Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method based on non-homogeneous token, network equipment and terminal storage equipment

An identity authentication and non-homogeneous technology, which is applied in the field of identity authentication methods based on non-homogeneous certificates, network equipment and terminal storage devices, can solve problems such as user inconvenience, false information, and attacks, and prevent data tampering Effect

Pending Publication Date: 2022-08-05
JIANGSU UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the traditional identity authentication system, the user's identity information, especially the rights and interests information, is managed by a third-party organization and stored in a centralized server, which is easy to be leaked and attacked, and users cannot fully grasp their own rights and interests information
In addition, users often need to manage different identity rights in different digital scenarios, which will bring inconvenience to users, and it is easy to leak private information during the authorization process, resulting in the use of false information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on non-homogeneous token, network equipment and terminal storage equipment
  • Identity authentication method based on non-homogeneous token, network equipment and terminal storage equipment
  • Identity authentication method based on non-homogeneous token, network equipment and terminal storage equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be noted that the specific implementation of this example is based on the premise of this technology, and a detailed implementation process and implementation steps are given, but the protection scope of the present invention is not limited to Not limited to this embodiment.

[0081] like figure 1 Character interaction diagram and figure 2 The identity authentication NFT casting and distribution flow chart shows that the service provider, that is, the minting party, invokes the smart contract to initialize the NFT casting. The user purchases the NFT corresponding to the identity rights, and the smart contract or the service provider distributes the NFT to the purchasing user. The main steps are as follows:

[0082] Step 1.1 Smart contract deployment and initialization, on the supported public chain, alliance chain or private chain, co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method based on a non-homogeneous token, network equipment and terminal storage equipment, and the method comprises the steps: firstly carrying out NFT initialization casting by a service provider, namely a coin casting party, through calling an intelligent contract; and assigning information such as a block chain for casting the NFT, a coin-casting protocol, the name of the cast NFT, the number of the cast NFT, the price of the cast NFT, the period of validity of the cast NFT, a collection address and the like. Secondly, the user purchases the NFT corresponding to the identity rights and interests, and then the smart contract or the service provider distributes the NFT to the user; and the user uses the non-homogenized token NFT to carry out corresponding identity identification in the period of validity so as to enjoy rights and interests. And the non-homogenous token NFT can be freely transferred among the users. Anyone can query the period of validity of the NFT, but only an NFT holder can perform a destruction operation on the NFT holder. The invention provides an identity authentication method based on a non-homogeneous token, so as to solve the problems that the traditional identity authentication management is centralized and the identity rights and interests are difficult to transact independently, and meanwhile, the data can be prevented from being tampered and forged and can be traced.

Description

technical field [0001] The invention belongs to the field of blockchain and digital currency, and in particular relates to an identity authentication method, network equipment and terminal storage equipment based on non-homogenized certificates. Background technique [0002] Identity authentication, also known as "verification" and "authentication", refers to the confirmation of the user's identity through certain means. There are many methods of identity authentication, which can be basically divided into three categories: identity authentication based on shared keys, identity authentication based on biological characteristics, and identity authentication based on public key encryption algorithms. Different authentication methods have different levels of security, and the corresponding identity information is managed and stored by a centralized server. The user's identity information is controlled by a third party, and the identity sovereignty is not owned by the user and c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40G06Q20/38
CPCG06Q20/4014G06Q20/386G06Q20/3825
Inventor 李致远徐丙磊何恩寒毕俊蕾吴越
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products