Alliance chain consensus identity authentication method

An identity authentication and alliance technology, applied in the blockchain field, can solve the problem that CA needs to maintain a large number of public key certificates, achieve efficient and secure access control, and solve fast and secure effects

Pending Publication Date: 2022-05-13
CETC BIGDATA RES INST CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, most of the existing consensus authentication mechanisms among members of the consortium chain use the public key signature algorithm based on the PKI system. As the alliance nodes become larger and larger, it will cause the problem that CA needs to maintain a large number of public key certificates

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alliance chain consensus identity authentication method
  • Alliance chain consensus identity authentication method
  • Alliance chain consensus identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solution of the present invention is further described below, but the scope of protection is not limited to the description.

[0039] Such as figure 2 As shown, a consortium chain consensus identity authentication method includes the following steps:

[0040] ①The user joins the alliance chain through the access mechanism of the alliance chain and becomes an alliance member. The supervision node runs the initialization algorithm to generate the public parameter PK, and at the same time generates digital identity information according to the unique identity information of the alliance member, and uploads the public parameter PK and digital identity information to the blockchain, and then generate the corresponding identity private key for each node's alliance members through the key generation algorithm;

[0041] ②The leader node packs and verifies a batch of transactions to form a block, signs the block with its own private key, and sends it to the follo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a consensus identity authentication method for an alliance chain, which comprises the following steps that: a user joins in the alliance chain through an access mechanism of the alliance chain to become an alliance member, a supervision node operates an initialization algorithm to generate a public parameter PK, and generates digital identity information according to unique identity identification information of the alliance member; and the public parameter PK and the digital identity information are uploaded to the block chain, and then a corresponding identity private key is generated for the alliance member of each node through a key generation algorithm. The method has the beneficial effects that the data transmission process can be ensured not to be tampered, and the identity information of a signer can be identified; the method is applied to a public data resource development and utilization scene, and is combined with an identity signature-based technology, so that not only is efficient security access control realized, but also the use scene of the alliance chain is expanded, and the problem of quickly and safely realizing identity authentication between consensus nodes under the background of the alliance chain can be effectively solved.

Description

technical field [0001] The invention relates to a consortium chain consensus identity authentication method, which belongs to the technical field of block chains, and specifically relates to a consortium chain consensus authentication method applicable to the development and utilization of public data resources. Background technique [0002] Carrying out the development and utilization of public data resources can not only promote the development of the urban digital economy and protect the people's livelihood, but also play an important role in improving government management concepts and realizing the modernization of government governance capabilities. However, in the process of promoting the market-based value-added development of public data, there are problems such as low data resource sharing efficiency, difficulty in ensuring personal data privacy, and difficulty in monitoring the data use process. At the same time, it is improving the support of data resources in the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L9/3247H04L63/08H04L63/123
Inventor 管桂林谢真强程序田懿
Owner CETC BIGDATA RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products