Distributed identity authentication method

An authentication method and distributed technology, applied in the field of distributed authentication, can solve the problems of unreliable authentication and low authentication efficiency, and achieve the effect of high authentication efficiency, reliable authentication, and reliable identity authentication.

Pending Publication Date: 2020-03-24
上海海加网络科技有限公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Under this change, the traditional centralized identity authentication method faces huge challenges, and the traditional centralized identity authentication method also has the disadvantages of low authentication efficiency and unreliable authentication. Therefore, under the decentralized Internet system, there is an urgent need for a High-efficiency authentication and reliable identity authenticator method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed identity authentication method
  • Distributed identity authentication method
  • Distributed identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings of the present invention.

[0031] Such as figure 1 As shown, a distributed authentication method disclosed in the present invention includes the following steps:

[0032] Step S100, the user node sends an authentication request to the scheduling node, and the user node selects a verification node after receiving the authentication request;

[0033] Specifically, when performing distributed identity verification, the user node first sends an authentication request to the scheduling node, and after receiving the authentication request, the user node further selects a verification node. In this embodiment, the verification node suitable for verification is selected through the node selection algorithm, that is, the current node is selected based on whether the current node is online, network bandwidth, delay, num...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed identity verification method, which comprises the following steps: a user node sending an authentication request to a scheduling node, and selecting a verification node; the verification node sending an authentication request to the user node, and the user node sending a response result to the verification node; the verification node verifying the response result to determine whether the authentication is successful or not; the verification node searching token information from the storage node according to the public key of the user node; matching the token information with the authentication information provided by the user node, judging and verifying whether the authentication information is valid or not, if yes, generating new authentication information according to the user data and storing the information in the storage node, and further broadcasting authentication success information to the user node. According to the invention, identity authentication can be reliably realized, the authentication efficiency is high, the authentication is reliable, and local resources are not occupied.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a distributed identity verification method. Background technique [0002] Today's Internet system is changing from a traditional centralized model to a decentralized and distributed model. The centralized control center in the traditional Internet system has exposed many problems, such as being vulnerable to network attacks, information theft, and also prone to single points Problems such as faults, so decentralized and distributed structures are increasingly appearing in front of people. [0003] Under this change, the traditional centralized identity authentication method faces huge challenges, and the traditional centralized identity authentication method also has the disadvantages of low authentication efficiency and unreliable authentication. Therefore, under the decentralized Internet system, there is an urgent need for a An identity authenticator method with high authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/3066H04L9/3242H04L9/3239H04L9/0894
Inventor 郑朝晖王健翔缪文豪
Owner 上海海加网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products