Safety authentication method, device and equipment based on block chain and storage medium

A technology of security authentication and blockchain, which is applied in the field of devices, equipment and storage media, and security authentication methods based on blockchain, can solve the problems of paralysis of identity authentication of all nodes, heavy operation and maintenance workload, data leakage, etc., and achieve The effect of simplifying operation and maintenance work, strengthening security, and wide application prospects

Active Publication Date: 2020-06-16
ZUNYI BRANCH OF CHINA MOBILE GRP GUIZHOU COMPANY +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) There are many nodes used in the distributed storage and calculation of big data. If a node is compromised, it will lead to a large amount of data leakage of this node and other nodes
[0007] (2) Once the central node that provides unified identity authentication service is compromised, it will cause the paralysis of identity authentication of all nodes
[0008] (3) When the number and location of nodes are dynamically adjusted, the traditional security protection measures for a single node must also be dynamically adjusted accordingly, resulting in a large workload for later operation and maintenance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety authentication method, device and equipment based on block chain and storage medium
  • Safety authentication method, device and equipment based on block chain and storage medium
  • Safety authentication method, device and equipment based on block chain and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0059]It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security authentication method, device and equipment based on blockchain, and a storage medium. The security authentication method based on the blockchain comprises the steps: obtaining user information, password information, authority information and related data value information of a to-be-authenticated node; generating encrypted information based on the user information, the password information, the authority information and the related data value information; issuing the encrypted information to a blockchain distributed account book, wherein the encrypted information is acquired and decrypted by the authentication object so as to determine an authentication result according to the user information, the password information, the authority information and therelated data value information; obtaining an authentication result, and determining whether the to-be-authenticated node passes security authentication or not according to the authentication result. According to the embodiment of the invention, a decentralized user authentication mechanism can be established, and the security of data storage and user authentication is enhanced.

Description

technical field [0001] The invention belongs to the technical field of network communication, and in particular relates to a block chain-based security authentication method, device, equipment and storage medium. Background technique [0002] At present, the big data center is mainly built on the basis of the Hadoop ecosystem. This ecosystem exposes the settings of the big data platform, making the big data containing massive data and potential value easy to attract hackers' attacks, and in the process of user use, Mainly, it is easy to have security problems in the process of identity verification, authorization and input verification. [0003] In the prior art, cloud computing technology is usually used to realize unified and centralized management of identity authentication of different application systems. Each application system no longer needs to care about the identity authentication process to solve the security issues of identity verification, authorization and oth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06Q20/38
CPCH04L63/08H04L67/1097G06Q20/3829
Inventor 杨东叶强
Owner ZUNYI BRANCH OF CHINA MOBILE GRP GUIZHOU COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products