identity authentication system based on block chain

A decentralization, identity authentication technology, applied in the field of computer and computer network, decentralized identity authentication system, can solve the problem of server credibility affecting identity authentication results, being tampered with, authentication results being wrong, etc., to reduce leakage risk, avoid tampering and forgery, improve stability

Active Publication Date: 2021-08-13
XIDIAN UNIV
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the central identity authentication system has the following disadvantages: 1) The carrying capacity of the system is limited; 2) The authentication server may have a single point of failure or failure; 3) There are risks such as loss, disclosure, and tampering of user information; 4) ) The credibility of the server directly affects the identity authentication results, once the server is attacked, it will produce wrong identity authentication results
However, the distributed authentication system still has the following disadvantages: 1) There are still central servers in the system, such as load balancing servers, global data dictionaries, etc. Once the central server is attacked or paralyzed, the system will not work normally; 2) Single authentication The process is still completed on an authentication server alone, which means that any authentication server in the authentication server cluster will be attacked and some authentication results will be wrong; 3) There are still data loss, tampering, and forgery. risk
Patent CN109218319A discloses a blockchain-based identity authentication system and method, which combines blockchain with identity authentication, and realizes complete decentralization by designing key modules, identity authentication modules, and service modules in the system This system can solve the problem that the central server is attacked or paralyzed in the distributed system, and improves the stability of the system, but the system still has the following disadvantages: 1) The user's identity information credential is completely dependent on the user's Private key, once the private key is stolen, there is a risk of fraudulent use of identity information;
[0006] 2) There is a lack of consideration of the divergence of authentication results generated by the authentication server cluster, that is, when the authentication server disagrees on the authentication results, the authentication server cluster will not be able to reach consistency and poor stability; 3) Directly store user identity information in the blockchain, Since the blockchain has the characteristics of data transparency, there is a risk that user data is easily leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralized identity authentication system based on block chain
  • Decentralized identity authentication system based on block chain
  • Decentralized identity authentication system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0039] refer to figure 1 , this example consists of six server nodes with identical functions and permissions, that is, authentication nodes. Each authentication node includes a contract layer and a data layer. The authentication nodes communicate through the P2P network, and the system coordinates the work between the authentication nodes through a consensus mechanism. The contract layer deploys the blockchain real-name authentication smart contract and the blockchain access authentication smart contract, and provides a calling interface for the real-name authentication module and the access verification module. The data layer stores user information in the form of "block + chain".

[0040] refer to figure 2 , each authentication node in this example is composed of multiple functional modules, including: access verification modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a decentralized identity authentication system based on a block chain. The decentralized identity authentication system mainly solves the problems that in the prior art, user identity information is likely to be illegally used and leaked, and the system stability is poor. The system comprises a plurality of server nodes with the same function and power, namely authentication nodes, and each authentication node comprises an identity information acquisition module, a real name authentication module, a data storage module, an identity information signature module and an access verification module. The identity information acquisition module is responsible for acquiring identity registration information of a user, the real-name authentication module is responsible for performing real-name authentication and encryption on the identity registration information of the user, the data storage module is used for storing the encrypted identity information of the user by adopting a block + chain structure, and the identity information signature module is responsible for acquiring identity signature information of the user; and the access verification module is responsible for performing access verification on the identity signature module of the user. According to the invention, the security and stability of the decentralized identity authentication system are improved, and the method can be used for computers and computer networks.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a decentralized identity authentication system, which can be used in computers and computer networks. Background technique [0002] Network identity authentication refers to the process of confirming the identity of the operator in the computer and computer network system. It is mainly used to judge whether the user can access or use certain resources, so as to effectively prevent attackers from obtaining resources by pretending to be identities, and ensure system security and visitor security. legal rights. [0003] Network identity authentication systems (referred to as identity authentication systems) can be divided into three types according to different system architectures: centralized, distributed, and decentralized. A central identity authentication system refers to a system with only a single authentication server in the system. Its advantages lie i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/30H04L9/08
CPCH04L63/08H04L9/3247H04L67/1097H04L9/302H04L9/3231H04L9/0861H04L2209/463H04L9/50
Inventor 张岗山舒子文赵林靖刘炯冯磊吴炜
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products