CN109815657A - A kind of identity identifying method and terminal device based on alliance's chain - Google Patents

A kind of identity identifying method and terminal device based on alliance's chain Download PDF

Info

Publication number
CN109815657A
CN109815657A CN201811529919.4A CN201811529919A CN109815657A CN 109815657 A CN109815657 A CN 109815657A CN 201811529919 A CN201811529919 A CN 201811529919A CN 109815657 A CN109815657 A CN 109815657A
Authority
CN
China
Prior art keywords
block chain
alliance
chain node
block
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811529919.4A
Other languages
Chinese (zh)
Other versions
CN109815657B (en
Inventor
冯承勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201811529919.4A priority Critical patent/CN109815657B/en
Publication of CN109815657A publication Critical patent/CN109815657A/en
Priority to PCT/CN2019/122453 priority patent/WO2020119506A1/en
Application granted granted Critical
Publication of CN109815657B publication Critical patent/CN109815657B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Abstract

The present invention is suitable for block chain technical field, provides a kind of identity identifying method and terminal device based on alliance's chain, comprising: the wound generation block into alliance's chain submits the identity data of the first block chain node and request is added;If receiving the authentication pass information that the wound generation block returns, the communication request for receiving the second block chain node is monitored whether;If receiving the communication request of the second block chain node, the identity data of the second block chain node is then obtained from the communication request, and authentication is carried out to the second block chain link point according to the identity data of the second block chain node;If passing through to the authentication of the second block chain node, data corresponding with the communication request are returned into the second block chain node.By the above method, the reliability of the identity identifying method based on alliance's chain is effectively increased.

Description

A kind of identity identifying method and terminal device based on alliance's chain
Technical field
The present invention relates to block chain technical fields more particularly to a kind of identity identifying method and terminal based on alliance's chain to set It is standby.
Background technique
In alliance's chain, usually using digital certificate, to carry out trusted identity certification, (digital certificate is by digital certificate machine Structure (CA, Certificate Authority) is issued).In order to distinguish multiple participation tissues and each tissue in alliance's chain Multiple alliance's chain nodes of middle participation, the scheme generallyd use are to represent alliance for each organizational building one individual root CA A tissue in chain, and digital certificate is signed and issued to prove node in tissue by this root CA for each node in the tissue Identity.Alliance's chain authenticate node identities when, by verify node digital certificate effectively signing and issuing root CA judges this Which tissue node belongs to.
One tissue may participate in multiple and different alliance's chains, i.e., one tissue may have multiple CA, then the tissue The digital certificate that interior each node can have different root CA to sign and issue, i.e., each node correspond to multiple digital certificates, this will lead Cause in tissue node carry out authentication when there is higher error rate, and then cause the reliability of authentication compared with It is low.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of identity identifying method and terminal device based on alliance's chain, with Solve the problems, such as that the existing identity identifying method reliability based on alliance's chain is lower.
The embodiment of the present invention in a first aspect, provide a kind of identity identifying method based on alliance's chain, may include:
Wound generation block into alliance's chain submits the identity data of the first block chain node and request is added, described Addition request is used to indicate the wound generation root tuber and recognizes according to the identity data the first block chain link point progress identity Card, and pass through information to the block chain node return authentication after authentication passes through, the authentication pass information is used for table Show that the first block chain node is added to corresponding alliance's chain group according to the identity data by the wound generation block In knitting;
If receiving the authentication pass information that the wound generation block returns, monitor whether to receive the second block chain node Communication request;
If receiving the communication request of the second block chain node, second block is obtained from the communication request The identity data of chain node, and according to the identity data of the second block chain node to the second block chain link Point carries out authentication;
If passing through to the authentication of the second block chain node, data corresponding with the communication request are returned To the second block chain node.
The second aspect of the embodiment of the present invention provides chain a kind of identification authentication system based on alliance's chain, described device packet It includes:
Submit unit, for the wound generation block into alliance's chain submit the identity data of the first block chain node with Request is added, the addition request is used to indicate the wound generation root tuber according to the identity data to the first block chain link Point carries out authentication, and passes through information to the block chain node return authentication after authentication passes through, and the certification is logical Information is crossed for indicating that the first block chain node is added to phase according to the identity data by the wound generation block In the alliance's chain tissue answered;
Monitoring unit monitors whether to receive the if the authentication pass information returned for receiving the wound generation block The communication request of two block chain nodes;
Authentication unit, if the communication request for receiving the second block chain node, is obtained from the communication request The identity data of the second block chain node is taken, and according to the identity data of the second block chain node to institute It states the second block chain link point and carries out authentication;
Return unit will be with the communication request if the authentication for the second block chain node passes through Corresponding data return to the second block chain node.
The third aspect of the embodiment of the present invention, provides a kind of computer readable storage medium, described computer-readable to deposit Storage media is stored with computer program, and the computer program realizes following steps when being executed by processor:
Wound generation block into alliance's chain submits the identity data of the first block chain node and request is added, described Addition request is used to indicate the wound generation root tuber and recognizes according to the identity data the first block chain link point progress identity Card, and pass through information to the block chain node return authentication after authentication passes through, the authentication pass information is used for table Show that the first block chain node is added to corresponding alliance's chain group according to the identity data by the wound generation block In knitting;
If receiving the authentication pass information that the wound generation block returns, monitor whether to receive the second block chain node Communication request;
If receiving the communication request of the second block chain node, second block is obtained from the communication request The identity data of chain node, and according to the identity data of the second block chain node to the second block chain link Point carries out authentication;
If passing through to the authentication of the second block chain node, data corresponding with the communication request are returned To the second block chain node.
The fourth aspect of the embodiment of the present invention, provides a kind of terminal device, including memory, processor and is stored in In the memory and the computer program that can run on the processor, when the processor executes the computer program Realize following steps:
Wound generation block into alliance's chain submits the identity data of the first block chain node and request is added, described Addition request is used to indicate the wound generation root tuber and recognizes according to the identity data the first block chain link point progress identity Card, and pass through information to the block chain node return authentication after authentication passes through, the authentication pass information is used for table Show that the first block chain node is added to corresponding alliance's chain group according to the identity data by the wound generation block In knitting;
If receiving the authentication pass information that the wound generation block returns, monitor whether to receive the second block chain node Communication request;
If receiving the communication request of the second block chain node, second block is obtained from the communication request The identity data of chain node, and according to the identity data of the second block chain node to the second block chain link Point carries out authentication;
If passing through to the authentication of the second block chain node, data corresponding with the communication request are returned To the second block chain node.
Existing beneficial effect is the embodiment of the present invention compared with prior art:
The embodiment of the present invention is submitted identity data by wound generation block of the first block chain node into alliance's chain and is asked The chain that coalizes is sought, to realize certification of the wound generation block to the first block chain node;After wound generation block certification passes through, alliance's chain is monitored In the second block chain node communication request, and according to the identity data of the second block chain node to the second block chain node Authentication is carried out, to realize certification of the first block chain node to the second block chain node;It authenticates after passing through to the second block Chain node returned data.By the above method, the first block chain node and the second block chain link are just able to achieve by double authentication Data interaction between point, effectively increases the reliability of the identity identifying method based on alliance's chain.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the implementation process schematic diagram of the identity identifying method provided in an embodiment of the present invention based on alliance's chain;
Fig. 2 is the schematic diagram of the identification authentication system provided in an embodiment of the present invention based on alliance's chain;
Fig. 3 is the schematic diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " instruction is described special Sign, entirety, step, operation, the presence of element and/or component, but be not precluded one or more of the other feature, entirety, step, Operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
Fig. 1 is the implementation process schematic diagram of the identity identifying method provided in an embodiment of the present invention based on alliance's chain, is such as schemed Shown, the method may include following steps:
Step S101, the wound generation block into alliance's chain submit the identity data and addition of the first block chain node Request, the addition request are used to indicate the wound generation root tuber and click through according to the identity data to the first block chain link Row authentication, and pass through information to the block chain node return authentication after authentication passes through, the certification passes through letter Breath is for indicating that the first block chain node has been added to accordingly according to the identity data by the wound generation block In alliance's chain tissue.
In practical applications, some block chain node A wants that an alliance chain B is added, it is necessary first to pass through alliance chain B Wound generation block in record authentication rule.Block chain node A sends the addition request for the chain that coalizes to alliance's catenary system, After alliance's catenary system wound generation block receives addition request, the identity data of block chain node A is obtained, and create generation with alliance's chain The authentication rule recorded in block compared to pair.
Here, the identity data of block chain node A can be the CA mechanism by representing alliance's chain organizational member identity The digital certificate signed and issued, the identity data of node can be placed in digital certificate DN project or customized digital certificate In extension.
Wherein, the identity data is the extension information in the digital certificate of block chain node.
The extension information includes:
The title of alliance's chain, the mark of alliance's chain tissue, the type of the title of block chain node and block chain node.
The title of alliance's chain indicates that alliance's chain network belonging to block chain node, the mark of alliance's chain tissue indicate area Alliance's chain tissue belonging to block chain node, block chain nodename are the distinguished name for indicating block chain node in the tissue Claim, the type of block chain node indicates the transaction types that block chain node is capable of handling, for example, block chain node A can be executed Payment transaction, block chain node B can execute gathering transaction.
It is, of course, also possible to increase the extension of other digital certificates, as long as can be used in the body for illustrating block chain node The information of part all can serve as extension.One legal CA mechanism cannot unlimitedly create legal root CA, but for Extension information does not require but.So the identity data of block chain node is placed in digital certificate extension, when When one group is woven with multiple CA, node in tissue only needs a digital certificate, can in the extension of this digital certificate To include the information of all CA belonging to the node, be conducive to the management of block chain node in this way.
In one embodiment, the wound generation root tuber carries out body to the first block chain link point according to the identity data Part certification, comprising:
Judge the title phase of the title of alliance's chain in identity data alliance's chain whether corresponding with the wound generation block Together.
If the title of the title of alliance's chain alliance's chain corresponding with the wound generation block is identical in the identity data, Judge in the default organizational member list stored in the wound generation block with the presence or absence of alliance's chain tissue in the identity data Mark.
If in the default organizational member list stored in the wound generation block, there are alliance's chain tissues in the identity data Mark, then the authentication of the first block chain node is passed through.
It creates generation block and authentication is carried out to the first block chain link point, be the first authentication again based on alliance's chain.Only It has passed through the certification of wound generation block, the first block chain node can be added in alliance's chain belonging to wound generation block, the first block chain Node has only been added in alliance's chain, could carry out data interaction with each block chain link point in alliance's chain.
Step S102 monitors whether to receive the secondth area if receiving the authentication pass information that the wound generation block returns The communication request of block chain node.
After wound generation block has passed through the authentication to the first block chain node, the first block chain node can be added to wound In alliance's chain belonging to generation block, and then the first block chain node can be with other nodes in alliance's chain i.e. the second block chain link Point carries out data interaction.But before carrying out data interaction, the first block chain node needs to carry out the second block chain link point Authentication, i.e., the second authentication again.Such as following step.
Step S103 obtains institute if receiving the communication request of the second block chain node from the communication request The identity data of the second block chain node is stated, and according to the identity data of the second block chain node to described 2 block chain link points carry out authentication.
In one embodiment, the identity data according to the second block chain node is to second block Chain link point carries out authentication, comprising:
Whether S1031 verifies the title of alliance's chain in the extension information of the second block chain node with described first The title of alliance's chain is identical in the extension information of block chain node.
The step for for verifying whether the first block chain node and the second block chain node belong to identical alliance's chain.
Optionally, in the extension information of the verifying the second block chain node alliance's chain title whether with it is described The title of alliance's chain is identical in the extension information of first block chain node, comprising:
It is the first character string by the name translation of alliance's chain in the extension information of the first block chain node, and by institute The name translation for stating alliance's chain in the extension information of the second block chain node is the second character string.
Each character in first character string is compared with corresponding character in second character string respectively.
If each character of first character string is identical as corresponding character in second character string, described in judgement Join in the title of alliance's chain and the extension information of the first block chain node in the extension information of second block chain node The title of alliance's chain is identical.
S1032, if the title of alliance's chain and the first block chain in the extension information of the second block chain node The title of alliance's chain is identical in the extension information of node, then verifies in the default organizational member list stored in the wound generation block With the presence or absence of the mark of alliance's chain tissue in the extension information of the second block chain node.
The step for for verifying whether the first block chain node and the second block chain node belong to identical alliance's chain group It knits.
S1033, if there are the second block chain nodes in the default organizational member list stored in the wound generation block The mark of alliance's chain tissue in extension information, then judge whether the corresponding nodes ' behavior of the communication request meets described second The corresponding nodes ' behavior of type of block chain node in the extension information of block chain node.
The step for whether meet its own node for verifying the request behavior that the second block chain node is currently initiated Behavior.For example, it is assumed that the node type of block chain node B is gathering transaction, but block chain node B is sent out to block chain node A What is risen is payment transaction, then the behavior of block chain node B is not inconsistent with its node type, then does not allow to trade.
Optionally, described to judge whether the corresponding nodes ' behavior of the communication request meets the second block chain node The corresponding nodes ' behavior of type of block chain node in extension information, comprising:
The corresponding behavior list of type of block chain node in the extension information of the second block chain node is obtained, and Obtain the request code for including in the communication request.
It searches in the behavior list with the presence or absence of the request code.
If determining that the corresponding nodes ' behavior of the communication request meets institute there are the request code in the behavior list State the corresponding nodes ' behavior of type of block chain node in the extension information of the second block chain node.
Illustratively, it is assumed that block chain node B initiates payment transaction, and the corresponding solicited message of payment transaction is 002, and area There was only 001 in the behavior list of block chain node B, illustrates that block chain node B does not allow to initiate payment transaction.
S1034, if the corresponding nodes ' behavior of the communication request meets the extension information of the second block chain node The corresponding nodes ' behavior of type of middle block chain node then passes through the authentication of the second block chain node.
To this step, authentication of the first block chain node to the second block chain node is completed, that is, completes second Re-authentication.
Step S104 will be corresponding with the communication request if passing through to the authentication of the second block chain node Data return to the second block chain node.
The embodiment of the present invention is submitted identity data by wound generation block of the first block chain node into alliance's chain and is asked The chain that coalizes is sought, to realize certification of the wound generation block to the first block chain node;After wound generation block certification passes through, alliance's chain is monitored In the second block chain node communication request, and according to the identity data of the second block chain node to the second block chain node Authentication is carried out, to realize certification of the first block chain node to the second block chain node;It authenticates after passing through to the second block Chain node returned data.By the above method, the first block chain node and the second block chain link are just able to achieve by double authentication Data interaction between point, effectively increases the reliability of the identity identifying method based on alliance's chain.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Fig. 2 is the schematic diagram of the identification authentication system provided in an embodiment of the present invention based on alliance's chain, for ease of description, Part related to the embodiment of the present invention is only shown.
Identification authentication system shown in Fig. 2 based on alliance's chain can be the software list being built in existing terminal device Member, hardware cell or soft or hard combination unit, can also be used as independent pendant and be integrated into the terminal device, can be with Exist as independent terminal device.
The identification authentication system 2 based on alliance's chain includes:
Unit 21 is submitted, the identity data of the first block chain node is submitted for the wound generation block into alliance's chain It is requested with being added, the addition request is used to indicate the wound generation root tuber according to the identity data to the first block chain Node carries out authentication, and passes through information, the certification to the block chain node return authentication after authentication passes through By information for indicating that the first block chain node has been added to according to the identity data by the wound generation block In corresponding alliance chain tissue.
Monitoring unit 22, if the authentication pass information returned for receiving the wound generation block, monitors whether to receive The communication request of second block chain node.
Authentication unit 23, if the communication request for receiving the second block chain node, from the communication request The identity data of the second block chain node is obtained, and according to the identity data pair of the second block chain node The second block chain link point carries out authentication.
Return unit 24 will ask if the authentication for the second block chain node passes through with the communication Corresponding data are asked to return to the second block chain node.
Wherein, the identity data is the extension information in the digital certificate of block chain node.
The extension information includes:
The title of alliance's chain, the mark of alliance's chain tissue, the type of the title of block chain node and block chain node.
Optionally, the authentication unit 23 includes:
First authentication module, whether the title of alliance's chain in the extension information for verifying the second block chain node It is identical as the title of alliance's chain in the extension information of the first block chain node.
Second authentication module, if for alliance's chain in the extension information of the second block chain node title with it is described The title of alliance's chain is identical in the extension information of first block chain node, then verifies the default tissue stored in the wound generation block With the presence or absence of the mark of alliance's chain tissue in the extension information of the second block chain node in members list.
Third authentication module, if for there are secondth areas in the default organizational member list that stores in the wound generation block The mark of alliance's chain tissue in the extension information of block chain node, then judge whether the corresponding nodes ' behavior of the communication request accords with Close the corresponding nodes ' behavior of type of block chain node in the extension information of the second block chain node.
First by module, if meeting the second block chain node for the corresponding nodes ' behavior of the communication request The corresponding nodes ' behavior of type of block chain node in extension information is then logical to the authentication of the second block chain node It crosses.
Optionally, first authentication module includes:
Transform subblock, for being the by the name translation of alliance's chain in the extension information of the first block chain node One character string, and be the second character string by the name translation of alliance's chain in the extension information of the second block chain node.
Submodule is compared, for respectively that each character in first character string is corresponding with second character string Character be compared.
First decision sub-module, if each character for first character string is corresponding with second character string Character is identical, then determines the title of alliance's chain and the first block chain link in the extension information of the second block chain node The title of alliance's chain is identical in the extension information of point.
Optionally, the third verifying submodule includes:
Acquisition submodule, the type pair of block chain node in the extension information for obtaining the second block chain node The behavior list answered, and obtain the request code for including in the communication request.
Submodule is searched, for searching in the behavior list with the presence or absence of the request code.
Second decision sub-module, if determining the communication request for there are the request codes in the behavior list Corresponding nodes ' behavior meets the corresponding node of type of block chain node in the extension information of the second block chain node Behavior.
Optionally, the submission unit 21 includes:
Whether first judgment module, the title for judging alliance's chain in the identity data are corresponding with the wound generation block Alliance's chain title it is identical.
Second judgment module, if the title for alliance's chain in the identity data is corresponding with the wound generation block The title of alliance's chain is identical, then judges in the default organizational member list stored in the wound generation block with the presence or absence of the identity number According to the mark of middle alliance's chain tissue.
Second by module, if there are the identity in the default organizational member list for storing in the wound generation block The mark of alliance's chain tissue in data then passes through the authentication of the first block chain node.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Fig. 3 is the schematic diagram of terminal device provided in an embodiment of the present invention.As shown in figure 3, the terminal device 3 of the embodiment Include: processor 30, memory 31 and is stored in the calculating that can be run in the memory 31 and on the processor 30 Machine program 32.The processor 30 realizes above-mentioned each authentication side based on alliance's chain when executing the computer program 32 Step in method embodiment, such as step S101 to S104 shown in FIG. 1.Alternatively, the processor 30 executes the computer The function of each module/unit in above-mentioned each Installation practice, such as the function of module 21 to 24 shown in Fig. 2 are realized when program 32.
Illustratively, the computer program 32 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 31, and are executed by the processor 30, to complete the present invention.Described one A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for Implementation procedure of the computer program 32 in the terminal device 3 is described.For example, the computer program 32 can be divided It is cut into and submits unit, monitoring unit, authentication unit, return unit, each unit concrete function is as follows:
Submit unit, for the wound generation block into alliance's chain submit the identity data of the first block chain node with Request is added, the addition request is used to indicate the wound generation root tuber according to the identity data to the first block chain link Point carries out authentication, and passes through information to the block chain node return authentication after authentication passes through, and the certification is logical Information is crossed for indicating that the first block chain node is added to phase according to the identity data by the wound generation block In the alliance's chain tissue answered.
Monitoring unit monitors whether to receive the if the authentication pass information returned for receiving the wound generation block The communication request of two block chain nodes.
Authentication unit, if the communication request for receiving the second block chain node, is obtained from the communication request The identity data of the second block chain node is taken, and according to the identity data of the second block chain node to institute It states the second block chain link point and carries out authentication.
Return unit will be with the communication request if the authentication for the second block chain node passes through Corresponding data return to the second block chain node.
Wherein, the identity data is the extension information in the digital certificate of block chain node.
The extension information includes:
The title of alliance's chain, the mark of alliance's chain tissue, the type of the title of block chain node and block chain node.
Optionally, the authentication unit includes:
First authentication module, whether the title of alliance's chain in the extension information for verifying the second block chain node It is identical as the title of alliance's chain in the extension information of the first block chain node.
Second authentication module, if for alliance's chain in the extension information of the second block chain node title with it is described The title of alliance's chain is identical in the extension information of first block chain node, then verifies the default tissue stored in the wound generation block With the presence or absence of the mark of alliance's chain tissue in the extension information of the second block chain node in members list.
Third authentication module, if for there are secondth areas in the default organizational member list that stores in the wound generation block The mark of alliance's chain tissue in the extension information of block chain node, then judge whether the corresponding nodes ' behavior of the communication request accords with Close the corresponding nodes ' behavior of type of block chain node in the extension information of the second block chain node.
First by module, if meeting the second block chain node for the corresponding nodes ' behavior of the communication request The corresponding nodes ' behavior of type of block chain node in extension information is then logical to the authentication of the second block chain node It crosses.
Optionally, first authentication module includes:
Transform subblock, for being the by the name translation of alliance's chain in the extension information of the first block chain node One character string, and be the second character string by the name translation of alliance's chain in the extension information of the second block chain node.
Submodule is compared, for respectively that each character in first character string is corresponding with second character string Character be compared.
First decision sub-module, if each character for first character string is corresponding with second character string Character is identical, then determines the title of alliance's chain and the first block chain link in the extension information of the second block chain node The title of alliance's chain is identical in the extension information of point.
Optionally, the third verifying submodule includes:
Acquisition submodule, the type pair of block chain node in the extension information for obtaining the second block chain node The behavior list answered, and obtain the request code for including in the communication request.
Submodule is searched, for searching in the behavior list with the presence or absence of the request code.
Second decision sub-module, if determining the communication request for there are the request codes in the behavior list Corresponding nodes ' behavior meets the corresponding node of type of block chain node in the extension information of the second block chain node Behavior.
Optionally, the submission unit includes:
Whether first judgment module, the title for judging alliance's chain in the identity data are corresponding with the wound generation block Alliance's chain title it is identical.
Second judgment module, if the title for alliance's chain in the identity data is corresponding with the wound generation block The title of alliance's chain is identical, then judges in the default organizational member list stored in the wound generation block with the presence or absence of the identity number According to the mark of middle alliance's chain tissue.
Second by module, if there are the identity in the default organizational member list for storing in the wound generation block The mark of alliance's chain tissue in data then passes through the authentication of the first block chain node.
The terminal device 3 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set It is standby.The terminal device may include, but be not limited only to, processor 30, memory 31.It will be understood by those skilled in the art that Fig. 3 The only example of terminal device 3 does not constitute the restriction to terminal device 3, may include than illustrating more or fewer portions Part perhaps combines certain components or different components, such as the terminal device can also include input-output equipment, net Network access device, bus etc..
Alleged processor 30 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 31 can be the internal storage unit of the terminal device 3, such as the hard disk or interior of terminal device 3 It deposits.The memory 31 is also possible to the External memory equipment of the terminal device 3, such as be equipped on the terminal device 3 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card) etc..Further, the memory 31 can also both include the storage inside list of the terminal device 3 Member also includes External memory equipment.The memory 31 is for storing needed for the computer program and the terminal device Other programs and data.The memory 31 can be also used for temporarily storing the data that has exported or will export.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and Telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of identity identifying method based on alliance's chain, which is characterized in that be applied to the first block chain node, the method packet It includes:
Wound generation block into alliance's chain submits the identity data of the first block chain node and request, the addition is added Request is used to indicate the wound generation root tuber and carries out authentication to the first block chain link point according to the identity data, and To the block chain node return authentication by information after authentication passes through, the authentication pass information is for indicating described The first block chain node is added in corresponding alliance's chain tissue according to the identity data by wound generation block;
If receiving the authentication pass information that the wound generation block returns, the communication for receiving the second block chain node is monitored whether Request;
If receiving the communication request of the second block chain node, the second block chain link is obtained from the communication request The identity data of point, and the second block chain link is clicked through according to the identity data of the second block chain node Row authentication;
If passing through to the authentication of the second block chain node, data corresponding with the communication request are returned into institute State the second block chain node.
2. the identity identifying method as described in claim 1 based on alliance's chain, which is characterized in that the identity data is Extension information in the digital certificate of block chain node;
The extension information includes:
The title of alliance's chain, the mark of alliance's chain tissue, the type of the title of block chain node and block chain node.
3. the identity identifying method as claimed in claim 2 based on alliance's chain, which is characterized in that described according to secondth area The identity data of block chain node carries out authentication to the second block chain link point, comprising:
Verify alliance's chain in the extension information of the second block chain node title whether with the first block chain node Extension information in alliance's chain title it is identical;
If the extension of the title of alliance's chain and the first block chain node in the extension information of the second block chain node The title of alliance's chain is identical in item information, then verifies in the default organizational member list stored in the wound generation block with the presence or absence of institute State the mark of alliance's chain tissue in the extension information of the second block chain node;
If in the default organizational member list stored in the wound generation block, there are the extension information of the second block chain node The mark of middle alliance's chain tissue, then judge whether the corresponding nodes ' behavior of the communication request meets the second block chain node Extension information in block chain node the corresponding nodes ' behavior of type;
If the corresponding nodes ' behavior of the communication request meets block chain link in the extension information of the second block chain node The corresponding nodes ' behavior of type of point, then pass through the authentication of the second block chain node.
4. the identity identifying method as claimed in claim 3 based on alliance's chain, which is characterized in that verifying secondth area In the extension information of block chain node the title of alliance's chain whether with alliance in the extension information of the first block chain node The title of chain is identical, comprising:
It is the first character string by the name translation of alliance's chain in the extension information of the first block chain node, and by described the The name translation of alliance's chain is the second character string in the extension information of two block chain nodes;
Each character in first character string is compared with corresponding character in second character string respectively;
If each character of first character string is identical as corresponding character in second character string, described second is determined The title of alliance's chain and alliance's chain in the extension information of the first block chain node in the extension information of block chain node Title it is identical.
5. the identity identifying method as claimed in claim 3 based on alliance's chain, which is characterized in that the judgement communication is asked The type for asking corresponding nodes ' behavior whether to meet block chain node in the extension information of the second block chain node is corresponding Nodes ' behavior, comprising:
The corresponding behavior list of type of block chain node in the extension information of the second block chain node is obtained, and is obtained The request code for including in the communication request;
It searches in the behavior list with the presence or absence of the request code;
If determining that the corresponding nodes ' behavior of the communication request meets described there are the request code in the behavior list The corresponding nodes ' behavior of type of block chain node in the extension information of two block chain nodes.
6. the identity identifying method as claimed in claim 2 based on alliance's chain, which is characterized in that the wound generation root tuber evidence The identity data carries out authentication to the first block chain link point, comprising:
Judge that whether corresponding with the wound generation block title of the title of alliance's chain in identity data alliance's chain be identical;
If the title of the title of alliance's chain alliance's chain corresponding with the wound generation block is identical in the identity data, judge With the presence or absence of the mark of alliance's chain tissue in the identity data in the default organizational member list stored in the wound generation block;
If in the default organizational member list stored in the wound generation block, there are the marks of alliance's chain tissue in the identity data Know, then the authentication of the first block chain node is passed through.
7. a kind of identification authentication system based on alliance's chain, which is characterized in that described device includes:
Unit is submitted, the identity data and addition of the first block chain node are submitted for the wound generation block into alliance's chain Request, the addition request are used to indicate the wound generation root tuber and click through according to the identity data to the first block chain link Row authentication, and pass through information to the block chain node return authentication after authentication passes through, the certification passes through letter Breath is for indicating that the first block chain node has been added to accordingly according to the identity data by the wound generation block In alliance's chain tissue;
Monitoring unit, if the authentication pass information returned for receiving the wound generation block, monitors whether to receive the secondth area The communication request of block chain node;
Authentication unit, if the communication request for receiving the second block chain node, obtains institute from the communication request The identity data of the second block chain node is stated, and according to the identity data of the second block chain node to described 2 block chain link points carry out authentication;
Return unit will be corresponding with the communication request if the authentication for the second block chain node passes through Data return to the second block chain node.
8. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In identity of the realization based on alliance's chain as described in any one of claims 1 to 6 when the computer program is executed by processor The step of authentication method.
9. a kind of terminal device, including memory, processor and storage are in the memory and can be on the processor The computer program of operation, which is characterized in that the processor realizes following steps when executing the computer program:
Wound generation block into alliance's chain submits the identity data of the first block chain node and request, the addition is added Request is used to indicate the wound generation root tuber according to the identity data to the first block chain link point progress authentication, in body Part certification pass through after to the block chain node return authentication by information, the authentication pass information is for indicating the wound generation The first block chain node is added in corresponding alliance's chain tissue according to the identity data by block;
If receiving the authentication pass information that the wound generation block returns, the communication for receiving the second block chain node is monitored whether Request;
If receiving the communication request of the second block chain node, the second block link is obtained from the communication request The identity data of node, and according to the identity data of the second block chain node to the second block chain node Carry out authentication;
If passing through to the authentication of the second block chain node, data corresponding with the communication request are returned into institute State the second block chain node.
10. terminal device as claimed in claim 9, which is characterized in that the identity data is the number of block chain node Extension information in word certificate;
The extension information includes:
The title of alliance's chain, the mark of alliance's chain tissue, the title of block chain node, the type of block chain node.
CN201811529919.4A 2018-12-14 2018-12-14 Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment Active CN109815657B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811529919.4A CN109815657B (en) 2018-12-14 2018-12-14 Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment
PCT/CN2019/122453 WO2020119506A1 (en) 2018-12-14 2019-12-02 Identity authentication method based on alliance chain, and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811529919.4A CN109815657B (en) 2018-12-14 2018-12-14 Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment

Publications (2)

Publication Number Publication Date
CN109815657A true CN109815657A (en) 2019-05-28
CN109815657B CN109815657B (en) 2022-10-28

Family

ID=66602943

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811529919.4A Active CN109815657B (en) 2018-12-14 2018-12-14 Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment

Country Status (2)

Country Link
CN (1) CN109815657B (en)
WO (1) WO2020119506A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110177109A (en) * 2019-06-04 2019-08-27 北京理工大学 A kind of cross-domain Verification System of dual-proxy based on id password and alliance's chain
CN110278255A (en) * 2019-06-13 2019-09-24 深圳前海微众银行股份有限公司 A kind of method and device of the Internet of Things IOT communication between devices based on block chain
CN110430235A (en) * 2019-06-28 2019-11-08 阿里巴巴集团控股有限公司 The method and apparatus that message can be certified based on across the chain transmission of processing module
CN110602051A (en) * 2019-08-15 2019-12-20 深圳壹账通智能科技有限公司 Information processing method based on consensus protocol and related device
CN110620776A (en) * 2019-09-24 2019-12-27 腾讯科技(深圳)有限公司 Data transfer information transmission method and device
CN111294356A (en) * 2020-02-11 2020-06-16 深圳壹账通智能科技有限公司 Block chain based method and system for organizing node uplink
WO2020119506A1 (en) * 2018-12-14 2020-06-18 深圳壹账通智能科技有限公司 Identity authentication method based on alliance chain, and terminal device
CN111737707A (en) * 2020-05-14 2020-10-02 云南云烁巴克云科技有限公司 Verification packet generation and verification method based on block chain, server and electronic equipment
CN111985929A (en) * 2020-09-03 2020-11-24 深圳壹账通智能科技有限公司 Transaction verification method and device in block chain, node equipment and storage medium
CN112287361A (en) * 2020-09-11 2021-01-29 杭州鸽子蛋网络科技有限责任公司 Data governance method, system, electronic device and storage medium
CN112861090A (en) * 2021-03-18 2021-05-28 深圳前海微众银行股份有限公司 Information processing method, device, equipment, storage medium and computer program product
CN113114634A (en) * 2021-03-24 2021-07-13 武汉卓尔信息科技有限公司 Credible data management method based on alliance chain and alliance chain
CN113206817A (en) * 2020-02-03 2021-08-03 中移物联网有限公司 Equipment connection confirmation method and block chain network
US11251966B2 (en) 2019-06-28 2022-02-15 Advanced New Technologies Co., Ltd. Sending cross-chain authenticatable messages
CN114095246A (en) * 2021-11-18 2022-02-25 国网河北省电力有限公司电力科学研究院 Network access identity authentication method of power distribution terminal
US11336465B2 (en) 2019-06-28 2022-05-17 Advanced New Technologies Co., Ltd. Sending cross-chain authenticatable messages
US11356282B2 (en) 2019-06-28 2022-06-07 Advanced New Technologies Co., Ltd. Sending cross-chain authenticatable messages
CN114640475A (en) * 2022-05-19 2022-06-17 广东省绿算技术有限公司 Decentralized identity authentication method and device, computer equipment and storage medium
CN114978529A (en) * 2022-05-10 2022-08-30 平安国际智慧城市科技股份有限公司 Block chain-based identity verification method and related equipment

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113972991A (en) * 2020-07-23 2022-01-25 南京理工大学 Cross-domain identity authentication method based on multistage alliance chain
CN112633878A (en) * 2020-08-31 2021-04-09 上海添玑网络服务有限公司 Real estate alliance chain terminal application platform and application method
CN112733121A (en) * 2021-01-13 2021-04-30 京东数科海益信息科技有限公司 Data acquisition method, device, equipment and storage medium
CN113225736B (en) * 2021-03-24 2024-02-02 湖南宸瀚信息科技有限责任公司 Unmanned aerial vehicle cluster node authentication method and device, storage medium and computer equipment
CN115601053B (en) * 2022-12-16 2023-08-22 浪潮云洲工业互联网有限公司 Method and equipment for proving safety and credibility and protecting back-to-back origin

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789920A (en) * 2016-11-25 2017-05-31 深圳前海微众银行股份有限公司 The joint connecting method and device of block chain
CN107426157A (en) * 2017-04-21 2017-12-01 杭州趣链科技有限公司 A kind of alliance's chain authority control method based on digital certificate and ca authentication system
US20170366348A1 (en) * 2016-06-17 2017-12-21 Capital One Services, Llc Blockchain systems and methods for user authentication
CN107592292A (en) * 2017-07-26 2018-01-16 阿里巴巴集团控股有限公司 A kind of block chain communication method between nodes and device
CN107733855A (en) * 2017-08-31 2018-02-23 中国科学院信息工程研究所 A kind of block catenary system and application process that can support publicly-owned chain, alliance's chain and privately owned chain simultaneously

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114447A1 (en) * 2003-10-24 2005-05-26 Kim Cameron Method and system for identity exchange and recognition for groups and group members
CN108389130B (en) * 2018-03-02 2020-02-14 合肥学院 Method for generating multi-transaction mode alliance chain
CN108416589A (en) * 2018-03-08 2018-08-17 深圳前海微众银行股份有限公司 Connection method, system and the computer readable storage medium of block chain node
CN109815657B (en) * 2018-12-14 2022-10-28 深圳壹账通智能科技有限公司 Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170366348A1 (en) * 2016-06-17 2017-12-21 Capital One Services, Llc Blockchain systems and methods for user authentication
CN106789920A (en) * 2016-11-25 2017-05-31 深圳前海微众银行股份有限公司 The joint connecting method and device of block chain
CN107426157A (en) * 2017-04-21 2017-12-01 杭州趣链科技有限公司 A kind of alliance's chain authority control method based on digital certificate and ca authentication system
CN107592292A (en) * 2017-07-26 2018-01-16 阿里巴巴集团控股有限公司 A kind of block chain communication method between nodes and device
CN107733855A (en) * 2017-08-31 2018-02-23 中国科学院信息工程研究所 A kind of block catenary system and application process that can support publicly-owned chain, alliance's chain and privately owned chain simultaneously

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020119506A1 (en) * 2018-12-14 2020-06-18 深圳壹账通智能科技有限公司 Identity authentication method based on alliance chain, and terminal device
CN110177109A (en) * 2019-06-04 2019-08-27 北京理工大学 A kind of cross-domain Verification System of dual-proxy based on id password and alliance's chain
CN110177109B (en) * 2019-06-04 2020-05-12 北京理工大学 Double-proxy cross-domain authentication system based on identification password and alliance chain
CN110278255A (en) * 2019-06-13 2019-09-24 深圳前海微众银行股份有限公司 A kind of method and device of the Internet of Things IOT communication between devices based on block chain
CN110430235A (en) * 2019-06-28 2019-11-08 阿里巴巴集团控股有限公司 The method and apparatus that message can be certified based on across the chain transmission of processing module
US11356282B2 (en) 2019-06-28 2022-06-07 Advanced New Technologies Co., Ltd. Sending cross-chain authenticatable messages
US11343103B2 (en) 2019-06-28 2022-05-24 Advanced New Technologies Co., Ltd. Sending cross-chain authenticatable messages
US11336465B2 (en) 2019-06-28 2022-05-17 Advanced New Technologies Co., Ltd. Sending cross-chain authenticatable messages
US11251966B2 (en) 2019-06-28 2022-02-15 Advanced New Technologies Co., Ltd. Sending cross-chain authenticatable messages
CN110602051A (en) * 2019-08-15 2019-12-20 深圳壹账通智能科技有限公司 Information processing method based on consensus protocol and related device
CN110620776B (en) * 2019-09-24 2021-11-26 腾讯科技(深圳)有限公司 Data transfer information transmission method and device
CN110620776A (en) * 2019-09-24 2019-12-27 腾讯科技(深圳)有限公司 Data transfer information transmission method and device
CN113206817B (en) * 2020-02-03 2022-07-12 中移物联网有限公司 Equipment connection confirmation method and block chain network
CN113206817A (en) * 2020-02-03 2021-08-03 中移物联网有限公司 Equipment connection confirmation method and block chain network
CN111294356B (en) * 2020-02-11 2022-09-06 深圳壹账通智能科技有限公司 Block chain-based method and system for organizing uplink of nodes
CN111294356A (en) * 2020-02-11 2020-06-16 深圳壹账通智能科技有限公司 Block chain based method and system for organizing node uplink
CN111737707A (en) * 2020-05-14 2020-10-02 云南云烁巴克云科技有限公司 Verification packet generation and verification method based on block chain, server and electronic equipment
CN111737707B (en) * 2020-05-14 2022-09-27 云南云烁巴克云科技有限公司 Block chain based verification package generation and verification method, server and electronic equipment
CN111985929A (en) * 2020-09-03 2020-11-24 深圳壹账通智能科技有限公司 Transaction verification method and device in block chain, node equipment and storage medium
CN112287361A (en) * 2020-09-11 2021-01-29 杭州鸽子蛋网络科技有限责任公司 Data governance method, system, electronic device and storage medium
CN112861090A (en) * 2021-03-18 2021-05-28 深圳前海微众银行股份有限公司 Information processing method, device, equipment, storage medium and computer program product
CN112861090B (en) * 2021-03-18 2023-01-31 深圳前海微众银行股份有限公司 Information processing method, device, equipment, storage medium and computer program product
CN113114634A (en) * 2021-03-24 2021-07-13 武汉卓尔信息科技有限公司 Credible data management method based on alliance chain and alliance chain
CN114095246A (en) * 2021-11-18 2022-02-25 国网河北省电力有限公司电力科学研究院 Network access identity authentication method of power distribution terminal
CN114095246B (en) * 2021-11-18 2024-01-23 国网河北省电力有限公司电力科学研究院 Network access identity authentication method of power distribution terminal
CN114978529A (en) * 2022-05-10 2022-08-30 平安国际智慧城市科技股份有限公司 Block chain-based identity verification method and related equipment
CN114640475B (en) * 2022-05-19 2022-09-06 广东省绿算技术有限公司 Decentralized identity authentication method and device, computer equipment and storage medium
CN114640475A (en) * 2022-05-19 2022-06-17 广东省绿算技术有限公司 Decentralized identity authentication method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN109815657B (en) 2022-10-28
WO2020119506A1 (en) 2020-06-18

Similar Documents

Publication Publication Date Title
CN109815657A (en) A kind of identity identifying method and terminal device based on alliance's chain
CN108365961B (en) The response method and server that interface call method and terminal device, interface call
CN111667267B (en) Block chain transaction risk identification method and device
CN110838065A (en) Transaction data processing method and device
CN110245220A (en) Electronic document signs method, apparatus and server, storage medium
CN108564181A (en) Electrical equipment fault detects and method for maintaining and terminal device
CN109672683A (en) Binding method, binding device and the terminal device of internet of things equipment
CN107766040A (en) A kind of method, apparatus and computer-readable recording medium for generating interface document
CN110222529A (en) Assets management method, electronic equipment and computer storage medium based on alliance's chain
CN110505305A (en) A kind of block chain sharding method, device and block catenary system
CN110362357A (en) A kind of configuration file management method and device of application program
CN110517147A (en) Transaction data processing method, device, system and computer readable storage medium
CN109861992A (en) A kind of information interacting method and across scene method for tracing of monitor terminal
CN109218080A (en) A kind of method, monitoring system and the terminal device of automatic drafting network topology architecture
CN110365479A (en) Random digit generation method and device based on block chain
CN109241357A (en) Chain structure model and its construction method, system and terminal device
CN109684272A (en) Document storage method, system and terminal device
CN109460661A (en) A kind of logical security leak detection method, device and terminal device
CN110322582A (en) Lightguide cable link method for inspecting, device and terminal device
CN105721612B (en) Data transmission method and device
CN109066650A (en) Power system vulnerability appraisal procedure and terminal device
CN114338666A (en) Method, device, equipment and medium for verifying Fabric block chain cross-chain transaction
CN109902493A (en) The delivery method and server of script
CN109359938A (en) A kind of optimization method of flow chart of data processing, device and terminal device
CN108965315A (en) A kind of authentic authentication method of terminal device, device and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant