CN109194481B - Block chain real-name authentication method, device, equipment and storage medium - Google Patents

Block chain real-name authentication method, device, equipment and storage medium Download PDF

Info

Publication number
CN109194481B
CN109194481B CN201810821390.7A CN201810821390A CN109194481B CN 109194481 B CN109194481 B CN 109194481B CN 201810821390 A CN201810821390 A CN 201810821390A CN 109194481 B CN109194481 B CN 109194481B
Authority
CN
China
Prior art keywords
information
user
video information
block chain
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810821390.7A
Other languages
Chinese (zh)
Other versions
CN109194481A (en
Inventor
田新雪
马书惠
肖征荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810821390.7A priority Critical patent/CN109194481B/en
Publication of CN109194481A publication Critical patent/CN109194481A/en
Application granted granted Critical
Publication of CN109194481B publication Critical patent/CN109194481B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the invention provides a block chain real-name authentication method, a block chain real-name authentication device, block chain real-name authentication equipment and a storage medium. The method comprises the following steps: the block chain participation node acquires the information in the identity card chip of the user; the block chain participating node generates a hash value of video information according to the video information of a user, wherein the video information comprises first time information during video information recording; the block chain participating node sends the hash value of the video information to a timestamp server; the block chain participating node receives second time information corresponding to the hash value sent by the timestamp server; and the block chain participating node sends the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information to the mining node in the block chain network, so that the mining node performs real-name authentication on the block chain participating node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information. The embodiment of the invention improves the safety of the block chain network.

Description

Block chain real-name authentication method, device, equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a block chain real-name authentication method, a block chain real-name authentication device, block chain real-name authentication equipment and a storage medium.
Background
In a blockchain network, data is permanently recorded in blocks in the form of files. A block is a record set of some or all of the latest bitcoin transactions and is not recorded by other previous blocks. Each tile records all events that occurred before it was created. Each tile includes some or all recent transactions, a reference to a previous tile, and other data.
When the current blockchain participating nodes participate in the blockchain network in an anonymous mode, the security of the blockchain network is low.
Disclosure of Invention
The embodiment of the invention provides a block chain real-name authentication method, a block chain real-name authentication device, block chain real-name authentication equipment and a block chain real-name authentication storage medium, which are used for improving the safety of a block chain network.
In a first aspect, an embodiment of the present invention provides a block chain real-name authentication method, including:
the block chain participation node acquires the information in the identity card chip of the user;
the block chain participating node generates a hash value of the video information according to the video information of a user, wherein the video information comprises first time information when the video information is recorded;
the block chain participating node sends the hash value of the video information to a timestamp server;
the block chain participating node receives second time information corresponding to the hash value sent by the timestamp server;
and the block chain participating node sends the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information to a mining node in a block chain network, so that the mining node performs real-name authentication on the block chain participating node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information.
In a second aspect, an embodiment of the present invention provides a block chain real-name authentication method, including:
a mining node in a block chain network receives video information of a user, a hash value corresponding to the video information, second time information corresponding to the hash value, identification information of the user and information in an identity card chip of the user, wherein the video information comprises first time information when the video information is recorded;
and the mining node performs real-name authentication on the block chain participation node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information.
In a third aspect, an embodiment of the present invention provides a block chain real-name authentication apparatus, including:
the acquisition module is used for acquiring the information in the identity card chip of the user;
the generating module is used for generating a hash value of the video information according to the video information of a user, wherein the video information comprises first time information when the video information is recorded;
the sending module is used for sending the hash value of the video information to a timestamp server;
the receiving module is used for receiving second time information corresponding to the hash value sent by the timestamp server;
the sending module is further configured to: and sending the information in the ID card chip, the hash value, the second time information, the identification information of the user and the video information to a mining node in a block chain network, so that the mining node performs real-name authentication on the block chain participating node according to the information in the ID card chip, the hash value, the second time information, the identification information of the user and the video information.
