CN108900507A - Block chain real name identification method and system - Google Patents

Block chain real name identification method and system Download PDF

Info

Publication number
CN108900507A
CN108900507A CN201810692343.7A CN201810692343A CN108900507A CN 108900507 A CN108900507 A CN 108900507A CN 201810692343 A CN201810692343 A CN 201810692343A CN 108900507 A CN108900507 A CN 108900507A
Authority
CN
China
Prior art keywords
user
block chain
node
block
registration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810692343.7A
Other languages
Chinese (zh)
Other versions
CN108900507B (en
Inventor
路成业
王凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201810692343.7A priority Critical patent/CN108900507B/en
Publication of CN108900507A publication Critical patent/CN108900507A/en
Application granted granted Critical
Publication of CN108900507B publication Critical patent/CN108900507B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1804Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for stock exchange and similar applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of block chain real name identification method and systems, wherein method includes:The difficulty value for carrying out real name registration to the user in block chain network is arranged in original node in original block;It participates in node and registration cryptographic Hash that is corresponding and being less than difficulty value is obtained based on real name registration information progress Hash calculation of the difficulty value to application user, it digs mine node verification user certificate image and whether living body user matches, if matching, then verify whether user certificate information matches with user basic information, if matching, then calculate the time difference between local time stamp and receiving time, if the time difference meets preset time range, then determine that application user's real-name authentication passes through, if being not received by active broadcast message, block is written in block chain account book.Hereby it is achieved that convenient for the legitimacy for managing and maintaining block chain to node, and being authenticated based on decentralization thought, verification process is more stable to the real-name authentication of block chain interior joint.

Description

Block chain real name identification method and system
Technical field
The present invention relates to field of communication technology more particularly to a kind of block chain real name identification method and systems.
Background technique
In general, block chain technology is due to the safety by realizing transaction based on the information exchange between node and node Guarantee, reduces and trust cost and be used widely.
Currently, the participation method in block chain network be all it is anonymous, can only prove all block chain behaviors be it is a certain The corresponding user of a node implements, and cannot be forged by other users, that is to say, that the implementation environment of block chain network and existing Work of growing directly from seeds is separation, it is difficult to node in real life, corresponding user is managed, once for example, block chain network In nodes ' behavior there are illegal activities, such as money laundering etc. can not be traced, completely even by national CA (Certificate Authority, certificate authority) certificate that organ provides, it can only also prove network identity, and can not prove its real body Part, and if CA mechanism will prove that true identity needs to participate under line, it is extremely complex.Therefore, a kind of effective determining block is needed The method of the corresponding real-life real user identity of node in chain network.
Summary of the invention
The present invention provides a kind of block chain real name identification method and system, can not be to block chain to solve in the prior art Node effectively managed, and the technical issues of can not safeguard the legitimacy of block chain.
First embodiment of the invention provides a kind of block chain real name identification method, including:Original node is in original block Difficulty value for carrying out real name registration to the user in block chain network is set;It participates in node and obtains application user for carrying out The certification video that real name registration is recorded, wherein the certification video includes:Living body user includes user certificate image and user The user certificate of certificate information;Original block in the block chain account book for participating in querying node local synchronization obtains the difficulty Angle value, and registration random number is generated for the application user, and Hash is carried out to the real name registration information of the application user It calculates and obtains registration cryptographic Hash that is corresponding and being less than the difficulty value, wherein the real name registration information includes:The certification Video, the registration random number, the public key of the application user and user basic information and local time stamp, and then apply The private key of the application user generates certification broadcast after signing to the real name registration information and the registration cryptographic Hash and disappears Breath is sent to block chain network;The receiving time that mine nodes records receive the certification broadcast message is dug, is used using the application The public key at family to received certification broadcast the message carry out signature verification, if being verified, calculate the local time stamp with it is described Time difference between receiving time, if after know that the time difference meets preset time range, verify the user Whether certificate image and the living body user match, if knowing correct matching, verify the user certificate information and the use Whether family essential information matches, if knowing correct matching, detects whether the user certificate information was registered, if detection does not have It was registered, then verifies whether the registration random number matches with the registration cryptographic Hash, if knowing correct matching, it is determined that It is described application user real-name authentication pass through, and will certification success message be written in block and to the block chain network it is wide It broadcasts;The mine node that digs judges that whether receiving other within a preset time digs the invalid wide of the instruction block that mine nodes are sent Message is broadcast, is not received by the active broadcast message if knowing, the block is broadcasted to the block chain network and comes into force, and The block is written in block chain account book.
Second embodiment of the invention provides a kind of block chain real-name authentication system, including:Original node participates in node and digging Mine node, wherein the original node, for being arranged in original block for carrying out real name to the user in block chain network The difficulty value of registration;The participation node is used to carry out the certification video that real name registration is recorded for obtaining application user, In, the certification video includes:Living body user, the user certificate comprising user certificate image and user certificate information;The ginseng With node, the original block being also used to inquire in the block chain account book of local synchronization obtains the difficulty value, and is the Shen Please user generate registration random number, and to it is described application user real name registration information carry out Hash calculation obtain it is corresponding and small In the registration cryptographic Hash of the difficulty value, wherein the real name registration information includes:The certification video, the registration are random The public key and user basic information and local time stamp of several, the described application user, and then the private key of the application application user Certification broadcast message is generated after signing to the real name registration information and the registration cryptographic Hash is sent to block chain network; The digging mine node, for recording the receiving time for receiving the certification broadcast message, using the public key pair of the application user Received certification broadcast message carries out signature verification, if being verified, calculate the local time stamp and the receiving time it Between time difference, if after know that the time difference meets preset time range, verify the user certificate image and Whether the living body user matches, if knowing correct matching, verifies the user certificate information and the user basic information Whether match, if knowing correct matching, detect whether the user certificate information was registered, if detection is not registered It crosses, then verifies whether the registration random number matches with the registration cryptographic Hash, if knowing correct matching, it is determined that the application The real-name authentication of user passes through, and certification success message is written in block and is broadcasted to the block chain network;The digging Mine node is also used to judge whether to receive other active broadcasts for digging the instruction block that mine node is sent within a preset time Message is not received by the active broadcast message if knowing, broadcasts the block to the block chain network and comes into force, and will In the block write-in block chain account book.
Third embodiment of the invention provides a kind of computer equipment, including:Memory, processor and storage are on a memory And the computer program that can be run on a processor, when the processor executes the computer program, realize such as above-mentioned implementation Block chain real name identification method described in example.
Fourth embodiment of the invention provides a kind of non-transitorycomputer readable storage medium, is stored thereon with computer journey Sequence realizes the block chain real name identification method as described in above-described embodiment when the computer program is executed by processor.
Technical solution provided in an embodiment of the present invention can include the following benefits:
The real-name authentication to block chain interior joint is realized, convenient for the legitimacy for managing and maintaining block chain to node, And authenticated based on decentralization thought, verification process is more stable.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, wherein
Fig. 1 is the structural schematic diagram of block chain real-name authentication system according to an embodiment of the invention;
Fig. 2 is the interaction schematic diagram of block chain real-name authentication system according to an embodiment of the invention;
Fig. 3 is the interaction schematic diagram of block chain real-name authentication system in accordance with another embodiment of the present invention;
Fig. 4 is the flow chart of block chain real name identification method according to an embodiment of the invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
Description based on background technique, it can be appreciated that in the prior art, since the participation node in block chain network participates in Mode be it is anonymous, only can confirm that the network identity for participating in node based on block chain network, and can not determine participating in The real identity of the corresponding operation user of node in real life, so as to cause that can not have to the operation of block chain network The supervision of effect.
It is quickly grown instantly in block chain technology, block chain technology is increasingly used to the wealth in the carrying entity world It produces, and anonymity can derive numerous frauds, this restrict the popularizations of block chain technology.
In order to solve the above-mentioned technical problem, the invention proposes a kind of block chain real name identification methods, in the method, will The identity information of the user in participation node and real world in block chain is closely connected together, thus, be conducive to be based on Management of the real information of user to node is participated in, and the legitimacy of block chain network environment is guaranteed.
Wherein, clear for description, the block chain real-name authentication system of the embodiment of the present invention is described first, is schemed 1 is the structural schematic diagram of block chain real-name authentication system according to an embodiment of the invention, as shown in Figure 1, the system includes Original node 100 participates in node 200 and digs mine node 300, wherein participating in node 100 is that block chain network is added in application for the first time Node, participate in exercising book keeping operation function etc. as mine node is dug, originating node 100 after node 100 is successfully joined block chain network Refer to the digging mine node being more early added in block chain network, the time for originating the addition block chain network of node 100 is more early, more can Guarantee the certification coverage for the digging mine node being added in block chain network later, for example, original node 100 adds if it is first Enter the node of block chain network, then it can be to second in block chain network and digging later by the original node 100 Mine node authenticates etc..
Referring to Fig. 2, in practical implementation, originates node and be arranged in original block for in block chain network User carries out the difficulty value (step 1) of real name registration, and participation node obtains application user and is used to carry out recognizing for real name registration recording Demonstrate,prove video (step 2), wherein authenticating video includes:Living body user, the user comprising user certificate image and user certificate information Certificate, wherein application user can be personal or enterprise, wherein authenticating video includes:Living body user includes user The user certificate of certificate image and user certificate information.
It participates in the original block in the block chain account book of querying node local synchronization and obtains difficulty value, and be application user Registration random number is generated, and obtains corresponding to the real name registration information of application user progress Hash calculation and is less than difficulty value Register cryptographic Hash (step 3), wherein real name registration information includes:Authenticate video, registration random number, apply user public key and User basic information and local time stamp, and then the private key of application application user is to real name registration information and registration cryptographic Hash Certification broadcast message is generated after being signed is sent to block chain network (step 4).
The receiving time that mine nodes records receive certification broadcast message is dug, using the public key of application user to received certification Broadcast message carries out signature verification (step 51), if being verified, calculates the time difference between local time stamp and receiving time, Know that the time difference meets preset time range (step 52) after if, whether verifies user certificate image and living body user Matching (step 53) verifies user certificate information with user basic information and whether matches (step 54) if knowing correct matching, If knowing correct matching, detect whether user certificate information was registered (step 55), if detection was not registered, tests Whether card registration random number matches (step 56) with registration cryptographic Hash, if knowing correct matching, it is determined that apply for the real name of user Certification passes through, and certification success message is written in block and broadcasts (step 57) to block chain network.
In the present embodiment, in order to further verify the validity for participating in node, it is avoided to destroy the fortune of block chain network Row environment, the active broadcast for digging the instruction the block whether judgement of mine node receives other digging mine nodes transmissions within a preset time disappear It ceases, that is, determines that the participation node is added in block chain network, if it is normal to exercise book keeping operation function, it is not received by vain if knowing Broadcast message, then it is normal to exercise book keeping operation function after showing that block chain network is added in the participation node, then it is broadcasted to block chain network Block comes into force, and (step 6) in block chain account book is written in block.
In practical implementation, possible other dig mine node and error in entering accounts occur to which erroneous judgement currently participates in node book keeping operation Mistake, and active broadcast message is had sent, thus, in order to further increase the verifying participated in when node participates in block chain network Accuracy, in one embodiment of the invention, as shown in figure 3, further including following step on the basis of above-mentioned shown in Fig. 2 Suddenly:Active broadcast message is received if knowing, judges to send whether the number of the digging mine node of active broadcast message is more than pre- If threshold value (step 7), than such as whether being more than the digging mine node of half, knowing how number is less than preset threshold, then to block chain Web broadcast block comes into force, and block is written in block chain account book, if knowing, number is more than or equal to preset threshold, to block Chain network broadcasts the invalid (step 8) of block.
The block chain real-name authentication system of the embodiment of the present invention as a result, when participating in node application addition block chain network, The real-name authentication based on decentralization thought is carried out to the corresponding living body user of node is participated in, real-name authentication at least has following several A significant advantage:
First:Node in block chain network is due to having carried out real-name authentication, and one therefore, and block chain network is by network and now It is real compact it is close link together, thus, block chain network can be used as deposit card, as right, as symbol of identity etc..
Second, convenience is brought for the management of node, for example, user reports the loss after Lost Security Key to passing through, it can basis The key that the real information feedback of user is lost, solving user's Lost Security Key can not report the loss the technical issues of giving for change.
Third, under system of real name system, the meeting such as nodes ' behavior in block chain network and specific investor etc. are contacted Together, so as to form a social contract, to release the strength of powerful responsibility and promise.
4th, according to relevant laws and regulations, in order to guarantee the property safety of user, real-name authentication is essential, thus, it is real The block chain network of name system has broken the opposition with law, is conducive to supervised and manages, is of great significance to popularization.
5th, under the system of system of real name, to many illegal nodes ' behaviors, for example, all being formed the problem of intelligent contract Effective transparent management environment maintains the legitimacy and authenticity of the operation of block chain network.
6th, when carrying out system of real name certification, the restriction range of a difficulty value based on introducing, to be looked for for application user Random number is registered to meet the registration cryptographic Hash of registration message to one, is authenticated based on cryptographic Hash, thus, on the one hand, draw Within a block, the great deal of nodes in block chain network stores corresponding difficulty value, even if there is a section for the difficulty value storage entered Point collapse, nor affects on the extraction of difficulty value, on the other hand, is authenticated based on registration cryptographic Hash is calculated, the calculating process Time loss avoid the camouflage of malicious node, if malicious node, which is wanted to pretend to be, participates in node to register, also have to pass through this The calculating of process, malicious node calculate with while, legal participation node has been completed registration, and related news have been write Block chain is entered.I.e. by increasing the time of intermediate malicious node attack, a possibility that so as to avoid malicious attack.
Details when being executed for the more detailed block chain real-name authentication system for illustrating the embodiment of the present invention, so that this The technical staff in field is clearer to block chain real-name authentication process of the invention, concentrates on block chain real-name authentication side below Method side carries out the description of the details of participation process.
Fig. 4 is the flow chart of block chain real name identification method according to an embodiment of the invention, as shown in figure 4, the party Method includes:
Step 101, node is originated to be arranged in original block for carrying out real name registration to the user in block chain network Difficulty value.
Wherein, difficulty value can be subsequent to participation node progress legitimate verification for limiting for specific time span etc. Difficulty standard, in embodiments of the present invention, it is desirable that based on the difficulty value complete to participate in node legitimacy certification, than Such as, it when the difficulty value corresponds to duration A, then requires to complete in duration A to authenticate the legitimacy for participating in node, once certification Duration is more than duration A, then is determined as authentification failure.
It is emphasized that in an embodiment of the present invention, the difficulty value that original node is arranged in original block can quilt In the block chain account book for broadcasting and being synchronized to other nodes in block chain network, thus, even if original node failure etc., Difficulty value can also be got from other nodes, ensure that the stability of verification process.
Step 102, it participates in node and obtains the certification video that application user records for carrying out real name registration, wherein certification Video includes:Living body user, the user certificate comprising user certificate image and user certificate information.
Wherein, above-mentioned user certificate includes comprising user certificate image and the identity card of user certificate information, passport, student Card, medical insurance card etc..
Specifically, in order to realize to the real-name authentication for participating in node application user, user, which needs to have prerecorded one section, to be recognized Video is demonstrate,proved, includes living body user (i.e. true application user, rather than the images such as humanoid vertical board) in the certification video, comprising using The user certificate of family certificate image and user certificate information participates in node and obtains the certification video that application user records in turn, In, it participates in node and obtains the mode of certification video be user's active upload, it is corresponding using node is participated in be also possible to user Equipment such as smart phone record after, participate in node and actively extract from relevant device.
Step 103, the original block participated in the block chain account book of querying node local synchronization obtains difficulty value, Yi Jiwei Apply for that user generates registration random number, and obtains corresponding to the real name registration information of application user progress Hash calculation and be less than The registration cryptographic Hash of difficulty value, wherein real name registration information includes:Authenticate video, registration random number, apply user public key and User basic information and local time stamp, and then the private key of application application user is to real name registration information and registration cryptographic Hash Certification broadcast message is generated after being signed is sent to block chain network.
As described above, the difficulty value that block is written can be synchronized to other nodes in block chain network, thus, Block chain account book can be synchronized by participating in node, thus, inquire local synchronization block chain account book can from being synchronized to original block, Difficulty value is obtained from original block.
Further, the restriction based on the difficulty value is authenticated, in an embodiment of the present invention, in the limit of the difficulty value It fixs, the generation of the cryptographic Hash based on random number is authenticated, and in an embodiment of the present invention, participating in node is application user Shen Random number (for example, generation etc. that random number can be carried out based on the program set) please be register, in turn, to the reality of application user Name registration information carries out Hash calculation and obtains registration cryptographic Hash that is corresponding and being less than difficulty value, wherein real name family registration letter Breath includes the relevant information of mark application user's uniqueness, including certification video, registration random number, the public key and use for applying for user Family essential information and local time stamp, wherein local time stamp illustrates the calculating time for being currently generated registration cryptographic Hash.
It should be understood that needing to generate under the restriction range of difficulty value less than difficulty value in above-mentioned implementation procedure Random number is registered, other malicious nodes participation node that disguises oneself as is avoided and is firmly registered the generation of cryptographic Hash, this is because, Other malicious nodes generate the time of registration cryptographic Hash after currently participating in node, thus, when malicious node expends a timing Between generate registration cryptographic Hash after, the registration cryptographic Hash be greater than the difficulty value, be based on the principle, in order to preferably avoid malicious node Attack, in some possible embodiments, difficulty value and register cryptographic Hash calculating process consumption time should more connect Closely.
Further, it is generated after signing using the private key of application user to real name registration information and registration cryptographic Hash Certification broadcast message is sent to block chain network, wherein applies the private key of user only by applying for that user holds.
Step 104, the receiving time that mine nodes records receive certification broadcast message is dug, is docked using the public key of application user The certification broadcast message of receipts carries out signature verification, if being verified, calculates the time difference between local time stamp and receiving time, Know that the time difference meets preset time range after if, verifies user certificate image and whether living body user matches, if Know correct matching, then verify whether user certificate information matches with user basic information, if knowing correct matching, detects use Whether family certificate information was registered, if detection be not registered, verify registration random number and registration cryptographic Hash whether Match, if knowing correct matching, it is determined that apply for that the real-name authentication of user passes through, and certification success message is written in block simultaneously It is broadcasted to block chain network.
As foregoing description, the private key of participating user and the public key of the participating user in real name registration message are a pair of each other Password, thus, in an embodiment of the present invention, the public key of digging mine node application application user is to received by participating user's The certification that the certification broadcast message of private key signature is signed, when the signature in the public key and certification broadcast message of application user Apply for the private key of user to then showing that transmission certification broadcast message is to participate in node itself when corresponding to, so that completion saves participation The verifying again of the legitimacy of point.
