CN107547514A - Identity identifying method, system and computer-readable recording medium - Google Patents

Identity identifying method, system and computer-readable recording medium Download PDF

Info

Publication number
CN107547514A
CN107547514A CN201710583852.1A CN201710583852A CN107547514A CN 107547514 A CN107547514 A CN 107547514A CN 201710583852 A CN201710583852 A CN 201710583852A CN 107547514 A CN107547514 A CN 107547514A
Authority
CN
China
Prior art keywords
identity
block chain
management system
transaction
identity management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710583852.1A
Other languages
Chinese (zh)
Inventor
侯庭伟
黄丽标
李俊
孙建平
胡辉
林常林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Merchants Bank Co Ltd
Original Assignee
China Merchants Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Merchants Bank Co Ltd filed Critical China Merchants Bank Co Ltd
Priority to CN201710583852.1A priority Critical patent/CN107547514A/en
Publication of CN107547514A publication Critical patent/CN107547514A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a kind of identity identifying method, including:The transaction member sends registration request to the identity management system;The identity management system is verified according to the registration request;When the registration request is verified, the identity management system generates log-on message and is sent to the block chain node, to cause the block chain node that the log-on message is write into block chain.The invention also discloses a kind of authentication card system, computer-readable recording medium.The present invention can simplify Design of Identity System and authentication procedures.

Description

Identity identifying method, system and computer-readable recording medium
Technical field
The present invention relates to communication technical field, more particularly to a kind of identity identifying method, system and computer-readable storage Medium.
Background technology
Block chain is the new of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, AES Application model.So-called common recognition mechanism is to realize that foundation is trusted, the mathematics of acquisition rights and interests is calculated between different nodes in block catenary system Method.
Block chain is divided into publicly-owned chain, alliance's chain and privately owned chain by using audient's scope, except publicly-owned chain, alliance's chain and privately owned Chain needs authentication, and the only user of authorization could add.Current most of alliance's chains and privately owned chain authentication system System design is heavy, and verification process is complicated, influences the landing application of block chain indirectly.
The above is only used for auxiliary and understands technical scheme, does not represent and recognizes that the above is existing skill Art.
The content of the invention
It is a primary object of the present invention to provide a kind of identity identifying method, system and computer-readable recording medium, purport Solving, Design of Identity System is heavy, the complicated technical problem of verification process.
To achieve the above object, the present invention provides a kind of identity identifying method, and the identity identifying method includes:
The transaction member sends registration request to the identity management system;
The identity management system is verified according to the registration request;
When the registration request is verified, the identity management system generates log-on message and is sent to the block Chain node, to cause the block chain node that the log-on message is write into block chain.
Preferably, the registration request includes:
First public key corresponding to transaction member's identity information and the transaction member.
Preferably, the identity management system carries out checking according to the registration request includes:
The identity management system sends the identity information in the registration request to third party, to cause third party couple The identity information is verified;
The identity management system receives the result after the third party verifies to the identity information.
Preferably, the identity identifying method also includes:
The transaction member utilizes the first private key corresponding to first public key to sign Transaction Information, and the transaction is believed Breath is sent to the block chain node, to cause the block chain node to utilize the friendship according to transaction member's identity information Checking is decrypted in first public key corresponding to easy member.
Preferably, the identity management system generates log-on message and is sent to the block chain node, described to cause Block chain node includes log-on message write-in block chain:
The identity management system signs what the transaction member sent using the second private key of the identity management system Registration request, generate log-on message;
The log-on message is sent to the block chain node by the identity management system, to cause the block chain link The identity of point identity management system described in the second public key verifications according to corresponding to second private key, and in the Identity Management system Unite authentication by when, by the log-on message write block chain.
In addition, to achieve the above object, the present invention also provides a kind of identity authorization system, and the system includes block chain link Point, transaction member, identity management system and authentication program, the authentication program is by the block chain node, described Transaction member and the identity management system realize following steps when performing:
The transaction member sends registration request to identity management system;
The identity management system is verified according to the registration request;
When the registration request is verified, the identity management system generates log-on message and is sent to the block Chain node, to cause the block chain node that the log-on message is write into block chain.
Preferably, the first public key corresponding to transaction member's identity information and the transaction member, the authentication When program is performed by the block chain node, the transaction member and the identity management system, also realizing following steps:
The identity management system sends the identity information in the registration request to third party, to cause third party couple The identity information is verified;
The identity management system receives the result after the third party verifies to the identity information.
Preferably, the first public key corresponding to transaction member's identity information and the transaction member, the authentication When program is performed by the block chain node, the transaction member and the identity management system, also realizing following steps:
The transaction member utilizes the first private key corresponding to first public key to sign Transaction Information, and the transaction is believed Breath is sent to the block chain node, to cause the block chain node to utilize the friendship according to transaction member's identity information Checking is decrypted in first public key corresponding to easy member.
Preferably, the authentication program is by the block chain node, the transaction member and the Identity Management system When system performs, also realizing following steps:
The identity management system signs what the transaction member sent using the second private key of the identity management system Registration request, generate log-on message;
The log-on message is sent to the block chain node by the identity management system, to cause the block chain link The identity of point identity management system described in the second public key verifications according to corresponding to second private key, and in the Identity Management system Unite authentication by when, by the log-on message write block chain.
In addition, to achieve these goals, the present invention also provides a kind of computer-readable recording medium, it is characterised in that Authentication program is stored with the computer-readable recording medium, the authentication program is realized when being executed by processor The step of identity identifying method as described above.
The present invention provides a kind of identity identifying method, system and computer-readable recording medium.The identity identifying method Applied to identity authorization system, the system includes block chain node, transaction member and identity management system.In the method, The transaction member sends registration request to the identity management system;
The identity management system is verified according to the registration request;When the registration request is verified, institute State identity management system generation log-on message and be sent to the block chain node, to cause the block chain node by the note Volume information write-in block chain.By the above-mentioned means, transaction member first sends registration request, then identity pipe to identity management system Reason system verifies to transaction member's identity, and being verified rear identity management system, to sign transaction member's log-on message again concurrent Block chain node is given, to cause block chain node that Transaction Information is write block chain.By setting identity management system to handing over Easy member carries out registration management, simplifies identity authorization system so that the transaction member's label registered in identity management system The transaction of administration is sent to block chain node by checking, using the asymmetric close mark as identity of transaction member, realizes letter Authentication procedures are changed.
Brief description of the drawings
Fig. 1 be the hardware running environment that scheme of the embodiment of the present invention is related to terminal apparatus structure schematic diagram;
Fig. 2 is the schematic flow sheet of identity identifying method first embodiment of the present invention;
Fig. 3 is that the identity identifying method first embodiment of the present invention bank related to each embodiment of identity authorization system is direct-connected Clear block chain packet platform schematic diagram;
Fig. 4 is the schematic flow sheet of identity identifying method second embodiment of the present invention;
Fig. 5 is the schematic flow sheet of identity identifying method 3rd embodiment of the present invention;
Fig. 6 is the schematic flow sheet of identity identifying method fourth embodiment of the present invention.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Because most of alliance's chains and privately owned chain Design of Identity System are too heavy in the prior art, Verification System is than on chain Service application is all complicated, especially corresponds to the high system of security requirement, can set multilayer certification, and this mode easily causes entirely System can not be run, and influence the landing application of block chain indirectly.
In order to solve the above-mentioned technical problem, the present invention proposes a kind of identity identifying method, by the transaction member to institute State identity management system and send registration request, the identity management system is verified according to the registration request, in the note Volume requests verification by when, identity management system generation log-on message is simultaneously sent to the block chain node, to cause State block chain node and the log-on message is write into block chain, simplify identity authorization system and verification process.
As shown in figure 1, Fig. 1 is the terminal structure schematic diagram for the hardware running environment that scheme of the embodiment of the present invention is related to.
Terminal of the embodiment of the present invention can be PC or smart mobile phone, tablet personal computer, E-book reader, MP3 (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio aspect 3) Player, MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard sound Frequency aspect 3) player, pocket computer etc. have the packaged type terminal device of display function.
As shown in figure 1, the terminal can include:Processor 1001, such as CPU, network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is used to realize the connection communication between these components. User interface 1003 can include display screen (Display), input block such as keyboard (Keyboard), optional user interface 1003 can also include wireline interface, the wave point of standard.Network interface 1004 can optionally connect including the wired of standard Mouth, wave point (such as WI-FI interfaces).Memory 1005 can be high-speed RAM memory or stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.
Alternatively, terminal can also include camera, RF (Radio Frequency, radio frequency) circuit, sensor, audio Circuit, Wi-Fi module etc..Wherein, sensor ratio such as optical sensor, motion sensor and other sensors.Specifically, light Sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can according to the light and shade of ambient light come The brightness of display screen is adjusted, proximity transducer can close display screen and/or backlight when mobile terminal is moved in one's ear.As One kind of motion sensor, gravity accelerometer can detect in all directions the size of (generally three axles) acceleration, quiet Size and the direction of gravity are can detect that when only, the application available for identification mobile terminal posture is (such as horizontal/vertical screen switching, related Game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Certainly, mobile terminal can also match somebody with somebody The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared ray sensor are put, will not be repeated here.
It will be understood by those skilled in the art that the restriction of the terminal structure shown in Fig. 1 not structure paired terminal, can be wrapped Include than illustrating more or less parts, either combine some parts or different parts arrangement.
As shown in figure 1, it can lead to as in a kind of memory 1005 of computer-readable storage medium including operating system, network Believe module, Subscriber Interface Module SIM and authentication program.
In the terminal shown in Fig. 1, network interface 1004 is mainly used in connecting background server, is carried out with background server Data communicate;User interface 1003 is mainly used in connecting client (user terminal), enters row data communication with client;And processor 1001 can be used for calling the authentication program stored in memory 1005, and perform following operate:
The transaction member sends registration request to identity management system;
The identity management system is verified according to the registration request;
When the registration request is verified, the identity management system generates log-on message and is sent to the block Chain node, to cause the block chain node that the log-on message is write into block chain.
Further, processor 1001 can call the network operation stored in memory 1005 to control application program, also Perform following operate:
The registration request includes:
First public key corresponding to transaction member's identity information and the transaction member.
Further, processor 1001 can call the authentication program stored in memory 1005, also perform following Operation:
The identity management system sends the identity information in the registration request to third party, to cause third party couple The identity information is verified;
The identity management system receives the result after the third party verifies to the identity information.
Further, processor 1001 can call the network operation stored in memory 1005 to control application program, also Perform following operate:
The transaction member utilizes the first private key corresponding to first public key to sign Transaction Information, and the transaction is believed Breath is sent to the block chain node, to cause the block chain node to utilize the friendship according to transaction member's identity information Checking is decrypted in first public key corresponding to easy member.
Further, processor 1001 can call the network operation stored in memory 1005 to control application program, also Perform following operate:
The identity management system signs what the transaction member sent using the second private key of the identity management system Registration request, generate log-on message;
The log-on message is sent to the block chain node by the identity management system, to cause the block chain link The identity of point identity management system described in the second public key verifications according to corresponding to second private key, and in the Identity Management system Unite authentication by when, by the log-on message write block chain.
Based on above-mentioned hardware configuration, identity identifying method embodiment of the present invention is proposed.
Reference picture 2, Fig. 2 are identity identifying method first embodiment schematic flow sheet of the present invention, the identity identifying method Including:
Step S10, the transaction member send registration request to the identity management system;
In invention implementation case, the identity identifying method can apply to the industries such as bank or security, the present embodiment with Exemplified by bank's industry.To ensure system safety, the transaction processing system of bank generally comprises core system and front-end system.Bank Core system, it is the data processing centre of bank, has concentrated the account information of bank client, is the most important thing of bank operations. Core system includes core accounting process systems and core database, and both interactions can complete the account information of miscellaneous service Processing.Can carry out the transaction system of complete bank transaction and issued transaction, bank core be one individually, can run Transaction system.
Front-end system, it is intermediary service switching plane, message conversion, the encryption and decryption processing of message, communication association can be carried out View conversion, and, it is transferred to or produces processing by the routing function progress communication packet on this platform.
Transaction member needs just add the block chain being made up of each bank by authentication, in the present embodiment Transaction member with block chain communicate by the front-end system in the transaction member carries out authentication.As shown in figure 3, Fig. 3 Being that the bank relevant with identity identifying method embodiment of the present invention is direct-connected clears block chain packet platform schematic diagram, the present embodiment body The identity authorization system that identity authentication method is applied and an important difference of conventional authentication system are to be provided with Identity Management System.In the block chain node of the multiple transaction member's compositions of each bank, the identity management system and the transaction member It is connected with block chain node, the registration for the transaction member and log-on message transaction member issues block chain.Figure three System shares the block chain node of 4 status equities, and block chain interstitial content does not limit to 4 in actual implementation, numerous nodes Collectively form a network end to end.Each block chain node allows to obtain a complete data copy.Base between node Whole block chain is safeguarded jointly by calculating jointly in a set of common recognition mechanism.Data exchange passes through digital signature technology between node Verified.The public key of identity management system is configured in block chain node as configuration information, in communication process, the body Part management system is communicated by the private key signature transaction of itself with block chain link point, and the block chain node can then use The public key being pre-configured with is verified, so as to realize corresponding communication.It is flat that direct-connected clearance block chain packet platform also includes monitoring Platform, monitor supervision platform are disclosed to read the Transaction Information in block chain, all friendships independently of identity management system Easy information is shown, and is read to transaction member.In the identity identifying method step of the present invention, transaction member is needed to identity Management system sends registration request, and the registration request includes the information that registration needs, only registered in identity management system Transaction member could be communicated with block chain node.In the present embodiment, the transaction member refers to bank pre-machine, by institute State bank pre-machine and send registration request.
Step S20, the identity management system are verified according to the registration request;
After the identity management system receives the registration request that the transaction member sends, entered according to the registration request Row checking.Two kinds of situations can be divided into by sending the transaction member of registration request to transaction member in step slo:It is described transaction into Member belongs to the transaction member for forming any one bank in the block chain and is not belonging to form any of described block chain The transaction member of bank.The content for needing to verify can include:The information that the registration request that the transaction member sends includes is It is no accurate;Whether the transaction member belongs to the transaction processing system of any bank in block chain.
The bank transaction processing system and the accurate registration request of information of transmission only belonged in block chain could lead to Cross.
For example, some first block chain by and A, B and tri- banks of C and its subbranch form, only A, B and tri- banks of C And its information of the registration request of the transaction processing system transmission of subbranch could accurately pass through checking.2 kinds of situations are obstructed below Cross:
1) it is not belonging to the registration request that the transaction system of the composition bank of block chain is sent.
For example, bank D is not belonging to the first block chain as described above, bank D some front end processor 1 have sent registration request 1, but because D banks are not belonging to the member of block chain, the registration request 1 that front end processor 1 is sent, which is verified, not to be passed through.
2) the information inaccuracy that the registration request of the composition bank transmission of block chain includes is belonged to.
For example, bank A belongs to the first block chain, bank A front end processor 2 have sent registration request 2, but the note The information content missing or information that volume request 2 includes are wrong, and the registration request 2 that front end processor 2 is sent, which is verified, not to be passed through.
Step S30, when the registration request is verified, the identity management system generates log-on message and is sent to The block chain node, to cause the block chain node that the log-on message is write into block chain.
Identity management system has issues block chain node so as to obtain block hinged node write-in block chain the transaction of signature Authority, and transaction member need in identity management system registration and by block chain node by log-on message write block chain after It can just be communicated with block chain node.Identity management system itself randomly generates a pair of unsymmetrical key, the Identity Management system Private key in the unsymmetrical key of system is used to signing Transaction Information, and the public key configuration in the unsymmetrical key of identity management system exists Block chain node.When the identity management system carries out checking according to the registration request to be completed, the identity management system A result can be obtained, the result can be transaction member's identity that third party provides according to identity management system The result or identity management system that information is sent after being verified achieved according to itself by third party provide The letter of identity of transaction member contrasts obtained the result with the identity information in transaction member's registration request.If test It is by the way that the information that identity management system is then included according to registration request using the private key of itself to registration request is carried out to demonstrate,prove result Encryption generation log-on message, the log-on message is sent to block chain node by identity management system, to cause wherein block chain Node writes the log-on message in block chain, and transaction member is communicated with block chain link point.
For example, in the first block chain in step S20, the registration request 3 of bank A front end processor 3 is verified Afterwards, the identity management system obtains the result being verified according to the registration request 3.Identity management system is according to Log-on message corresponding to registration request 3 and registering result generation, and the log-on message is sent to block chain node, to cause The block chain node writes the log-on message in block chain.
In the present embodiment, the transaction member sends registration request to the identity management system;The Identity Management System is verified according to the registration request;When the registration request is verified, the identity management system generation note Volume information is simultaneously sent to the block chain node, to cause the block chain node that the log-on message is write into block chain.It is logical Aforesaid way is crossed, transaction member first sends registration request to identity management system, and then identity management system is to transaction member's body Part is verified, is verified rear identity management system and signs transaction member's log-on message again and be sent to block chain node, with So that Transaction Information is write block chain by block chain node.By setting identity management system to carry out registration pipe to transaction member Reason, simplifies identity authorization system so that the transaction of the transaction member's signature registered in identity management system is sent to area Block chain node, using the asymmetric close mark as identity of transaction member, is realized by checking and simplifies authentication procedures.
Further, based on the invention described above identity identifying method embodiment, reference picture 4, authentication of the present invention is proposed The second embodiment of method.
In the present embodiment, the identity information of transaction member described in registration request described in step S20 and the transaction member Corresponding first public key, described part management system carries out checking according to the registration request to be included:
S21, the identity management system send the identity information in the registration request to third party, to cause the 3rd Side is verified by the identity information;
S22, the identity management system receive the result after the third party verifies to the identity information.
In the present embodiment, using identity of the unsymmetrical key as the transaction member, rivest, shamir, adelman Need two keys:Public-key cryptography and private cipher key, are briefly referred to as public key and private key here.Public key and private key are a pair, such as Data are encrypted with public key for fruit, and only private key corresponding to use could be decrypted;If data are encrypted with private key, then Public key corresponding to only using could be decrypted.Because encryption and decryption use two different keys, this algorithm Make rivest, shamir, adelman.Rivest, shamir, adelman realizes that the basic process that confidential information exchanges is:Party A generates a pair of secret keys And disclosed using therein one as Public key to other sides;The Party B for obtaining the Public key is believed secret using the key Breath is then forwarded to Party A after being encrypted;Party A solves private key to the information after encryption with oneself the another of preservation again It is close.
Unsymmetrical key, particularly ECC keys, calculating speed is fast, cracks difficulty and increases up to index with key length Rank, it is safe.If by the unsymmetrical key of some certain length and some is organized or individual security associations, by close The identity of key is falsely used hardly possible in theory.According to the algorithm characteristic of unsymmetrical key, by differentiating some unsymmetrical key Whether authentication algorithm is met, it can be determined that whether the individual and object for holding key obtain system registry mandate.
The unsymmetrical key of transaction member described in the present embodiment is randomly generated by transaction member, here it is described transaction into The unsymmetrical key of member is referred to as the first unsymmetrical key, and the public key in the first unsymmetrical key is referred to as the first public key, corresponding private key For the first private key.Transaction member's all identity informations and the transaction member couple when the transaction member that merchandises sends registration request The the first public key binding answered is together.The identity information of the transaction member includes but is not limited to the affiliated bank's knot of the transaction member The information such as structure title and transaction member's title in affiliated bank and coding.First private key is held alone by each transaction member Have, for signing encrypted transaction message.Corresponding first public key bundlees in registration with identity information, in the Identity Management system After system is registered and the log-on message is write into block chain by the block chain node, the block chain node can utilizes institute State the public key of transaction member first transaction member is decrypted and verified using the transaction of the described first public and private key signature, from And ensure the safety of Transaction Information.
, will wherein according to registration request after the identity authorization system receives the registration request that the transaction member sends The identity information of transaction member is sent to third party.Third party can be in addition to identity authorization system and transaction member Tripartite authority's authentication mechanism.
For example the front end processor 4 as belonging to the bank A in the first block chain of first embodiment is to described Identity Management system System have sent registration request 4, and the information of the registration request 4 is accurate, including the identity information of the front end processor 4 and described preposition The public key of machine 4.The identity information of front end processor 4 is issued the third party by the identity authorization system, and the third party is to described The authentication of front end processor 4 by when, the result that the authentication of front end processor 4 passes through is issued identity management system.When not The front end processor 1 for belonging to the bank D of the first block chain have sent registration request 1, described in the bank D is not belonging to The first block chain, therefore authentication of the third party to the front end processor 1 be not by and the authentication of front end processor 1 The result not passed through issues identity management system.
Further, part management system carries out checking according to the registration request to include, Identity Management system System is believed using the letter of identity of the transaction member provided in itself achieving by third party with the identity in transaction member's registration request Breath is contrasted to obtain result.The counting personnel in the field should be appreciated that the result of two authentications listed herewith obtains To mode simply play illustration, rather than restriction effect.
In the present embodiment, the of the identity information of the registration request including the transaction member and the transaction member One public key, sufficiently includes authentication and subsequent transaction verifies required information.By the use of unsymmetrical key as transaction into The identity of member, key length can ensure that caused key can not possibly collide.The individual and tissue for possessing key can confirm that. In other words, key is unique sign of individual and tissue.In addition, asymmetric key algorithm is authentication center CA basic calculation Method, almost possess the equal security mechanism of the digital certificates provided with CA.The identity management system is by the registration request Identity information send to third party, to cause third party to verify the identity information, the then Identity Management system System receives the result after the third party verifies to the identity information, is effectively guaranteed transaction member's body The accuracy and reliability of part information.
Further, the identity identifying method embodiment based on the invention described above prompting, reference picture 5, proposes the present invention's 3rd embodiment.
In the present embodiment, after Transaction Information is write block chain by the block chain node, the friendship of the transaction member Easy step is as follows:
Step S40, the transaction member utilize the first private key corresponding to first public key to sign Transaction Information, and by institute State Transaction Information and be sent to the block chain node, to cause the block chain node according to transaction member's identity information profit Checking is decrypted in the first public key corresponding to the transaction member.
After the completion of transaction member's authentication, the identity information of the transaction member and corresponding first public key have been write Enter block chain.The transaction member is in transaction, using the first private key encryption Transaction Information corresponding to the first described public key, and Transaction Information is sent to block chain node.After the block chain link point receives the Transaction Information of encryption, according to it is described transaction into The identity information of language finds corresponding first private key, and described Transaction Information is decrypted and verified.When successful decryption, Corresponding Transaction Information writes block chain.In the present embodiment, only log-on message is written into transaction member's hair in block chain The Transaction Information sent could be by block chain node decryption and checking, the transaction member not registered in identity management system, its body Part information and corresponding public key are not written to block chain, thus block chain node can not be decrypted and test to its Transaction Information Card, the Transaction Information can not write block chain.
Further, the identity identifying method embodiment based on the invention described above prompting, reference picture 6, proposes the present invention the Four embodiments.
Based on above-mentioned shown embodiment, in the present embodiment, step S30 can include:
S31, the identity management system sign transaction member's hair using the second private key of the identity management system The registration request sent, generate log-on message.
The log-on message is sent to the block chain node by S32, the identity management system, to cause the block The identity of chain node identity management system described in the second public key verifications according to corresponding to second private key, and in the identity pipe When reason system identity is verified, the log-on message is write into block chain.
In order to ensure verification process safety, forgery log-on message is avoided to be sent to block chain node and be written to block chain feelings The appearance of condition, in the present embodiment the identity management system itself produce a pair of unsymmetrical key, corresponding public key referred to here as For the second public key, corresponding private key is referred to as the second private key.Identity management system have block chain node is issued in the transaction of signature so that The authority of block hinged node write-in block chain is obtained, the public key of identity management system is configured in block chain node.Identity Management system When system receives the result that the registration request is verified, the information included using the second private key registration request described in itself is entered Row encryption generation log-on message, the identity management system is utilized after receiving the log-on message so as to the block chain node The second public key is decrypted and verified to the log-on message corresponding to second private key.Block chain node receives the registration of encryption During information, log-on message is decrypted using the second public key corresponding to the private key of identity management system second.Successful decryption, Then confirm that the log-on message is sent by the identity management system, log-on message is write block chain by the block chain node. Decrypt unsuccessful, then the key for confirming to encrypt the log-on message is not second corresponding to the public key of identity management system second Private key, the log-on message are not sent by the identity management system, and block chain node refusal writes the log-on message Block chain.
In the present embodiment, the identity management system signs the friendship using the second private key of the identity management system The registration request that easy member sends, generates log-on message, and then the log-on message is sent to institute by the identity management system Block chain node is stated, to cause block chain node identity pipe described in the second public key verifications according to corresponding to second private key The identity of reason system, and the identity management system authentication by when, by the log-on message write block chain, effectively The transmission and the checking that ensure verification process log-on message safety.
In addition, the present invention also provides a kind of identity authorization system.
With reference to figure 3, the first embodiment of identity authorization system of the present invention is proposed.
In the present embodiment, the authentication program is by block chain node, the transaction member and the identity Management system can realize following steps when performing:
Step S10, the transaction member send registration request to the identity management system;
In inventive embodiments, the identity authorization system can apply to the industries such as bank or security, the present embodiment with Exemplified by bank's industry.To ensure system safety, the transaction processing system of bank generally comprises core system and front-end system.Bank Core system, it is the data processing centre of bank, has concentrated the account information of bank client, is the most important thing of bank operations. Core system includes core accounting process systems and core database, and both interactions can complete the account information of miscellaneous service Processing.Can carry out the transaction system of complete bank transaction and issued transaction, bank core be one individually, can run Transaction system.
Front-end system, it is intermediary service switching plane, message conversion, the encryption and decryption processing of message, communication association can be carried out View conversion, and, it is transferred to or produces processing by the routing function progress communication packet on this platform.
Transaction member needs just add the block chain being made up of each bank by authentication, in the present embodiment Transaction member with block chain communicate by the front-end system in the transaction member carries out authentication.As shown in figure 3, Fig. 3 Being that the bank relevant with identity authorization system embodiment of the present invention is direct-connected clears block chain packet platform schematic diagram, the present embodiment body The identity authorization system and an important difference of conventional authentication system that part Verification System is applied are to be provided with Identity Management System.In the block chain node of the multiple transaction member's compositions of each bank, the identity management system and the transaction member It is connected with block chain node, the registration for the transaction member and log-on message transaction member issues block chain.Fig. 3 systems Altogether there is the block chain node of 4 status equities, block chain interstitial content does not limit to 4 in actual implementation, and numerous nodes are total to It is same to form a network end to end.Each block chain node allows to obtain a complete data copy.It is based between node A set of common recognition mechanism safeguards whole block chain jointly by calculating jointly.Data exchange is entered by digital signature technology between node Row checking.The public key of identity management system is configured in block chain node as configuration information, in communication process, the identity Management system is communicated by the private key signature transaction of itself with block chain link point, and the block chain node can then use pre- The public key first configured is verified, so as to realize corresponding communication.Direct-connected clearance block chain packet platform also includes monitor supervision platform, Monitor supervision platform is disclosed to read the Transaction Information in block chain, all transaction independently of identity management system Information is shown, and is read to transaction member.When the identity authorization system of the present invention is performed, transaction member is needed to identity Management system sends registration request, and the registration request includes the information that registration needs, only registered in identity management system Transaction member could be communicated with block chain node.In the present embodiment, the transaction member refers to bank pre-machine, by institute State bank pre-machine and send registration request.
Step S20, the identity management system are verified according to the registration request;
After the identity management system receives the registration request that the transaction member sends, entered according to the registration request Row checking.Two kinds of situations can be divided into by sending the transaction member of registration request to transaction member in step slo:It is described transaction into Member belongs to the transaction member for forming any one bank in the block chain and is not belonging to form any of described block chain The transaction member of bank.The content for needing to verify can include:The information that the registration request that the transaction member sends includes is It is no accurate;Whether the transaction member belongs to the transaction processing system of any bank in block chain.
The bank transaction processing system and the accurate registration request of information of transmission only belonged in block chain could lead to Cross.
For example, some first block chain by and A, B and tri- banks of C and its subbranch form, only A, B and tri- banks of C And its information of the registration request of the transaction processing system transmission of subbranch could accurately pass through checking.2 kinds of situations are obstructed below Cross:
1) it is not belonging to the registration request that the transaction system of the composition bank of block chain is sent.
For example, bank D is not belonging to the first block chain as described above, bank D some front end processor 1 have sent registration request 1, but because D banks are not belonging to the member of block chain, the registration request 1 that front end processor 1 is sent, which is verified, not to be passed through.
2) the information inaccuracy that the registration request of the composition bank transmission of block chain includes is belonged to.
For example, bank A belongs to the first block chain, bank A front end processor 2 have sent registration request 2, but the note The information content missing or information that volume request 2 includes are wrong, and the registration request 2 that front end processor 2 is sent, which is verified, not to be passed through.
Step S30, when the registration request is verified, the identity management system generates log-on message and is sent to The block chain node, to cause the block chain node that the log-on message is write into block chain.
Identity management system has issues block chain node so as to obtain block hinged node write-in block chain the transaction of signature Authority, and transaction member need in identity management system registration and by block chain node by log-on message write block chain after It can just be communicated with block chain node.Identity management system itself randomly generates a pair of unsymmetrical key, the Identity Management system Private key in the unsymmetrical key of system is used to signing Transaction Information, and the public key configuration in the unsymmetrical key of identity management system exists Block chain node.When the identity management system carries out checking according to the registration request to be completed, the identity management system A result can be obtained, the result can be that the transaction member that third party provides according to identity management system is carried out The transaction member provided by third party that the result or identity management system sent after checking achieve according to itself Letter of identity and transaction member's registration request in identity information contrast obtained the result.If the result is By the way that then generation is encrypted to the information that registration request includes using the private key of itself according to registration request in identity management system The log-on message is sent to block chain node by log-on message, identity management system, make it that wherein block chain node is by institute State in log-on message write-in block chain, and transaction member is communicated with block chain link point.
For example, in the first block chain in step S20, the registration request 3 of bank A front end processor 3 is verified Afterwards, the identity management system obtains the result being verified according to the registration request 3.Identity management system is according to Log-on message corresponding to registration request 3 and registering result generation, and the log-on message is sent to block chain node, to cause The block chain node writes the log-on message in block chain.
In the present embodiment, the transaction member sends registration request to the identity management system;The Identity Management System is verified according to the registration request;When the registration request is verified, the identity management system generation note Volume information is simultaneously sent to the block chain node, to cause the block chain node that the log-on message is write into block chain.It is logical Aforesaid way is crossed, transaction member first sends registration request to identity management system, and then identity management system is to transaction member's body Part is verified, is verified rear identity management system and signs transaction member's log-on message again and be sent to block chain node, with So that Transaction Information is write block chain by block chain node.By setting identity management system to carry out registration pipe to transaction member Reason, simplifies identity authorization system so that the transaction of the transaction member's signature registered in identity management system is sent to area Block chain node, using the asymmetric close mark as identity of transaction member, is realized by checking and simplifies authentication procedures.
Further, with reference to figure 3, the second embodiment of identity authorization system of the present invention is proposed.
In the present embodiment, the authentication program is by block chain node, the transaction member and the identity Management system can realize following steps when performing:
In the present embodiment, registration request described in step S20 includes the identity information of the transaction member and the transaction First public key corresponding to member, described part management system carries out checking according to the registration request to be included:
S21, the identity management system send the identity information in the registration request to third party, to cause the 3rd Side is verified by the identity information;
S22, the identity management system receive the result after the third party verifies to the identity information.
In the present embodiment, using identity of the unsymmetrical key as the transaction member, rivest, shamir, adelman Need two keys:Public-key cryptography and private cipher key, are briefly referred to as public key and private key here.Public key and private key are a pair, such as Data are encrypted with public key for fruit, and only private key corresponding to use could be decrypted;If data are encrypted with private key, then Public key corresponding to only using could be decrypted.Because encryption and decryption use two different keys, this algorithm Make rivest, shamir, adelman.Rivest, shamir, adelman realizes that the basic process that confidential information exchanges is:Party A generates a pair of secret keys And disclosed using therein one as Public key to other sides;The Party B for obtaining the Public key is believed secret using the key Breath is then forwarded to Party A after being encrypted;Party A solves private key to the information after encryption with oneself the another of preservation again It is close.
Unsymmetrical key, particularly ECC keys, calculating speed is fast, cracks difficulty and increases up to index with key length Rank, it is safe.If by the unsymmetrical key of some certain length and some is organized or individual security associations, by close The identity of key is falsely used hardly possible in theory.According to the algorithm characteristic of unsymmetrical key, by differentiating some unsymmetrical key Whether authentication algorithm is met, it can be determined that whether the individual and object for holding key obtain system registry mandate.
The unsymmetrical key of transaction member described in the present embodiment is randomly generated by transaction member, here it is described transaction into The unsymmetrical key of member is referred to as the first unsymmetrical key, and the public key in the first unsymmetrical key is referred to as the first public key, corresponding private key For the first private key.Transaction member's all identity informations and the transaction member couple when the transaction member that merchandises sends registration request The the first public key binding answered is together.The identity information of the transaction member includes but is not limited to the affiliated bank's knot of the transaction member The information such as structure title and transaction member's title in affiliated bank and coding.First private key is held alone by each transaction member Have, for signing encrypted transaction message.Corresponding first public key bundlees in registration with identity information, in the Identity Management system After system is registered and the log-on message is write into block chain by the block chain node, the block chain node can utilizes institute The transaction that the public key of transaction member first signs the transaction member using first private key is stated to be decrypted and verify, so as to Ensure the safety of Transaction Information.
, will wherein according to registration request after the identity authorization system receives the registration request that the transaction member sends The identity information of transaction member is sent to third party.Third party can be in addition to identity authorization system and transaction member Tripartite authority's authentication mechanism.
For example the front end processor 4 as belonging to the bank A in the first block chain of first embodiment is to described Identity Management system System have sent registration request 4, and the information of the registration request 4 is accurate, including the identity information of the front end processor 4 and described preposition The public key of machine 4.The identity information of front end processor 4 is issued the third party by the identity authorization system, and the third party is to described The authentication of front end processor 4 by when, the result that the authentication of front end processor 4 passes through is issued identity management system.When not The front end processor 1 for belonging to the bank D of the first block chain have sent registration request 1, described in the bank D is not belonging to The first block chain, therefore authentication of the third party to the front end processor 1 be not by and the authentication of front end processor 1 The result not passed through issues identity management system.
Further, part management system carries out checking according to the registration request to include, Identity Management system System is believed using the letter of identity of the transaction member provided in itself achieving by third party with the identity in transaction member's registration request Breath is contrasted to obtain result.The counting personnel in the field should be appreciated that the result of two authentications listed herewith obtains To mode simply play illustration, rather than restriction effect.
In the present embodiment, the of the identity information of the registration request including the transaction member and the transaction member One public key, sufficiently includes authentication and subsequent transaction verifies required information.By the use of unsymmetrical key as transaction into The identity of member, key length can ensure that caused key can not possibly collide.The individual and tissue for possessing key can confirm that. In other words, key is unique sign of individual and tissue.In addition, asymmetric key algorithm is authentication center CA basic calculation Method, almost possess the equal security mechanism of the digital certificates provided with CA.The identity management system is by the registration request Identity information send to third party, to cause third party to verify the identity information, the then Identity Management system System receives the result after the third party verifies to the identity information, is effectively guaranteed transaction member's body The accuracy and reliability of part information.
Further, with reference to figure 3, the 3rd embodiment of identity authorization system of the present invention is proposed.
In the present embodiment, the authentication program is by block chain node, the transaction member and the identity Management system can realize following steps when performing:
After Transaction Information is write block chain by the block chain node, the transaction step of the transaction member is as follows:
Step S40, the transaction member utilize the first private key corresponding to first public key to sign Transaction Information, and by institute State Transaction Information and be sent to the block chain node, to cause the block chain node according to transaction member's identity information profit Checking is decrypted in the first public key corresponding to the transaction member.
After the completion of transaction member's authentication, the identity information of the transaction member and corresponding first public key have been write Enter block chain.The transaction member is in transaction, using the first private key encryption Transaction Information corresponding to the first described public key, and Transaction Information is sent to block chain node.After the block chain link point receives the Transaction Information of encryption, according to it is described transaction into The identity information of language finds corresponding first private key, and described Transaction Information is decrypted and verified.When successful decryption, Corresponding Transaction Information writes block chain.In the present embodiment, only log-on message is written into transaction member's hair in block chain The Transaction Information sent could be by block chain node decryption and checking, the transaction member not registered in identity management system, its body Part information and corresponding public key are not written to block chain, thus block chain node can not be decrypted and test to its Transaction Information Card, the Transaction Information can not write block chain.
Further, with reference to figure 3, the fourth embodiment of identity authorization system of the present invention is proposed.
In the present embodiment, the authentication program is by block chain node, the transaction member and the identity Management system can realize following steps when performing:
Based on above-mentioned shown embodiment, in the present embodiment, step S30 can include:
S31, the identity management system sign transaction member's hair using the second private key of the identity management system The registration request sent, generate log-on message.
The log-on message is sent to the block chain node by S32, the identity management system, to cause the block The identity of chain node identity management system described in the second public key verifications according to corresponding to second private key, and in the identity pipe When reason system identity is verified, the log-on message is write into block chain.
In order to ensure verification process safety, forgery log-on message is avoided to be sent to block chain node and be written to block chain feelings The appearance of condition, in the present embodiment the identity management system itself produce a pair of unsymmetrical key, corresponding public key referred to here as For the second public key, corresponding private key is referred to as the second private key.Identity management system have block chain node is issued in the transaction of signature so that The authority of block hinged node write-in block chain is obtained, the public key of identity management system is configured in block chain node.Identity Management system When system receives the result that the registration request is verified, the information included using the second private key registration request described in itself is entered Row encryption generation log-on message, the identity management system is utilized after receiving the log-on message so as to the block chain node The second public key is decrypted and verified to the log-on message corresponding to second private key.Block chain node receives the registration of encryption During information, log-on message is decrypted using the second public key corresponding to the private key of identity management system second.Successful decryption, Then confirm that the log-on message is sent by the identity management system, log-on message is write block chain by the block chain node. Decrypt unsuccessful, then the key for confirming to encrypt the log-on message is not second corresponding to the public key of identity management system second Private key, the log-on message are not sent by the identity management system, and block chain node refusal writes the log-on message Block chain.
In the present embodiment, the identity management system signs the friendship using the second private key of the identity management system The registration request that easy member sends, generates log-on message, and then the log-on message is sent to institute by the identity management system Block chain node is stated, to cause block chain node identity pipe described in the second public key verifications according to corresponding to second private key The identity of reason system, and the identity management system authentication by when, by the log-on message write block chain, effectively The transmission and the checking that ensure verification process log-on message safety.
In addition, the embodiment of the present invention also proposes a kind of computer-readable recording medium.
Authentication program is stored with computer-readable recording medium of the present invention, it is real when the authentication program performs Now the step of identity identifying method as described above.
Wherein, the method that the authentication program run on the processor is realized when being performed can refer to the present invention The each embodiment of identity identifying method, here is omitted.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or system including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or system institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, Computer, server, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of identity identifying method, it is characterised in that the identity identifying method is applied to identity authorization system, the system Including block chain node, transaction member and identity management system, comprise the following steps:
The transaction member sends registration request to the identity management system;
The identity management system is verified according to the registration request;
When the registration request is verified, the identity management system generates log-on message and is sent to the block chain link Point, to cause the block chain node that the log-on message is write into block chain.
2. identity identifying method as claimed in claim 1, it is characterised in that the registration request includes:
First public key corresponding to transaction member's identity information and the transaction member.
3. identity identifying method as claimed in claim 2, it is characterised in that the identity management system is according to the registration request Carrying out checking includes:
The identity management system sends the identity information in the registration request to third party, to cause third party to described Identity information is verified;
The identity management system receives the result after the third party verifies to the identity information.
4. identity identifying method as claimed in claim 2, it is characterised in that the identity identifying method also includes:
The transaction member utilizes the first private key corresponding to first public key to sign Transaction Information, and the Transaction Information is sent out Give the block chain node, with cause the block chain node according to transaction member's identity information using it is described transaction into Checking is decrypted in first public key corresponding to member.
5. identity identifying method as claimed in claim 1, it is characterised in that the identity management system generation log-on message is simultaneously The block chain node is sent to, to cause the block chain node to include log-on message write-in block chain:
The identity management system signs the registration of transaction member's transmission using the second private key of the identity management system Request, generate log-on message;
The log-on message is sent to the block chain node by the identity management system, to cause the block chain node root According to the identity of identity management system described in the second public key verifications corresponding to second private key, and in the identity management system body When part is verified, the log-on message is write into block chain.
6. a kind of identity authorization system, it is characterised in that the system includes block chain node, transaction member, Identity Management system System and authentication program, the authentication program is by block chain node, the transaction member and the Identity Management System realizes following steps when performing:
The transaction member sends registration request to identity management system;
The identity management system is verified according to the registration request;
When the registration request is verified, the identity management system generates log-on message and is sent to the block chain link Point, to cause the block chain node that the log-on message is write into block chain.
7. identity authorization system as claimed in claim 6, it is characterised in that transaction member's identity information and the transaction First public key corresponding to member, the authentication program is by the block chain node, the transaction member and the identity pipe When reason system performs, also realizing following steps:
The identity management system sends the identity information in the registration request to third party, to cause third party to described Identity information is verified;
The identity management system receives the result after the third party verifies to the identity information.
8. identity authorization system as claimed in claim 6, it is characterised in that transaction member's identity information and the transaction First public key corresponding to member, the authentication program is by the block chain node, the transaction member and the identity pipe When reason system performs, also realizing following steps:
The transaction member utilizes the first private key corresponding to first public key to sign Transaction Information, and the Transaction Information is sent out Give the block chain node, with cause the block chain node according to transaction member's identity information using it is described transaction into Checking is decrypted in first public key corresponding to member.
9. identity authorization system as claimed in claim 6, it is characterised in that the authentication program is by the block chain link When point, the transaction member and the identity management system perform, also realizing following steps:
The identity management system signs the registration of transaction member's transmission using the second private key of the identity management system Request, generate log-on message;
The log-on message is sent to the block chain node by the identity management system, to cause the block chain node root According to the identity of identity management system described in the second public key verifications corresponding to second private key, and in the identity management system body When part is verified, the log-on message is write into block chain.
10. a kind of computer-readable recording medium, it is characterised in that be stored with identity on the computer-readable recording medium and recognize Program is demonstrate,proved, the authentication as any one of claim 1 to 5 is realized when the authentication program is executed by processor The step of method.
CN201710583852.1A 2017-07-17 2017-07-17 Identity identifying method, system and computer-readable recording medium Pending CN107547514A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710583852.1A CN107547514A (en) 2017-07-17 2017-07-17 Identity identifying method, system and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710583852.1A CN107547514A (en) 2017-07-17 2017-07-17 Identity identifying method, system and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107547514A true CN107547514A (en) 2018-01-05

Family

ID=60971072

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710583852.1A Pending CN107547514A (en) 2017-07-17 2017-07-17 Identity identifying method, system and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107547514A (en)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108289129A (en) * 2018-02-26 2018-07-17 深圳智乾区块链科技有限公司 Block chain ecological environment creation method, system and computer readable storage medium
CN108712395A (en) * 2018-04-27 2018-10-26 腾讯科技(深圳)有限公司 Account management method, device, server based on block chain and storage medium
CN108734018A (en) * 2018-05-21 2018-11-02 北京京东尚科信息技术有限公司 authentication method, device, system and computer readable storage medium
CN108769010A (en) * 2018-05-29 2018-11-06 中国联合网络通信集团有限公司 The method and apparatus that node is invited to registration
CN108777673A (en) * 2018-04-12 2018-11-09 三维通信股份有限公司 One kind carrying out Bidirectional identity authentication method in block chain
CN108881296A (en) * 2018-07-24 2018-11-23 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN109088866A (en) * 2018-08-02 2018-12-25 北京百悟科技有限公司 Cloudy platform unified identity authentication method and device based on alliance's chain
CN109167771A (en) * 2018-08-21 2019-01-08 北京京东金融科技控股有限公司 Method for authenticating, device, equipment and readable storage medium storing program for executing based on alliance's chain
CN109325342A (en) * 2018-09-10 2019-02-12 平安科技(深圳)有限公司 Identity information management method, apparatus, computer equipment and storage medium
CN109327528A (en) * 2018-10-31 2019-02-12 阿里巴巴集团控股有限公司 A kind of node administration method and device based on block chain
CN109361738A (en) * 2018-09-25 2019-02-19 安徽灵图壹智能科技有限公司 A kind of identity authorization system and method based on block chain network
CN109389498A (en) * 2018-09-18 2019-02-26 上海诚频信息科技合伙企业(有限合伙) Block chain user identity management method, system, equipment and storage medium
CN109495246A (en) * 2018-11-20 2019-03-19 王建新 A kind of alliance's chain node verification method
CN109543441A (en) * 2018-10-08 2019-03-29 北京百度网讯科技有限公司 Database authorization method, device, computer equipment and storage medium
CN109639632A (en) * 2018-11-02 2019-04-16 远光软件股份有限公司 User information management method, electronic equipment and storage medium based on block chain
CN109981588A (en) * 2019-02-27 2019-07-05 四川享宇金信金融科技有限公司 A kind of data trade method for processing business and system based on block chain
CN110119309A (en) * 2019-04-04 2019-08-13 中国平安人寿保险股份有限公司 Data processing method, device and storage medium
CN110166413A (en) * 2018-02-14 2019-08-23 上海硅孚信息科技有限公司 The method and system of personal status relationship authentication management and service are carried out based on block chain
CN110264208A (en) * 2018-03-12 2019-09-20 科纳银行有限公司 For generating the method and system of Client-initiated identity federation
CN110290157A (en) * 2019-08-21 2019-09-27 广东电网有限责任公司 A kind of credible access device of measuring terminal and method towards adapted electric field scape
WO2019184924A1 (en) * 2018-03-27 2019-10-03 华为技术有限公司 Identity management method, equipment, communication network, and storage medium
CN110428307A (en) * 2018-08-30 2019-11-08 腾讯科技(深圳)有限公司 Method of commerce, system, equipment and the storage medium of virtual pet commodity
CN110445627A (en) * 2019-08-12 2019-11-12 腾讯科技(深圳)有限公司 Group updating method, apparatus, computer equipment and computer storage medium
CN110929288A (en) * 2018-12-07 2020-03-27 深圳市智税链科技有限公司 Method for generating public key certificate, certificate authority and medium
CN111400727A (en) * 2019-01-03 2020-07-10 菜鸟智能物流控股有限公司 Access control method and device of block chain and electronic equipment
CN111726324A (en) * 2019-03-20 2020-09-29 上海御行信息技术有限公司 Block chain technology-based alliance multi-node network identity authentication system
EP3701466A4 (en) * 2018-05-10 2020-10-28 Alibaba Group Holding Limited Blockchain member management data processing methods, apparatuses, servers, and systems
CN112349368A (en) * 2020-09-29 2021-02-09 福建西岸康健管理有限公司 Electronic health record authorization sharing and management system based on medical block chain
CN112395356A (en) * 2020-11-13 2021-02-23 浙江数秦科技有限公司 Distributed identity authentication and verification method, equipment and storage medium
WO2021073502A1 (en) * 2019-10-14 2021-04-22 Shanghai Weilian Information Technology Co., Ltd. Method and device for implementing identity endorsement on blockchain
CN113055392A (en) * 2021-03-26 2021-06-29 浙江工商大学 Block chain-based unified identity authentication method
CN113194082A (en) * 2021-04-26 2021-07-30 中国联合网络通信集团有限公司 Block chain-based identity verification method, block chain platform and operator platform
WO2022001786A1 (en) * 2020-06-30 2022-01-06 京东科技信息技术有限公司 Blockchain-based data processing method, system, processing device and authentication device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
US20160358186A1 (en) * 2015-06-04 2016-12-08 Chronicled, Inc. Open registry for identity of things
CN106354994A (en) * 2016-08-22 2017-01-25 布比(北京)网络技术有限公司 Method and system for processing medical data
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
CN106682530A (en) * 2017-01-10 2017-05-17 杭州电子科技大学 Method and device for medical information sharing privacy protection based on blockchain technology
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160358186A1 (en) * 2015-06-04 2016-12-08 Chronicled, Inc. Open registry for identity of things
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN106354994A (en) * 2016-08-22 2017-01-25 布比(北京)网络技术有限公司 Method and system for processing medical data
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
CN106682530A (en) * 2017-01-10 2017-05-17 杭州电子科技大学 Method and device for medical information sharing privacy protection based on blockchain technology
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110166413A (en) * 2018-02-14 2019-08-23 上海硅孚信息科技有限公司 The method and system of personal status relationship authentication management and service are carried out based on block chain
CN108289129A (en) * 2018-02-26 2018-07-17 深圳智乾区块链科技有限公司 Block chain ecological environment creation method, system and computer readable storage medium
CN110264208A (en) * 2018-03-12 2019-09-20 科纳银行有限公司 For generating the method and system of Client-initiated identity federation
US11784788B2 (en) 2018-03-27 2023-10-10 Huawei Technologies Co., Ltd. Identity management method, device, communications network, and storage medium
WO2019184924A1 (en) * 2018-03-27 2019-10-03 华为技术有限公司 Identity management method, equipment, communication network, and storage medium
CN110311883A (en) * 2018-03-27 2019-10-08 华为技术有限公司 Identity management method, equipment, communication network and storage medium
CN110311883B (en) * 2018-03-27 2020-11-10 华为技术有限公司 Identity management method, device, communication network and storage medium
CN108777673B (en) * 2018-04-12 2020-09-15 三维通信股份有限公司 Bidirectional identity authentication method in block chain
CN108777673A (en) * 2018-04-12 2018-11-09 三维通信股份有限公司 One kind carrying out Bidirectional identity authentication method in block chain
CN108712395B (en) * 2018-04-27 2022-01-07 腾讯科技(深圳)有限公司 Account management method, device, server and storage medium based on block chain
CN108712395A (en) * 2018-04-27 2018-10-26 腾讯科技(深圳)有限公司 Account management method, device, server based on block chain and storage medium
EP3701466A4 (en) * 2018-05-10 2020-10-28 Alibaba Group Holding Limited Blockchain member management data processing methods, apparatuses, servers, and systems
US10891612B2 (en) 2018-05-10 2021-01-12 Advanced New Technologies Co., Ltd. Blockchain member management data processing methods, apparatuses, servers, and systems
CN108734018B (en) * 2018-05-21 2021-03-30 北京京东尚科信息技术有限公司 Authentication method, device, system and computer readable storage medium
CN108734018A (en) * 2018-05-21 2018-11-02 北京京东尚科信息技术有限公司 authentication method, device, system and computer readable storage medium
CN108769010B (en) * 2018-05-29 2021-08-17 中国联合网络通信集团有限公司 Method and device for node invited registration
CN108769010A (en) * 2018-05-29 2018-11-06 中国联合网络通信集团有限公司 The method and apparatus that node is invited to registration
CN108881296B (en) * 2018-07-24 2021-11-30 中国联合网络通信集团有限公司 Block chain real-name authentication method, device, equipment and storage medium
CN108881296A (en) * 2018-07-24 2018-11-23 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN109088866A (en) * 2018-08-02 2018-12-25 北京百悟科技有限公司 Cloudy platform unified identity authentication method and device based on alliance's chain
CN109088866B (en) * 2018-08-02 2021-02-19 北京百悟科技有限公司 Multi-cloud platform unified identity authentication method and device based on alliance chain
CN109167771A (en) * 2018-08-21 2019-01-08 北京京东金融科技控股有限公司 Method for authenticating, device, equipment and readable storage medium storing program for executing based on alliance's chain
CN109167771B (en) * 2018-08-21 2020-06-05 京东数字科技控股有限公司 Authentication method, device and equipment based on alliance chain and readable storage medium
CN110428307A (en) * 2018-08-30 2019-11-08 腾讯科技(深圳)有限公司 Method of commerce, system, equipment and the storage medium of virtual pet commodity
CN110458660A (en) * 2018-08-30 2019-11-15 腾讯科技(深圳)有限公司 Method of commerce, device, system and the storage medium of virtual pet commodity
CN109325342A (en) * 2018-09-10 2019-02-12 平安科技(深圳)有限公司 Identity information management method, apparatus, computer equipment and storage medium
CN109325342B (en) * 2018-09-10 2024-03-05 平安科技(深圳)有限公司 Identity information management method, device, computer equipment and storage medium
CN109389498A (en) * 2018-09-18 2019-02-26 上海诚频信息科技合伙企业(有限合伙) Block chain user identity management method, system, equipment and storage medium
CN109361738A (en) * 2018-09-25 2019-02-19 安徽灵图壹智能科技有限公司 A kind of identity authorization system and method based on block chain network
CN109543441A (en) * 2018-10-08 2019-03-29 北京百度网讯科技有限公司 Database authorization method, device, computer equipment and storage medium
CN109327528A (en) * 2018-10-31 2019-02-12 阿里巴巴集团控股有限公司 A kind of node administration method and device based on block chain
US11461773B2 (en) 2018-10-31 2022-10-04 Advanced New Technologies Co., Ltd. Blockchain-based node management methods and apparatuses
TWI724391B (en) * 2018-10-31 2021-04-11 開曼群島商創新先進技術有限公司 Node management method and device based on blockchain
CN109639632A (en) * 2018-11-02 2019-04-16 远光软件股份有限公司 User information management method, electronic equipment and storage medium based on block chain
CN109495246A (en) * 2018-11-20 2019-03-19 王建新 A kind of alliance's chain node verification method
CN109495246B (en) * 2018-11-20 2021-04-20 王建新 Method for verifying federated link node
CN110929288A (en) * 2018-12-07 2020-03-27 深圳市智税链科技有限公司 Method for generating public key certificate, certificate authority and medium
CN110929288B (en) * 2018-12-07 2021-06-01 深圳市智税链科技有限公司 Method for generating public key certificate, certificate authority and medium
CN111400727A (en) * 2019-01-03 2020-07-10 菜鸟智能物流控股有限公司 Access control method and device of block chain and electronic equipment
CN111400727B (en) * 2019-01-03 2023-08-22 菜鸟智能物流控股有限公司 Block chain access control method and device and electronic equipment
CN109981588A (en) * 2019-02-27 2019-07-05 四川享宇金信金融科技有限公司 A kind of data trade method for processing business and system based on block chain
CN109981588B (en) * 2019-02-27 2021-08-10 四川享宇金信金融科技有限公司 Data transaction service processing method and system based on block chain
CN111726324A (en) * 2019-03-20 2020-09-29 上海御行信息技术有限公司 Block chain technology-based alliance multi-node network identity authentication system
CN110119309A (en) * 2019-04-04 2019-08-13 中国平安人寿保险股份有限公司 Data processing method, device and storage medium
CN110445627A (en) * 2019-08-12 2019-11-12 腾讯科技(深圳)有限公司 Group updating method, apparatus, computer equipment and computer storage medium
CN110445627B (en) * 2019-08-12 2021-10-26 腾讯科技(深圳)有限公司 Group updating method and device, computer equipment and computer storage medium
CN110290157A (en) * 2019-08-21 2019-09-27 广东电网有限责任公司 A kind of credible access device of measuring terminal and method towards adapted electric field scape
WO2021073502A1 (en) * 2019-10-14 2021-04-22 Shanghai Weilian Information Technology Co., Ltd. Method and device for implementing identity endorsement on blockchain
WO2022001786A1 (en) * 2020-06-30 2022-01-06 京东科技信息技术有限公司 Blockchain-based data processing method, system, processing device and authentication device
CN112349368A (en) * 2020-09-29 2021-02-09 福建西岸康健管理有限公司 Electronic health record authorization sharing and management system based on medical block chain
CN112395356A (en) * 2020-11-13 2021-02-23 浙江数秦科技有限公司 Distributed identity authentication and verification method, equipment and storage medium
CN113055392A (en) * 2021-03-26 2021-06-29 浙江工商大学 Block chain-based unified identity authentication method
CN113194082A (en) * 2021-04-26 2021-07-30 中国联合网络通信集团有限公司 Block chain-based identity verification method, block chain platform and operator platform

Similar Documents

Publication Publication Date Title
CN107547514A (en) Identity identifying method, system and computer-readable recording medium
US10498542B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN107545414B (en) Anonymous transaction method, device and computer readable storage medium
KR100851976B1 (en) Method and apparatus of transmitting private information using trusted apparatus
CN104780141B (en) Message Authentication acquisition methods and equipment in a kind of car networking system
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN106161359A (en) The method and device of certification user, the method and device of registration wearable device
CN106878318A (en) A kind of block chain real time polling cloud system
CN110417750A (en) File based on block chain technology is read and method, terminal device and the storage medium of storage
CN106059757A (en) Audio and video monitoring device, data encryption and decryption method, and audio and video display device
CN103914913B (en) A kind of application of IC cards scene recognition method and system
EP1984890A2 (en) A point-of-sale terminal transaction using mutating identifiers
CN110299996A (en) Authentication method, equipment and system
CN108353076A (en) For the Internet Key Exchange (IKE) of the security association between device
CN108876593A (en) A kind of online transaction method and apparatus
CN105791277B (en) A kind of identity authentication method
CN106650495A (en) File verification method and device
CN102238193A (en) Data authentication method and system using same
CN106060073B (en) Channel key machinery of consultation
CN104393993A (en) A security chip for electricity selling terminal and the realizing method
CN109815659A (en) Safety certifying method, device, electronic equipment and storage medium based on WEB project
CN108270568A (en) A kind of mobile digital certificate device and its update method
CN104168117A (en) Voice digital signature method
CN103139179A (en) Multi-channel active type network identity verification system and network identity verification device
CN103813333B (en) A kind of data processing method based on arranging key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180105

RJ01 Rejection of invention patent application after publication