CN109347865B - User data authentication and evidence storage method and system based on block chain technology - Google Patents

User data authentication and evidence storage method and system based on block chain technology Download PDF

Info

Publication number
CN109347865B
CN109347865B CN201811412768.4A CN201811412768A CN109347865B CN 109347865 B CN109347865 B CN 109347865B CN 201811412768 A CN201811412768 A CN 201811412768A CN 109347865 B CN109347865 B CN 109347865B
Authority
CN
China
Prior art keywords
information
data
party terminal
client
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811412768.4A
Other languages
Chinese (zh)
Other versions
CN109347865A (en
Inventor
何立鹏
胡先建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Xingzheng Information Technology Co ltd
Original Assignee
Sichuan Xingzheng Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Xingzheng Information Technology Co ltd filed Critical Sichuan Xingzheng Information Technology Co ltd
Priority to CN201811412768.4A priority Critical patent/CN109347865B/en
Publication of CN109347865A publication Critical patent/CN109347865A/en
Application granted granted Critical
Publication of CN109347865B publication Critical patent/CN109347865B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The invention relates to a method and a system for authenticating and storing user data based on a block chain technology, wherein the method is applied to a client connected with a server terminal and a third-party terminal, the client comprises a client node, and the client node is added into the block chain and issues the block chain to a network; the server end comprises a server end node, and the server end node is added into the block chain and issues the block chain to the network; the third party terminal comprises a third party terminal node, and the third party terminal node is added into the block chain and issues the block chain to the network. The invention is used for solving the technical problems in the prior art that how to enable a user to safely and conveniently use personal privacy data without influencing the legal rights and interests of a third-party terminal and how to supervise and store the data.

Description

User data authentication and evidence storage method and system based on block chain technology
Technical Field
The invention relates to the field of citizen information open security mutual trust, in particular to an authentication and evidence storage method and system based on a block chain technology.
Background
With the development of the era, personal data related to the government and government affair system is more and more detailed, and the demand of each social organization (client) on the personal data generated by the government and government affair system (server) is stronger. The government affair system discloses personal privacy data, and the legitimate rights and interests of the third-party terminal can be damaged after the disclosure, so that the consent of the third-party terminal should be obtained. However, conventionally, if a user authorizes the use of personal private data involved in government information at a client, and if the authorization data is stored in a localized database at the client and transmitted to a server by way of an interface, and this database is still maintained by the client, there is a significant risk of compliance. Therefore, how to make personal private data of government and government affair system open to society and how to make users use the data safely and conveniently without affecting the legal interests of third party terminals becomes a difficult problem before the supervision layer and data storage.
Disclosure of Invention
Aiming at the problems in the prior art, the embodiment of the invention provides a method and a system for authenticating and storing user data based on a block chain technology, which are used for solving the technical problems in the prior art that how to enable a user to safely and conveniently use personal privacy data without influencing the legal rights and interests of a third-party terminal and how to supervise and store the data; the user authorization data is decentralized, cannot be tampered and can be traced, and a safe block chain technology is adopted to store the shared user authorization data, so that the purpose of opening and safe mutual trust of citizen information is finally achieved.
The technical scheme for solving the technical problems is as follows:
in a first aspect, the present application provides a method for authenticating and storing user data based on a blockchain technology, where the method is applied to a client connected to a server and a third-party terminal, and the client includes a client node, and the client node joins in a blockchain and issues the blockchain to a network, and includes the following steps:
sending authorization data of user data and authorization data processed by a third-party terminal to a server side, and storing the user authorization data on a block chain;
encoding the first data request information to generate first authentication information, and storing the first authentication information on a block chain;
sending first data request information to a server;
receiving second feedback data information of the third-party terminal;
and verifying whether the second feedback data information is tampered according to the fourth authentication information, and if not, finishing user data authentication and storage.
In a second aspect, a method for authenticating and storing user data based on a blockchain technology is provided, where the method is applied to a server connected to a client and a third-party terminal, where the server includes a server end node, and the server end node joins in a blockchain and issues the blockchain to a network, and includes the following steps:
receiving first data request information of a client;
generating second data request information according to the first data request information, and sending the second data request information to a third-party terminal;
receiving third request data information sent by a third party terminal, verifying whether the third request data information is tampered according to third authentication information, if not, verifying whether a user authorizes the client and the third party terminal, and if so, packaging user authorization data;
feeding back according to the third request data information to generate first feedback data information, coding the first feedback data information to generate second authentication information, and storing the second authentication information into the block chain;
and sending the first feedback data information to the third-party terminal. .
In a third aspect, a method for authenticating and storing user data based on a block chain technology is provided, where the method is applied to a third-party terminal connected to a client and a server, the third-party terminal includes a third-party terminal node, and the third-party terminal node is added to a block chain and issues the block chain to a network, and the method includes the following steps:
receiving second data request information sent by a server;
verifying whether the second data request information is tampered according to the first authentication information, and if not, verifying whether a user authorizes the client;
if the authentication is successful, receiving second data request information sent by the server, generating third request data information according to the second data request information, encoding the third request data information, generating third authentication information, and storing the third authentication information in a block chain;
receiving first feedback data information of a server side, and verifying whether the second authentication information is tampered according to the first feedback data information;
if the first feedback data information is not tampered, processing the first feedback data information to obtain second feedback data information, coding the second feedback data information to generate fourth authentication information, and storing the fourth authentication information on a block chain;
and sending the second feedback data information to the client.
In a fourth aspect, a client is provided, based on the method in the first aspect, where the client is connected to a server and a third-party terminal, and the client includes a client node, and the client node adds to a blockchain and publishes the blockchain to a network, and the method includes:
the authorization module is used for sending authorization data of user data and authorization data processed by a third-party terminal to the server side and storing the user authorization data on the block chain;
the first authentication information module is used for encoding the first data request information, generating first authentication information and storing the first authentication information into the block chain;
the sending module is used for sending first data request information to the server side;
the receiving module is used for receiving second feedback data information of the third-party terminal;
and the verification module is used for verifying whether the second feedback data information is tampered according to the fourth authentication information, and if the second feedback data information is not tampered, the authentication and the storage of the user data are completed.
A fifth aspect provides a server, based on the method in the second aspect, where the server is connected to a client and a third-party terminal, respectively, and the server includes a server end node, and the server end node joins in a blockchain and publishes the blockchain to a network, and the method includes:
the receiving module is used for receiving first data request information of a client;
the first sending module is used for generating second data request information according to the first data request information and sending the second data request information to the third-party terminal;
the verification module is used for receiving third request data information sent by a third party terminal, verifying whether the third request data information is tampered according to third authentication information, if not, verifying whether a user authorizes the client and the third party terminal, and if so, packaging user authorization data;
the second authentication information module is used for feeding back according to the third request data information to generate first feedback data information, coding the first feedback data information to generate second authentication information, and storing the second authentication information in the block chain;
and the second sending module is used for sending the first feedback data information to the third-party terminal.
A sixth aspect provides a third party terminal, based on the method in the third aspect, where the third party terminal is connected to the client and the server, and the third party terminal includes a third party terminal node, and the third party terminal node is added to the blockchain and issues the blockchain to the network, where the method includes:
the receiving module is used for receiving second data request information sent by the server side;
the first verification module is used for verifying whether the second data request information is tampered according to the first authentication information, and if the second data request information is not tampered, verifying whether a user authorizes the client;
the third authentication information module is used for receiving second data request information sent by the server side if the authentication is successful, generating third request data information according to the second data request information, coding the third request data information, generating third authentication information and storing the third authentication information into the block chain;
the second verification module is used for receiving the first feedback data information of the server end and verifying whether the first feedback data information is tampered according to the second authentication information;
the fourth authentication information module is used for processing the first feedback data information to obtain second feedback data information if the first feedback data information is not tampered, encoding the second feedback data information to generate fourth authentication information, and storing the fourth authentication information into the block chain;
and the sending module is used for sending the second feedback data information to the client.
A seventh aspect provides a system for authenticating and storing user data based on a block chain technology, including the client of the fourth aspect, the server of the fifth aspect, and the third party terminal of the sixth aspect;
the client comprises the following steps:
sending authorization data of user data and authorization data processed by a third-party terminal to a server side, and storing the user authorization data on a block chain;
encoding the first data request information to generate first authentication information, and storing the first authentication information on a block chain;
sending first data request information to a server;
receiving second feedback data information of the third-party terminal;
verifying whether the second feedback data information is tampered according to the fourth authentication information, and if not, finishing user data authentication and storage;
the server side comprises the following steps:
receiving first data request information of a client;
generating second data request information according to the first data request information, and sending the second data request information to a third-party terminal;
receiving third request data information sent by a third party terminal, verifying whether the third request data information is tampered according to third authentication information, if not, verifying whether a user authorizes the client and the third party terminal, and if so, packaging user authorization data;
feeding back according to the third request data information to generate first feedback data information, coding the first feedback data information to generate second authentication information, and storing the second authentication information into the block chain;
sending first feedback data information to a third party terminal;
the third party terminal comprises the following steps:
receiving second data request information sent by a server;
verifying whether the second data request information is tampered according to the first authentication information, and if not, verifying whether a user authorizes the client;
if the authentication is successful, receiving second data request information sent by the server, generating third request data information according to the second data request information, encoding the third request data information, generating third authentication information, and storing the third authentication information in a block chain;
receiving first feedback data information of the server side, and verifying whether the first feedback data information is tampered according to the second authentication information;
if the first feedback data information is not tampered, processing the first feedback data information to obtain second feedback data information, coding the second feedback data information to generate fourth authentication information, and storing the fourth authentication information on a block chain;
and sending the second feedback data information to the client.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
the embodiment of the invention provides a user data authentication and evidence storage method and system based on a block chain technology, and the block chain technology has the characteristics of decentralization, data transparency, non-falsification, collective maintenance and the like, and a block chain authentication and evidence storage system which can be traced, prevent falsification, monitor and ensure privacy is constructed through a selected alliance block chain.
Drawings
FIG. 1 is a flow chart of a method for authenticating and storing data according to the present invention;
FIG. 2 is a schematic diagram of a client of the present invention;
FIG. 3 is a schematic diagram of a server side of the present invention;
fig. 4 is a schematic diagram of a third party terminal of the present invention.
Detailed Description
The principles and features of this invention are described below in conjunction with the following drawings, which are set forth by way of illustration only and are not intended to limit the scope of the invention.
As shown in fig. 1, the present embodiment provides a method for authenticating and storing user data based on a blockchain technology, where the method is applied to a client connected to a server and a third-party terminal, and the client includes a client node, and the client node joins in a blockchain and issues the blockchain to a network; the server end comprises a server end node, and the server end node is added into the block chain and issues the block chain to the network; the third party terminal comprises a third party terminal node, the third party terminal node is added into the block chain and issues the block chain to the network, and the method comprises the following steps:
the client sends authorization data of user data and authorization data processed by a third-party terminal to the server, and the user authorization data is stored on the block chain; the authorization data comprises a transaction id, a client code, a third party terminal code, an authorization data directory and an authorization data directory fingerprint;
the client encodes the first data request information to generate first authentication information, and stores the first authentication information in the block chain, wherein the first data request information comprises information such as an identity card number, a production right number, a license plate number and the like, and the first authentication information comprises a transaction id, a client code, a first data request information data fingerprint, a timestamp and the like;
the client sends first data request information to the server;
the server receives first data request information of the client;
the server side verifies whether the first data request information is tampered according to the first authentication information, and if the first data request information is not tampered, the next step is carried out;
the server side verifies whether the user authorizes the client side, and if so, the next step is carried out;
the server side generates second data request information according to the first data request information and sends the second data request information to the third-party terminal;
the third party terminal receives second data request information sent by the server side;
the third party terminal verifies whether the second data request information is tampered according to the first authentication information, and if the second data request information is not tampered, the next step is carried out;
the third-party terminal verifies whether the user authorizes the client, and if so, the next step is carried out;
the third party terminal generates third request data information according to the second data request information, encodes the third request data information, generates third authentication information, and stores the third authentication information on the block chain; the third request information comprises information such as an identity card number, a production right number, a license plate number, a service number and the like, and the third authentication information comprises a transaction id, a third party terminal code, a third request information data fingerprint, a timestamp and the like;
the server receives third request data information sent by the third party terminal, verifies whether the third request data information is tampered according to the third authentication information, and enters the next step if the third request data information is not tampered;
the server side verifies whether the user authorizes the client side and the third-party terminal, and if the user authorizes, user authorization data are packaged; feeding back according to the third request data information to generate first feedback data information, wherein the first feedback data information comprises user authorization data in an authorization data directory; coding the first feedback data information to generate second authentication information, and storing the second authentication information on the block chain;
the second authentication information comprises a transaction id, a server side code, a first feedback data information data fingerprint, a timestamp and the like;
the server side sends first feedback data information to the third-party terminal;
the third party terminal receives first feedback data information of the server side;
the third party terminal verifies whether the first feedback data information is tampered according to the second authentication information, and if the first feedback data information is not tampered, the next step is carried out;
the third party terminal processes the first feedback data information to obtain second feedback data information, encodes the second feedback data information to generate fourth authentication information, and stores and proves the fourth authentication information to the block chain, wherein the second feedback data information comprises result data processed by the third party terminal according to the user authorization data, and the fourth authentication information comprises a transaction id, a third party terminal code, a second feedback data information data fingerprint, a timestamp and the like;
the third-party terminal sends second feedback data information to the client;
the client receives second feedback data information of the third-party terminal;
and the client verifies whether the second feedback data information is tampered according to the fourth authentication information, if not, the authentication and the storage of the user data are completed, and the transaction is completed.
Based on the foregoing method, this embodiment provides a system for authenticating and storing user data based on a block chain technology, where the system includes a client, a server, and a third-party terminal, and as shown in fig. 2, the client includes:
the authorization module is used for sending authorization data of user data and authorization data processed by a third-party terminal to the server side and storing the user authorization data on the block chain;
the first authentication information module is used for encoding the first data request information, generating first authentication information and storing the first authentication information into the block chain;
the sending module is used for sending first data request information to the server side;
the receiving module is used for receiving second feedback data information of the third-party terminal;
and the verification module is used for verifying whether the second feedback data information is tampered according to the fourth authentication information, and if the second feedback data information is not tampered, the authentication and the storage of the user data are completed.
As shown in fig. 3, the server includes:
the receiving module is used for receiving first data request information of a client;
the first sending module is used for generating second data request information according to the first data request information and sending the second data request information to the third-party terminal;
the verification module is used for receiving third request data information sent by a third party terminal, verifying whether the third request data information is tampered according to third authentication information, if not, verifying whether a user authorizes the client and the third party terminal, and if so, packaging user authorization data;
the second authentication information module is used for feeding back according to the third request data information to generate first feedback data information, coding the first feedback data information to generate second authentication information, and storing the second authentication information in the block chain;
and the second sending module is also used for sending the first feedback data information to the third-party terminal.
As shown in fig. 4, the third party terminal includes:
the receiving module is used for receiving second data request information sent by the server side;
the first verification module is used for verifying whether the second data request information is tampered according to the first authentication information, and if the second data request information is not tampered, verifying whether a user authorizes the client;
the third authentication information module is used for receiving second data request information sent by the server side if the authentication is successful, generating third request data information according to the second data request information, coding the third request data information, generating third authentication information and storing the third authentication information into the block chain;
the second verification module is used for receiving the first feedback data information of the server end and verifying whether the first feedback data information is tampered according to the second authentication information;
the fourth authentication information module is used for processing the first feedback data information to obtain second feedback data information if the first feedback data information is not tampered, encoding the second feedback data information to generate fourth authentication information, and storing the fourth authentication information into the block chain;
and the sending module is used for sending the second feedback data information to the client.
The client comprises the following steps:
sending authorization data of user data and authorization data processed by a third-party terminal to a server side, and storing the user authorization data on a block chain;
encoding the first data request information to generate first authentication information, and storing the first authentication information on a block chain;
sending first data request information to a server;
receiving second feedback data information of the third-party terminal;
verifying whether the second feedback data information is tampered according to the fourth authentication information, and if not, finishing user data authentication and storage;
the server side comprises the following steps:
receiving first data request information of a client;
generating second data request information according to the first data request information, and sending the second data request information to a third-party terminal;
receiving third request data information sent by a third party terminal, verifying whether the third request data information is tampered according to third authentication information, if not, verifying whether a user authorizes the client and the third party terminal, and if so, packaging user authorization data;
feeding back according to the third request data information to generate first feedback data information, coding the first feedback data information to generate second authentication information, and storing the second authentication information into the block chain;
sending first feedback data information to a third party terminal;
the third party terminal comprises the following steps:
receiving second data request information sent by a server;
verifying whether the second data request information is tampered according to the first authentication information, and if not, verifying whether a user authorizes the client;
if the authentication is successful, receiving second data request information sent by the server, generating third request data information according to the second data request information, encoding the third request data information, generating third authentication information, and storing the third authentication information in a block chain;
receiving first feedback data information of the server side, and verifying whether the first feedback data information is tampered according to the second authentication information;
if the first feedback data information is not tampered, processing the first feedback data information to obtain second feedback data information, coding the second feedback data information to generate fourth authentication information, and storing the fourth authentication information on a block chain;
and sending the second feedback data information to the client.
In this embodiment, the client, the server, and the third party terminal may be mobile devices, for example, smart phones, tablet electronic devices, portable computers, Personal Digital Assistants (PDAs), vehicle-mounted devices, POS machines, or smart wearable devices. Alternatively, the client, the server, and the third party terminal may also be desktop devices, such as a television, a server, an industrial personal computer (industrial control computer), a Personal Computer (PC), a kiosk, or an intelligent self-service terminal (kiosk). The client, the server and the third party terminal may have configuration data, the client may have configuration data, and the configuration data may provide an operating environment or an operating condition for an application program running on the client, the server and the third party terminal.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (2)

1. A method for authenticating and storing user data based on a block chain technology is characterized in that the method is applied to a client connected with a server terminal and a third-party terminal, the client comprises a client node, and the client node is added into a block chain and issues the block chain to a network; the server end comprises a server end node, and the server end node is added into the block chain and issues the block chain to the network; the third party terminal comprises a third party terminal node, the third party terminal node is added into the block chain and issues the block chain to the network, and the method comprises the following steps:
the client sends authorization data of user data and authorization data processed by a third-party terminal to the server, and the user authorization data is stored on the block chain; the authorization data comprises a transaction id, a client code, a third party terminal code, an authorization data directory and an authorization data directory fingerprint;
the client encodes the first data request information to generate first authentication information, and stores the first authentication information on the block chain, wherein the first data request information comprises an identity card number, a production right card number and license plate number information, and the first authentication information comprises a transaction id, a client code, a first data request information data fingerprint and a timestamp;
the client sends first data request information to the server;
the server receives first data request information of the client;
the server side verifies whether the first data request information is tampered according to the first authentication information, and if the first data request information is not tampered, the next step is carried out;
the server side verifies whether the user authorizes the client side, and if so, the next step is carried out;
the server side generates second data request information according to the first data request information and sends the second data request information to the third-party terminal;
the third party terminal receives second data request information sent by the server side;
the third party terminal verifies whether the second data request information is tampered according to the first authentication information, and if the second data request information is not tampered, the next step is carried out;
the third-party terminal verifies whether the user authorizes the client, and if so, the next step is carried out;
the third party terminal generates third request data information according to the second data request information, encodes the third request data information, generates third authentication information, and stores the third authentication information on the block chain; the third request information comprises an identity card number, a production right number, a license plate number and service number information, and the third authentication information comprises a transaction id, a third party terminal code, a third request information data fingerprint and a timestamp;
the server receives third request data information sent by the third party terminal, verifies whether the third request data information is tampered according to the third authentication information, and enters the next step if the third request data information is not tampered;
the server side verifies whether the user authorizes the client side and the third-party terminal, and if the user authorizes, user authorization data are packaged; feeding back according to the third request data information to generate first feedback data information, wherein the first feedback data information comprises user authorization data in an authorization data directory; coding the first feedback data information to generate second authentication information, and storing the second authentication information on the block chain;
the second authentication information comprises a transaction id, a server side code, a first feedback data information data fingerprint and a timestamp;
the server side sends first feedback data information to the third-party terminal;
the third party terminal receives first feedback data information of the server side;
the third party terminal verifies whether the first feedback data information is tampered according to the second authentication information, and if the first feedback data information is not tampered, the next step is carried out;
the third party terminal processes the first feedback data information to obtain second feedback data information, encodes the second feedback data information to generate fourth authentication information, and stores and proves the fourth authentication information to the block chain, wherein the second feedback data information comprises result data processed by the third party terminal according to the user authorization data, and the fourth authentication information comprises a transaction id, a third party terminal code, a second feedback data information data fingerprint and a timestamp;
the third-party terminal sends second feedback data information to the client;
the client receives second feedback data information of the third-party terminal;
and the client verifies whether the second feedback data information is tampered according to the fourth authentication information, if not, the authentication and the storage of the user data are completed, and the transaction is completed.
2. A system for authenticating and storing user data based on a block chain technology is characterized by comprising a client, a server and a third-party terminal;
the client comprises the following steps:
sending authorization data of user data and authorization data processed by a third-party terminal to a server side, and storing the user authorization data on a block chain;
encoding the first data request information to generate first authentication information, and storing the first authentication information on a block chain;
sending first data request information to a server;
receiving second feedback data information of the third-party terminal;
verifying whether the second feedback data information is tampered according to the fourth authentication information, and if not, finishing user data authentication and storage;
the server side comprises the following steps:
receiving first data request information of a client;
generating second data request information according to the first data request information, and sending the second data request information to a third-party terminal;
receiving third request data information sent by a third party terminal, verifying whether the third request data information is tampered according to third authentication information, if not, verifying whether a user authorizes the client and the third party terminal, and if so, packaging user authorization data;
feeding back according to the third request data information to generate first feedback data information, coding the first feedback data information to generate second authentication information, and storing the second authentication information into the block chain;
sending first feedback data information to a third party terminal;
the third party terminal comprises the following steps:
receiving second data request information sent by a server;
verifying whether the second data request information is tampered according to the first authentication information, and if not, verifying whether a user authorizes the client;
if the authentication is successful, receiving second data request information sent by the server, generating third request data information according to the second data request information, encoding the third request data information, generating third authentication information, and storing the third authentication information in a block chain;
receiving first feedback data information of the server side, and verifying whether the first feedback data information is tampered according to the second authentication information;
if the first feedback data information is not tampered, processing the first feedback data information to obtain second feedback data information, coding the second feedback data information to generate fourth authentication information, and storing the fourth authentication information on a block chain;
and sending the second feedback data information to the client.
CN201811412768.4A 2018-11-23 2018-11-23 User data authentication and evidence storage method and system based on block chain technology Active CN109347865B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811412768.4A CN109347865B (en) 2018-11-23 2018-11-23 User data authentication and evidence storage method and system based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811412768.4A CN109347865B (en) 2018-11-23 2018-11-23 User data authentication and evidence storage method and system based on block chain technology

Publications (2)

Publication Number Publication Date
CN109347865A CN109347865A (en) 2019-02-15
CN109347865B true CN109347865B (en) 2021-10-01

Family

ID=65317707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811412768.4A Active CN109347865B (en) 2018-11-23 2018-11-23 User data authentication and evidence storage method and system based on block chain technology

Country Status (1)

Country Link
CN (1) CN109347865B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111355710B (en) * 2020-02-19 2021-12-24 腾讯科技(深圳)有限公司 Data request method and device of network service
CN111461687B (en) * 2020-03-23 2023-07-07 韩海韵 Application system of block chain service platform based on terminal equipment and implementation method thereof
CN111447238A (en) * 2020-04-13 2020-07-24 夏彬彬 Data sharing system based on block chain
CN112131309A (en) * 2020-08-28 2020-12-25 赣州圣享区块链技术有限公司 Data evidence storing method and system based on block chain technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106997525A (en) * 2017-04-10 2017-08-01 山大地纬软件股份有限公司 Digital license system based on block chain technology
CN107659610A (en) * 2017-08-02 2018-02-02 北京瑞卓喜投科技发展有限公司 Copyright protection methods, devices and systems based on block chain technology
CN108549825A (en) * 2018-03-14 2018-09-18 中链科技有限公司 A kind of file deposits card, verification and the means of proof and device
US10091180B1 (en) * 2012-03-20 2018-10-02 United Services Automobile Association (Usaa) Behavioral profiling method and system to authenticate a user
CN108665946A (en) * 2018-05-08 2018-10-16 阿里巴巴集团控股有限公司 A kind of access method and device of business datum

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150379510A1 (en) * 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10091180B1 (en) * 2012-03-20 2018-10-02 United Services Automobile Association (Usaa) Behavioral profiling method and system to authenticate a user
CN106997525A (en) * 2017-04-10 2017-08-01 山大地纬软件股份有限公司 Digital license system based on block chain technology
CN107659610A (en) * 2017-08-02 2018-02-02 北京瑞卓喜投科技发展有限公司 Copyright protection methods, devices and systems based on block chain technology
CN108549825A (en) * 2018-03-14 2018-09-18 中链科技有限公司 A kind of file deposits card, verification and the means of proof and device
CN108665946A (en) * 2018-05-08 2018-10-16 阿里巴巴集团控股有限公司 A kind of access method and device of business datum

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
【案例】享宇金服:区块链授权存证体系;享宇金服;《https://cloud.tencent.com/developer/article/1107590》;20180424;1-2,7 *
基于区块链的数字版权保护与交易系统;李超,戴炳荣等;《现代计算机(专业版)》;20181031;1-10 *

Also Published As

Publication number Publication date
CN109347865A (en) 2019-02-15

Similar Documents

Publication Publication Date Title
CN110365670B (en) Blacklist sharing method and device, computer equipment and storage medium
CN109347865B (en) User data authentication and evidence storage method and system based on block chain technology
CN111783075B (en) Authority management method, device and medium based on secret key and electronic equipment
CN109274652B (en) Identity information verification system, method and device and computer storage medium
CN112003858B (en) Block chain-based platform docking method, electronic device and storage medium
CN113537984A (en) Content verification method and device based on block chain and electronic equipment
CN105427099A (en) Network authentication method for secure electronic transactions
CN112039826B (en) Login method and device applied to applet end, electronic equipment and readable medium
CN110222531A (en) A kind of method, system and equipment accessing database
CN110611657A (en) File stream processing method, device and system based on block chain
CN110908786A (en) Intelligent contract calling method, device and medium
EP3937040B1 (en) Systems and methods for securing login access
EP3579595A1 (en) Improved system and method for internet access age-verification
CN113486122A (en) Data sharing method and electronic equipment
CN112733121A (en) Data acquisition method, device, equipment and storage medium
CN111709860A (en) Homote advice processing method, device, equipment and storage medium
CN116226289A (en) Electronic certificate management method, device, equipment and storage medium based on blockchain
CN110223075B (en) Identity authentication method and device, computer equipment and storage medium
CN111062059A (en) Method and device for service processing
CN113434882A (en) Communication protection method and device of application program, computer equipment and storage medium
CN115659378A (en) Case record information evidence storing method and related equipment
CN115482132A (en) Data processing method and device for electronic contract based on block chain and server
CN113434824B (en) Software service authorization management method, device, equipment and storage medium
CN115085934A (en) Contract management method based on block chain and combined key and related equipment
CN113868713A (en) Data verification method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 610000 No. 5 Xiaojiahe Zheng street, Chengdu high tech Zone, Sichuan

Applicant after: Sichuan Xingzheng Information Technology Co.,Ltd.

Address before: 610000 No. 5 Xiaojiahe Zheng street, Chengdu high tech Zone, Sichuan

Applicant before: CHENGDU XINGZHENG ELECTRONIC GOVERNMENT AFFAIRS OPERATION SERVICES Co.,Ltd.

GR01 Patent grant
GR01 Patent grant