CN108900507A - Block chain real name identification method and system - Google Patents
Block chain real name identification method and system Download PDFInfo
- Publication number
- CN108900507A CN108900507A CN201810692343.7A CN201810692343A CN108900507A CN 108900507 A CN108900507 A CN 108900507A CN 201810692343 A CN201810692343 A CN 201810692343A CN 108900507 A CN108900507 A CN 108900507A
- Authority
- CN
- China
- Prior art keywords
- user
- block chain
- node
- block
- registration
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1804—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for stock exchange and similar applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides a kind of block chain real name identification method and systems, wherein method includes:The difficulty value for carrying out real name registration to the user in block chain network is arranged in original node in original block;It participates in node and registration cryptographic Hash that is corresponding and being less than difficulty value is obtained based on real name registration information progress Hash calculation of the difficulty value to application user, it digs mine node verification user certificate image and whether living body user matches, if matching, then verify whether user certificate information matches with user basic information, if matching, then calculate the time difference between local time stamp and receiving time, if the time difference meets preset time range, then determine that application user's real-name authentication passes through, if being not received by active broadcast message, block is written in block chain account book.Hereby it is achieved that convenient for the legitimacy for managing and maintaining block chain to node, and being authenticated based on decentralization thought, verification process is more stable to the real-name authentication of block chain interior joint.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of block chain real name identification method and systems.
Background technique
In general, block chain technology is due to the safety by realizing transaction based on the information exchange between node and node
Guarantee, reduces and trust cost and be used widely.
Currently, the participation method in block chain network be all it is anonymous, can only prove all block chain behaviors be it is a certain
The corresponding user of a node implements, and cannot be forged by other users, that is to say, that the implementation environment of block chain network and existing
Work of growing directly from seeds is separation, it is difficult to node in real life, corresponding user is managed, once for example, block chain network
In nodes ' behavior there are illegal activities, such as money laundering etc. can not be traced, completely even by national CA (Certificate
Authority, certificate authority) certificate that organ provides, it can only also prove network identity, and can not prove its real body
Part, and if CA mechanism will prove that true identity needs to participate under line, it is extremely complex.Therefore, a kind of effective determining block is needed
The method of the corresponding real-life real user identity of node in chain network.
Summary of the invention
The present invention provides a kind of block chain real name identification method and system, can not be to block chain to solve in the prior art
Node effectively managed, and the technical issues of can not safeguard the legitimacy of block chain.
First embodiment of the invention provides a kind of block chain real name identification method, including:Original node is in original block
Difficulty value for carrying out real name registration to the user in block chain network is set;It participates in node and obtains application user for carrying out
The certification video that real name registration is recorded, wherein the certification video includes:Living body user includes user certificate image and user
The user certificate of certificate information;Original block in the block chain account book for participating in querying node local synchronization obtains the difficulty
Angle value, and registration random number is generated for the application user, and Hash is carried out to the real name registration information of the application user
It calculates and obtains registration cryptographic Hash that is corresponding and being less than the difficulty value, wherein the real name registration information includes:The certification
Video, the registration random number, the public key of the application user and user basic information and local time stamp, and then apply
The private key of the application user generates certification broadcast after signing to the real name registration information and the registration cryptographic Hash and disappears
Breath is sent to block chain network;The receiving time that mine nodes records receive the certification broadcast message is dug, is used using the application
The public key at family to received certification broadcast the message carry out signature verification, if being verified, calculate the local time stamp with it is described
Time difference between receiving time, if after know that the time difference meets preset time range, verify the user
Whether certificate image and the living body user match, if knowing correct matching, verify the user certificate information and the use
Whether family essential information matches, if knowing correct matching, detects whether the user certificate information was registered, if detection does not have
It was registered, then verifies whether the registration random number matches with the registration cryptographic Hash, if knowing correct matching, it is determined that
It is described application user real-name authentication pass through, and will certification success message be written in block and to the block chain network it is wide
It broadcasts;The mine node that digs judges that whether receiving other within a preset time digs the invalid wide of the instruction block that mine nodes are sent
Message is broadcast, is not received by the active broadcast message if knowing, the block is broadcasted to the block chain network and comes into force, and
The block is written in block chain account book.
Second embodiment of the invention provides a kind of block chain real-name authentication system, including:Original node participates in node and digging
Mine node, wherein the original node, for being arranged in original block for carrying out real name to the user in block chain network
The difficulty value of registration;The participation node is used to carry out the certification video that real name registration is recorded for obtaining application user,
In, the certification video includes:Living body user, the user certificate comprising user certificate image and user certificate information;The ginseng
With node, the original block being also used to inquire in the block chain account book of local synchronization obtains the difficulty value, and is the Shen
Please user generate registration random number, and to it is described application user real name registration information carry out Hash calculation obtain it is corresponding and small
In the registration cryptographic Hash of the difficulty value, wherein the real name registration information includes:The certification video, the registration are random
The public key and user basic information and local time stamp of several, the described application user, and then the private key of the application application user
Certification broadcast message is generated after signing to the real name registration information and the registration cryptographic Hash is sent to block chain network;
The digging mine node, for recording the receiving time for receiving the certification broadcast message, using the public key pair of the application user
Received certification broadcast message carries out signature verification, if being verified, calculate the local time stamp and the receiving time it
Between time difference, if after know that the time difference meets preset time range, verify the user certificate image and
Whether the living body user matches, if knowing correct matching, verifies the user certificate information and the user basic information
Whether match, if knowing correct matching, detect whether the user certificate information was registered, if detection is not registered
It crosses, then verifies whether the registration random number matches with the registration cryptographic Hash, if knowing correct matching, it is determined that the application
The real-name authentication of user passes through, and certification success message is written in block and is broadcasted to the block chain network;The digging
Mine node is also used to judge whether to receive other active broadcasts for digging the instruction block that mine node is sent within a preset time
Message is not received by the active broadcast message if knowing, broadcasts the block to the block chain network and comes into force, and will
In the block write-in block chain account book.
Third embodiment of the invention provides a kind of computer equipment, including:Memory, processor and storage are on a memory
And the computer program that can be run on a processor, when the processor executes the computer program, realize such as above-mentioned implementation
Block chain real name identification method described in example.
Fourth embodiment of the invention provides a kind of non-transitorycomputer readable storage medium, is stored thereon with computer journey
Sequence realizes the block chain real name identification method as described in above-described embodiment when the computer program is executed by processor.
Technical solution provided in an embodiment of the present invention can include the following benefits:
The real-name authentication to block chain interior joint is realized, convenient for the legitimacy for managing and maintaining block chain to node,
And authenticated based on decentralization thought, verification process is more stable.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, wherein
Fig. 1 is the structural schematic diagram of block chain real-name authentication system according to an embodiment of the invention;
Fig. 2 is the interaction schematic diagram of block chain real-name authentication system according to an embodiment of the invention;
Fig. 3 is the interaction schematic diagram of block chain real-name authentication system in accordance with another embodiment of the present invention;
Fig. 4 is the flow chart of block chain real name identification method according to an embodiment of the invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
Description based on background technique, it can be appreciated that in the prior art, since the participation node in block chain network participates in
Mode be it is anonymous, only can confirm that the network identity for participating in node based on block chain network, and can not determine participating in
The real identity of the corresponding operation user of node in real life, so as to cause that can not have to the operation of block chain network
The supervision of effect.
It is quickly grown instantly in block chain technology, block chain technology is increasingly used to the wealth in the carrying entity world
It produces, and anonymity can derive numerous frauds, this restrict the popularizations of block chain technology.
In order to solve the above-mentioned technical problem, the invention proposes a kind of block chain real name identification methods, in the method, will
The identity information of the user in participation node and real world in block chain is closely connected together, thus, be conducive to be based on
Management of the real information of user to node is participated in, and the legitimacy of block chain network environment is guaranteed.
Wherein, clear for description, the block chain real-name authentication system of the embodiment of the present invention is described first, is schemed
1 is the structural schematic diagram of block chain real-name authentication system according to an embodiment of the invention, as shown in Figure 1, the system includes
Original node 100 participates in node 200 and digs mine node 300, wherein participating in node 100 is that block chain network is added in application for the first time
Node, participate in exercising book keeping operation function etc. as mine node is dug, originating node 100 after node 100 is successfully joined block chain network
Refer to the digging mine node being more early added in block chain network, the time for originating the addition block chain network of node 100 is more early, more can
Guarantee the certification coverage for the digging mine node being added in block chain network later, for example, original node 100 adds if it is first
Enter the node of block chain network, then it can be to second in block chain network and digging later by the original node 100
Mine node authenticates etc..
Referring to Fig. 2, in practical implementation, originates node and be arranged in original block for in block chain network
User carries out the difficulty value (step 1) of real name registration, and participation node obtains application user and is used to carry out recognizing for real name registration recording
Demonstrate,prove video (step 2), wherein authenticating video includes:Living body user, the user comprising user certificate image and user certificate information
Certificate, wherein application user can be personal or enterprise, wherein authenticating video includes:Living body user includes user
The user certificate of certificate image and user certificate information.
It participates in the original block in the block chain account book of querying node local synchronization and obtains difficulty value, and be application user
Registration random number is generated, and obtains corresponding to the real name registration information of application user progress Hash calculation and is less than difficulty value
Register cryptographic Hash (step 3), wherein real name registration information includes:Authenticate video, registration random number, apply user public key and
User basic information and local time stamp, and then the private key of application application user is to real name registration information and registration cryptographic Hash
Certification broadcast message is generated after being signed is sent to block chain network (step 4).
The receiving time that mine nodes records receive certification broadcast message is dug, using the public key of application user to received certification
Broadcast message carries out signature verification (step 51), if being verified, calculates the time difference between local time stamp and receiving time,
Know that the time difference meets preset time range (step 52) after if, whether verifies user certificate image and living body user
Matching (step 53) verifies user certificate information with user basic information and whether matches (step 54) if knowing correct matching,
If knowing correct matching, detect whether user certificate information was registered (step 55), if detection was not registered, tests
Whether card registration random number matches (step 56) with registration cryptographic Hash, if knowing correct matching, it is determined that apply for the real name of user
Certification passes through, and certification success message is written in block and broadcasts (step 57) to block chain network.
In the present embodiment, in order to further verify the validity for participating in node, it is avoided to destroy the fortune of block chain network
Row environment, the active broadcast for digging the instruction the block whether judgement of mine node receives other digging mine nodes transmissions within a preset time disappear
It ceases, that is, determines that the participation node is added in block chain network, if it is normal to exercise book keeping operation function, it is not received by vain if knowing
Broadcast message, then it is normal to exercise book keeping operation function after showing that block chain network is added in the participation node, then it is broadcasted to block chain network
Block comes into force, and (step 6) in block chain account book is written in block.
In practical implementation, possible other dig mine node and error in entering accounts occur to which erroneous judgement currently participates in node book keeping operation
Mistake, and active broadcast message is had sent, thus, in order to further increase the verifying participated in when node participates in block chain network
Accuracy, in one embodiment of the invention, as shown in figure 3, further including following step on the basis of above-mentioned shown in Fig. 2
Suddenly:Active broadcast message is received if knowing, judges to send whether the number of the digging mine node of active broadcast message is more than pre-
If threshold value (step 7), than such as whether being more than the digging mine node of half, knowing how number is less than preset threshold, then to block chain
Web broadcast block comes into force, and block is written in block chain account book, if knowing, number is more than or equal to preset threshold, to block
Chain network broadcasts the invalid (step 8) of block.
The block chain real-name authentication system of the embodiment of the present invention as a result, when participating in node application addition block chain network,
The real-name authentication based on decentralization thought is carried out to the corresponding living body user of node is participated in, real-name authentication at least has following several
A significant advantage:
First:Node in block chain network is due to having carried out real-name authentication, and one therefore, and block chain network is by network and now
It is real compact it is close link together, thus, block chain network can be used as deposit card, as right, as symbol of identity etc..
Second, convenience is brought for the management of node, for example, user reports the loss after Lost Security Key to passing through, it can basis
The key that the real information feedback of user is lost, solving user's Lost Security Key can not report the loss the technical issues of giving for change.
Third, under system of real name system, the meeting such as nodes ' behavior in block chain network and specific investor etc. are contacted
Together, so as to form a social contract, to release the strength of powerful responsibility and promise.
4th, according to relevant laws and regulations, in order to guarantee the property safety of user, real-name authentication is essential, thus, it is real
The block chain network of name system has broken the opposition with law, is conducive to supervised and manages, is of great significance to popularization.
5th, under the system of system of real name, to many illegal nodes ' behaviors, for example, all being formed the problem of intelligent contract
Effective transparent management environment maintains the legitimacy and authenticity of the operation of block chain network.
6th, when carrying out system of real name certification, the restriction range of a difficulty value based on introducing, to be looked for for application user
Random number is registered to meet the registration cryptographic Hash of registration message to one, is authenticated based on cryptographic Hash, thus, on the one hand, draw
Within a block, the great deal of nodes in block chain network stores corresponding difficulty value, even if there is a section for the difficulty value storage entered
Point collapse, nor affects on the extraction of difficulty value, on the other hand, is authenticated based on registration cryptographic Hash is calculated, the calculating process
Time loss avoid the camouflage of malicious node, if malicious node, which is wanted to pretend to be, participates in node to register, also have to pass through this
The calculating of process, malicious node calculate with while, legal participation node has been completed registration, and related news have been write
Block chain is entered.I.e. by increasing the time of intermediate malicious node attack, a possibility that so as to avoid malicious attack.
Details when being executed for the more detailed block chain real-name authentication system for illustrating the embodiment of the present invention, so that this
The technical staff in field is clearer to block chain real-name authentication process of the invention, concentrates on block chain real-name authentication side below
Method side carries out the description of the details of participation process.
Fig. 4 is the flow chart of block chain real name identification method according to an embodiment of the invention, as shown in figure 4, the party
Method includes:
Step 101, node is originated to be arranged in original block for carrying out real name registration to the user in block chain network
Difficulty value.
Wherein, difficulty value can be subsequent to participation node progress legitimate verification for limiting for specific time span etc.
Difficulty standard, in embodiments of the present invention, it is desirable that based on the difficulty value complete to participate in node legitimacy certification, than
Such as, it when the difficulty value corresponds to duration A, then requires to complete in duration A to authenticate the legitimacy for participating in node, once certification
Duration is more than duration A, then is determined as authentification failure.
It is emphasized that in an embodiment of the present invention, the difficulty value that original node is arranged in original block can quilt
In the block chain account book for broadcasting and being synchronized to other nodes in block chain network, thus, even if original node failure etc.,
Difficulty value can also be got from other nodes, ensure that the stability of verification process.
Step 102, it participates in node and obtains the certification video that application user records for carrying out real name registration, wherein certification
Video includes:Living body user, the user certificate comprising user certificate image and user certificate information.
Wherein, above-mentioned user certificate includes comprising user certificate image and the identity card of user certificate information, passport, student
Card, medical insurance card etc..
