Authentication system and method of identity authentication system based on block chain technology

A technology of identity authentication and authentication methods, applied in digital data authentication, instruments, data processing applications, etc., can solve problems such as single authentication methods, affect transaction efficiency, and inconvenient authentication, and achieve single identity authentication methods and ensure security , The verification method is convenient and fast

Active Publication Date: 2020-12-08
IANGSU COLLEGE OF ENG & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the general blockchain authentication technology currently on the market has a single verification method. For example, when only the user's fingerprint is used for verification, if the user's palm is bandaged due to injury, the verification will be inconvenient, which will affect the transaction efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and method of identity authentication system based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Embodiments of the invention are described in detail below, examples of which are illustrated in the accompanying drawings. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0025] An identity authentication system based on blockchain technology provided in this embodiment includes a client terminal, a cloud server, and a third-party platform;

[0026] The user sends a registration request to the cloud server through the client terminal, and the cloud server assigns a unique identification code to the user. The user's registration information includes its unique biometric features, which include fingerprint information, voiceprint information, and iris information;

[0027] The cloud server encrypts and generates keys based on the user's identification code and biometric features, including:

[0028] The cloud server generates a first key b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication system and method based on a block chain technology. The identity authentication system comprises a client terminal, a cloud server and a third-partyplatform, wherein a user sends a registration request to the cloud server through the client terminal, the cloud server allocates a unique identification code to the user, the cloud server performs encryption according to the identification code and the biological characteristics of the user to generate a secret key, and when the user performs transaction on the third-party platform, the cloud server decomposes the public key and the private key of the user into a plurality of sections respectively by acquiring the public key of the user and the private key input by the user, verifies the sections respectively, allows the user to perform transaction if the number of verification passing times is greater than a set threshold, otherwise, does not allow the user to perform transaction and gives an alarm. According to the invention, identity authentication is performed through consideration in multiple aspects, and the characteristic of non-tampering of the application block chain technology is adopted to solve the problem of single identity authentication mode in the prior art, so that the transaction security is ensured, and the variable flexibility of the authentication mode is improved.

Description

technical field [0001] The invention belongs to the technical field of identity authentication, and in particular relates to an authentication system and method of an identity authentication system based on block chain technology. Background technique [0002] As the latest term in the field of information technology, blockchain technology has the advantages of "unforgeable", "traceable", "open and transparent", etc. Based on these characteristics, blockchain technology is widely used. Among them, the application of blockchain technology to identity verification has a good prospect. However, the general blockchain authentication technology currently on the market has a single verification method. For example, when only the user's fingerprint is used for verification, if the user's palm is bandaged due to injury, the verification will be inconvenient, which will affect the transaction efficiency. Contents of the invention [0003] Purpose of the invention: The purpose of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06F21/60G06F21/64G06F16/27G06Q40/04
CPCG06F21/32G06F21/602G06F21/64G06F16/27G06Q40/04
Inventor 胡志刚张慧马文静
Owner IANGSU COLLEGE OF ENG & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products