In a fourth aspect, an embodiment of the present invention provides a block chain real name authentication apparatus, including:
the receiving module is used for receiving video information of a user, a hash value corresponding to the video information, second time information corresponding to the hash value, identification information of the user and information in an identity card chip of the user, wherein the video information is sent by a block chain participation node and comprises first time information when the video information is recorded;
and the authentication module is used for performing real-name authentication on the block chain participation node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information.
In a fifth aspect, an embodiment of the present invention provides a block link point, including:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of the first aspect.
In a sixth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, the computer program being executed by a processor to implement the method of the first aspect.
The method, the device, the equipment and the storage medium for authenticating the real name of the block chain provided by the embodiment of the invention acquire the information in an identity card chip of a user through a block chain participating node, generate a hash value of the video information according to the video information of the user, the video information comprises first time information when the video information is recorded, and acquire second time information corresponding to the hash value from a timestamp server, and the block chain participating node transmits the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information to an ore mining node in a block chain network so that the ore mining node authenticates the real name of the block chain participating node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information, the safety of the block chain network is improved.
Drawings
Fig. 1 is a schematic diagram of an application scenario provided in an embodiment of the present invention;
fig. 2 is a flowchart of a block chain real-name authentication method according to an embodiment of the present invention;
fig. 3 is a flowchart of a block chain real-name authentication method according to an embodiment of the present invention;
fig. 4 is a flowchart of a blockchain real-name authentication method according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a blockchain real-name authentication apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a blockchain real-name authentication apparatus according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a blockchain node according to an embodiment of the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The block chain real name authentication method provided by the invention can be applied to the communication system shown in fig. 1. As shown in fig. 1, the communication system includes: access network device 11, terminal device 12, and server 13. It should be noted that the communication System shown in fig. 1 may be applicable to different network formats, for example, may be applicable to Global System for Mobile communication (GSM), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Time Division-Synchronous Code Division Multiple Access (TD-SCDMA), Long Term Evolution (Long Term Evolution, LTE), and future 5G network formats. Optionally, the communication system may be a system in a scenario of high-reliability and Low-Latency Communications (URLLC) transmission in a 5G communication system.
Therefore, optionally, the access Network device 11 may be a Base Station (BTS) and/or a Base Station Controller in GSM or CDMA, a Base Station (NodeB, NB) and/or a Radio Network Controller (RNC) in WCDMA, an evolved Node B (eNB or eNodeB) in LTE, or a relay Station or an access point, or a Base Station (gbb) in a future 5G Network, and the present invention is not limited thereto.
The terminal device 12 may be a wireless terminal or a wired terminal. A wireless terminal may refer to a device that provides voice and/or other traffic data connectivity to a user, a handheld device having wireless connection capability, or other processing device connected to a wireless modem. A wireless terminal, which may be a mobile terminal such as a mobile telephone (or "cellular" telephone) and a computer having a mobile terminal, for example, a portable, pocket, hand-held, computer-included, or vehicle-mounted mobile device, may communicate with one or more core Network devices via a Radio Access Network (RAN), and may exchange language and/or data with the RAN. For another example, the Wireless terminal may also be a Personal Communication Service (PCS) phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), and other devices. A wireless Terminal may also be referred to as a system, a Subscriber Unit (Subscriber Unit), a Subscriber Station (Subscriber Station), a Mobile Station (Mobile), a Remote Station (Remote Station), a Remote Terminal (Remote Terminal), an Access Terminal (Access Terminal), a User Terminal (User Terminal), a User Agent (User Agent), and a User Device or User Equipment (User Equipment), which are not limited herein. Optionally, the terminal device 12 may also be a smart watch, a tablet computer, or the like. The terminal device 12 and the server 13 may be nodes in a blockchain network.
The invention provides a block chain real-name authentication method, which aims to solve the technical problems in the prior art.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a block chain real-name authentication method according to an embodiment of the present invention. The embodiment of the invention provides a block chain real-name authentication method aiming at the technical problems in the prior art, and the method comprises the following specific steps:
step 201, the block chain participation node acquires the information in the identity card chip of the user.
