CN109961292A - Block chain identifying code application method, equipment and storage medium - Google Patents

Block chain identifying code application method, equipment and storage medium Download PDF

Info

Publication number
CN109961292A
CN109961292A CN201910222944.6A CN201910222944A CN109961292A CN 109961292 A CN109961292 A CN 109961292A CN 201910222944 A CN201910222944 A CN 201910222944A CN 109961292 A CN109961292 A CN 109961292A
Authority
CN
China
Prior art keywords
identifying code
address
block chain
user
encryption information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910222944.6A
Other languages
Chinese (zh)
Other versions
CN109961292B (en
Inventor
魏吉星
吴思进
王志文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN201910222944.6A priority Critical patent/CN109961292B/en
Publication of CN109961292A publication Critical patent/CN109961292A/en
Application granted granted Critical
Publication of CN109961292B publication Critical patent/CN109961292B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention provides a kind of block chain identifying code application method, equipment and storage medium, this method comprises: generating identifying code at random in response to user terminal triggering identifying code verifying;According to the first public key encryption identifying code of user, encryption information is generated;Transaction is generated according to the address of user and encryption information and the node of block chain is sent to by the address of server-side for executing so that the corresponding relationship of server-side address, station address and encryption information to be recorded on block chain;Server-side address is sent to user terminal, so that the corresponding relationship of query service end address and station address and is decrypted to obtain encryption information to obtain identifying code encryption information with private key for user in the data of block chain;The identifying code that user terminal is sent is received, judges whether identifying code is effective.The application is realized without binding cell-phone number or hardware device and suitable for the identifying code scheme of decentralization system.

Description

Block chain identifying code application method, equipment and storage medium
Technical field
This application involves Internet technical fields, and in particular to a kind of block chain identifying code application method, equipment and storage Medium.
Background technique
Current verification code is widely used in the identity authentication scheme of Internet application, such as Account Logon, payment are tested Card, other all kinds of authentications etc..
Existing identifying code scheme usually requires binding cell-phone number or mobile phone hardware, based on centralized server and the hand The verifying of machine communicated to realize identifying code, the defect of these schemes is, once user has replaced cell-phone number or hardware device, Just need to reconfigure the binding relationship of account and cell-phone number or hardware device, and with the growth of binding relationship, lead to user The number of changing or cost of changing planes increase substantially, and bring great inconvenience to users.In addition, these schemes are not suitable for the area of decentralization Block catenary system.
Summary of the invention
In view of drawbacks described above in the prior art or deficiency, be intended to provide it is a kind of without bind cell-phone number or hardware device and Block chain identifying code application method, equipment and storage medium suitable for decentralization system.
In a first aspect, the present invention provides a kind of block chain identifying code application method, it is suitable for server-side, which is awarded The public key for having or obtaining each user and corresponding address are weighed, this method comprises:
It is random to generate the first identifying code in response to the user terminal triggering identifying code verifying of the first user;
According to first the first identifying code of public key encryption of the first user, the first encryption information is generated;
The first the second ground for trading and passing through server-side is generated according to the first address of the first user and the first encryption information Location is sent to the node of the first block chain for executing with by the corresponding relationship of the second address, the first address and the first encryption information It is recorded on the first block chain;
To the user terminal of the first user send the second address, for inquired in the data of the first block chain the second address and The corresponding relationship of first address believes the first encryption with the first private key for corresponding to the first public key with obtaining the first encryption information Breath is decrypted to obtain the second identifying code;
Receive the second identifying code that the user terminal of the first user is sent, compare the second identifying code and the first identifying code whether phase With to judge whether the second identifying code is effective.
Second aspect, the present invention provides another block chain identifying code application method, suitable for the node of block chain, the party Method includes:
Receive the first transaction;Wherein, user terminal of first transaction by first service end in response to the first user triggers verifying Code verifying, it is random to generate the first identifying code, according to first the first identifying code of public key encryption of the first user, generate the first encryption letter After breath, is generated according to the first address of the first user and the first encryption information and pass through the transmission of the second address;First service end quilt Authorize the public key for having or obtaining each user and corresponding address;
The first transaction is executed so that the corresponding relationship of the second address, the first address and the first encryption information is recorded in the firstth area On block chain, behind the second address sent for the user terminal reception first service end of the first user in the data of the first block chain The corresponding relationship of the second address and the first address is inquired to obtain the first encryption information, with the first private key for corresponding to the first public key First encryption information is decrypted to obtain the second identifying code, the second identifying code is sent to first service end for comparing the Whether two identifying codes are identical to judge whether the second identifying code is effective as the first identifying code.
The third aspect, the present invention provide another block chain identifying code application method, are suitable for user terminal, this method packet It includes:
Receive the second address that first service end is sent;Wherein, first service end is authorized to and has or obtain each user's Public key and corresponding address, first service end generate first in response to the server-side triggering identifying code verifying of active user at random Identifying code generates the first encryption information according to first the first identifying code of public key encryption of active user, according to the of active user One address and the first encryption information generate the first transaction and are sent to the node of the first block chain by the second address for executing The corresponding relationship of the second address, the first address and the first encryption information to be recorded on the first block chain;
The corresponding relationship of the second address and the first address is inquired in the data of the first block chain to obtain the first encryption letter Breath;
The first encryption information is decrypted with the first private key for corresponding to the first public key to obtain the second identifying code;
By the second identifying code be sent to first service end for compare the second identifying code and the first identifying code it is whether identical with Judge whether the second identifying code is effective.
Fourth aspect, the present invention also provides a kind of equipment, including one or more processors and memory, wherein memory Comprising can by instruction that the one or more processors execute so that the one or more processors execute it is each according to the present invention The block chain identifying code application method that embodiment provides.
5th aspect, the present invention also provides a kind of storage medium for being stored with computer program, which makes to count Calculation machine executes the block chain identifying code application method that each embodiment provides according to the present invention.
Block chain identifying code application method, equipment and the storage medium that many embodiments of the present invention provide by will according to Identifying code, station address and the corresponding relationship of server-side address of family public key encryption are recorded on block chain, so that user terminal can With the identifying code service of issuing for inquiring the identifying code of encryption on block chain and decrypting by private key for user, and decryption is obtained End is verified, to realize without binding cell-phone number or hardware device and suitable for the identifying code side of decentralization system Case;
Block chain identifying code application method, equipment and the storage medium that some embodiments of the invention provide, which further pass through, is Identifying code configures validity period and whether authentication code is expired, has further ensured the safety of identifying code;
Block chain identifying code application method, equipment and the storage medium that some embodiments of the invention provide further pass through area Identifying code identifier is recorded on block chain, and user terminal is allow to need to obtain the different identifying codes of a plurality of same server-side in a short time When can accurately find the encryption information of identifying code.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is a kind of flow chart for block chain identifying code application method that one embodiment of the invention provides.
Fig. 2 is the flow chart for another block chain identifying code application method that one embodiment of the invention provides.
Fig. 3 is the flow chart for another block chain identifying code application method that one embodiment of the invention provides.
Fig. 4 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, part relevant to invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is a kind of flow chart for block chain identifying code application method that one embodiment of the invention provides.
As shown in Figure 1, in the present embodiment, the present invention provides a kind of block chain identifying code application side suitable for server-side Method, the server-side are authorized to the public key for having or obtaining each user and corresponding address, this method comprises:
S11: random to generate the first identifying code in response to the user terminal triggering identifying code verifying of the first user;
S13: according to first the first identifying code of public key encryption of the first user, the first encryption information is generated;
S15: according to the first address of the first user and the first encryption information generate first trade and pass through server-side the Double-address is sent to the node of the first block chain for executing with by the correspondence of the second address, the first address and the first encryption information Relation record is on the first block chain;
S17: the second address is sent to the user terminal of the first user, for inquiring the second ground in the data of the first block chain The corresponding relationship of location and the first address is added with the first private key for corresponding to the first public key to first with obtaining the first encryption information Confidential information is decrypted to obtain the second identifying code;
S19: receiving the second identifying code that the user terminal of the first user is sent, and comparing the second identifying code with the first identifying code is It is no identical to judge whether the second identifying code is effective.
The server-side of X software is triggered to the server-side requested service data of X software with the user terminal of user A below For identifying code verifying, the above method is illustratively illustrated.
In the present embodiment, the server-side of X software configures in individual centralized server;In another embodiment, X The server-side of software can be only fitted in the node of the first block chain (be specifically configurable to the contract of the first block chain, can also To be configured to the local service of the node of the first block chain, etc.), it can also configure and (equally may be used in the node of the second block chain To be configured to contract or local service etc.).
In the present embodiment, the server-side of X software requires user to provide public key and corresponding address in login account, from And have each user public key and corresponding address;In another embodiment, the server-side of X software is also configured as requiring to use The family public key that authorization service end obtains user when carrying out identifying code verifying in login account and corresponding address are, it can be achieved that phase Same technical effect.
When the user terminal of user A is to the server-side requested service data of X software, the verifying of identifying code is triggered:
In step s 11, the server-side of X software generates first verifying of several characters in response to above-mentioned triggering at random Code c1
In step s 13, the server-side of X software is according to the public key P of the user A storedATo the first identifying code c1Added It is close, generate the first encryption information m1
In step S15, the server-side of X software is according to the address add of the user A storedAWith the first encryption information m1It is raw At the first transaction tx1, and pass through the address add of server-sideSIt is sent to the node of the first block chain;
The node of first block chain receives tx1Afterwards, by tx1It broadcasts to other nodes of the first block chain network, and by tx1 It is packed into block and executes, thus by add after implementing result is by common recognitionS、addAWith m1Corresponding relationship be recorded in the firstth area On block chain;
In step S17, the server-side of X software is by addSIt is sent to the user terminal of user A;
The user terminal of user A receives addSAfterwards, addS and add is inquired in the data of the first block chainACorresponding relationship with Obtain the first encryption information m1, and by corresponding to public key PAPrivate key pATo m1It is decrypted, obtains the second identifying code c2;Its In, when inquiring multinomial add in the data of the first block chainSWith addACorresponding relationship when, take wherein newest one;
In step S19, the server-side of X software receives the second identifying code c transmitted by the user terminal of user A2, compare the Two identifying code c2With the first identifying code c1It is whether identical:
It is no, then the second identifying code c2In vain;
It is, then the second identifying code c2Effectively, requested business datum is sent to the user terminal of user A.
In addition, being held when the server-side of X software is configured to the local service of the node of the first block chain or the second block chain The principle of the row above method is essentially identical with above-mentioned example, repeats no more;When the server-side of X software be configured to the first block chain or When the contract of the second block chain, the difference for executing the principle and above-mentioned example of the above method is, needs to pass through in step S17 The local service of node configuration sends the second address to user terminal, and, in step S19, user terminal beats the second identifying code Packet is the second transaction tx2Block chain node is sent to trigger above-mentioned contract and execute tx2
Above-described embodiment is closed by the way that the identifying code, the station address that will be encrypted according to client public key are corresponding with server-side address System is recorded on block chain, and user terminal is allowed to inquire the identifying code of encryption on block chain and by private key for user solution It is close, and the identifying code that decryption obtains is issued into server-side and is verified, to realize without binding cell-phone number or hardware device And it is suitable for the identifying code scheme of decentralization system.
Preferably, the first identifying code is configured with the validity period of fixed duration or fixed block height quantity, the validity period Entry-into-force time is time point or block height of first transaction record on the first block chain.
For example, the first identifying code c1Validity period be configured to 300 seconds or 50 block height, work as tx1The block being packaged is logical Common recognition is crossed when being recorded on the first block chain, first service end gets time point t1Or the block height h of the block1, first Identifying code c1It comes into force;
When first service end receives the second identifying code c2Without departing from 300 seconds time (t1+ 300s) or 50 block height (h1+ 50) when, the second identifying code c2It does not fail, compares c2With c1It is whether identical;
When first service end receives the second identifying code c2Time exceed 300 seconds (t1+ 300s) or 50 block height (h1+ 50) when, the second identifying code c2It has been failed that, authentication failed.
Above-mentioned 300 seconds merely illustrative with 50 block height, can configure any difference for validity period according to actual needs Duration or block height quantity.
Further by configuring validity period for identifying code, simultaneously whether authentication code is expired for above-described embodiment, further ensures The safety of identifying code.
It is further preferred that it is above-mentioned first transaction, and, the second address, the first address and the first encryption information correspondence Relationship further includes identifying code identifier.The inquiry of above-mentioned user terminal further includes being inquired according to identifying code identifier.
Specifically, when the same server-side of same user's short time internal trigger carries out the verifying of multiple authentication code, probably due to Various reasons cause the encryption information of every identifying code not to be recorded on block chain in chronological order, or, wherein two or more Item encryption information is packaged in the same block and is recorded on block chain simultaneously, causes user terminal that can not accurately distinguish items and tests Code is demonstrate,proved, this can effectively be solved the problems, such as by configuration verification code identifier.
For example, tx1It further include identifying code identifier n1, tx1After the block being packaged is by common recognition, by addS、addA、n1With m1Corresponding relationship be recorded on the first block chain;User terminal passes through inquiry addS、addA、n1Corresponding relationship can accurately look into Find m1, without the multinomial encryption information being simultaneously or successively recorded on block chain in the short time cannot be distinguished.
Above-described embodiment further passes through record identifying code identifier on block chain, needs user terminal in a short time The encryption information of identifying code can be accurately found when obtaining the different identifying codes of a plurality of same server-side.
Fig. 2 is the flow chart for another block chain identifying code application method that one embodiment of the invention provides.It is shown in Fig. 2 Method can cooperate method shown in FIG. 1 to execute.
As shown in Fig. 2, in the present embodiment, the present invention also provides another block chain identifying code application methods, it is suitable for The node of block chain, this method comprises:
S22: the first transaction is received;Wherein, user terminal of first transaction by first service end in response to the first user triggers Identifying code verifying, it is random to generate the first identifying code, according to first the first identifying code of public key encryption of the first user, generates first and add After confidential information, is generated according to the first address of the first user and the first encryption information and pass through the transmission of the second address;First service End is authorized to the public key for having or obtaining each user and corresponding address;
S24: the first transaction is executed so that the corresponding relationship of the second address, the first address and the first encryption information is recorded in the On one block chain, in the number of the first block chain behind the second address sent for the user terminal reception first service end of the first user According to the corresponding relationship of the second address of middle inquiry and the first address to obtain the first encryption information, with first corresponding to the first public key Private key is decrypted the first encryption information to obtain the second identifying code, by the second identifying code be sent to first service end for than It is whether identical to judge whether the second identifying code is effective as the first identifying code to the second identifying code.
Preferably, the first identifying code is configured with the validity period of fixed duration or fixed block height quantity, the life of validity period The effect time is time point or block height of first transaction record on the first block chain.
It is further preferred that the corresponding relationship of the first transaction and the second address, the first address and the first encryption information also wraps Include identifying code identifier;Identifying code identifier is used to search the first encryption information for the user terminal of the first user.
The identifying code application principle of method shown in Fig. 2 can refer to method shown in FIG. 1, and details are not described herein again.
Fig. 3 is the flow chart for another block chain identifying code application method that one embodiment of the invention provides.It is shown in Fig. 3 Method can cooperate Fig. 1 and method shown in Fig. 2 to execute.
As shown in figure 3, in the present embodiment, the present invention also provides another block chain identifying code application methods, it is suitable for User terminal, this method comprises:
S32: the second address that first service end is sent is received;Wherein, first service end, which is authorized to, has or obtains each use The public key at family and corresponding address, server-side triggering identifying code verifying of the first service end in response to active user, random generation First identifying code generates the first encryption information, according to active user according to first the first identifying code of public key encryption of active user The first address and the first encryption information generate first transaction and by the second address be sent to the node of the first block chain for It executes so that the corresponding relationship of the second address, the first address and the first encryption information to be recorded on the first block chain;
S34: the corresponding relationship of the second address and the first address is inquired in the data of the first block chain to obtain first and add Confidential information;
S36: the first encryption information is decrypted with the first private key for corresponding to the first public key to obtain the second identifying code;
S38: the second identifying code is sent to first service end for compare the second identifying code and the first identifying code whether phase With to judge whether the second identifying code is effective.
Preferably, the first identifying code is configured with the validity period of fixed duration or fixed block height quantity, the life of validity period The effect time is time point or block height of first transaction record on the first block chain.
It is further preferred that the corresponding relationship of the first transaction and the second address, the first address and the first encryption information also wraps Include identifying code identifier;Identifying code identifier is used to search the first encryption information for the user terminal of the first user.
The identifying code application principle of method shown in Fig. 3 equally can refer to method shown in FIG. 1, and details are not described herein again.
Fig. 4 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
As shown in figure 4, present invention also provides a kind of equipment 400, including one or more centres as on the other hand Unit (CPU) 401 is managed, can be added according to the program being stored in read-only memory (ROM) 402 or from storage section 408 The program that is downloaded in random access storage device (RAM) 403 and execute various movements appropriate and processing.In RAM403, also deposit It contains equipment 400 and operates required various programs and data.CPU401, ROM402 and RAM403 pass through the phase each other of bus 404 Even.Input/output (I/O) interface 405 is also connected to bus 404.
I/O interface 405 is connected to lower component: the importation 406 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 407 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 408 including hard disk etc.; And the communications portion 409 of the network interface card including LAN card, modem etc..Communications portion 409 via such as because The network of spy's net executes communication process.Driver 410 is also connected to I/O interface 405 as needed.Detachable media 411, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 410, in order to read from thereon Computer program be mounted into storage section 408 as needed.
Particularly, in accordance with an embodiment of the present disclosure, the block chain identifying code application method of any of the above-described embodiment description can To be implemented as computer software programs.For example, embodiment of the disclosure includes a kind of computer program product comprising tangible Ground includes computer program on a machine-readable medium, and computer program includes for executing block chain identifying code application method Program code.In such embodiments, which can be downloaded and be pacified from network by communications portion 409 Dress, and/or be mounted from detachable media 411.
As another aspect, present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums Matter can be computer readable storage medium included in the device of above-described embodiment;It is also possible to individualism, it is unassembled Enter the computer readable storage medium in equipment.Computer-readable recording medium storage has one or more than one program, should Program is used to execute the block chain identifying code application method for being described in the application by one or more than one processor.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depending on related function.Also it wants It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yitong The dedicated hardware based system of functions or operations as defined in executing is crossed to realize, or by specialized hardware and can be calculated The combination of machine instruction is realized.
Being described in the embodiment of the present application involved unit or module can be realized by way of software, can also be with It is realized by way of hardware.Described unit or module also can be set in the processor, for example, each unit can be Software program in computer or intelligent movable equipment is set, the hardware device being separately configured is also possible to.Wherein, these lists The title of member or module does not constitute the restriction to the unit or module itself under certain conditions.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from the application design, appointed by above-mentioned technical characteristic or its equivalent feature Other technical solutions of meaning combination and formation.Such as features described above and (but being not limited to) disclosed herein have similar functions Technical characteristic replaced mutually and the technical solution that is formed.

Claims (11)

1. a kind of block chain identifying code application method, which is characterized in that the method is suitable for server-side, and the server-side is awarded Weigh the public key for having or obtaining each user and corresponding address, which comprises
It is random to generate the first identifying code in response to the user terminal triggering identifying code verifying of the first user;
According to the first identifying code described in the first public key encryption of first user, the first encryption information is generated;
The first transaction is generated according to the first address of first user and first encryption information and passes through the server-side The second address be sent to the node of the first block chain for executing with by second address, first address and described The corresponding relationship of one encryption information is recorded on the first block chain;
Second address is sent to the user terminal of first user, for inquiring institute in the data of the first block chain The corresponding relationship of the second address and first address is stated to obtain first encryption information, and public with corresponding to described first First encryption information is decrypted to obtain the second identifying code in first private key of key;
Second identifying code that the user terminal of first user is sent is received, second identifying code and described first is compared Whether identifying code is identical to judge whether second identifying code is effective.
2. the method according to claim 1, wherein first identifying code is configured with fixed duration or fixed area The validity period of block height quantity, the entry-into-force time of the validity period are first transaction record on the first block chain Time point or block height.
3. method according to claim 1 or 2, which is characterized in that first transaction and second address, described the The corresponding relationship of one address and first encryption information further includes identifying code identifier;
It is described to send second address to the user terminal of first user, for being looked into the data of the first block chain The corresponding relationship for asking second address and first address includes to obtain first encryption information:
Second address and the identifying code identifier are sent to the user terminal of first user, in firstth area The corresponding relationship of second address, the identifying code identifier and first address is inquired in the data of block chain to obtain State the first encryption information.
4. a kind of block chain identifying code application method, which is characterized in that the method is suitable for the node of block chain, the method Include:
Receive the first transaction;Wherein, user terminal of first transaction by first service end in response to the first user triggers verifying Code verifying, it is random to generate the first identifying code, according to the first identifying code described in the first public key encryption of first user, generate the After one encryption information, is generated according to the first address of first user and first encryption information and pass through the second address hair It send;The first service end is authorized to the public key for having or obtaining each user and corresponding address;
First transaction is executed with by the corresponding relationship of second address, first address and first encryption information It is recorded on the first block chain, so that the user terminal of first user receives second ground that the first service end is sent The corresponding relationship of second address and first address is inquired behind location in the data of the first block chain to obtain The first encryption information is stated, first encryption information is decrypted to obtain with the first private key for corresponding to first public key Second identifying code is sent to the first service end for comparing second identifying code and described the by the second identifying code Whether one identifying code is identical to judge whether second identifying code is effective.
5. according to the method described in claim 4, it is characterized in that, first identifying code is configured with fixed duration or fixed area The validity period of block height quantity, the entry-into-force time of the validity period are first transaction record on the first block chain Time point or block height.
6. method according to claim 4 or 5, which is characterized in that first transaction and second address, described the The corresponding relationship of one address and first encryption information further includes identifying code identifier;The identifying code identifier is used for for institute The user terminal for stating the first user searches first encryption information.
7. a kind of block chain identifying code application method, which is characterized in that the method is suitable for user terminal, which comprises
Receive the second address that first service end is sent;Wherein, the first service end is authorized to and has or obtain each user's Public key and corresponding address, server-side triggering identifying code verifying of the first service end in response to active user, random generation First identifying code, the first identifying code according to the first public key encryption of the active user generate the first encryption information, according to The first address of the active user and first encryption information generate first and trade and be sent to by second address The node of first block chain is for executing with by the correspondence of second address, first address and first encryption information Relation record is on the first block chain;
The corresponding relationship of second address and first address is inquired in the data of the first block chain to obtain State the first encryption information;
First encryption information is decrypted to obtain the second identifying code with the first private key for corresponding to first public key;
Second identifying code is sent to the first service end for comparing second identifying code and first verifying Whether code is identical to judge whether second identifying code is effective.
8. the method according to the description of claim 7 is characterized in that first identifying code is configured with fixed duration or fixed area The validity period of block height quantity, the entry-into-force time of the validity period are first transaction record on the first block chain Time point or block height.
9. method according to claim 7 or 8, which is characterized in that first transaction and second address, described the The corresponding relationship of one address and first encryption information further includes identifying code identifier;The identifying code identifier is used for for institute The user terminal for stating the first user searches first encryption information.
10. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors Execute method as claimed in any one of claims 1-9 wherein.
11. a kind of storage medium for being stored with computer program, which is characterized in that realize when the program is executed by processor as weighed Benefit requires method described in any one of 1-9.
CN201910222944.6A 2019-03-22 2019-03-22 Block chain verification code application method, equipment and storage medium Active CN109961292B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910222944.6A CN109961292B (en) 2019-03-22 2019-03-22 Block chain verification code application method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910222944.6A CN109961292B (en) 2019-03-22 2019-03-22 Block chain verification code application method, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109961292A true CN109961292A (en) 2019-07-02
CN109961292B CN109961292B (en) 2022-04-01

Family

ID=67024673

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910222944.6A Active CN109961292B (en) 2019-03-22 2019-03-22 Block chain verification code application method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109961292B (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493261A (en) * 2019-09-16 2019-11-22 腾讯科技(深圳)有限公司 Identifying code acquisition methods, client, server and storage medium based on block chain
CN110602098A (en) * 2019-09-16 2019-12-20 北京众享比特科技有限公司 Identity authentication method, device, equipment and storage medium
CN110942300A (en) * 2019-11-14 2020-03-31 杭州复杂美科技有限公司 Transfer certificate submitting method, device and storage medium
CN111050326A (en) * 2019-11-28 2020-04-21 泰康保险集团股份有限公司 Short message verification method, device, equipment and medium based on block chain
CN112035879A (en) * 2020-09-04 2020-12-04 昆明理工大学 Information processing method and system for improving confidentiality of automatic logistics of cell
CN112053164A (en) * 2020-08-19 2020-12-08 吴晓庆 Block chain-based electronic commerce data processing method and system
CN112084509A (en) * 2020-08-19 2020-12-15 喻婷婷 Block chain key generation method and system based on biological identification technology
CN112188418A (en) * 2019-07-05 2021-01-05 青岛海链数字科技有限公司 Short message verification method based on block chain
CN112446988A (en) * 2020-04-08 2021-03-05 杭州左链科技有限公司 Access control application method, device and storage medium
CN112488681A (en) * 2020-12-11 2021-03-12 广东广宇科技发展有限公司 Block chain-based authorization code payment method, system, terminal and storage medium
CN113489667A (en) * 2020-04-09 2021-10-08 济南诚方网络科技有限公司 Verification method, device and medium based on in-vivo detection
CN113593090A (en) * 2021-07-30 2021-11-02 国家电网有限公司技术学院分公司 Transformer substation five-prevention Bluetooth lockset system based on block chain
CN113593082A (en) * 2021-05-14 2021-11-02 国家电网有限公司技术学院分公司 Five-prevention lock management method and system based on block chain
CN113611014A (en) * 2021-07-08 2021-11-05 国家电网有限公司技术学院分公司 Five-prevention lock management method based on block chain
CN113904774A (en) * 2021-08-27 2022-01-07 重庆小雨点小额贷款有限公司 Block chain address authentication method and device and computer equipment
CN113938499A (en) * 2021-09-29 2022-01-14 深圳时空云科技有限公司 Decentralized service method, device and system
CN114362950A (en) * 2020-09-29 2022-04-15 中国移动通信有限公司研究院 Information transmission method, device and terminal
WO2024045053A1 (en) * 2022-08-31 2024-03-07 北京京东方技术开发有限公司 Resource distribution method and apparatus

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160188874A1 (en) * 2014-12-29 2016-06-30 Rubicon Labs, Inc. System and method for secure code entry point control
CN108235806A (en) * 2017-12-28 2018-06-29 深圳达闼科技控股有限公司 Method, device and system for safely accessing block chain, storage medium and electronic equipment
CN108259438A (en) * 2016-12-29 2018-07-06 中移(苏州)软件技术有限公司 A kind of method and apparatus of the certification based on block chain technology
CN108377189A (en) * 2018-05-09 2018-08-07 深圳壹账通智能科技有限公司 User's communication encrypting method, device, terminal device and storage medium on block chain
CN109117674A (en) * 2018-09-25 2019-01-01 深圳市元征科技股份有限公司 A kind of client validation encryption method, system, equipment and computer media
CN109146481A (en) * 2018-08-23 2019-01-04 泰链(厦门)科技有限公司 Account private key automatically imported method, medium, device and the block catenary system of block chain wallet

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160188874A1 (en) * 2014-12-29 2016-06-30 Rubicon Labs, Inc. System and method for secure code entry point control
CN108259438A (en) * 2016-12-29 2018-07-06 中移(苏州)软件技术有限公司 A kind of method and apparatus of the certification based on block chain technology
CN108235806A (en) * 2017-12-28 2018-06-29 深圳达闼科技控股有限公司 Method, device and system for safely accessing block chain, storage medium and electronic equipment
CN108377189A (en) * 2018-05-09 2018-08-07 深圳壹账通智能科技有限公司 User's communication encrypting method, device, terminal device and storage medium on block chain
CN109146481A (en) * 2018-08-23 2019-01-04 泰链(厦门)科技有限公司 Account private key automatically imported method, medium, device and the block catenary system of block chain wallet
CN109117674A (en) * 2018-09-25 2019-01-01 深圳市元征科技股份有限公司 A kind of client validation encryption method, system, equipment and computer media

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112188418B (en) * 2019-07-05 2022-10-14 青岛海链数字科技有限公司 Short message verification method based on block chain
CN112188418A (en) * 2019-07-05 2021-01-05 青岛海链数字科技有限公司 Short message verification method based on block chain
CN110602098A (en) * 2019-09-16 2019-12-20 北京众享比特科技有限公司 Identity authentication method, device, equipment and storage medium
CN110493261A (en) * 2019-09-16 2019-11-22 腾讯科技(深圳)有限公司 Identifying code acquisition methods, client, server and storage medium based on block chain
CN110602098B (en) * 2019-09-16 2021-08-24 北京众享比特科技有限公司 Identity authentication method, device, equipment and storage medium
CN110942300A (en) * 2019-11-14 2020-03-31 杭州复杂美科技有限公司 Transfer certificate submitting method, device and storage medium
CN110942300B (en) * 2019-11-14 2023-04-14 杭州复杂美科技有限公司 Transfer certificate submitting method, device and storage medium
CN111050326A (en) * 2019-11-28 2020-04-21 泰康保险集团股份有限公司 Short message verification method, device, equipment and medium based on block chain
CN111050326B (en) * 2019-11-28 2023-08-25 泰康保险集团股份有限公司 Block chain-based short message verification method, device, equipment and medium
CN112446988A (en) * 2020-04-08 2021-03-05 杭州左链科技有限公司 Access control application method, device and storage medium
CN113489667B (en) * 2020-04-09 2023-08-18 济南诚方网络科技有限公司 Verification method, device and medium based on living body detection
CN113489667A (en) * 2020-04-09 2021-10-08 济南诚方网络科技有限公司 Verification method, device and medium based on in-vivo detection
CN112084509A (en) * 2020-08-19 2020-12-15 喻婷婷 Block chain key generation method and system based on biological identification technology
CN112053164A (en) * 2020-08-19 2020-12-08 吴晓庆 Block chain-based electronic commerce data processing method and system
CN112035879A (en) * 2020-09-04 2020-12-04 昆明理工大学 Information processing method and system for improving confidentiality of automatic logistics of cell
CN114362950A (en) * 2020-09-29 2022-04-15 中国移动通信有限公司研究院 Information transmission method, device and terminal
CN112488681A (en) * 2020-12-11 2021-03-12 广东广宇科技发展有限公司 Block chain-based authorization code payment method, system, terminal and storage medium
CN113593082A (en) * 2021-05-14 2021-11-02 国家电网有限公司技术学院分公司 Five-prevention lock management method and system based on block chain
CN113611014A (en) * 2021-07-08 2021-11-05 国家电网有限公司技术学院分公司 Five-prevention lock management method based on block chain
CN113611014B (en) * 2021-07-08 2023-07-21 国家电网有限公司技术学院分公司 Five-prevention lockset management method based on block chain
CN113593090A (en) * 2021-07-30 2021-11-02 国家电网有限公司技术学院分公司 Transformer substation five-prevention Bluetooth lockset system based on block chain
CN113593090B (en) * 2021-07-30 2023-07-18 国家电网有限公司技术学院分公司 Block chain-based five-prevention Bluetooth lock system of transformer substation
CN113904774A (en) * 2021-08-27 2022-01-07 重庆小雨点小额贷款有限公司 Block chain address authentication method and device and computer equipment
CN113938499A (en) * 2021-09-29 2022-01-14 深圳时空云科技有限公司 Decentralized service method, device and system
WO2024045053A1 (en) * 2022-08-31 2024-03-07 北京京东方技术开发有限公司 Resource distribution method and apparatus

Also Published As

Publication number Publication date
CN109961292B (en) 2022-04-01

Similar Documents

Publication Publication Date Title
CN109961292A (en) Block chain identifying code application method, equipment and storage medium
US11720891B2 (en) Method and system for zero-knowledge and identity based key management for decentralized applications
JP7364724B2 (en) Operating system for blockchain IoT devices
AU2021206913B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
US20200145223A1 (en) System and method for blockchain-based notification
US6957199B1 (en) Method, system and service for conducting authenticated business transactions
US20180322491A1 (en) Method and System for Blockchain-Based Combined Identity, Ownership, Integrity and Custody Management
US8931689B2 (en) Systems and methods for anti-counterfeit authentication through communication networks
JP4682187B2 (en) Authentication system, information providing method, and information providing system
CN110163751B (en) Block chain access system oriented to alliance chain and implementation method thereof
JP2017208840A (en) Method of enabling digital music content to be downloaded to and used on portable wireless computing device
CN106600403A (en) Asset management method, device and system
CN110537346A (en) Safe decentralization domain name system
CN108881167A (en) A kind of intelligent contract of finite field block catenary system
CN101937528A (en) Systems and methods for implementing supply chain visibility policies
US8055898B2 (en) Tag authentication system
US11831636B2 (en) Systems and techniques for trans-account device key transfer in benefit denial system
CN110490640A (en) Method, apparatus and system for object distribution processor
CN110264207A (en) Block chain separation processing method and system
CN109583915A (en) Anti-counterfeiting authentication method, equipment and storage medium
Omar et al. Decentralized identifiers and verifiable credentials for smartphone anticounterfeiting and decentralized IMEI database
CN109995775A (en) Block chain identifying code application method, equipment and storage medium
CN109040142A (en) Private communication method, address configuration method, equipment and storage medium
CN109495468A (en) Authentication method, device, electronic equipment and storage medium
US20080189287A1 (en) System and method for a central index for rfid data with data privilege indicia

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant