Identity authorization method and system based on block chain

A blockchain and identity technology, applied in the computer field, can solve problems such as time-consuming and cumbersome processes, and achieve the effects of improving identity authorization efficiency, ensuring security, and simplifying the identity authorization process

Active Publication Date: 2022-06-03
天聚地合(苏州)科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing method needs to call the authentication system every time, and the process is cumbersome and takes a long time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authorization method and system based on block chain
  • Identity authorization method and system based on block chain
  • Identity authorization method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding and should be considered as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted from the following description for clarity and conciseness.

[0020] The existing identity authorization process requires interaction between the client of the business system, the server of the business system and the authentication system. In different business scenarios, the authentication system may be different. For example, the authentication system may be a public security system, a banking system, a short message operator system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authorization method and system based on a block chain, and relates to the technical field of computers. The method comprises the following steps: a user side obtains a session identifier of a service system; the user side generates a first signature of the current user based on the private key and the session identifier of the current user; sending the first signature, the identity information of the current user, the session identifier and the public key of the current user to a service system; the service system verifies whether the first signature is legal or not according to the session identifier and the public key of the current user, if yes, a second signature of the current user is obtained from the block chain, whether the second signature of the current user is legal or not is verified according to the identity information of the current user and the public key of the authentication system, and if yes, it is determined that authorization of the current user is passed; wherein the block chain stores the second signature of the user passing verification of the authentication system, and the second signature of the user is determined by the identity information of the user and the private key of the authentication system. According to the embodiment, the identity authorization process can be simplified, and the identity authorization efficiency is improved.

Description

technical field [0001] The invention relates to the field of computer technology, and in particular, to a method and system for identity authorization based on blockchain. Background technique [0002] In order to ensure data security, the business system usually needs to verify the identity of the access user to verify whether the user has the corresponding access authority. [0003] In the prior art, the business system needs to call the authentication system for each authorization process. Taking SMS verification as an example, the user accesses the server of the business system through the client of the business system. The server of the business system will generate a verification code based on the user's mobile phone number, and call the interface of the SMS operator to send the verification code to the mobile phone number. The user inputs the verification code on the client of the business system, the client of the business system sends the verification code to the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3247
Inventor 许绪满韩剑锋
Owner 天聚地合(苏州)科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products