In this embodiment, the blockchain participating node may specifically be the terminal device 12 shown in fig. 1. The terminal device 12 may be a mobile phone, and may read information in an id card chip of a user through Near Field Communication (NFC) technology of the mobile phone or a dedicated device.
Step 202, the block chain participating node generates a hash value of the video information according to the video information of the user, wherein the video information comprises first time information when the video information is recorded.
The terminal device 12 is provided with a shooting device, and a user can record video information through the terminal device 12, where the video information is specifically video information of the user, and specifically, the user can shoot a face of the user through the terminal device 12. In addition, the video information may further include first time information when the video information is recorded. The first time information during recording of the video information comprises the following possible implementation modes:
one possible implementation is: the video information comprises audio information of the user, and the audio information comprises first time information when the video information is recorded. For example, when the user records the video information through the terminal device 12, the user may dictate the current recording time, for example, the video information recorded in minutes and seconds on the day of the month, that is, the video information further includes the audio information of the user, which is specifically the voice information that the user dictates the recording time, and here, the current recording time dictated by the user is taken as the first time information when the video information is recorded.
Another possible implementation is: the video information comprises second image information of the timer, and the second image information comprises first time information when the video information is recorded. For example, when the user records the video information through the terminal device 12, the terminal device 12 may be aligned with and photograph a timer, which may be specifically a clock, which may be specifically a time electronic clock that displays the time of the month and the day. Here, the image information of the timer shot by the terminal device 12 is recorded as the second image information, that is, the video information recorded by the terminal device 12 includes the second image information, and the second image information includes the first time information when the video information displayed by the timer is recorded.
In this embodiment, after the terminal device 12 records the video information, the hash value of the video information is generated.
And 203, the block chain participating node sends the hash value of the video information to a timestamp server.
In this embodiment, the timestamp server may specifically be the server 13 shown in fig. 1, and the terminal device 12 sends the hash value of the video information to the server 13.
And 204, the blockchain participating node receives second time information corresponding to the hash value sent by the timestamp server.
When the server 13 receives the hash value of the video information sent by the terminal device 12, the current accurate time of the server 13 is recorded, and here, the accurate time of the server 13 when the server 13 receives the hash value is taken as the second time information corresponding to the hash value. The server 13 signs the hash value and the second time information with its own private key, and sends the signed hash value and the second time information to the terminal device 12.
Step 205, the blockchain participating node sends the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information to a mining node in a blockchain network, so that the mining node performs real-name authentication on the blockchain participating node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information.
After the terminal device 12 receives the hash value and the second time information sent by the server 13 and signed by the private key of the server 13, the first time information dictated by the user in the video information and the second time information are compared, or the first time information recorded by a timer shot in the video information and the second time information are compared, if the time difference between the first time information and the second time information is less than or equal to a preset time difference threshold value, the terminal device 12 sends the information in the id card chip, the hash value, the second time information, the identification information of the user, such as name and identification number, and the video information to a mining node in the block chain network, such as the mining node 14 shown in fig. 1. The terminal device 12 may sign the information in the id card chip, the hash value, the second time information, and the identification information of the user, such as name and id card number, with its own private key, and broadcast the signed information and the video information to the blockchain network, and since the mining node 14 is a node in the blockchain network, the information broadcast by the terminal device 12 may be received. Specifically, the mining node 14 may perform real-name authentication on a block chain participating node, such as the terminal device 12, according to the information in the identity card chip, the hash value, the second time information, the identification information of the user, and the video information.
Optionally, the mine excavation node performs real-name authentication on the block chain participation node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user, and the video information, and includes the following steps as shown in fig. 3:
step 301, the mining node verifies whether the hash value corresponding to the video information is correct.
When the mining node 14 receives the hash value corresponding to the video information, the second time information corresponding to the hash value, the identification information of the user and the video information sent by the terminal device 12, it is first verified whether the hash value corresponding to the video information is correct. If the hash value corresponding to the video information is incorrect, the mining node 14 fails to authenticate the user by the real name.
And 302, if the hash value corresponding to the video information is correct, the mining node acquires the head portrait information, the name and the identification card number corresponding to the identification card from a public security department server according to the information in the identification card chip.
If the hash value corresponding to the video information is correct, the mining node 14 further obtains the head portrait information, the name and the identification card number corresponding to the identification card from the public security department server according to the information in the identification card chip.
And step 303, the mining node compares whether the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security server.
The mining node 14 compares the face information of the user in the video information with the head portrait information corresponding to the identity card acquired from the public security department server, and if the similarity between the face information of the user in the video information and the head portrait information corresponding to the identity card acquired from the public security department server is greater than a threshold value, it is determined that the face information of the user in the video information is consistent with the head portrait information of the user in the identity card.
If the face information of the user in the video information is not consistent with the head portrait information of the user in the identity card, the mining node 14 fails to authenticate the real name of the user.
Step 304, if the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security department server, the mining node compares whether the identification information of the user sent by the block chain participation node is consistent with the name and the identity card number corresponding to the identity card acquired from the public security department server.
In the case that the face information of the user in the video information is consistent with the avatar information of the user in the identification card, the mining node 14 further compares the identification information of the user, such as the name and the identification card number, sent by the terminal device 12, with the name and the identification card number corresponding to the identification card obtained from the server of the ministry of public security.
If the identification information of the user, such as the name and the identification card number, sent by the terminal device 12 is inconsistent with the name and the identification card number corresponding to the identification card acquired from the server of the ministry of public security, the real-name authentication of the user by the mining node 14 fails.
Step 305, if the identification information of the user sent by the block chain participation node is consistent with the name and the identification card number corresponding to the identification card acquired from the public security department server, the mining node compares the first time information with the second time information.
If the identification information of the user, such as the name and the identification number, sent by the terminal device 12 is consistent with the name and the identification number corresponding to the identification card acquired from the public security server, the mining node 14 compares first time information when the video information spoken by the user in the video information is recorded with second time information sent to the mining node 14 by the terminal device 12, or the mining node 14 compares first time information when the video information recorded by a timer shot in the video information is recorded with the second time information sent to the mining node 14 by the terminal device 12.
If the time difference between the first time information and the second time information is greater than the preset time difference threshold, the mining node 14 fails to authenticate the real name of the user.
Step 306, if the time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold, the mining node determines that the real-name authentication of the block chain participating node passes.
If the time difference between the first time information and the second time information is less than or equal to the preset time difference threshold, the mining node 14 determines that the real-name authentication for the blockchain participating node, such as the terminal device 12, passes, that is, the real-name authentication for the user passes.
In addition, in other embodiments, after the mining node 14 determines that the time difference between the first time information and the second time information is less than or equal to the preset time difference threshold, the first time information may be further compared with the current time information of the mining node 14, and if the time difference between the first time information and the current time information of the mining node 14 is also less than or equal to the preset time difference threshold, the mining node 14 determines that the real name authentication of the block chain participating node, such as the terminal device 12, is passed.
In addition, after the mining node 14 determines that the real-name authentication of the blockchain participating node, for example, the terminal device 12, passes, the information that the real-name authentication of the terminal device 12 succeeds may also be written into the blockchain ledger, and other mining nodes may also perform the real-name authentication of the terminal device 12 by using the method described in this embodiment, so as to determine whether the authentication result of the mining node 14 for the terminal device 12 is correct. And if the plurality of mining nodes can accept the real-name authentication of the terminal equipment 12, then accepting the information of the successful real-name authentication of the terminal equipment 12 written in the block chain account book.
According to the embodiment of the invention, the information in the identity card chip of the user is obtained through the block chain participation node, the hash value of the video information is generated according to the video information of the user, the video information comprises the first time information when the video information is recorded, the second time information corresponding to the hash value is obtained from the timestamp server, and the block chain participation node sends the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information to the mining node in the block chain network, so that the mining node carries out real-name authentication on the block chain participation node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information, and the safety of the block chain network is improved.
Fig. 4 is a flowchart of a block chain real name authentication method according to another embodiment of the present invention. On the basis of the foregoing embodiment, the block chain real-name authentication method provided in this embodiment specifically includes the following steps:
step 401, a mining node in a blockchain network receives video information of a user, sent by a blockchain participating node, a hash value corresponding to the video information, second time information corresponding to the hash value, identification information of the user and information in an identity card chip of the user, wherein the video information includes first time information when the video information is recorded.
And 402, the mining node performs real-name authentication on the block chain participation node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information.
The mining node performs real-name authentication on the block chain participation node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information, and the method comprises the following steps: the mining node verifies whether the hash value corresponding to the video information is correct or not; if the hash value corresponding to the video information is correct, the mining node acquires the head portrait information, the name and the identification card number corresponding to the identification card from a public security department server according to the information in the identification card chip; the mining node compares whether the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security department server; if the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security department server, the mining node compares whether the identification information of the user sent by the block chain participation node is consistent with the name and the identity card number corresponding to the identity card acquired from the public security department server; if the identification information of the user sent by the block chain participation node is consistent with the name and the identification number corresponding to the identity card acquired from the public security department server, the mining node compares the first time information with the second time information; and if the time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold value, the mining node determines that the real-name authentication of the block chain participation node passes.
The method described in this embodiment is consistent with the principle of the method described in the above embodiment, and is not described herein again.
According to the embodiment of the invention, the information in the identity card chip of the user is obtained through the block chain participation node, the hash value of the video information is generated according to the video information of the user, the video information comprises the first time information when the video information is recorded, the second time information corresponding to the hash value is obtained from the timestamp server, and the block chain participation node sends the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information to the mining node in the block chain network, so that the mining node carries out real-name authentication on the block chain participation node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information, and the safety of the block chain network is improved.
Fig. 5 is a schematic structural diagram of a blockchain real-name authentication apparatus according to an embodiment of the present invention. The blockchain real-name authentication device may be a blockchain participating node in the above embodiments. As shown in fig. 5, the blockchain real-name authentication apparatus 50 according to an embodiment of the present invention may execute a processing procedure provided in an embodiment of a blockchain real-name authentication method, and includes: an acquisition module 51, a generation module 52, a transmission module 53 and a reception module 54; the obtaining module 51 is configured to obtain information in an identity card chip of a user; the generating module 52 is configured to generate a hash value of the video information according to video information of a user, where the video information includes first time information when the video information is recorded; the sending module 53 is configured to send the hash value of the video information to a timestamp server; the receiving module 54 is configured to receive second time information corresponding to the hash value sent by the timestamp server; the sending module 53 is further configured to: and sending the information in the ID card chip, the hash value, the second time information, the identification information of the user and the video information to a mining node in a block chain network, so that the mining node performs real-name authentication on the block chain participating node according to the information in the ID card chip, the hash value, the second time information, the identification information of the user and the video information.
Optionally, the video information includes audio information of the user, and the audio information includes first time information when the video information is recorded.
Optionally, the video information includes second image information of the timer, and the second image information includes first time information when the video information is recorded.
The block chain real-name authentication apparatus in the embodiment shown in fig. 5 can be used to implement the technical solution of the above method embodiment, and the implementation principle and technical effect are similar, which are not described herein again.
Fig. 6 is a schematic structural diagram of a blockchain real-name authentication device according to an embodiment of the present invention. The block chain real name authentication device may be the mining node in the above embodiment. As shown in fig. 6, the blockchain real-name authentication apparatus 60 includes: a receiving module 61 and an authentication module 62; the receiving module 61 is configured to receive video information of a user, sent by a blockchain participating node, a hash value corresponding to the video information, second time information corresponding to the hash value, identification information of the user, and information in an identity card chip of the user, where the video information includes first time information when the video information is recorded; the authentication module 62 is configured to perform real-name authentication on the blockchain participation node according to the information in the id card chip, the hash value, the second time information, the identification information of the user, and the video information.
Optionally, the authentication module 62 includes: an authentication unit 621, an acquisition unit 622, a comparison unit 623, a determination unit 624; the verification unit 621 is configured to verify whether the hash value corresponding to the video information is correct; the obtaining unit 622 is configured to obtain, according to the information in the id card chip, the head portrait information, the name, and the id card number corresponding to the id card from the public security server when the hash value corresponding to the video information is correct; the comparing unit 623 is configured to compare whether the face information of the user in the video information is consistent with the avatar information corresponding to the identity card acquired from the public security server; the comparing unit 623 is further configured to compare whether the identification information of the user sent by the blockchain participating node is consistent with the name and the identity card number corresponding to the identity card acquired from the public security department server when the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security department server; the comparing unit 623 is further configured to compare the first time information with the second time information when the identification information of the user sent by the blockchain participating node is consistent with the name and the identification number corresponding to the identification card acquired from the police department server; the determining unit 624 is configured to determine that the real-name authentication of the blockchain participating node passes when a time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold.
The block chain real-name authentication apparatus in the embodiment shown in fig. 6 can be used to implement the technical solution of the above method embodiment, and the implementation principle and technical effect are similar, and are not described herein again.
Fig. 7 is a schematic structural diagram of a blockchain node according to an embodiment of the present invention. The block link point provided by the embodiment of the present invention may execute the processing procedure provided by the block chain real-name authentication method embodiment, as shown in fig. 7, the block link point 70 includes a memory 71, a processor 72, a computer program, and a communication interface 73; wherein a computer program is stored in the memory 71 and configured to execute the blockchain real name authentication method described in the above embodiments by the processor 72.
The block link points of the embodiment shown in fig. 7 can be used to implement the technical solution of the above method embodiment, and the implementation principle and technical effect are similar, and are not described herein again.
In addition, the present embodiment also provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the blockchain real-name authentication method described in the above embodiments.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A blockchain real name authentication method is characterized by comprising the following steps:
the block chain participation node acquires the information in the identity card chip of the user;
the block chain participating node generates a hash value of the video information according to the video information of a user, wherein the video information comprises first time information when the video information is recorded;
the block chain participating node sends the hash value of the video information to a timestamp server;
the block chain participating node receives second time information corresponding to the hash value sent by the timestamp server;
the block chain participating node sends the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information to a mining node in a block chain network, so that the mining node performs real-name authentication on the block chain participating node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information;
the mining node performs real-name authentication on the block chain participation node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information, and the method comprises the following steps:
the mining node verifies whether the hash value corresponding to the video information is correct or not;
if the hash value corresponding to the video information is correct, the mining node acquires the head portrait information, the name and the identification card number corresponding to the identification card from a public security department server according to the information in the identification card chip;
the mining node compares whether the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security department server;
if the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security department server, the mining node compares whether the identification information of the user sent by the block chain participation node is consistent with the name and the identity card number corresponding to the identity card acquired from the public security department server;
if the identification information of the user sent by the block chain participation node is consistent with the name and the identification number corresponding to the identity card acquired from the public security department server, the mining node compares the first time information with the second time information;
and if the time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold value, the mining node determines that the real-name authentication of the block chain participation node passes.
2. The method of claim 1, wherein the video information comprises audio information of the user, and wherein the audio information comprises first time information of the recording of the video information.
3. The method of claim 1, wherein the video information comprises second image information of a timer, and the second image information comprises first time information of the recording of the video information.
4. A blockchain real name authentication method is characterized by comprising the following steps:
a mining node in a block chain network receives video information of a user, a hash value corresponding to the video information, second time information corresponding to the hash value, identification information of the user and information in an identity card chip of the user, wherein the video information comprises first time information when the video information is recorded;
the mining node performs real-name authentication on the block chain participation node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information;
the mining node performs real-name authentication on the block chain participation node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information, and the method comprises the following steps:
the mining node verifies whether the hash value corresponding to the video information is correct or not;
if the hash value corresponding to the video information is correct, the mining node acquires the head portrait information, the name and the identification card number corresponding to the identification card from a public security department server according to the information in the identification card chip;
the mining node compares whether the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security department server;
if the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security department server, the mining node compares whether the identification information of the user sent by the block chain participation node is consistent with the name and the identity card number corresponding to the identity card acquired from the public security department server;
if the identification information of the user sent by the block chain participation node is consistent with the name and the identification number corresponding to the identity card acquired from the public security department server, the mining node compares the first time information with the second time information;
and if the time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold value, the mining node determines that the real-name authentication of the block chain participation node passes.
5. A blockchain real name authentication apparatus, comprising:
the acquisition module is used for acquiring the information in the identity card chip of the user;
the generating module is used for generating a hash value of the video information according to the video information of a user, wherein the video information comprises first time information when the video information is recorded;
the sending module is used for sending the hash value of the video information to a timestamp server;
the receiving module is used for receiving second time information corresponding to the hash value sent by the timestamp server;
the sending module is further configured to: sending the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information to a mining node in a block chain network, so that the mining node performs real-name authentication on a block chain participating node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information;
the authentication module includes: the device comprises a verification unit, an acquisition unit, a comparison unit and a determination unit;
the verification unit is used for verifying whether the hash value corresponding to the video information is correct or not;
the acquiring unit is used for acquiring the head portrait information, the name and the identification card number corresponding to the identification card from a public security department server according to the information in the identification card chip when the hash value corresponding to the video information is correct;
the comparison unit is used for comparing whether the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security server;
the comparison unit is further used for comparing whether the identification information of the user sent by the block chain participation node is consistent with the name and the identity card number corresponding to the identity card acquired from the public security department server or not when the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security department server;
the comparison unit is further configured to compare the first time information with the second time information when the identification information of the user sent by the blockchain participation node is consistent with the name and the identification card number corresponding to the identification card acquired from the public security department server;
the determining unit is configured to determine that real-name authentication of the blockchain participating node passes when a time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold.
6. The blockchain real-name authentication device of claim 5, wherein the video information includes audio information of the user, and the audio information includes first time information when the video information is recorded.
7. The blockchain real name authentication device according to claim 5, wherein the video information includes second image information of a timer, and the second image information includes first time information when the video information is recorded.
8. A blockchain real name authentication apparatus, comprising:
the receiving module is used for receiving video information of a user, a hash value corresponding to the video information, second time information corresponding to the hash value, identification information of the user and information in an identity card chip of the user, wherein the video information is sent by a block chain participation node and comprises first time information when the video information is recorded;
the authentication module is used for performing real-name authentication on the block chain participation node according to the information in the identity card chip, the hash value, the second time information, the identification information of the user and the video information;
the authentication module includes: the device comprises a verification unit, an acquisition unit, a comparison unit and a determination unit;
the verification unit is used for verifying whether the hash value corresponding to the video information is correct or not;
the acquiring unit is used for acquiring the head portrait information, the name and the identification card number corresponding to the identification card from a public security department server according to the information in the identification card chip when the hash value corresponding to the video information is correct;
the comparison unit is used for comparing whether the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security server;
the comparison unit is further used for comparing whether the identification information of the user sent by the block chain participation node is consistent with the name and the identity card number corresponding to the identity card acquired from the public security department server or not when the face information of the user in the video information is consistent with the head portrait information corresponding to the identity card acquired from the public security department server;
the comparison unit is further configured to compare the first time information with the second time information when the identification information of the user sent by the blockchain participation node is consistent with the name and the identification card number corresponding to the identification card acquired from the public security department server;
the determining unit is configured to determine that real-name authentication of the blockchain participating node passes when a time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold.
9. A block link point, comprising:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of any one of claims 1-4.
10. A computer-readable storage medium, having stored thereon a computer program for execution by a processor to perform the method of any one of claims 1-4.
CN201810821390.7A 2018-07-24 2018-07-24 Block chain real-name authentication method, device, equipment and storage medium Active CN109194481B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810821390.7A CN109194481B (en) 2018-07-24 2018-07-24 Block chain real-name authentication method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810821390.7A CN109194481B (en) 2018-07-24 2018-07-24 Block chain real-name authentication method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109194481A CN109194481A (en) 2019-01-11
CN109194481B true CN109194481B (en) 2021-07-27

Family

ID=64936751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810821390.7A Active CN109194481B (en) 2018-07-24 2018-07-24 Block chain real-name authentication method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109194481B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111918027B (en) * 2020-07-02 2021-07-06 杭州齐圣科技有限公司 Intelligent community security method based on Internet of things
CN113065463A (en) * 2021-04-01 2021-07-02 江苏芯灵智能科技有限公司 High-safety identity authentication system
CN114398449B (en) * 2021-12-29 2023-01-06 深圳市海清视讯科技有限公司 Data processing method, device, video monitoring system and storage medium
CN115174109A (en) * 2022-06-30 2022-10-11 中国联合网络通信集团有限公司 Enterprise employee identity authentication method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147501A (en) * 2017-06-27 2017-09-08 中国联合网络通信集团有限公司 Timestamp processing method and processing device
CN107579827A (en) * 2017-06-06 2018-01-12 江苏慧世联网络科技有限公司 It is a kind of that method is signed based on the electronic document of trusted third party and facial recognition techniques
CN108881253A (en) * 2018-06-29 2018-11-23 全链通有限公司 Block chain real name participatory approaches and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10176309B2 (en) * 2016-10-28 2019-01-08 Acronis International Gmbh Systems and methods for authenticating video using watermarks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107579827A (en) * 2017-06-06 2018-01-12 江苏慧世联网络科技有限公司 It is a kind of that method is signed based on the electronic document of trusted third party and facial recognition techniques
CN107147501A (en) * 2017-06-27 2017-09-08 中国联合网络通信集团有限公司 Timestamp processing method and processing device
CN108881253A (en) * 2018-06-29 2018-11-23 全链通有限公司 Block chain real name participatory approaches and system

Also Published As

Publication number Publication date
CN109194481A (en) 2019-01-11

Similar Documents

Publication Publication Date Title
CN108881296B (en) Block chain real-name authentication method, device, equipment and storage medium
CN109194481B (en) Block chain real-name authentication method, device, equipment and storage medium
CN108900528B (en) Block chain real-name authentication method, device, equipment and storage medium
CN109067724B (en) Block chain data transaction method, device, equipment and storage medium
US20220229893A1 (en) Identity authentication using biometrics
CN109067721B (en) Block chain real-name authentication method, device, equipment and storage medium
CN108989043B (en) Block processing method and device and block link points
CN109087100B (en) Key distribution method, device, equipment and storage medium
CN109104285B (en) Block chain real-name authentication method, device, equipment and storage medium
CN104504767A (en) Check-in information verification method and system
US8874919B2 (en) Apparatus and method of a portable terminal authenticating another portable terminal
CN105307172B (en) Bluetooth base. station legality identification method based on dynamic time
CN108596636B (en) Anti-counterfeiting method and device and terminal equipment
CN111065101A (en) 5G communication information encryption and decryption method and device based on block chain and storage medium
JP2022529837A (en) Parameter transmission method and equipment
CN113411184B (en) Integrated management terminal device and integrated management method
CN108683727B (en) Block processing method and main node
CN109379199B (en) User credit processing method, device, equipment and storage medium
CN108876611B (en) Transaction information processing method and device and block link points
CN110971830B (en) Anti-shake method for video shooting and related device
CN108768961B (en) Storage processing method and home gateway
CN108985765A (en) Enterprise user information processing method, equipment and storage medium
CN109087096B (en) Block chain account checking method, device, equipment and storage medium
EP2482575A1 (en) Authenticating and localizing a mobile user
CN108768733B (en) Block chain account book processing method and device and block chain link points

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant