CN109815657A - A kind of identity identifying method and terminal device based on alliance's chain - Google Patents
A kind of identity identifying method and terminal device based on alliance's chain Download PDFInfo
- Publication number
- CN109815657A CN109815657A CN201811529919.4A CN201811529919A CN109815657A CN 109815657 A CN109815657 A CN 109815657A CN 201811529919 A CN201811529919 A CN 201811529919A CN 109815657 A CN109815657 A CN 109815657A
- Authority
- CN
- China
- Prior art keywords
- block chain
- alliance
- chain node
- block
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000004891 communication Methods 0.000 claims abstract description 66
- 230000006399 behavior Effects 0.000 claims description 44
- 238000004590 computer program Methods 0.000 claims description 19
- 238000013519 translation Methods 0.000 claims description 8
- 238000012544 monitoring process Methods 0.000 claims description 5
- 230000006870 function Effects 0.000 description 12
- 230000008569 process Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000003993 interaction Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000009940 knitting Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
Abstract
The present invention is suitable for block chain technical field, provides a kind of identity identifying method and terminal device based on alliance's chain, comprising: the wound generation block into alliance's chain submits the identity data of the first block chain node and request is added;If receiving the authentication pass information that the wound generation block returns, the communication request for receiving the second block chain node is monitored whether;If receiving the communication request of the second block chain node, the identity data of the second block chain node is then obtained from the communication request, and authentication is carried out to the second block chain link point according to the identity data of the second block chain node;If passing through to the authentication of the second block chain node, data corresponding with the communication request are returned into the second block chain node.By the above method, the reliability of the identity identifying method based on alliance's chain is effectively increased.
Description
Technical field
The present invention relates to block chain technical fields more particularly to a kind of identity identifying method and terminal based on alliance's chain to set
It is standby.
Background technique
In alliance's chain, usually using digital certificate, to carry out trusted identity certification, (digital certificate is by digital certificate machine
Structure (CA, Certificate Authority) is issued).In order to distinguish multiple participation tissues and each tissue in alliance's chain
Multiple alliance's chain nodes of middle participation, the scheme generallyd use are to represent alliance for each organizational building one individual root CA
A tissue in chain, and digital certificate is signed and issued to prove node in tissue by this root CA for each node in the tissue
Identity.Alliance's chain authenticate node identities when, by verify node digital certificate effectively signing and issuing root CA judges this
Which tissue node belongs to.
One tissue may participate in multiple and different alliance's chains, i.e., one tissue may have multiple CA, then the tissue
The digital certificate that interior each node can have different root CA to sign and issue, i.e., each node correspond to multiple digital certificates, this will lead
Cause in tissue node carry out authentication when there is higher error rate, and then cause the reliability of authentication compared with
It is low.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of identity identifying method and terminal device based on alliance's chain, with
Solve the problems, such as that the existing identity identifying method reliability based on alliance's chain is lower.
The embodiment of the present invention in a first aspect, provide a kind of identity identifying method based on alliance's chain, may include:
Wound generation block into alliance's chain submits the identity data of the first block chain node and request is added, described
Addition request is used to indicate the wound generation root tuber and recognizes according to the identity data the first block chain link point progress identity
Card, and pass through information to the block chain node return authentication after authentication passes through, the authentication pass information is used for table
Show that the first block chain node is added to corresponding alliance's chain group according to the identity data by the wound generation block
In knitting;
If receiving the authentication pass information that the wound generation block returns, monitor whether to receive the second block chain node
Communication request;
If receiving the communication request of the second block chain node, second block is obtained from the communication request
The identity data of chain node, and according to the identity data of the second block chain node to the second block chain link
Point carries out authentication;
If passing through to the authentication of the second block chain node, data corresponding with the communication request are returned
To the second block chain node.
The second aspect of the embodiment of the present invention provides chain a kind of identification authentication system based on alliance's chain, described device packet
It includes:
Submit unit, for the wound generation block into alliance's chain submit the identity data of the first block chain node with
Request is added, the addition request is used to indicate the wound generation root tuber according to the identity data to the first block chain link
Point carries out authentication, and passes through information to the block chain node return authentication after authentication passes through, and the certification is logical
Information is crossed for indicating that the first block chain node is added to phase according to the identity data by the wound generation block
In the alliance's chain tissue answered;
Monitoring unit monitors whether to receive the if the authentication pass information returned for receiving the wound generation block
The communication request of two block chain nodes;
Authentication unit, if the communication request for receiving the second block chain node, is obtained from the communication request
The identity data of the second block chain node is taken, and according to the identity data of the second block chain node to institute
It states the second block chain link point and carries out authentication;
Return unit will be with the communication request if the authentication for the second block chain node passes through
Corresponding data return to the second block chain node.
The third aspect of the embodiment of the present invention, provides a kind of computer readable storage medium, described computer-readable to deposit
Storage media is stored with computer program, and the computer program realizes following steps when being executed by processor:
Wound generation block into alliance's chain submits the identity data of the first block chain node and request is added, described
Addition request is used to indicate the wound generation root tuber and recognizes according to the identity data the first block chain link point progress identity
Card, and pass through information to the block chain node return authentication after authentication passes through, the authentication pass information is used for table
Show that the first block chain node is added to corresponding alliance's chain group according to the identity data by the wound generation block
In knitting;
If receiving the authentication pass information that the wound generation block returns, monitor whether to receive the second block chain node
Communication request;
If receiving the communication request of the second block chain node, second block is obtained from the communication request
The identity data of chain node, and according to the identity data of the second block chain node to the second block chain link
Point carries out authentication;
If passing through to the authentication of the second block chain node, data corresponding with the communication request are returned
To the second block chain node.
The fourth aspect of the embodiment of the present invention, provides a kind of terminal device, including memory, processor and is stored in
In the memory and the computer program that can run on the processor, when the processor executes the computer program
Realize following steps:
Wound generation block into alliance's chain submits the identity data of the first block chain node and request is added, described
Addition request is used to indicate the wound generation root tuber and recognizes according to the identity data the first block chain link point progress identity
Card, and pass through information to the block chain node return authentication after authentication passes through, the authentication pass information is used for table
Show that the first block chain node is added to corresponding alliance's chain group according to the identity data by the wound generation block
In knitting;
If receiving the authentication pass information that the wound generation block returns, monitor whether to receive the second block chain node
Communication request;
If receiving the communication request of the second block chain node, second block is obtained from the communication request
The identity data of chain node, and according to the identity data of the second block chain node to the second block chain link
Point carries out authentication;
If passing through to the authentication of the second block chain node, data corresponding with the communication request are returned
To the second block chain node.
Existing beneficial effect is the embodiment of the present invention compared with prior art:
The embodiment of the present invention is submitted identity data by wound generation block of the first block chain node into alliance's chain and is asked
The chain that coalizes is sought, to realize certification of the wound generation block to the first block chain node;After wound generation block certification passes through, alliance's chain is monitored
In the second block chain node communication request, and according to the identity data of the second block chain node to the second block chain node
Authentication is carried out, to realize certification of the first block chain node to the second block chain node;It authenticates after passing through to the second block
Chain node returned data.By the above method, the first block chain node and the second block chain link are just able to achieve by double authentication
Data interaction between point, effectively increases the reliability of the identity identifying method based on alliance's chain.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is the implementation process schematic diagram of the identity identifying method provided in an embodiment of the present invention based on alliance's chain;
Fig. 2 is the schematic diagram of the identification authentication system provided in an embodiment of the present invention based on alliance's chain;
Fig. 3 is the schematic diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed
Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific
The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, in case unnecessary details interferes description of the invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " instruction is described special
Sign, entirety, step, operation, the presence of element and/or component, but be not precluded one or more of the other feature, entirety, step,
Operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment
And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
Fig. 1 is the implementation process schematic diagram of the identity identifying method provided in an embodiment of the present invention based on alliance's chain, is such as schemed
Shown, the method may include following steps:
Step S101, the wound generation block into alliance's chain submit the identity data and addition of the first block chain node
Request, the addition request are used to indicate the wound generation root tuber and click through according to the identity data to the first block chain link
Row authentication, and pass through information to the block chain node return authentication after authentication passes through, the certification passes through letter
Breath is for indicating that the first block chain node has been added to accordingly according to the identity data by the wound generation block
In alliance's chain tissue.
In practical applications, some block chain node A wants that an alliance chain B is added, it is necessary first to pass through alliance chain B
Wound generation block in record authentication rule.Block chain node A sends the addition request for the chain that coalizes to alliance's catenary system,
After alliance's catenary system wound generation block receives addition request, the identity data of block chain node A is obtained, and create generation with alliance's chain
The authentication rule recorded in block compared to pair.
Here, the identity data of block chain node A can be the CA mechanism by representing alliance's chain organizational member identity
The digital certificate signed and issued, the identity data of node can be placed in digital certificate DN project or customized digital certificate
In extension.
Wherein, the identity data is the extension information in the digital certificate of block chain node.
The extension information includes:
The title of alliance's chain, the mark of alliance's chain tissue, the type of the title of block chain node and block chain node.
The title of alliance's chain indicates that alliance's chain network belonging to block chain node, the mark of alliance's chain tissue indicate area
Alliance's chain tissue belonging to block chain node, block chain nodename are the distinguished name for indicating block chain node in the tissue
Claim, the type of block chain node indicates the transaction types that block chain node is capable of handling, for example, block chain node A can be executed
Payment transaction, block chain node B can execute gathering transaction.
It is, of course, also possible to increase the extension of other digital certificates, as long as can be used in the body for illustrating block chain node
The information of part all can serve as extension.One legal CA mechanism cannot unlimitedly create legal root CA, but for
Extension information does not require but.So the identity data of block chain node is placed in digital certificate extension, when
When one group is woven with multiple CA, node in tissue only needs a digital certificate, can in the extension of this digital certificate
To include the information of all CA belonging to the node, be conducive to the management of block chain node in this way.
In one embodiment, the wound generation root tuber carries out body to the first block chain link point according to the identity data
Part certification, comprising:
Judge the title phase of the title of alliance's chain in identity data alliance's chain whether corresponding with the wound generation block
Together.
If the title of the title of alliance's chain alliance's chain corresponding with the wound generation block is identical in the identity data,
Judge in the default organizational member list stored in the wound generation block with the presence or absence of alliance's chain tissue in the identity data
Mark.
If in the default organizational member list stored in the wound generation block, there are alliance's chain tissues in the identity data
Mark, then the authentication of the first block chain node is passed through.
It creates generation block and authentication is carried out to the first block chain link point, be the first authentication again based on alliance's chain.Only
It has passed through the certification of wound generation block, the first block chain node can be added in alliance's chain belonging to wound generation block, the first block chain
Node has only been added in alliance's chain, could carry out data interaction with each block chain link point in alliance's chain.
Step S102 monitors whether to receive the secondth area if receiving the authentication pass information that the wound generation block returns
The communication request of block chain node.
After wound generation block has passed through the authentication to the first block chain node, the first block chain node can be added to wound
In alliance's chain belonging to generation block, and then the first block chain node can be with other nodes in alliance's chain i.e. the second block chain link
Point carries out data interaction.But before carrying out data interaction, the first block chain node needs to carry out the second block chain link point
Authentication, i.e., the second authentication again.Such as following step.
Step S103 obtains institute if receiving the communication request of the second block chain node from the communication request
The identity data of the second block chain node is stated, and according to the identity data of the second block chain node to described
2 block chain link points carry out authentication.
In one embodiment, the identity data according to the second block chain node is to second block
Chain link point carries out authentication, comprising:
Whether S1031 verifies the title of alliance's chain in the extension information of the second block chain node with described first
The title of alliance's chain is identical in the extension information of block chain node.
The step for for verifying whether the first block chain node and the second block chain node belong to identical alliance's chain.
Optionally, in the extension information of the verifying the second block chain node alliance's chain title whether with it is described
The title of alliance's chain is identical in the extension information of first block chain node, comprising:
It is the first character string by the name translation of alliance's chain in the extension information of the first block chain node, and by institute
The name translation for stating alliance's chain in the extension information of the second block chain node is the second character string.
Each character in first character string is compared with corresponding character in second character string respectively.
If each character of first character string is identical as corresponding character in second character string, described in judgement
Join in the title of alliance's chain and the extension information of the first block chain node in the extension information of second block chain node
The title of alliance's chain is identical.
S1032, if the title of alliance's chain and the first block chain in the extension information of the second block chain node
The title of alliance's chain is identical in the extension information of node, then verifies in the default organizational member list stored in the wound generation block
With the presence or absence of the mark of alliance's chain tissue in the extension information of the second block chain node.
The step for for verifying whether the first block chain node and the second block chain node belong to identical alliance's chain group
It knits.
S1033, if there are the second block chain nodes in the default organizational member list stored in the wound generation block
The mark of alliance's chain tissue in extension information, then judge whether the corresponding nodes ' behavior of the communication request meets described second
The corresponding nodes ' behavior of type of block chain node in the extension information of block chain node.
The step for whether meet its own node for verifying the request behavior that the second block chain node is currently initiated
Behavior.For example, it is assumed that the node type of block chain node B is gathering transaction, but block chain node B is sent out to block chain node A
What is risen is payment transaction, then the behavior of block chain node B is not inconsistent with its node type, then does not allow to trade.
Optionally, described to judge whether the corresponding nodes ' behavior of the communication request meets the second block chain node
The corresponding nodes ' behavior of type of block chain node in extension information, comprising:
The corresponding behavior list of type of block chain node in the extension information of the second block chain node is obtained, and
Obtain the request code for including in the communication request.
It searches in the behavior list with the presence or absence of the request code.
If determining that the corresponding nodes ' behavior of the communication request meets institute there are the request code in the behavior list
State the corresponding nodes ' behavior of type of block chain node in the extension information of the second block chain node.
Illustratively, it is assumed that block chain node B initiates payment transaction, and the corresponding solicited message of payment transaction is 002, and area
There was only 001 in the behavior list of block chain node B, illustrates that block chain node B does not allow to initiate payment transaction.
S1034, if the corresponding nodes ' behavior of the communication request meets the extension information of the second block chain node
The corresponding nodes ' behavior of type of middle block chain node then passes through the authentication of the second block chain node.
To this step, authentication of the first block chain node to the second block chain node is completed, that is, completes second
Re-authentication.
Step S104 will be corresponding with the communication request if passing through to the authentication of the second block chain node
Data return to the second block chain node.
The embodiment of the present invention is submitted identity data by wound generation block of the first block chain node into alliance's chain and is asked
The chain that coalizes is sought, to realize certification of the wound generation block to the first block chain node;After wound generation block certification passes through, alliance's chain is monitored
In the second block chain node communication request, and according to the identity data of the second block chain node to the second block chain node
Authentication is carried out, to realize certification of the first block chain node to the second block chain node;It authenticates after passing through to the second block
Chain node returned data.By the above method, the first block chain node and the second block chain link are just able to achieve by double authentication
Data interaction between point, effectively increases the reliability of the identity identifying method based on alliance's chain.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
Fig. 2 is the schematic diagram of the identification authentication system provided in an embodiment of the present invention based on alliance's chain, for ease of description,
Part related to the embodiment of the present invention is only shown.
Identification authentication system shown in Fig. 2 based on alliance's chain can be the software list being built in existing terminal device
Member, hardware cell or soft or hard combination unit, can also be used as independent pendant and be integrated into the terminal device, can be with
Exist as independent terminal device.
The identification authentication system 2 based on alliance's chain includes:
Unit 21 is submitted, the identity data of the first block chain node is submitted for the wound generation block into alliance's chain
It is requested with being added, the addition request is used to indicate the wound generation root tuber according to the identity data to the first block chain
Node carries out authentication, and passes through information, the certification to the block chain node return authentication after authentication passes through
By information for indicating that the first block chain node has been added to according to the identity data by the wound generation block
In corresponding alliance chain tissue.
Monitoring unit 22, if the authentication pass information returned for receiving the wound generation block, monitors whether to receive
The communication request of second block chain node.
Authentication unit 23, if the communication request for receiving the second block chain node, from the communication request
The identity data of the second block chain node is obtained, and according to the identity data pair of the second block chain node
The second block chain link point carries out authentication.
Return unit 24 will ask if the authentication for the second block chain node passes through with the communication
Corresponding data are asked to return to the second block chain node.
Wherein, the identity data is the extension information in the digital certificate of block chain node.
The extension information includes:
The title of alliance's chain, the mark of alliance's chain tissue, the type of the title of block chain node and block chain node.
Optionally, the authentication unit 23 includes:
First authentication module, whether the title of alliance's chain in the extension information for verifying the second block chain node
It is identical as the title of alliance's chain in the extension information of the first block chain node.
Second authentication module, if for alliance's chain in the extension information of the second block chain node title with it is described
The title of alliance's chain is identical in the extension information of first block chain node, then verifies the default tissue stored in the wound generation block
With the presence or absence of the mark of alliance's chain tissue in the extension information of the second block chain node in members list.
Third authentication module, if for there are secondth areas in the default organizational member list that stores in the wound generation block
The mark of alliance's chain tissue in the extension information of block chain node, then judge whether the corresponding nodes ' behavior of the communication request accords with
Close the corresponding nodes ' behavior of type of block chain node in the extension information of the second block chain node.
First by module, if meeting the second block chain node for the corresponding nodes ' behavior of the communication request
The corresponding nodes ' behavior of type of block chain node in extension information is then logical to the authentication of the second block chain node
It crosses.
Optionally, first authentication module includes:
Transform subblock, for being the by the name translation of alliance's chain in the extension information of the first block chain node
One character string, and be the second character string by the name translation of alliance's chain in the extension information of the second block chain node.
Submodule is compared, for respectively that each character in first character string is corresponding with second character string
Character be compared.
First decision sub-module, if each character for first character string is corresponding with second character string
Character is identical, then determines the title of alliance's chain and the first block chain link in the extension information of the second block chain node
The title of alliance's chain is identical in the extension information of point.
Optionally, the third verifying submodule includes:
Acquisition submodule, the type pair of block chain node in the extension information for obtaining the second block chain node
The behavior list answered, and obtain the request code for including in the communication request.
Submodule is searched, for searching in the behavior list with the presence or absence of the request code.
Second decision sub-module, if determining the communication request for there are the request codes in the behavior list
Corresponding nodes ' behavior meets the corresponding node of type of block chain node in the extension information of the second block chain node
Behavior.
Optionally, the submission unit 21 includes:
Whether first judgment module, the title for judging alliance's chain in the identity data are corresponding with the wound generation block
Alliance's chain title it is identical.
Second judgment module, if the title for alliance's chain in the identity data is corresponding with the wound generation block
The title of alliance's chain is identical, then judges in the default organizational member list stored in the wound generation block with the presence or absence of the identity number
According to the mark of middle alliance's chain tissue.
Second by module, if there are the identity in the default organizational member list for storing in the wound generation block
The mark of alliance's chain tissue in data then passes through the authentication of the first block chain node.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list
Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Fig. 3 is the schematic diagram of terminal device provided in an embodiment of the present invention.As shown in figure 3, the terminal device 3 of the embodiment
Include: processor 30, memory 31 and is stored in the calculating that can be run in the memory 31 and on the processor 30
Machine program 32.The processor 30 realizes above-mentioned each authentication side based on alliance's chain when executing the computer program 32
Step in method embodiment, such as step S101 to S104 shown in FIG. 1.Alternatively, the processor 30 executes the computer
The function of each module/unit in above-mentioned each Installation practice, such as the function of module 21 to 24 shown in Fig. 2 are realized when program 32.
Illustratively, the computer program 32 can be divided into one or more module/units, it is one or
Multiple module/units are stored in the memory 31, and are executed by the processor 30, to complete the present invention.Described one
A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for
Implementation procedure of the computer program 32 in the terminal device 3 is described.For example, the computer program 32 can be divided
It is cut into and submits unit, monitoring unit, authentication unit, return unit, each unit concrete function is as follows:
Submit unit, for the wound generation block into alliance's chain submit the identity data of the first block chain node with
Request is added, the addition request is used to indicate the wound generation root tuber according to the identity data to the first block chain link
Point carries out authentication, and passes through information to the block chain node return authentication after authentication passes through, and the certification is logical
Information is crossed for indicating that the first block chain node is added to phase according to the identity data by the wound generation block
In the alliance's chain tissue answered.
Monitoring unit monitors whether to receive the if the authentication pass information returned for receiving the wound generation block
The communication request of two block chain nodes.
Authentication unit, if the communication request for receiving the second block chain node, is obtained from the communication request
The identity data of the second block chain node is taken, and according to the identity data of the second block chain node to institute
It states the second block chain link point and carries out authentication.
Return unit will be with the communication request if the authentication for the second block chain node passes through
Corresponding data return to the second block chain node.
Wherein, the identity data is the extension information in the digital certificate of block chain node.
The extension information includes:
The title of alliance's chain, the mark of alliance's chain tissue, the type of the title of block chain node and block chain node.
Optionally, the authentication unit includes:
First authentication module, whether the title of alliance's chain in the extension information for verifying the second block chain node
It is identical as the title of alliance's chain in the extension information of the first block chain node.
Second authentication module, if for alliance's chain in the extension information of the second block chain node title with it is described
The title of alliance's chain is identical in the extension information of first block chain node, then verifies the default tissue stored in the wound generation block
With the presence or absence of the mark of alliance's chain tissue in the extension information of the second block chain node in members list.
Third authentication module, if for there are secondth areas in the default organizational member list that stores in the wound generation block
The mark of alliance's chain tissue in the extension information of block chain node, then judge whether the corresponding nodes ' behavior of the communication request accords with
Close the corresponding nodes ' behavior of type of block chain node in the extension information of the second block chain node.
First by module, if meeting the second block chain node for the corresponding nodes ' behavior of the communication request
The corresponding nodes ' behavior of type of block chain node in extension information is then logical to the authentication of the second block chain node
It crosses.
Optionally, first authentication module includes:
Transform subblock, for being the by the name translation of alliance's chain in the extension information of the first block chain node
One character string, and be the second character string by the name translation of alliance's chain in the extension information of the second block chain node.
Submodule is compared, for respectively that each character in first character string is corresponding with second character string
Character be compared.
First decision sub-module, if each character for first character string is corresponding with second character string
Character is identical, then determines the title of alliance's chain and the first block chain link in the extension information of the second block chain node
The title of alliance's chain is identical in the extension information of point.
Optionally, the third verifying submodule includes:
Acquisition submodule, the type pair of block chain node in the extension information for obtaining the second block chain node
The behavior list answered, and obtain the request code for including in the communication request.
Submodule is searched, for searching in the behavior list with the presence or absence of the request code.
Second decision sub-module, if determining the communication request for there are the request codes in the behavior list
Corresponding nodes ' behavior meets the corresponding node of type of block chain node in the extension information of the second block chain node
Behavior.
Optionally, the submission unit includes:
Whether first judgment module, the title for judging alliance's chain in the identity data are corresponding with the wound generation block
Alliance's chain title it is identical.
Second judgment module, if the title for alliance's chain in the identity data is corresponding with the wound generation block
The title of alliance's chain is identical, then judges in the default organizational member list stored in the wound generation block with the presence or absence of the identity number
According to the mark of middle alliance's chain tissue.
Second by module, if there are the identity in the default organizational member list for storing in the wound generation block
The mark of alliance's chain tissue in data then passes through the authentication of the first block chain node.
The terminal device 3 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set
It is standby.The terminal device may include, but be not limited only to, processor 30, memory 31.It will be understood by those skilled in the art that Fig. 3
The only example of terminal device 3 does not constitute the restriction to terminal device 3, may include than illustrating more or fewer portions
Part perhaps combines certain components or different components, such as the terminal device can also include input-output equipment, net
Network access device, bus etc..
Alleged processor 30 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 31 can be the internal storage unit of the terminal device 3, such as the hard disk or interior of terminal device 3
It deposits.The memory 31 is also possible to the External memory equipment of the terminal device 3, such as be equipped on the terminal device 3
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge
Deposit card (Flash Card) etc..Further, the memory 31 can also both include the storage inside list of the terminal device 3
Member also includes External memory equipment.The memory 31 is for storing needed for the computer program and the terminal device
Other programs and data.The memory 31 can be also used for temporarily storing the data that has exported or will export.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with
It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute
The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as
Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately
A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device
Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation
All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium
It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code
Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice
Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and
Telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of identity identifying method based on alliance's chain, which is characterized in that be applied to the first block chain node, the method packet
It includes:
Wound generation block into alliance's chain submits the identity data of the first block chain node and request, the addition is added
Request is used to indicate the wound generation root tuber and carries out authentication to the first block chain link point according to the identity data, and
To the block chain node return authentication by information after authentication passes through, the authentication pass information is for indicating described
The first block chain node is added in corresponding alliance's chain tissue according to the identity data by wound generation block;
If receiving the authentication pass information that the wound generation block returns, the communication for receiving the second block chain node is monitored whether
Request;
If receiving the communication request of the second block chain node, the second block chain link is obtained from the communication request
The identity data of point, and the second block chain link is clicked through according to the identity data of the second block chain node
Row authentication;
If passing through to the authentication of the second block chain node, data corresponding with the communication request are returned into institute
State the second block chain node.
2. the identity identifying method as described in claim 1 based on alliance's chain, which is characterized in that the identity data is
Extension information in the digital certificate of block chain node;
The extension information includes:
The title of alliance's chain, the mark of alliance's chain tissue, the type of the title of block chain node and block chain node.
3. the identity identifying method as claimed in claim 2 based on alliance's chain, which is characterized in that described according to secondth area
The identity data of block chain node carries out authentication to the second block chain link point, comprising:
Verify alliance's chain in the extension information of the second block chain node title whether with the first block chain node
Extension information in alliance's chain title it is identical;
If the extension of the title of alliance's chain and the first block chain node in the extension information of the second block chain node
The title of alliance's chain is identical in item information, then verifies in the default organizational member list stored in the wound generation block with the presence or absence of institute
State the mark of alliance's chain tissue in the extension information of the second block chain node;
If in the default organizational member list stored in the wound generation block, there are the extension information of the second block chain node
The mark of middle alliance's chain tissue, then judge whether the corresponding nodes ' behavior of the communication request meets the second block chain node
Extension information in block chain node the corresponding nodes ' behavior of type;
If the corresponding nodes ' behavior of the communication request meets block chain link in the extension information of the second block chain node
The corresponding nodes ' behavior of type of point, then pass through the authentication of the second block chain node.
4. the identity identifying method as claimed in claim 3 based on alliance's chain, which is characterized in that verifying secondth area
In the extension information of block chain node the title of alliance's chain whether with alliance in the extension information of the first block chain node
The title of chain is identical, comprising:
It is the first character string by the name translation of alliance's chain in the extension information of the first block chain node, and by described the
The name translation of alliance's chain is the second character string in the extension information of two block chain nodes;
Each character in first character string is compared with corresponding character in second character string respectively;
If each character of first character string is identical as corresponding character in second character string, described second is determined
The title of alliance's chain and alliance's chain in the extension information of the first block chain node in the extension information of block chain node
Title it is identical.
5. the identity identifying method as claimed in claim 3 based on alliance's chain, which is characterized in that the judgement communication is asked
The type for asking corresponding nodes ' behavior whether to meet block chain node in the extension information of the second block chain node is corresponding
Nodes ' behavior, comprising:
The corresponding behavior list of type of block chain node in the extension information of the second block chain node is obtained, and is obtained
The request code for including in the communication request;
It searches in the behavior list with the presence or absence of the request code;
If determining that the corresponding nodes ' behavior of the communication request meets described there are the request code in the behavior list
The corresponding nodes ' behavior of type of block chain node in the extension information of two block chain nodes.
6. the identity identifying method as claimed in claim 2 based on alliance's chain, which is characterized in that the wound generation root tuber evidence
The identity data carries out authentication to the first block chain link point, comprising:
Judge that whether corresponding with the wound generation block title of the title of alliance's chain in identity data alliance's chain be identical;
If the title of the title of alliance's chain alliance's chain corresponding with the wound generation block is identical in the identity data, judge
With the presence or absence of the mark of alliance's chain tissue in the identity data in the default organizational member list stored in the wound generation block;
If in the default organizational member list stored in the wound generation block, there are the marks of alliance's chain tissue in the identity data
Know, then the authentication of the first block chain node is passed through.
7. a kind of identification authentication system based on alliance's chain, which is characterized in that described device includes:
Unit is submitted, the identity data and addition of the first block chain node are submitted for the wound generation block into alliance's chain
Request, the addition request are used to indicate the wound generation root tuber and click through according to the identity data to the first block chain link
Row authentication, and pass through information to the block chain node return authentication after authentication passes through, the certification passes through letter
Breath is for indicating that the first block chain node has been added to accordingly according to the identity data by the wound generation block
In alliance's chain tissue;
Monitoring unit, if the authentication pass information returned for receiving the wound generation block, monitors whether to receive the secondth area
The communication request of block chain node;
Authentication unit, if the communication request for receiving the second block chain node, obtains institute from the communication request
The identity data of the second block chain node is stated, and according to the identity data of the second block chain node to described
2 block chain link points carry out authentication;
Return unit will be corresponding with the communication request if the authentication for the second block chain node passes through
Data return to the second block chain node.
8. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In identity of the realization based on alliance's chain as described in any one of claims 1 to 6 when the computer program is executed by processor
The step of authentication method.
9. a kind of terminal device, including memory, processor and storage are in the memory and can be on the processor
The computer program of operation, which is characterized in that the processor realizes following steps when executing the computer program:
Wound generation block into alliance's chain submits the identity data of the first block chain node and request, the addition is added
Request is used to indicate the wound generation root tuber according to the identity data to the first block chain link point progress authentication, in body
Part certification pass through after to the block chain node return authentication by information, the authentication pass information is for indicating the wound generation
The first block chain node is added in corresponding alliance's chain tissue according to the identity data by block;
If receiving the authentication pass information that the wound generation block returns, the communication for receiving the second block chain node is monitored whether
Request;
If receiving the communication request of the second block chain node, the second block link is obtained from the communication request
The identity data of node, and according to the identity data of the second block chain node to the second block chain node
Carry out authentication;
If passing through to the authentication of the second block chain node, data corresponding with the communication request are returned into institute
State the second block chain node.
10. terminal device as claimed in claim 9, which is characterized in that the identity data is the number of block chain node
Extension information in word certificate;
The extension information includes:
The title of alliance's chain, the mark of alliance's chain tissue, the title of block chain node, the type of block chain node.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811529919.4A CN109815657B (en) | 2018-12-14 | 2018-12-14 | Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment |
PCT/CN2019/122453 WO2020119506A1 (en) | 2018-12-14 | 2019-12-02 | Identity authentication method based on alliance chain, and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811529919.4A CN109815657B (en) | 2018-12-14 | 2018-12-14 | Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109815657A true CN109815657A (en) | 2019-05-28 |
CN109815657B CN109815657B (en) | 2022-10-28 |
Family
ID=66602943
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811529919.4A Active CN109815657B (en) | 2018-12-14 | 2018-12-14 | Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109815657B (en) |
WO (1) | WO2020119506A1 (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110177109A (en) * | 2019-06-04 | 2019-08-27 | 北京理工大学 | A kind of cross-domain Verification System of dual-proxy based on id password and alliance's chain |
CN110278255A (en) * | 2019-06-13 | 2019-09-24 | 深圳前海微众银行股份有限公司 | A kind of method and device of the Internet of Things IOT communication between devices based on block chain |
CN110430235A (en) * | 2019-06-28 | 2019-11-08 | 阿里巴巴集团控股有限公司 | The method and apparatus that message can be certified based on across the chain transmission of processing module |
CN110602051A (en) * | 2019-08-15 | 2019-12-20 | 深圳壹账通智能科技有限公司 | Information processing method based on consensus protocol and related device |
CN110620776A (en) * | 2019-09-24 | 2019-12-27 | 腾讯科技(深圳)有限公司 | Data transfer information transmission method and device |
CN111294356A (en) * | 2020-02-11 | 2020-06-16 | 深圳壹账通智能科技有限公司 | Block chain based method and system for organizing node uplink |
WO2020119506A1 (en) * | 2018-12-14 | 2020-06-18 | 深圳壹账通智能科技有限公司 | Identity authentication method based on alliance chain, and terminal device |
CN111737707A (en) * | 2020-05-14 | 2020-10-02 | 云南云烁巴克云科技有限公司 | Verification packet generation and verification method based on block chain, server and electronic equipment |
CN111985929A (en) * | 2020-09-03 | 2020-11-24 | 深圳壹账通智能科技有限公司 | Transaction verification method and device in block chain, node equipment and storage medium |
CN112287361A (en) * | 2020-09-11 | 2021-01-29 | 杭州鸽子蛋网络科技有限责任公司 | Data governance method, system, electronic device and storage medium |
CN112861090A (en) * | 2021-03-18 | 2021-05-28 | 深圳前海微众银行股份有限公司 | Information processing method, device, equipment, storage medium and computer program product |
CN113114634A (en) * | 2021-03-24 | 2021-07-13 | 武汉卓尔信息科技有限公司 | Credible data management method based on alliance chain and alliance chain |
CN113206817A (en) * | 2020-02-03 | 2021-08-03 | 中移物联网有限公司 | Equipment connection confirmation method and block chain network |
US11251966B2 (en) | 2019-06-28 | 2022-02-15 | Advanced New Technologies Co., Ltd. | Sending cross-chain authenticatable messages |
CN114095246A (en) * | 2021-11-18 | 2022-02-25 | 国网河北省电力有限公司电力科学研究院 | Network access identity authentication method of power distribution terminal |
US11336465B2 (en) | 2019-06-28 | 2022-05-17 | Advanced New Technologies Co., Ltd. | Sending cross-chain authenticatable messages |
US11356282B2 (en) | 2019-06-28 | 2022-06-07 | Advanced New Technologies Co., Ltd. | Sending cross-chain authenticatable messages |
CN114640475A (en) * | 2022-05-19 | 2022-06-17 | 广东省绿算技术有限公司 | Decentralized identity authentication method and device, computer equipment and storage medium |
CN114978529A (en) * | 2022-05-10 | 2022-08-30 | 平安国际智慧城市科技股份有限公司 | Block chain-based identity verification method and related equipment |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113972991A (en) * | 2020-07-23 | 2022-01-25 | 南京理工大学 | Cross-domain identity authentication method based on multistage alliance chain |
CN112633878A (en) * | 2020-08-31 | 2021-04-09 | 上海添玑网络服务有限公司 | Real estate alliance chain terminal application platform and application method |
CN112733121A (en) * | 2021-01-13 | 2021-04-30 | 京东数科海益信息科技有限公司 | Data acquisition method, device, equipment and storage medium |
CN113225736B (en) * | 2021-03-24 | 2024-02-02 | 湖南宸瀚信息科技有限责任公司 | Unmanned aerial vehicle cluster node authentication method and device, storage medium and computer equipment |
CN115601053B (en) * | 2022-12-16 | 2023-08-22 | 浪潮云洲工业互联网有限公司 | Method and equipment for proving safety and credibility and protecting back-to-back origin |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789920A (en) * | 2016-11-25 | 2017-05-31 | 深圳前海微众银行股份有限公司 | The joint connecting method and device of block chain |
CN107426157A (en) * | 2017-04-21 | 2017-12-01 | 杭州趣链科技有限公司 | A kind of alliance's chain authority control method based on digital certificate and ca authentication system |
US20170366348A1 (en) * | 2016-06-17 | 2017-12-21 | Capital One Services, Llc | Blockchain systems and methods for user authentication |
CN107592292A (en) * | 2017-07-26 | 2018-01-16 | 阿里巴巴集团控股有限公司 | A kind of block chain communication method between nodes and device |
CN107733855A (en) * | 2017-08-31 | 2018-02-23 | 中国科学院信息工程研究所 | A kind of block catenary system and application process that can support publicly-owned chain, alliance's chain and privately owned chain simultaneously |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050114447A1 (en) * | 2003-10-24 | 2005-05-26 | Kim Cameron | Method and system for identity exchange and recognition for groups and group members |
CN108389130B (en) * | 2018-03-02 | 2020-02-14 | 合肥学院 | Method for generating multi-transaction mode alliance chain |
CN108416589A (en) * | 2018-03-08 | 2018-08-17 | 深圳前海微众银行股份有限公司 | Connection method, system and the computer readable storage medium of block chain node |
CN109815657B (en) * | 2018-12-14 | 2022-10-28 | 深圳壹账通智能科技有限公司 | Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment |
-
2018
- 2018-12-14 CN CN201811529919.4A patent/CN109815657B/en active Active
-
2019
- 2019-12-02 WO PCT/CN2019/122453 patent/WO2020119506A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170366348A1 (en) * | 2016-06-17 | 2017-12-21 | Capital One Services, Llc | Blockchain systems and methods for user authentication |
CN106789920A (en) * | 2016-11-25 | 2017-05-31 | 深圳前海微众银行股份有限公司 | The joint connecting method and device of block chain |
CN107426157A (en) * | 2017-04-21 | 2017-12-01 | 杭州趣链科技有限公司 | A kind of alliance's chain authority control method based on digital certificate and ca authentication system |
CN107592292A (en) * | 2017-07-26 | 2018-01-16 | 阿里巴巴集团控股有限公司 | A kind of block chain communication method between nodes and device |
CN107733855A (en) * | 2017-08-31 | 2018-02-23 | 中国科学院信息工程研究所 | A kind of block catenary system and application process that can support publicly-owned chain, alliance's chain and privately owned chain simultaneously |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020119506A1 (en) * | 2018-12-14 | 2020-06-18 | 深圳壹账通智能科技有限公司 | Identity authentication method based on alliance chain, and terminal device |
CN110177109A (en) * | 2019-06-04 | 2019-08-27 | 北京理工大学 | A kind of cross-domain Verification System of dual-proxy based on id password and alliance's chain |
CN110177109B (en) * | 2019-06-04 | 2020-05-12 | 北京理工大学 | Double-proxy cross-domain authentication system based on identification password and alliance chain |
CN110278255A (en) * | 2019-06-13 | 2019-09-24 | 深圳前海微众银行股份有限公司 | A kind of method and device of the Internet of Things IOT communication between devices based on block chain |
CN110430235A (en) * | 2019-06-28 | 2019-11-08 | 阿里巴巴集团控股有限公司 | The method and apparatus that message can be certified based on across the chain transmission of processing module |
US11356282B2 (en) | 2019-06-28 | 2022-06-07 | Advanced New Technologies Co., Ltd. | Sending cross-chain authenticatable messages |
US11343103B2 (en) | 2019-06-28 | 2022-05-24 | Advanced New Technologies Co., Ltd. | Sending cross-chain authenticatable messages |
US11336465B2 (en) | 2019-06-28 | 2022-05-17 | Advanced New Technologies Co., Ltd. | Sending cross-chain authenticatable messages |
US11251966B2 (en) | 2019-06-28 | 2022-02-15 | Advanced New Technologies Co., Ltd. | Sending cross-chain authenticatable messages |
CN110602051A (en) * | 2019-08-15 | 2019-12-20 | 深圳壹账通智能科技有限公司 | Information processing method based on consensus protocol and related device |
CN110620776B (en) * | 2019-09-24 | 2021-11-26 | 腾讯科技(深圳)有限公司 | Data transfer information transmission method and device |
CN110620776A (en) * | 2019-09-24 | 2019-12-27 | 腾讯科技(深圳)有限公司 | Data transfer information transmission method and device |
CN113206817B (en) * | 2020-02-03 | 2022-07-12 | 中移物联网有限公司 | Equipment connection confirmation method and block chain network |
CN113206817A (en) * | 2020-02-03 | 2021-08-03 | 中移物联网有限公司 | Equipment connection confirmation method and block chain network |
CN111294356B (en) * | 2020-02-11 | 2022-09-06 | 深圳壹账通智能科技有限公司 | Block chain-based method and system for organizing uplink of nodes |
CN111294356A (en) * | 2020-02-11 | 2020-06-16 | 深圳壹账通智能科技有限公司 | Block chain based method and system for organizing node uplink |
CN111737707A (en) * | 2020-05-14 | 2020-10-02 | 云南云烁巴克云科技有限公司 | Verification packet generation and verification method based on block chain, server and electronic equipment |
CN111737707B (en) * | 2020-05-14 | 2022-09-27 | 云南云烁巴克云科技有限公司 | Block chain based verification package generation and verification method, server and electronic equipment |
CN111985929A (en) * | 2020-09-03 | 2020-11-24 | 深圳壹账通智能科技有限公司 | Transaction verification method and device in block chain, node equipment and storage medium |
CN112287361A (en) * | 2020-09-11 | 2021-01-29 | 杭州鸽子蛋网络科技有限责任公司 | Data governance method, system, electronic device and storage medium |
CN112861090A (en) * | 2021-03-18 | 2021-05-28 | 深圳前海微众银行股份有限公司 | Information processing method, device, equipment, storage medium and computer program product |
CN112861090B (en) * | 2021-03-18 | 2023-01-31 | 深圳前海微众银行股份有限公司 | Information processing method, device, equipment, storage medium and computer program product |
CN113114634A (en) * | 2021-03-24 | 2021-07-13 | 武汉卓尔信息科技有限公司 | Credible data management method based on alliance chain and alliance chain |
CN114095246A (en) * | 2021-11-18 | 2022-02-25 | 国网河北省电力有限公司电力科学研究院 | Network access identity authentication method of power distribution terminal |
CN114095246B (en) * | 2021-11-18 | 2024-01-23 | 国网河北省电力有限公司电力科学研究院 | Network access identity authentication method of power distribution terminal |
CN114978529A (en) * | 2022-05-10 | 2022-08-30 | 平安国际智慧城市科技股份有限公司 | Block chain-based identity verification method and related equipment |
CN114640475B (en) * | 2022-05-19 | 2022-09-06 | 广东省绿算技术有限公司 | Decentralized identity authentication method and device, computer equipment and storage medium |
CN114640475A (en) * | 2022-05-19 | 2022-06-17 | 广东省绿算技术有限公司 | Decentralized identity authentication method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109815657B (en) | 2022-10-28 |
WO2020119506A1 (en) | 2020-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109815657A (en) | A kind of identity identifying method and terminal device based on alliance's chain | |
CN108365961B (en) | The response method and server that interface call method and terminal device, interface call | |
CN111667267B (en) | Block chain transaction risk identification method and device | |
CN110838065A (en) | Transaction data processing method and device | |
CN110245220A (en) | Electronic document signs method, apparatus and server, storage medium | |
CN108564181A (en) | Electrical equipment fault detects and method for maintaining and terminal device | |
CN109672683A (en) | Binding method, binding device and the terminal device of internet of things equipment | |
CN107766040A (en) | A kind of method, apparatus and computer-readable recording medium for generating interface document | |
CN110222529A (en) | Assets management method, electronic equipment and computer storage medium based on alliance's chain | |
CN110505305A (en) | A kind of block chain sharding method, device and block catenary system | |
CN110362357A (en) | A kind of configuration file management method and device of application program | |
CN110517147A (en) | Transaction data processing method, device, system and computer readable storage medium | |
CN109861992A (en) | A kind of information interacting method and across scene method for tracing of monitor terminal | |
CN109218080A (en) | A kind of method, monitoring system and the terminal device of automatic drafting network topology architecture | |
CN110365479A (en) | Random digit generation method and device based on block chain | |
CN109241357A (en) | Chain structure model and its construction method, system and terminal device | |
CN109684272A (en) | Document storage method, system and terminal device | |
CN109460661A (en) | A kind of logical security leak detection method, device and terminal device | |
CN110322582A (en) | Lightguide cable link method for inspecting, device and terminal device | |
CN105721612B (en) | Data transmission method and device | |
CN109066650A (en) | Power system vulnerability appraisal procedure and terminal device | |
CN114338666A (en) | Method, device, equipment and medium for verifying Fabric block chain cross-chain transaction | |
CN109902493A (en) | The delivery method and server of script | |
CN109359938A (en) | A kind of optimization method of flow chart of data processing, device and terminal device | |
CN108965315A (en) | A kind of authentic authentication method of terminal device, device and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |