Cross-domain identity authentication method based on block chain certificate

A technology of identity authentication and authentication method, which is applied in the direction of user identity/authority verification, digital transmission system, electrical components, etc., can solve the problems of inconvenient use, achieve the effects of ensuring security, improving identity authentication efficiency, and reducing communication overhead

Active Publication Date: 2021-12-21
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the entire certificate is stored on the blockchain, its space and length will grow much faster than other blockchain systems, so BlockCAM will not be convenient to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain identity authentication method based on block chain certificate
  • Cross-domain identity authentication method based on block chain certificate
  • Cross-domain identity authentication method based on block chain certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] 1) Design of blockchain certificate:

[0049] The traditional PKI-based identity authentication process is realized through digital certificates, and the most common version of digital certificates is the X.509v3 version, which is characterized by strong stability, not easy to tamper, and has high safety.

[0050] In the X509v3 version of the digital certificate, there are several parts that need to be explained: Issuer Unique Identifier and Subject Unique Identifier are optional, and they are only available in X.509v3 and X. There are requirements in 509v2; the signature (Signature) is mainly used to prove the correctness of the public key contained in the certificate. Generally, the issuer of the certificate uses its private key to sign according to the agreed signature algorithm. In the extended part, the policy mapping generally only appears in the CA certificate, which contains the equivalence relationship between multiple policies in different domains; the CRL di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cross-domain authentication method based on a block chain certificate, and the method comprises the steps that: in a first stage, an entity in a trust domain transmits the own block chain certificate in a cross-domain manner; in a second stage, a block chain proxy server where the entity is located verifies the block chain certificate of a cross-domain block chain proxy server through a block chain; and, in a third stage, after the cross-domain identity authentication is successful, the cross-domain block chain proxy server generates a new cross-domain block chain certificate. The cross-domain block chain certificate is generated, so that the identity authentication efficiency can be improved when the same cross-domain identity authentication operation is performed next time. Each trust domain is provided with a private key generation center to perform unified management on all signature private keys in the domain. The block chain certificate adopts a lightweight structure. On the premise of ensuring the security, the problem of low efficiency in traditional cross-domain identity authentication is solved. In addition, the traditional digital certificate is subjected to lightweight improvement to meet the current requirement, and the communication overhead is further reduced.

Description

technical field [0001] The invention relates to block chain technology, in particular to identity authentication technology in block chain. Background technique [0002] The public key infrastructure (PKI) technology is based on public key encryption theory. Through the public key infrastructure, each user can be provided with key and certificate management functions required in the identity authentication process to ensure the confidentiality of identity information and the non-repudiation of identity information. It is for this reason that public key constitutions are widely used in digital signature and key exchange scenarios. PKI includes certification authority CA, registration authority RA and certificate storehouse. The core of the PKI system is the CA, which can complete the issuance and management of digital certificates, and is a third-party organization with impartiality and authority. The registration authority RA is responsible for the application and registr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3239H04L9/3249H04L9/3268H04L9/3265H04L9/50
Inventor 陈爱国秦科朱大勇罗光春林晨曦傅阳
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products