If it is appreciated that digging receiving time and the time difference of local time stamp that mine node receives certification broadcast message Away from larger, it is likely that be that other illegality equipments have intercepted and captured the certification broadcast message for participating in node transmission, disguise oneself as and participate in node To the certification broadcast message etc. dug mine node and have sent intercepting and capturing, so as to cause receiving time and the lead time of local time stamp compared with Greatly, thus, in an embodiment of the present invention, by calculating the time difference between local time stamp and receiving time, to ginseng It is authenticated with the legitimacy of node.
Specifically, dig mine and calculate time difference between local time stamp and the receiving time, if after know the time Difference meets preset time range, then shows that certification broadcast message participates in node itself really and sends, thus, to application User carries out real-name authentication.
In one embodiment of the invention, if knowing that the time difference is unsatisfactory for preset time model after digging mine node It encloses, then to block chain network broadcast authentication failed message.
Further, real-name authentication is carried out to application user, whether verifying user certificate image matches with living body user, i.e., Whether living body user is authenticated using my user certificate, if it does, then verifying user certificate information and user are basic Whether information matches, and is further ensured that living body user carries out real-name authentication using my relevant information to verify, for example, working as User certificate information includes that certificate number and user certificate title can when user basic information includes user identifier and user's name It is whether identical to verify certificate number and user identifier, and verifying user certificate title and user's name it is whether identical.
In the present embodiment, in order to avoid the repeated registration of user, the fairness of block chain network is influenced, in verifying user After certificate information is matched with user basic information, whether also detection user certificate information was registered, for example, detection related service It is consistent etc. with active user's certificate information that it whether is stored with user certificate information corresponding with chartered node in device, and compares Such as, it detects other to dig in mine nodes during the certification that stores successfully broadcast the message, if be stored with and the section of successful registration The corresponding user certificate information of point is consistent with active user's certificate information etc., is not registered if detecting, verify register with Whether machine number matches with registration cryptographic Hash, i.e., this registers whether cryptographic Hash applies for the participation node that block chain network is added as before It sends, if correct matching, shows that the participation node for sending current registration cryptographic Hash is not the illegal node of camouflage, from And determine that the real-name authentication of application user passes through, and certification success message is written in block and is broadcasted to block chain network.
In one embodiment of the invention, mine node is dug knowing how institute's user's certificate information was registered, the area Ze Xiang Block chain network broadcast authentication failed message.
Wherein, under different application scenarios, certification success message can be about fixed expression and authenticate successful character string, It is also possible to specifically indicate to authenticate successful text information etc., this is not restricted.
Step 105, it digs mine node and judges that whether receiving other within a preset time digs the instruction block that mine nodes are sent Active broadcast message is not received by active broadcast message if knowing, comes into force to block chain network broadcast block, and by block It is written in block chain account book.
It is understandable to be, after participation node is successfully accessed block chain network, even if completing real-name authentication, it is also possible to The user of the real-name authentication is illegal user etc., thus, in order to guarantee that the participation node is normally carried out accounting activities, rather than into The illegal activities such as row money laundering, need to verify the accounting activities whether the participation node executes normal legal.
Specifically, the digging mine node in block chain network is by Transaction Information recorded in account book etc. and the participation nodes records The Transaction Information similarly traded be compared, if it is inconsistent, the digging mine node determine participate in node error in entering accounts, sentence The corresponding block for authenticating success message of the participation node that breaks is invalid, digs whether the judgement of mine node receives it within a preset time He digs the broadcast message for indicating that block is invalid of mine node transmission, active broadcast message is not received by if knowing, to block Chain network broadcasts the block and comes into force, and block is written in block chain account book.
Certainly, in practical implementation, possible other dig mine node and error in entering accounts occur to which erroneous judgement currently participates in section Point error in entering accounts, and active broadcast message is had sent, thus, when participating in block chain network to further increase participation node The accuracy of verifying know if digging mine node in one embodiment of the invention and receive active broadcast message, judge Whether the number of diggings mine node for sending active broadcast message is more than preset threshold, the preset threshold and dig the total of mine node and The authority of digging mine node in block chain network is related, and the sum for digging mine node is more, digs the lower (ratio of authority of mine node Such as it is only common participation node), then corresponding preset threshold is lower.
If digging mine node knows that number is less than preset threshold, show that the most digging mine node is to accept the block , alternatively, without authoritative digging mine node think the block be it is invalid, thus, at this time to block chain network broadcast block It comes into force, and block is written in block chain account book, conversely, number is more than or equal to preset threshold if knowing, to block chain network It is invalid to broadcast the block.
In conclusion the block chain real name identification method of the embodiment of the present invention, realizes the real name to block chain interior joint Certification convenient for the legitimacy for managing and maintaining block chain to node, and is authenticated, verification process based on decentralization thought It is more stable.
In order to realize above-described embodiment, the invention also provides a kind of computer equipment, including memory, processor and deposit The computer program that can be run on a memory and on a processor is stored up, it is real when the processor executes the computer program The now block chain real name identification method as described in previous embodiment.
In order to realize above-described embodiment, the present invention also proposes a kind of non-transitorycomputer readable storage medium, deposits thereon Computer program is contained, it is real to can be realized block chain as in the foregoing embodiment when the computer program is executed by processor Name authentication method.
In the present invention, term " first ", " second " are used for description purposes only, and are not understood to indicate or imply opposite Importance or the quantity for implicitly indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be bright Show or implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two It is a, three etc., unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, fisrt feature in the second feature " on " or " down " can be with It is that the first and second features directly contact or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists Second feature " on ", " top " and " above " but fisrt feature be directly above or diagonally above the second feature, or be merely representative of First feature horizontal height is higher than second feature.Fisrt feature can be under the second feature " below ", " below " and " below " One feature is directly under or diagonally below the second feature, or is merely representative of first feature horizontal height less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned Embodiment is changed, modifies, replacement and variant.

Claims (10)

1. a kind of block chain real name identification method, which is characterized in that including:
The difficulty value for carrying out real name registration to the user in block chain network is arranged in original node in original block;
It participates in node and obtains application user being used to carry out the certification video that real name registration is recorded, wherein the certification video includes: Living body user, the user certificate comprising user certificate image and user certificate information;
Original block in the block chain account book for participating in querying node local synchronization obtains the difficulty value, and is described Apply user generate registration random number, and to it is described application user real name registration information carry out Hash calculation obtain it is corresponding and Less than the registration cryptographic Hash of the difficulty value, wherein the real name registration information includes:The certification video, it is described registration with Machine number, the public key of the application user and user basic information and local time stamp, and then the private of the application application user Key generates certification broadcast message and is sent to block link network after signing to the real name registration information and the registration cryptographic Hash Network;
The receiving time that mine nodes records receive the certification broadcast message is dug, using the public key of the application user to received Certification broadcast message carry out signature verification, if being verified, calculate between the local time stamp and the receiving time when Between it is poor, if after know that the time difference meets preset time range, verify the user certificate image and the work Whether body user matches, if knowing correct matching, verify the user certificate information and the user basic information whether Match, if knowing correct matching, detect whether the user certificate information was registered, if detection was not registered, tests Demonstrate,prove whether the registration random number matches with the registration cryptographic Hash, if knowing correct matching, it is determined that the application user's Real-name authentication passes through, and certification success message is written in block and is broadcasted to the block chain network;
The mine node that digs judges that whether receiving other within a preset time digs the invalid of the instruction block that mine nodes are sent Broadcast message, is not received by the active broadcast message if knowing, broadcasts the block to the block chain network and comes into force, And the block is written in block chain account book.
2. the method as described in claim 1, which is characterized in that further include:
If the digging mine node, which is known, receives the active broadcast message, the digging mine for sending the active broadcast message is judged Whether the number of node is more than preset threshold;
If the digging mine node knows that the number is less than the preset threshold, the block is broadcasted to the block chain network It comes into force, and the block is written in block chain account book, the number is more than or equal to the preset threshold if knowing, to described It is invalid that block chain network broadcasts the block.
3. the method as described in claim 1, which is characterized in that the user certificate information includes:Certificate number and user certificate Title;The user basic information includes:User identifier and user's name;
Whether the verifying user certificate information matches with the user basic information, including:
It verifies the certificate number and whether the user identifier is identical, and verify the user certificate title and the user name Whether identical claim.
4. the method as described in claim 1, which is characterized in that calculate the local time stamp and the receiving time described Between time difference after, further include:
Know that the time difference is unsatisfactory for preset time range after the digging mine node, then it is wide to the block chain network Broadcast authentification failure message.
5. the method as described in claim 1, which is characterized in that whether be registered in the detection user certificate information Later, the method also includes:
The digging mine node knows that the user certificate information was registered, then unsuccessfully disappears to the block chain network broadcast authentication Breath.
6. a kind of block chain real-name authentication system, which is characterized in that including:Original node participates in node and digs mine node, In,
The original node, for the difficulty for carrying out real name registration to the user in block chain network to be arranged in original block Angle value;
The participation node is used to carry out the certification video that real name registration is recorded for obtaining application user, wherein the certification Video includes:Living body user, the user certificate comprising user certificate image and user certificate information;
The participation node, the original block being also used to inquire in the block chain account book of local synchronization obtain the difficulty value, with And registration random number is generated for the application user, and Hash calculation acquisition is carried out to the real name registration information of the application user Registration cryptographic Hash that is corresponding and being less than the difficulty value, wherein the real name registration information includes:The certification video, institute Registration random number, the public key of the application user and user basic information and local time stamp are stated, and then applies the application The private key of user generates certification broadcast message and is sent to after signing to the real name registration information and the registration cryptographic Hash Block chain network;
The digging mine node, for recording the receiving time for receiving the certification broadcast message, using the public affairs of the application user Key broadcasts the message to received certification and carries out signature verification, if being verified, when calculating the local time stamp and the reception Between between time difference, if after know that the time difference meets preset time range, verify the user certificate figure Whether picture and the living body user match, if knowing correct matching, verify the user certificate information and the user is basic Whether information matches, if knowing correct matching, detects whether the user certificate information was registered, if detection is not infused Volume mistake, then verify whether the registration random number matches with the registration cryptographic Hash, if knowing correct matching, it is determined that the Shen Please the real-name authentication of user pass through, and certification success message is written in block and is broadcasted to the block chain network;
The digging mine node is also used to judge whether to receive other within a preset time and digs the instruction block that mine node is sent Active broadcast message, be not received by the active broadcast message if knowing, broadcast the area to the block chain network Block comes into force, and the block is written in block chain account book.
7. system as claimed in claim 6, which is characterized in that the digging mine node is also used to:
The active broadcast message is received if knowing, judges that the number for the digging mine node for sending the active broadcast message is No is more than preset threshold;
If knowing, the number is less than the preset threshold, broadcasts the block to the block chain network and comes into force, and by institute It states in block write-in block chain account book, if knowing, the number is more than or equal to the preset threshold, to the block chain network It is invalid to broadcast the block.
8. system as claimed in claim 6, which is characterized in that the digging mine node is also used to:
After time difference between the calculating local time stamp and the receiving time, the time is known more afterwards Difference is unsatisfactory for preset time range, then to the block chain network broadcast authentication failed message.
9. a kind of computer equipment, which is characterized in that on a memory and can be in processor including memory, processor and storage The computer program of upper operation when the processor executes the computer program, is realized as described in any in claim 1-5 Block chain real name identification method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program Such as block chain real name identification method as claimed in any one of claims 1 to 5 is realized when being executed by processor.
CN201810692343.7A 2018-06-29 2018-06-29 Block chain real-name authentication method and system Expired - Fee Related CN108900507B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810692343.7A CN108900507B (en) 2018-06-29 2018-06-29 Block chain real-name authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810692343.7A CN108900507B (en) 2018-06-29 2018-06-29 Block chain real-name authentication method and system

Publications (2)

Publication Number Publication Date
CN108900507A true CN108900507A (en) 2018-11-27
CN108900507B CN108900507B (en) 2020-12-22

Family

ID=64346853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810692343.7A Expired - Fee Related CN108900507B (en) 2018-06-29 2018-06-29 Block chain real-name authentication method and system

Country Status (1)

Country Link
CN (1) CN108900507B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881296A (en) * 2018-07-24 2018-11-23 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN109450659A (en) * 2018-12-25 2019-03-08 杭州复杂美科技有限公司 Block delayed broadcast method, equipment and storage medium
CN109617698A (en) * 2019-01-09 2019-04-12 腾讯科技(深圳)有限公司 Provide the method for digital certificate, digital certificate issues center and medium
CN109902074A (en) * 2019-04-17 2019-06-18 江苏全链通信息科技有限公司 Log storing method and system based on data center
CN110046165A (en) * 2019-04-17 2019-07-23 江苏全链通信息科技有限公司 Dissemination method, equipment and the computer readable storage medium of distributed application program
CN111107075A (en) * 2019-12-13 2020-05-05 中国工商银行股份有限公司 Request response method and device, electronic equipment and computer-readable storage medium
CN111132155A (en) * 2019-12-30 2020-05-08 江苏全链通信息科技有限公司 5G secure communication method, equipment and storage medium
CN111367872A (en) * 2018-12-25 2020-07-03 北京嘀嘀无限科技发展有限公司 User behavior analysis method and device, electronic equipment and storage medium
CN111786797A (en) * 2020-07-03 2020-10-16 四川阵风科技有限公司 Time effectiveness verification method for three-party communication
CN111836070A (en) * 2020-07-28 2020-10-27 中国联合网络通信集团有限公司 User statistical method and system
CN112035856A (en) * 2020-08-20 2020-12-04 北方工业大学 V2G charging and discharging information processing method based on block chain technology
WO2021226854A1 (en) * 2020-05-09 2021-11-18 杭州安存网络科技有限公司 Blockchain machine, blockchain data access authentication method, and computer-readable storage medium
CN114465866A (en) * 2022-01-21 2022-05-10 北京航空航天大学 Block chain generation method and device, storage medium and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
US20170046680A1 (en) * 2013-08-01 2017-02-16 Richard R. Crites Peer-to-Peer Internet Shopping Marketplaces
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
CN106600403A (en) * 2016-11-07 2017-04-26 北京金股链科技有限公司 Asset management method, device and system
CN106789911A (en) * 2016-11-15 2017-05-31 深圳银链科技有限公司 A kind of network identity validation method and system based on block chain
CN107707660A (en) * 2017-10-13 2018-02-16 广州市驱创信息科技有限公司 The cloud storage method and system of the selectable identity-based verification technique of algorithm
CN107967608A (en) * 2017-12-21 2018-04-27 北京智帮帮科技有限公司 A kind of intelligent contract system based on block chain technology

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170046680A1 (en) * 2013-08-01 2017-02-16 Richard R. Crites Peer-to-Peer Internet Shopping Marketplaces
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
CN106600403A (en) * 2016-11-07 2017-04-26 北京金股链科技有限公司 Asset management method, device and system
CN106789911A (en) * 2016-11-15 2017-05-31 深圳银链科技有限公司 A kind of network identity validation method and system based on block chain
CN107707660A (en) * 2017-10-13 2018-02-16 广州市驱创信息科技有限公司 The cloud storage method and system of the selectable identity-based verification technique of algorithm
CN107967608A (en) * 2017-12-21 2018-04-27 北京智帮帮科技有限公司 A kind of intelligent contract system based on block chain technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李吉广: "视频版权自动认证系统的思考与设计", 《电视技术》 *

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881296B (en) * 2018-07-24 2021-11-30 中国联合网络通信集团有限公司 Block chain real-name authentication method, device, equipment and storage medium
CN108881296A (en) * 2018-07-24 2018-11-23 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN109450659B (en) * 2018-12-25 2020-10-23 杭州复杂美科技有限公司 Block delay broadcasting method, equipment and storage medium
CN109450659A (en) * 2018-12-25 2019-03-08 杭州复杂美科技有限公司 Block delayed broadcast method, equipment and storage medium
CN111367872A (en) * 2018-12-25 2020-07-03 北京嘀嘀无限科技发展有限公司 User behavior analysis method and device, electronic equipment and storage medium
CN109617698A (en) * 2019-01-09 2019-04-12 腾讯科技(深圳)有限公司 Provide the method for digital certificate, digital certificate issues center and medium
CN109617698B (en) * 2019-01-09 2021-08-03 腾讯科技(深圳)有限公司 Method for issuing digital certificate, digital certificate issuing center and medium
US11924358B2 (en) 2019-01-09 2024-03-05 Tencent Technology (Shenzhen) Company Limited Method for issuing digital certificate, digital certificate issuing center, and medium
CN110046165A (en) * 2019-04-17 2019-07-23 江苏全链通信息科技有限公司 Dissemination method, equipment and the computer readable storage medium of distributed application program
CN109902074A (en) * 2019-04-17 2019-06-18 江苏全链通信息科技有限公司 Log storing method and system based on data center
CN111107075A (en) * 2019-12-13 2020-05-05 中国工商银行股份有限公司 Request response method and device, electronic equipment and computer-readable storage medium
CN111132155A (en) * 2019-12-30 2020-05-08 江苏全链通信息科技有限公司 5G secure communication method, equipment and storage medium
CN111132155B (en) * 2019-12-30 2023-11-17 江苏全链通信息科技有限公司 5G secure communication method, device and storage medium
WO2021226854A1 (en) * 2020-05-09 2021-11-18 杭州安存网络科技有限公司 Blockchain machine, blockchain data access authentication method, and computer-readable storage medium
CN111786797A (en) * 2020-07-03 2020-10-16 四川阵风科技有限公司 Time effectiveness verification method for three-party communication
CN111786797B (en) * 2020-07-03 2022-10-18 四川阵风科技有限公司 Time effectiveness verification method for three-party communication
CN111836070A (en) * 2020-07-28 2020-10-27 中国联合网络通信集团有限公司 User statistical method and system
CN111836070B (en) * 2020-07-28 2022-04-12 中国联合网络通信集团有限公司 User statistical method and system
CN112035856B (en) * 2020-08-20 2023-05-30 北方工业大学 V2G charge and discharge information processing method based on block chain technology
CN112035856A (en) * 2020-08-20 2020-12-04 北方工业大学 V2G charging and discharging information processing method based on block chain technology
CN114465866A (en) * 2022-01-21 2022-05-10 北京航空航天大学 Block chain generation method and device, storage medium and electronic equipment
CN114465866B (en) * 2022-01-21 2023-08-15 北京航空航天大学 DPoS method based on trust degree and PBFT

Also Published As

Publication number Publication date
CN108900507B (en) 2020-12-22

Similar Documents

Publication Publication Date Title
CN108900507A (en) Block chain real name identification method and system
CN108876374A (en) The network identity certificate authentication method and system of block chain
CN108881253A (en) Block chain real name participatory approaches and system
US11743038B2 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
CN108880832A (en) Block chain real name identification method and system
CN105187431B (en) Login method, server, client and the communication system of third-party application
CN108416589A (en) Connection method, system and the computer readable storage medium of block chain node
CN108737430A (en) The encryption communication method and system of block chain node
CN108235805A (en) Account unifying method and device and storage medium
CN104283885B (en) A kind of implementation method of many SP secure bindings based on intelligent terminal local authentication
CN108964924A (en) Digital certificate method of calibration, device, computer equipment and storage medium
CN104735065B (en) A kind of data processing method, electronic equipment and server
CN112487778A (en) Multi-user online signing system and method
CN108876375A (en) Block chain real name participatory approaches and system
CN105554018B (en) Genuine cyber identification verification method
CN112000744A (en) Signature method and related equipment
CN109102404A (en) The method for secret protection and system of block chain real name communication
Alhaidary et al. Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol
CN116112187B (en) Remote proving method, device, equipment and readable storage medium
KR102441120B1 (en) System and method for credit exchange using block-chain technology
CN109492377A (en) Device authentication method, apparatus and electronic equipment
CN101741561B (en) Method and system for authenticating two-way hardware
CN109495441A (en) Access authentication method, device, relevant device and computer readable storage medium
CN112002436A (en) Block chain-based medical question answering method, device and medium
CN114003959A (en) Decentralized identity information processing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing

Applicant after: IALLCHAIN Co.,Ltd.

Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing.

Applicant before: IALLCHAIN Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201222

Termination date: 20210629

CF01 Termination of patent right due to non-payment of annual fee