Specifically, in order to realize to the real-name authentication for participating in node application user, user, which needs to have prerecorded one section, to be recognized
Video is demonstrate,proved, includes living body user (i.e. true application user, rather than the images such as humanoid vertical board) in the certification video, comprising using
The user certificate of family certificate image and user certificate information participates in node and obtains the certification video that application user records in turn,
In, it participates in node and obtains the mode of certification video be user's active upload, it is corresponding using node is participated in be also possible to user
Equipment such as smart phone record after, participate in node and actively extract from relevant device.
Step 103, the original block participated in the block chain account book of querying node local synchronization obtains difficulty value, Yi Jiwei
Apply for that user generates registration random number, and obtains corresponding to the real name registration information of application user progress Hash calculation and be less than
The registration cryptographic Hash of difficulty value, wherein real name registration information includes:Authenticate video, registration random number, apply user public key and
User basic information and local time stamp, and then the private key of application application user is to real name registration information and registration cryptographic Hash
Certification broadcast message is generated after being signed is sent to block chain network.
As described above, the difficulty value that block is written can be synchronized to other nodes in block chain network, thus,
Block chain account book can be synchronized by participating in node, thus, inquire local synchronization block chain account book can from being synchronized to original block,
Difficulty value is obtained from original block.
Further, the restriction based on the difficulty value is authenticated, in an embodiment of the present invention, in the limit of the difficulty value
It fixs, the generation of the cryptographic Hash based on random number is authenticated, and in an embodiment of the present invention, participating in node is application user Shen
Random number (for example, generation etc. that random number can be carried out based on the program set) please be register, in turn, to the reality of application user
Name registration information carries out Hash calculation and obtains registration cryptographic Hash that is corresponding and being less than difficulty value, wherein real name family registration letter
Breath includes the relevant information of mark application user's uniqueness, including certification video, registration random number, the public key and use for applying for user
Family essential information and local time stamp, wherein local time stamp illustrates the calculating time for being currently generated registration cryptographic Hash.
It should be understood that needing to generate under the restriction range of difficulty value less than difficulty value in above-mentioned implementation procedure
Random number is registered, other malicious nodes participation node that disguises oneself as is avoided and is firmly registered the generation of cryptographic Hash, this is because,
Other malicious nodes generate the time of registration cryptographic Hash after currently participating in node, thus, when malicious node expends a timing
Between generate registration cryptographic Hash after, the registration cryptographic Hash be greater than the difficulty value, be based on the principle, in order to preferably avoid malicious node
Attack, in some possible embodiments, difficulty value and register cryptographic Hash calculating process consumption time should more connect
Closely.
Further, it is generated after signing using the private key of application user to real name registration information and registration cryptographic Hash
Certification broadcast message is sent to block chain network, wherein applies the private key of user only by applying for that user holds.
Step 104, the receiving time that mine nodes records receive certification broadcast message is dug, is docked using the public key of application user
The certification broadcast message of receipts carries out signature verification, if being verified, calculates the time difference between local time stamp and receiving time,
Know that the time difference meets preset time range after if, verifies user certificate image and whether living body user matches, if
Know correct matching, then verify whether user certificate information matches with user basic information, if knowing correct matching, detects use
Whether family certificate information was registered, if detection be not registered, verify registration random number and registration cryptographic Hash whether
Match, if knowing correct matching, it is determined that apply for that the real-name authentication of user passes through, and certification success message is written in block simultaneously
It is broadcasted to block chain network.
As foregoing description, the private key of participating user and the public key of the participating user in real name registration message are a pair of each other
Password, thus, in an embodiment of the present invention, the public key of digging mine node application application user is to received by participating user's
The certification that the certification broadcast message of private key signature is signed, when the signature in the public key and certification broadcast message of application user
Apply for the private key of user to then showing that transmission certification broadcast message is to participate in node itself when corresponding to, so that completion saves participation
The verifying again of the legitimacy of point.
If it is appreciated that digging receiving time and the time difference of local time stamp that mine node receives certification broadcast message
Away from larger, it is likely that be that other illegality equipments have intercepted and captured the certification broadcast message for participating in node transmission, disguise oneself as and participate in node
To the certification broadcast message etc. dug mine node and have sent intercepting and capturing, so as to cause receiving time and the lead time of local time stamp compared with
Greatly, thus, in an embodiment of the present invention, by calculating the time difference between local time stamp and receiving time, to ginseng
It is authenticated with the legitimacy of node.
Specifically, dig mine and calculate time difference between local time stamp and the receiving time, if after know the time
Difference meets preset time range, then shows that certification broadcast message participates in node itself really and sends, thus, to application
User carries out real-name authentication.
In one embodiment of the invention, if knowing that the time difference is unsatisfactory for preset time model after digging mine node
It encloses, then to block chain network broadcast authentication failed message.
Further, real-name authentication is carried out to application user, whether verifying user certificate image matches with living body user, i.e.,
Whether living body user is authenticated using my user certificate, if it does, then verifying user certificate information and user are basic
Whether information matches, and is further ensured that living body user carries out real-name authentication using my relevant information to verify, for example, working as
User certificate information includes that certificate number and user certificate title can when user basic information includes user identifier and user's name
It is whether identical to verify certificate number and user identifier, and verifying user certificate title and user's name it is whether identical.
In the present embodiment, in order to avoid the repeated registration of user, the fairness of block chain network is influenced, in verifying user
After certificate information is matched with user basic information, whether also detection user certificate information was registered, for example, detection related service
It is consistent etc. with active user's certificate information that it whether is stored with user certificate information corresponding with chartered node in device, and compares
Such as, it detects other to dig in mine nodes during the certification that stores successfully broadcast the message, if be stored with and the section of successful registration
The corresponding user certificate information of point is consistent with active user's certificate information etc., is not registered if detecting, verify register with
Whether machine number matches with registration cryptographic Hash, i.e., this registers whether cryptographic Hash applies for the participation node that block chain network is added as before
It sends, if correct matching, shows that the participation node for sending current registration cryptographic Hash is not the illegal node of camouflage, from
And determine that the real-name authentication of application user passes through, and certification success message is written in block and is broadcasted to block chain network.
In one embodiment of the invention, mine node is dug knowing how institute's user's certificate information was registered, the area Ze Xiang
Block chain network broadcast authentication failed message.
Wherein, under different application scenarios, certification success message can be about fixed expression and authenticate successful character string,
It is also possible to specifically indicate to authenticate successful text information etc., this is not restricted.
Step 105, it digs mine node and judges that whether receiving other within a preset time digs the instruction block that mine nodes are sent
Active broadcast message is not received by active broadcast message if knowing, comes into force to block chain network broadcast block, and by block
It is written in block chain account book.
It is understandable to be, after participation node is successfully accessed block chain network, even if completing real-name authentication, it is also possible to
The user of the real-name authentication is illegal user etc., thus, in order to guarantee that the participation node is normally carried out accounting activities, rather than into
The illegal activities such as row money laundering, need to verify the accounting activities whether the participation node executes normal legal.
Specifically, the digging mine node in block chain network is by Transaction Information recorded in account book etc. and the participation nodes records
The Transaction Information similarly traded be compared, if it is inconsistent, the digging mine node determine participate in node error in entering accounts, sentence
The corresponding block for authenticating success message of the participation node that breaks is invalid, digs whether the judgement of mine node receives it within a preset time
He digs the broadcast message for indicating that block is invalid of mine node transmission, active broadcast message is not received by if knowing, to block
Chain network broadcasts the block and comes into force, and block is written in block chain account book.
Certainly, in practical implementation, possible other dig mine node and error in entering accounts occur to which erroneous judgement currently participates in section
Point error in entering accounts, and active broadcast message is had sent, thus, when participating in block chain network to further increase participation node
The accuracy of verifying know if digging mine node in one embodiment of the invention and receive active broadcast message, judge
Whether the number of diggings mine node for sending active broadcast message is more than preset threshold, the preset threshold and dig the total of mine node and
The authority of digging mine node in block chain network is related, and the sum for digging mine node is more, digs the lower (ratio of authority of mine node
Such as it is only common participation node), then corresponding preset threshold is lower.
If digging mine node knows that number is less than preset threshold, show that the most digging mine node is to accept the block
, alternatively, without authoritative digging mine node think the block be it is invalid, thus, at this time to block chain network broadcast block
It comes into force, and block is written in block chain account book, conversely, number is more than or equal to preset threshold if knowing, to block chain network
It is invalid to broadcast the block.
In conclusion the block chain real name identification method of the embodiment of the present invention, realizes the real name to block chain interior joint
Certification convenient for the legitimacy for managing and maintaining block chain to node, and is authenticated, verification process based on decentralization thought
It is more stable.
In order to realize above-described embodiment, the invention also provides a kind of computer equipment, including memory, processor and deposit
The computer program that can be run on a memory and on a processor is stored up, it is real when the processor executes the computer program
The now block chain real name identification method as described in previous embodiment.
In order to realize above-described embodiment, the present invention also proposes a kind of non-transitorycomputer readable storage medium, deposits thereon
Computer program is contained, it is real to can be realized block chain as in the foregoing embodiment when the computer program is executed by processor
Name authentication method.
In the present invention, term " first ", " second " are used for description purposes only, and are not understood to indicate or imply opposite
Importance or the quantity for implicitly indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be bright
Show or implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two
It is a, three etc., unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, fisrt feature in the second feature " on " or " down " can be with
It is that the first and second features directly contact or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists
Second feature " on ", " top " and " above " but fisrt feature be directly above or diagonally above the second feature, or be merely representative of
First feature horizontal height is higher than second feature.Fisrt feature can be under the second feature " below ", " below " and " below "
One feature is directly under or diagonally below the second feature, or is merely representative of first feature horizontal height less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned
Embodiment is changed, modifies, replacement and variant.
Claims (10)
1. a kind of block chain real name identification method, which is characterized in that including:
The difficulty value for carrying out real name registration to the user in block chain network is arranged in original node in original block;
It participates in node and obtains application user being used to carry out the certification video that real name registration is recorded, wherein the certification video includes:
Living body user, the user certificate comprising user certificate image and user certificate information;
Original block in the block chain account book for participating in querying node local synchronization obtains the difficulty value, and is described
Apply user generate registration random number, and to it is described application user real name registration information carry out Hash calculation obtain it is corresponding and
Less than the registration cryptographic Hash of the difficulty value, wherein the real name registration information includes:The certification video, it is described registration with
Machine number, the public key of the application user and user basic information and local time stamp, and then the private of the application application user
Key generates certification broadcast message and is sent to block link network after signing to the real name registration information and the registration cryptographic Hash
Network;
The receiving time that mine nodes records receive the certification broadcast message is dug, using the public key of the application user to received
Certification broadcast message carry out signature verification, if being verified, calculate between the local time stamp and the receiving time when
Between it is poor, if after know that the time difference meets preset time range, verify the user certificate image and the work
Whether body user matches, if knowing correct matching, verify the user certificate information and the user basic information whether
Match, if knowing correct matching, detect whether the user certificate information was registered, if detection was not registered, tests
Demonstrate,prove whether the registration random number matches with the registration cryptographic Hash, if knowing correct matching, it is determined that the application user's
Real-name authentication passes through, and certification success message is written in block and is broadcasted to the block chain network;
The mine node that digs judges that whether receiving other within a preset time digs the invalid of the instruction block that mine nodes are sent
Broadcast message, is not received by the active broadcast message if knowing, broadcasts the block to the block chain network and comes into force,
And the block is written in block chain account book.
2. the method as described in claim 1, which is characterized in that further include:
If the digging mine node, which is known, receives the active broadcast message, the digging mine for sending the active broadcast message is judged
Whether the number of node is more than preset threshold;
If the digging mine node knows that the number is less than the preset threshold, the block is broadcasted to the block chain network
It comes into force, and the block is written in block chain account book, the number is more than or equal to the preset threshold if knowing, to described
It is invalid that block chain network broadcasts the block.
3. the method as described in claim 1, which is characterized in that the user certificate information includes:Certificate number and user certificate
Title;The user basic information includes:User identifier and user's name;
Whether the verifying user certificate information matches with the user basic information, including:
It verifies the certificate number and whether the user identifier is identical, and verify the user certificate title and the user name
Whether identical claim.
4. the method as described in claim 1, which is characterized in that calculate the local time stamp and the receiving time described
Between time difference after, further include:
Know that the time difference is unsatisfactory for preset time range after the digging mine node, then it is wide to the block chain network
Broadcast authentification failure message.
5. the method as described in claim 1, which is characterized in that whether be registered in the detection user certificate information
Later, the method also includes:
The digging mine node knows that the user certificate information was registered, then unsuccessfully disappears to the block chain network broadcast authentication
Breath.
6. a kind of block chain real-name authentication system, which is characterized in that including:Original node participates in node and digs mine node,
In,
The original node, for the difficulty for carrying out real name registration to the user in block chain network to be arranged in original block
Angle value;
The participation node is used to carry out the certification video that real name registration is recorded for obtaining application user, wherein the certification
Video includes:Living body user, the user certificate comprising user certificate image and user certificate information;
The participation node, the original block being also used to inquire in the block chain account book of local synchronization obtain the difficulty value, with
And registration random number is generated for the application user, and Hash calculation acquisition is carried out to the real name registration information of the application user
Registration cryptographic Hash that is corresponding and being less than the difficulty value, wherein the real name registration information includes:The certification video, institute
Registration random number, the public key of the application user and user basic information and local time stamp are stated, and then applies the application
The private key of user generates certification broadcast message and is sent to after signing to the real name registration information and the registration cryptographic Hash
Block chain network;
The digging mine node, for recording the receiving time for receiving the certification broadcast message, using the public affairs of the application user
Key broadcasts the message to received certification and carries out signature verification, if being verified, when calculating the local time stamp and the reception
Between between time difference, if after know that the time difference meets preset time range, verify the user certificate figure
Whether picture and the living body user match, if knowing correct matching, verify the user certificate information and the user is basic
Whether information matches, if knowing correct matching, detects whether the user certificate information was registered, if detection is not infused
Volume mistake, then verify whether the registration random number matches with the registration cryptographic Hash, if knowing correct matching, it is determined that the Shen
Please the real-name authentication of user pass through, and certification success message is written in block and is broadcasted to the block chain network;
The digging mine node is also used to judge whether to receive other within a preset time and digs the instruction block that mine node is sent
Active broadcast message, be not received by the active broadcast message if knowing, broadcast the area to the block chain network
Block comes into force, and the block is written in block chain account book.
7. system as claimed in claim 6, which is characterized in that the digging mine node is also used to:
The active broadcast message is received if knowing, judges that the number for the digging mine node for sending the active broadcast message is
No is more than preset threshold;
If knowing, the number is less than the preset threshold, broadcasts the block to the block chain network and comes into force, and by institute
It states in block write-in block chain account book, if knowing, the number is more than or equal to the preset threshold, to the block chain network
It is invalid to broadcast the block.
8. system as claimed in claim 6, which is characterized in that the digging mine node is also used to:
After time difference between the calculating local time stamp and the receiving time, the time is known more afterwards
Difference is unsatisfactory for preset time range, then to the block chain network broadcast authentication failed message.
9. a kind of computer equipment, which is characterized in that on a memory and can be in processor including memory, processor and storage
The computer program of upper operation when the processor executes the computer program, is realized as described in any in claim 1-5
Block chain real name identification method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
Such as block chain real name identification method as claimed in any one of claims 1 to 5 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810692343.7A CN108900507B (en) | 2018-06-29 | 2018-06-29 | Block chain real-name authentication method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810692343.7A CN108900507B (en) | 2018-06-29 | 2018-06-29 | Block chain real-name authentication method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108900507A true CN108900507A (en) | 2018-11-27 |
CN108900507B CN108900507B (en) | 2020-12-22 |
Family
ID=64346853
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810692343.7A Expired - Fee Related CN108900507B (en) | 2018-06-29 | 2018-06-29 | Block chain real-name authentication method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108900507B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108881296A (en) * | 2018-07-24 | 2018-11-23 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN109450659A (en) * | 2018-12-25 | 2019-03-08 | 杭州复杂美科技有限公司 | Block delayed broadcast method, equipment and storage medium |
CN109617698A (en) * | 2019-01-09 | 2019-04-12 | 腾讯科技(深圳)有限公司 | Provide the method for digital certificate, digital certificate issues center and medium |
CN109902074A (en) * | 2019-04-17 | 2019-06-18 | 江苏全链通信息科技有限公司 | Log storing method and system based on data center |
CN110046165A (en) * | 2019-04-17 | 2019-07-23 | 江苏全链通信息科技有限公司 | Dissemination method, equipment and the computer readable storage medium of distributed application program |
CN111107075A (en) * | 2019-12-13 | 2020-05-05 | 中国工商银行股份有限公司 | Request response method and device, electronic equipment and computer-readable storage medium |
CN111132155A (en) * | 2019-12-30 | 2020-05-08 | 江苏全链通信息科技有限公司 | 5G secure communication method, equipment and storage medium |
CN111367872A (en) * | 2018-12-25 | 2020-07-03 | 北京嘀嘀无限科技发展有限公司 | User behavior analysis method and device, electronic equipment and storage medium |
CN111786797A (en) * | 2020-07-03 | 2020-10-16 | 四川阵风科技有限公司 | Time effectiveness verification method for three-party communication |
CN111836070A (en) * | 2020-07-28 | 2020-10-27 | 中国联合网络通信集团有限公司 | User statistical method and system |
CN112035856A (en) * | 2020-08-20 | 2020-12-04 | 北方工业大学 | V2G charging and discharging information processing method based on block chain technology |
WO2021226854A1 (en) * | 2020-05-09 | 2021-11-18 | 杭州安存网络科技有限公司 | Blockchain machine, blockchain data access authentication method, and computer-readable storage medium |
CN114465866A (en) * | 2022-01-21 | 2022-05-10 | 北京航空航天大学 | Block chain generation method and device, storage medium and electronic equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
US20170046680A1 (en) * | 2013-08-01 | 2017-02-16 | Richard R. Crites | Peer-to-Peer Internet Shopping Marketplaces |
CN106529946A (en) * | 2016-11-01 | 2017-03-22 | 北京金股链科技有限公司 | Method for realizing user identity digitalization based on block chain |
CN106600403A (en) * | 2016-11-07 | 2017-04-26 | 北京金股链科技有限公司 | Asset management method, device and system |
CN106789911A (en) * | 2016-11-15 | 2017-05-31 | 深圳银链科技有限公司 | A kind of network identity validation method and system based on block chain |
CN107707660A (en) * | 2017-10-13 | 2018-02-16 | 广州市驱创信息科技有限公司 | The cloud storage method and system of the selectable identity-based verification technique of algorithm |
CN107967608A (en) * | 2017-12-21 | 2018-04-27 | 北京智帮帮科技有限公司 | A kind of intelligent contract system based on block chain technology |
-
2018
- 2018-06-29 CN CN201810692343.7A patent/CN108900507B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170046680A1 (en) * | 2013-08-01 | 2017-02-16 | Richard R. Crites | Peer-to-Peer Internet Shopping Marketplaces |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106529946A (en) * | 2016-11-01 | 2017-03-22 | 北京金股链科技有限公司 | Method for realizing user identity digitalization based on block chain |
CN106600403A (en) * | 2016-11-07 | 2017-04-26 | 北京金股链科技有限公司 | Asset management method, device and system |
CN106789911A (en) * | 2016-11-15 | 2017-05-31 | 深圳银链科技有限公司 | A kind of network identity validation method and system based on block chain |
CN107707660A (en) * | 2017-10-13 | 2018-02-16 | 广州市驱创信息科技有限公司 | The cloud storage method and system of the selectable identity-based verification technique of algorithm |
CN107967608A (en) * | 2017-12-21 | 2018-04-27 | 北京智帮帮科技有限公司 | A kind of intelligent contract system based on block chain technology |
Non-Patent Citations (1)
Title |
---|
李吉广: "视频版权自动认证系统的思考与设计", 《电视技术》 * |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108881296B (en) * | 2018-07-24 | 2021-11-30 | 中国联合网络通信集团有限公司 | Block chain real-name authentication method, device, equipment and storage medium |
CN108881296A (en) * | 2018-07-24 | 2018-11-23 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN109450659B (en) * | 2018-12-25 | 2020-10-23 | 杭州复杂美科技有限公司 | Block delay broadcasting method, equipment and storage medium |
CN109450659A (en) * | 2018-12-25 | 2019-03-08 | 杭州复杂美科技有限公司 | Block delayed broadcast method, equipment and storage medium |
CN111367872A (en) * | 2018-12-25 | 2020-07-03 | 北京嘀嘀无限科技发展有限公司 | User behavior analysis method and device, electronic equipment and storage medium |
CN109617698A (en) * | 2019-01-09 | 2019-04-12 | 腾讯科技(深圳)有限公司 | Provide the method for digital certificate, digital certificate issues center and medium |
CN109617698B (en) * | 2019-01-09 | 2021-08-03 | 腾讯科技(深圳)有限公司 | Method for issuing digital certificate, digital certificate issuing center and medium |
US11924358B2 (en) | 2019-01-09 | 2024-03-05 | Tencent Technology (Shenzhen) Company Limited | Method for issuing digital certificate, digital certificate issuing center, and medium |
CN110046165A (en) * | 2019-04-17 | 2019-07-23 | 江苏全链通信息科技有限公司 | Dissemination method, equipment and the computer readable storage medium of distributed application program |
CN109902074A (en) * | 2019-04-17 | 2019-06-18 | 江苏全链通信息科技有限公司 | Log storing method and system based on data center |
CN111107075A (en) * | 2019-12-13 | 2020-05-05 | 中国工商银行股份有限公司 | Request response method and device, electronic equipment and computer-readable storage medium |
CN111132155A (en) * | 2019-12-30 | 2020-05-08 | 江苏全链通信息科技有限公司 | 5G secure communication method, equipment and storage medium |
CN111132155B (en) * | 2019-12-30 | 2023-11-17 | 江苏全链通信息科技有限公司 | 5G secure communication method, device and storage medium |
WO2021226854A1 (en) * | 2020-05-09 | 2021-11-18 | 杭州安存网络科技有限公司 | Blockchain machine, blockchain data access authentication method, and computer-readable storage medium |
CN111786797A (en) * | 2020-07-03 | 2020-10-16 | 四川阵风科技有限公司 | Time effectiveness verification method for three-party communication |
CN111786797B (en) * | 2020-07-03 | 2022-10-18 | 四川阵风科技有限公司 | Time effectiveness verification method for three-party communication |
CN111836070A (en) * | 2020-07-28 | 2020-10-27 | 中国联合网络通信集团有限公司 | User statistical method and system |
CN111836070B (en) * | 2020-07-28 | 2022-04-12 | 中国联合网络通信集团有限公司 | User statistical method and system |
CN112035856B (en) * | 2020-08-20 | 2023-05-30 | 北方工业大学 | V2G charge and discharge information processing method based on block chain technology |
CN112035856A (en) * | 2020-08-20 | 2020-12-04 | 北方工业大学 | V2G charging and discharging information processing method based on block chain technology |
CN114465866A (en) * | 2022-01-21 | 2022-05-10 | 北京航空航天大学 | Block chain generation method and device, storage medium and electronic equipment |
CN114465866B (en) * | 2022-01-21 | 2023-08-15 | 北京航空航天大学 | DPoS method based on trust degree and PBFT |
Also Published As
Publication number | Publication date |
---|---|
CN108900507B (en) | 2020-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108900507A (en) | Block chain real name identification method and system | |
CN108876374A (en) | The network identity certificate authentication method and system of block chain | |
CN108881253A (en) | Block chain real name participatory approaches and system | |
US11743038B2 (en) | Methods and systems of providing verification of information using a centralized or distributed ledger | |
CN108880832A (en) | Block chain real name identification method and system | |
CN105187431B (en) | Login method, server, client and the communication system of third-party application | |
CN108416589A (en) | Connection method, system and the computer readable storage medium of block chain node | |
CN108737430A (en) | The encryption communication method and system of block chain node | |
CN108235805A (en) | Account unifying method and device and storage medium | |
CN104283885B (en) | A kind of implementation method of many SP secure bindings based on intelligent terminal local authentication | |
CN108964924A (en) | Digital certificate method of calibration, device, computer equipment and storage medium | |
CN104735065B (en) | A kind of data processing method, electronic equipment and server | |
CN112487778A (en) | Multi-user online signing system and method | |
CN108876375A (en) | Block chain real name participatory approaches and system | |
CN105554018B (en) | Genuine cyber identification verification method | |
CN112000744A (en) | Signature method and related equipment | |
CN109102404A (en) | The method for secret protection and system of block chain real name communication | |
Alhaidary et al. | Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol | |
CN116112187B (en) | Remote proving method, device, equipment and readable storage medium | |
KR102441120B1 (en) | System and method for credit exchange using block-chain technology | |
CN109492377A (en) | Device authentication method, apparatus and electronic equipment | |
CN101741561B (en) | Method and system for authenticating two-way hardware | |
CN109495441A (en) | Access authentication method, device, relevant device and computer readable storage medium | |
CN112002436A (en) | Block chain-based medical question answering method, device and medium | |
CN114003959A (en) | Decentralized identity information processing method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing Applicant after: IALLCHAIN Co.,Ltd. Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing. Applicant before: IALLCHAIN Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201222 Termination date: 20210629 |
|
CF01 | Termination of patent right due to non-payment of annual fee |