CN109961292A - Block chain identifying code application method, equipment and storage medium - Google Patents
Block chain identifying code application method, equipment and storage medium Download PDFInfo
- Publication number
- CN109961292A CN109961292A CN201910222944.6A CN201910222944A CN109961292A CN 109961292 A CN109961292 A CN 109961292A CN 201910222944 A CN201910222944 A CN 201910222944A CN 109961292 A CN109961292 A CN 109961292A
- Authority
- CN
- China
- Prior art keywords
- identifying code
- address
- block chain
- user
- encryption information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The present invention provides a kind of block chain identifying code application method, equipment and storage medium, this method comprises: generating identifying code at random in response to user terminal triggering identifying code verifying;According to the first public key encryption identifying code of user, encryption information is generated;Transaction is generated according to the address of user and encryption information and the node of block chain is sent to by the address of server-side for executing so that the corresponding relationship of server-side address, station address and encryption information to be recorded on block chain;Server-side address is sent to user terminal, so that the corresponding relationship of query service end address and station address and is decrypted to obtain encryption information to obtain identifying code encryption information with private key for user in the data of block chain;The identifying code that user terminal is sent is received, judges whether identifying code is effective.The application is realized without binding cell-phone number or hardware device and suitable for the identifying code scheme of decentralization system.
Description
Technical field
This application involves Internet technical fields, and in particular to a kind of block chain identifying code application method, equipment and storage
Medium.
Background technique
Current verification code is widely used in the identity authentication scheme of Internet application, such as Account Logon, payment are tested
Card, other all kinds of authentications etc..
Existing identifying code scheme usually requires binding cell-phone number or mobile phone hardware, based on centralized server and the hand
The verifying of machine communicated to realize identifying code, the defect of these schemes is, once user has replaced cell-phone number or hardware device,
Just need to reconfigure the binding relationship of account and cell-phone number or hardware device, and with the growth of binding relationship, lead to user
The number of changing or cost of changing planes increase substantially, and bring great inconvenience to users.In addition, these schemes are not suitable for the area of decentralization
Block catenary system.
Summary of the invention
In view of drawbacks described above in the prior art or deficiency, be intended to provide it is a kind of without bind cell-phone number or hardware device and
Block chain identifying code application method, equipment and storage medium suitable for decentralization system.
In a first aspect, the present invention provides a kind of block chain identifying code application method, it is suitable for server-side, which is awarded
The public key for having or obtaining each user and corresponding address are weighed, this method comprises:
It is random to generate the first identifying code in response to the user terminal triggering identifying code verifying of the first user;
According to first the first identifying code of public key encryption of the first user, the first encryption information is generated;
The first the second ground for trading and passing through server-side is generated according to the first address of the first user and the first encryption information
Location is sent to the node of the first block chain for executing with by the corresponding relationship of the second address, the first address and the first encryption information
It is recorded on the first block chain;
To the user terminal of the first user send the second address, for inquired in the data of the first block chain the second address and
The corresponding relationship of first address believes the first encryption with the first private key for corresponding to the first public key with obtaining the first encryption information
Breath is decrypted to obtain the second identifying code;
Receive the second identifying code that the user terminal of the first user is sent, compare the second identifying code and the first identifying code whether phase
With to judge whether the second identifying code is effective.
Second aspect, the present invention provides another block chain identifying code application method, suitable for the node of block chain, the party
Method includes:
Receive the first transaction;Wherein, user terminal of first transaction by first service end in response to the first user triggers verifying
Code verifying, it is random to generate the first identifying code, according to first the first identifying code of public key encryption of the first user, generate the first encryption letter
After breath, is generated according to the first address of the first user and the first encryption information and pass through the transmission of the second address;First service end quilt
Authorize the public key for having or obtaining each user and corresponding address;
The first transaction is executed so that the corresponding relationship of the second address, the first address and the first encryption information is recorded in the firstth area
On block chain, behind the second address sent for the user terminal reception first service end of the first user in the data of the first block chain
The corresponding relationship of the second address and the first address is inquired to obtain the first encryption information, with the first private key for corresponding to the first public key
First encryption information is decrypted to obtain the second identifying code, the second identifying code is sent to first service end for comparing the
Whether two identifying codes are identical to judge whether the second identifying code is effective as the first identifying code.
The third aspect, the present invention provide another block chain identifying code application method, are suitable for user terminal, this method packet
It includes:
Receive the second address that first service end is sent;Wherein, first service end is authorized to and has or obtain each user's
Public key and corresponding address, first service end generate first in response to the server-side triggering identifying code verifying of active user at random
Identifying code generates the first encryption information according to first the first identifying code of public key encryption of active user, according to the of active user
One address and the first encryption information generate the first transaction and are sent to the node of the first block chain by the second address for executing
The corresponding relationship of the second address, the first address and the first encryption information to be recorded on the first block chain;
The corresponding relationship of the second address and the first address is inquired in the data of the first block chain to obtain the first encryption letter
Breath;
The first encryption information is decrypted with the first private key for corresponding to the first public key to obtain the second identifying code;
By the second identifying code be sent to first service end for compare the second identifying code and the first identifying code it is whether identical with
Judge whether the second identifying code is effective.
Fourth aspect, the present invention also provides a kind of equipment, including one or more processors and memory, wherein memory
Comprising can by instruction that the one or more processors execute so that the one or more processors execute it is each according to the present invention
The block chain identifying code application method that embodiment provides.
5th aspect, the present invention also provides a kind of storage medium for being stored with computer program, which makes to count
Calculation machine executes the block chain identifying code application method that each embodiment provides according to the present invention.
Block chain identifying code application method, equipment and the storage medium that many embodiments of the present invention provide by will according to
Identifying code, station address and the corresponding relationship of server-side address of family public key encryption are recorded on block chain, so that user terminal can
With the identifying code service of issuing for inquiring the identifying code of encryption on block chain and decrypting by private key for user, and decryption is obtained
End is verified, to realize without binding cell-phone number or hardware device and suitable for the identifying code side of decentralization system
Case;
Block chain identifying code application method, equipment and the storage medium that some embodiments of the invention provide, which further pass through, is
Identifying code configures validity period and whether authentication code is expired, has further ensured the safety of identifying code;
Block chain identifying code application method, equipment and the storage medium that some embodiments of the invention provide further pass through area
Identifying code identifier is recorded on block chain, and user terminal is allow to need to obtain the different identifying codes of a plurality of same server-side in a short time
When can accurately find the encryption information of identifying code.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is a kind of flow chart for block chain identifying code application method that one embodiment of the invention provides.
Fig. 2 is the flow chart for another block chain identifying code application method that one embodiment of the invention provides.
Fig. 3 is the flow chart for another block chain identifying code application method that one embodiment of the invention provides.
Fig. 4 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to
Convenient for description, part relevant to invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is a kind of flow chart for block chain identifying code application method that one embodiment of the invention provides.
As shown in Figure 1, in the present embodiment, the present invention provides a kind of block chain identifying code application side suitable for server-side
Method, the server-side are authorized to the public key for having or obtaining each user and corresponding address, this method comprises:
S11: random to generate the first identifying code in response to the user terminal triggering identifying code verifying of the first user;
S13: according to first the first identifying code of public key encryption of the first user, the first encryption information is generated;
S15: according to the first address of the first user and the first encryption information generate first trade and pass through server-side the
Double-address is sent to the node of the first block chain for executing with by the correspondence of the second address, the first address and the first encryption information
Relation record is on the first block chain;
S17: the second address is sent to the user terminal of the first user, for inquiring the second ground in the data of the first block chain
The corresponding relationship of location and the first address is added with the first private key for corresponding to the first public key to first with obtaining the first encryption information
Confidential information is decrypted to obtain the second identifying code;
S19: receiving the second identifying code that the user terminal of the first user is sent, and comparing the second identifying code with the first identifying code is
It is no identical to judge whether the second identifying code is effective.
The server-side of X software is triggered to the server-side requested service data of X software with the user terminal of user A below
For identifying code verifying, the above method is illustratively illustrated.
In the present embodiment, the server-side of X software configures in individual centralized server;In another embodiment, X
The server-side of software can be only fitted in the node of the first block chain (be specifically configurable to the contract of the first block chain, can also
To be configured to the local service of the node of the first block chain, etc.), it can also configure and (equally may be used in the node of the second block chain
To be configured to contract or local service etc.).
In the present embodiment, the server-side of X software requires user to provide public key and corresponding address in login account, from
And have each user public key and corresponding address;In another embodiment, the server-side of X software is also configured as requiring to use
The family public key that authorization service end obtains user when carrying out identifying code verifying in login account and corresponding address are, it can be achieved that phase
Same technical effect.
When the user terminal of user A is to the server-side requested service data of X software, the verifying of identifying code is triggered:
In step s 11, the server-side of X software generates first verifying of several characters in response to above-mentioned triggering at random
Code c1;
In step s 13, the server-side of X software is according to the public key P of the user A storedATo the first identifying code c1Added
It is close, generate the first encryption information m1;
In step S15, the server-side of X software is according to the address add of the user A storedAWith the first encryption information m1It is raw
At the first transaction tx1, and pass through the address add of server-sideSIt is sent to the node of the first block chain;
The node of first block chain receives tx1Afterwards, by tx1It broadcasts to other nodes of the first block chain network, and by tx1
It is packed into block and executes, thus by add after implementing result is by common recognitionS、addAWith m1Corresponding relationship be recorded in the firstth area
On block chain;
In step S17, the server-side of X software is by addSIt is sent to the user terminal of user A;
The user terminal of user A receives addSAfterwards, addS and add is inquired in the data of the first block chainACorresponding relationship with
Obtain the first encryption information m1, and by corresponding to public key PAPrivate key pATo m1It is decrypted, obtains the second identifying code c2;Its
In, when inquiring multinomial add in the data of the first block chainSWith addACorresponding relationship when, take wherein newest one;
In step S19, the server-side of X software receives the second identifying code c transmitted by the user terminal of user A2, compare the
Two identifying code c2With the first identifying code c1It is whether identical:
It is no, then the second identifying code c2In vain;
It is, then the second identifying code c2Effectively, requested business datum is sent to the user terminal of user A.
In addition, being held when the server-side of X software is configured to the local service of the node of the first block chain or the second block chain
The principle of the row above method is essentially identical with above-mentioned example, repeats no more;When the server-side of X software be configured to the first block chain or
When the contract of the second block chain, the difference for executing the principle and above-mentioned example of the above method is, needs to pass through in step S17
The local service of node configuration sends the second address to user terminal, and, in step S19, user terminal beats the second identifying code
Packet is the second transaction tx2Block chain node is sent to trigger above-mentioned contract and execute tx2。
Above-described embodiment is closed by the way that the identifying code, the station address that will be encrypted according to client public key are corresponding with server-side address
System is recorded on block chain, and user terminal is allowed to inquire the identifying code of encryption on block chain and by private key for user solution
It is close, and the identifying code that decryption obtains is issued into server-side and is verified, to realize without binding cell-phone number or hardware device
And it is suitable for the identifying code scheme of decentralization system.
Preferably, the first identifying code is configured with the validity period of fixed duration or fixed block height quantity, the validity period
Entry-into-force time is time point or block height of first transaction record on the first block chain.
For example, the first identifying code c1Validity period be configured to 300 seconds or 50 block height, work as tx1The block being packaged is logical
Common recognition is crossed when being recorded on the first block chain, first service end gets time point t1Or the block height h of the block1, first
Identifying code c1It comes into force;
When first service end receives the second identifying code c2Without departing from 300 seconds time (t1+ 300s) or 50 block height
(h1+ 50) when, the second identifying code c2It does not fail, compares c2With c1It is whether identical;
When first service end receives the second identifying code c2Time exceed 300 seconds (t1+ 300s) or 50 block height (h1+
50) when, the second identifying code c2It has been failed that, authentication failed.
Above-mentioned 300 seconds merely illustrative with 50 block height, can configure any difference for validity period according to actual needs
Duration or block height quantity.
Further by configuring validity period for identifying code, simultaneously whether authentication code is expired for above-described embodiment, further ensures
The safety of identifying code.
It is further preferred that it is above-mentioned first transaction, and, the second address, the first address and the first encryption information correspondence
Relationship further includes identifying code identifier.The inquiry of above-mentioned user terminal further includes being inquired according to identifying code identifier.
Specifically, when the same server-side of same user's short time internal trigger carries out the verifying of multiple authentication code, probably due to
Various reasons cause the encryption information of every identifying code not to be recorded on block chain in chronological order, or, wherein two or more
Item encryption information is packaged in the same block and is recorded on block chain simultaneously, causes user terminal that can not accurately distinguish items and tests
Code is demonstrate,proved, this can effectively be solved the problems, such as by configuration verification code identifier.
For example, tx1It further include identifying code identifier n1, tx1After the block being packaged is by common recognition, by addS、addA、n1With
m1Corresponding relationship be recorded on the first block chain;User terminal passes through inquiry addS、addA、n1Corresponding relationship can accurately look into
Find m1, without the multinomial encryption information being simultaneously or successively recorded on block chain in the short time cannot be distinguished.
Above-described embodiment further passes through record identifying code identifier on block chain, needs user terminal in a short time
The encryption information of identifying code can be accurately found when obtaining the different identifying codes of a plurality of same server-side.
Fig. 2 is the flow chart for another block chain identifying code application method that one embodiment of the invention provides.It is shown in Fig. 2
Method can cooperate method shown in FIG. 1 to execute.
As shown in Fig. 2, in the present embodiment, the present invention also provides another block chain identifying code application methods, it is suitable for
The node of block chain, this method comprises:
S22: the first transaction is received;Wherein, user terminal of first transaction by first service end in response to the first user triggers
Identifying code verifying, it is random to generate the first identifying code, according to first the first identifying code of public key encryption of the first user, generates first and add
After confidential information, is generated according to the first address of the first user and the first encryption information and pass through the transmission of the second address;First service
End is authorized to the public key for having or obtaining each user and corresponding address;
S24: the first transaction is executed so that the corresponding relationship of the second address, the first address and the first encryption information is recorded in the
On one block chain, in the number of the first block chain behind the second address sent for the user terminal reception first service end of the first user
According to the corresponding relationship of the second address of middle inquiry and the first address to obtain the first encryption information, with first corresponding to the first public key
Private key is decrypted the first encryption information to obtain the second identifying code, by the second identifying code be sent to first service end for than
It is whether identical to judge whether the second identifying code is effective as the first identifying code to the second identifying code.
Preferably, the first identifying code is configured with the validity period of fixed duration or fixed block height quantity, the life of validity period
The effect time is time point or block height of first transaction record on the first block chain.
It is further preferred that the corresponding relationship of the first transaction and the second address, the first address and the first encryption information also wraps
Include identifying code identifier;Identifying code identifier is used to search the first encryption information for the user terminal of the first user.
The identifying code application principle of method shown in Fig. 2 can refer to method shown in FIG. 1, and details are not described herein again.
Fig. 3 is the flow chart for another block chain identifying code application method that one embodiment of the invention provides.It is shown in Fig. 3
Method can cooperate Fig. 1 and method shown in Fig. 2 to execute.
As shown in figure 3, in the present embodiment, the present invention also provides another block chain identifying code application methods, it is suitable for
User terminal, this method comprises:
S32: the second address that first service end is sent is received;Wherein, first service end, which is authorized to, has or obtains each use
The public key at family and corresponding address, server-side triggering identifying code verifying of the first service end in response to active user, random generation
First identifying code generates the first encryption information, according to active user according to first the first identifying code of public key encryption of active user
The first address and the first encryption information generate first transaction and by the second address be sent to the node of the first block chain for
It executes so that the corresponding relationship of the second address, the first address and the first encryption information to be recorded on the first block chain;
S34: the corresponding relationship of the second address and the first address is inquired in the data of the first block chain to obtain first and add
Confidential information;
S36: the first encryption information is decrypted with the first private key for corresponding to the first public key to obtain the second identifying code;
S38: the second identifying code is sent to first service end for compare the second identifying code and the first identifying code whether phase
With to judge whether the second identifying code is effective.
Preferably, the first identifying code is configured with the validity period of fixed duration or fixed block height quantity, the life of validity period
The effect time is time point or block height of first transaction record on the first block chain.
It is further preferred that the corresponding relationship of the first transaction and the second address, the first address and the first encryption information also wraps
Include identifying code identifier;Identifying code identifier is used to search the first encryption information for the user terminal of the first user.
The identifying code application principle of method shown in Fig. 3 equally can refer to method shown in FIG. 1, and details are not described herein again.
Fig. 4 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
As shown in figure 4, present invention also provides a kind of equipment 400, including one or more centres as on the other hand
Unit (CPU) 401 is managed, can be added according to the program being stored in read-only memory (ROM) 402 or from storage section 408
The program that is downloaded in random access storage device (RAM) 403 and execute various movements appropriate and processing.In RAM403, also deposit
It contains equipment 400 and operates required various programs and data.CPU401, ROM402 and RAM403 pass through the phase each other of bus 404
Even.Input/output (I/O) interface 405 is also connected to bus 404.
I/O interface 405 is connected to lower component: the importation 406 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 407 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 408 including hard disk etc.;
And the communications portion 409 of the network interface card including LAN card, modem etc..Communications portion 409 via such as because
The network of spy's net executes communication process.Driver 410 is also connected to I/O interface 405 as needed.Detachable media 411, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 410, in order to read from thereon
Computer program be mounted into storage section 408 as needed.
Particularly, in accordance with an embodiment of the present disclosure, the block chain identifying code application method of any of the above-described embodiment description can
To be implemented as computer software programs.For example, embodiment of the disclosure includes a kind of computer program product comprising tangible
Ground includes computer program on a machine-readable medium, and computer program includes for executing block chain identifying code application method
Program code.In such embodiments, which can be downloaded and be pacified from network by communications portion 409
Dress, and/or be mounted from detachable media 411.
As another aspect, present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums
Matter can be computer readable storage medium included in the device of above-described embodiment;It is also possible to individualism, it is unassembled
Enter the computer readable storage medium in equipment.Computer-readable recording medium storage has one or more than one program, should
Program is used to execute the block chain identifying code application method for being described in the application by one or more than one processor.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depending on related function.Also it wants
It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yitong
The dedicated hardware based system of functions or operations as defined in executing is crossed to realize, or by specialized hardware and can be calculated
The combination of machine instruction is realized.
Being described in the embodiment of the present application involved unit or module can be realized by way of software, can also be with
It is realized by way of hardware.Described unit or module also can be set in the processor, for example, each unit can be
Software program in computer or intelligent movable equipment is set, the hardware device being separately configured is also possible to.Wherein, these lists
The title of member or module does not constitute the restriction to the unit or module itself under certain conditions.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art
Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from the application design, appointed by above-mentioned technical characteristic or its equivalent feature
Other technical solutions of meaning combination and formation.Such as features described above and (but being not limited to) disclosed herein have similar functions
Technical characteristic replaced mutually and the technical solution that is formed.
Claims (11)
1. a kind of block chain identifying code application method, which is characterized in that the method is suitable for server-side, and the server-side is awarded
Weigh the public key for having or obtaining each user and corresponding address, which comprises
It is random to generate the first identifying code in response to the user terminal triggering identifying code verifying of the first user;
According to the first identifying code described in the first public key encryption of first user, the first encryption information is generated;
The first transaction is generated according to the first address of first user and first encryption information and passes through the server-side
The second address be sent to the node of the first block chain for executing with by second address, first address and described
The corresponding relationship of one encryption information is recorded on the first block chain;
Second address is sent to the user terminal of first user, for inquiring institute in the data of the first block chain
The corresponding relationship of the second address and first address is stated to obtain first encryption information, and public with corresponding to described first
First encryption information is decrypted to obtain the second identifying code in first private key of key;
Second identifying code that the user terminal of first user is sent is received, second identifying code and described first is compared
Whether identifying code is identical to judge whether second identifying code is effective.
2. the method according to claim 1, wherein first identifying code is configured with fixed duration or fixed area
The validity period of block height quantity, the entry-into-force time of the validity period are first transaction record on the first block chain
Time point or block height.
3. method according to claim 1 or 2, which is characterized in that first transaction and second address, described the
The corresponding relationship of one address and first encryption information further includes identifying code identifier;
It is described to send second address to the user terminal of first user, for being looked into the data of the first block chain
The corresponding relationship for asking second address and first address includes to obtain first encryption information:
Second address and the identifying code identifier are sent to the user terminal of first user, in firstth area
The corresponding relationship of second address, the identifying code identifier and first address is inquired in the data of block chain to obtain
State the first encryption information.
4. a kind of block chain identifying code application method, which is characterized in that the method is suitable for the node of block chain, the method
Include:
Receive the first transaction;Wherein, user terminal of first transaction by first service end in response to the first user triggers verifying
Code verifying, it is random to generate the first identifying code, according to the first identifying code described in the first public key encryption of first user, generate the
After one encryption information, is generated according to the first address of first user and first encryption information and pass through the second address hair
It send;The first service end is authorized to the public key for having or obtaining each user and corresponding address;
First transaction is executed with by the corresponding relationship of second address, first address and first encryption information
It is recorded on the first block chain, so that the user terminal of first user receives second ground that the first service end is sent
The corresponding relationship of second address and first address is inquired behind location in the data of the first block chain to obtain
The first encryption information is stated, first encryption information is decrypted to obtain with the first private key for corresponding to first public key
Second identifying code is sent to the first service end for comparing second identifying code and described the by the second identifying code
Whether one identifying code is identical to judge whether second identifying code is effective.
5. according to the method described in claim 4, it is characterized in that, first identifying code is configured with fixed duration or fixed area
The validity period of block height quantity, the entry-into-force time of the validity period are first transaction record on the first block chain
Time point or block height.
6. method according to claim 4 or 5, which is characterized in that first transaction and second address, described the
The corresponding relationship of one address and first encryption information further includes identifying code identifier;The identifying code identifier is used for for institute
The user terminal for stating the first user searches first encryption information.
7. a kind of block chain identifying code application method, which is characterized in that the method is suitable for user terminal, which comprises
Receive the second address that first service end is sent;Wherein, the first service end is authorized to and has or obtain each user's
Public key and corresponding address, server-side triggering identifying code verifying of the first service end in response to active user, random generation
First identifying code, the first identifying code according to the first public key encryption of the active user generate the first encryption information, according to
The first address of the active user and first encryption information generate first and trade and be sent to by second address
The node of first block chain is for executing with by the correspondence of second address, first address and first encryption information
Relation record is on the first block chain;
The corresponding relationship of second address and first address is inquired in the data of the first block chain to obtain
State the first encryption information;
First encryption information is decrypted to obtain the second identifying code with the first private key for corresponding to first public key;
Second identifying code is sent to the first service end for comparing second identifying code and first verifying
Whether code is identical to judge whether second identifying code is effective.
8. the method according to the description of claim 7 is characterized in that first identifying code is configured with fixed duration or fixed area
The validity period of block height quantity, the entry-into-force time of the validity period are first transaction record on the first block chain
Time point or block height.
9. method according to claim 7 or 8, which is characterized in that first transaction and second address, described the
The corresponding relationship of one address and first encryption information further includes identifying code identifier;The identifying code identifier is used for for institute
The user terminal for stating the first user searches first encryption information.
10. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors
Execute method as claimed in any one of claims 1-9 wherein.
11. a kind of storage medium for being stored with computer program, which is characterized in that realize when the program is executed by processor as weighed
Benefit requires method described in any one of 1-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910222944.6A CN109961292B (en) | 2019-03-22 | 2019-03-22 | Block chain verification code application method, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910222944.6A CN109961292B (en) | 2019-03-22 | 2019-03-22 | Block chain verification code application method, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109961292A true CN109961292A (en) | 2019-07-02 |
CN109961292B CN109961292B (en) | 2022-04-01 |
Family
ID=67024673
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910222944.6A Active CN109961292B (en) | 2019-03-22 | 2019-03-22 | Block chain verification code application method, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109961292B (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110493261A (en) * | 2019-09-16 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Identifying code acquisition methods, client, server and storage medium based on block chain |
CN110602098A (en) * | 2019-09-16 | 2019-12-20 | 北京众享比特科技有限公司 | Identity authentication method, device, equipment and storage medium |
CN110942300A (en) * | 2019-11-14 | 2020-03-31 | 杭州复杂美科技有限公司 | Transfer certificate submitting method, device and storage medium |
CN111050326A (en) * | 2019-11-28 | 2020-04-21 | 泰康保险集团股份有限公司 | Short message verification method, device, equipment and medium based on block chain |
CN112035879A (en) * | 2020-09-04 | 2020-12-04 | 昆明理工大学 | Information processing method and system for improving confidentiality of automatic logistics of cell |
CN112053164A (en) * | 2020-08-19 | 2020-12-08 | 吴晓庆 | Block chain-based electronic commerce data processing method and system |
CN112084509A (en) * | 2020-08-19 | 2020-12-15 | 喻婷婷 | Block chain key generation method and system based on biological identification technology |
CN112188418A (en) * | 2019-07-05 | 2021-01-05 | 青岛海链数字科技有限公司 | Short message verification method based on block chain |
CN112446988A (en) * | 2020-04-08 | 2021-03-05 | 杭州左链科技有限公司 | Access control application method, device and storage medium |
CN112488681A (en) * | 2020-12-11 | 2021-03-12 | 广东广宇科技发展有限公司 | Block chain-based authorization code payment method, system, terminal and storage medium |
CN113489667A (en) * | 2020-04-09 | 2021-10-08 | 济南诚方网络科技有限公司 | Verification method, device and medium based on in-vivo detection |
CN113593090A (en) * | 2021-07-30 | 2021-11-02 | 国家电网有限公司技术学院分公司 | Transformer substation five-prevention Bluetooth lockset system based on block chain |
CN113593082A (en) * | 2021-05-14 | 2021-11-02 | 国家电网有限公司技术学院分公司 | Five-prevention lock management method and system based on block chain |
CN113611014A (en) * | 2021-07-08 | 2021-11-05 | 国家电网有限公司技术学院分公司 | Five-prevention lock management method based on block chain |
CN113904774A (en) * | 2021-08-27 | 2022-01-07 | 重庆小雨点小额贷款有限公司 | Block chain address authentication method and device and computer equipment |
CN113938499A (en) * | 2021-09-29 | 2022-01-14 | 深圳时空云科技有限公司 | Decentralized service method, device and system |
CN114362950A (en) * | 2020-09-29 | 2022-04-15 | 中国移动通信有限公司研究院 | Information transmission method, device and terminal |
WO2024045053A1 (en) * | 2022-08-31 | 2024-03-07 | 北京京东方技术开发有限公司 | Resource distribution method and apparatus |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160188874A1 (en) * | 2014-12-29 | 2016-06-30 | Rubicon Labs, Inc. | System and method for secure code entry point control |
CN108235806A (en) * | 2017-12-28 | 2018-06-29 | 深圳达闼科技控股有限公司 | Method, device and system for safely accessing block chain, storage medium and electronic equipment |
CN108259438A (en) * | 2016-12-29 | 2018-07-06 | 中移(苏州)软件技术有限公司 | A kind of method and apparatus of the certification based on block chain technology |
CN108377189A (en) * | 2018-05-09 | 2018-08-07 | 深圳壹账通智能科技有限公司 | User's communication encrypting method, device, terminal device and storage medium on block chain |
CN109117674A (en) * | 2018-09-25 | 2019-01-01 | 深圳市元征科技股份有限公司 | A kind of client validation encryption method, system, equipment and computer media |
CN109146481A (en) * | 2018-08-23 | 2019-01-04 | 泰链(厦门)科技有限公司 | Account private key automatically imported method, medium, device and the block catenary system of block chain wallet |
-
2019
- 2019-03-22 CN CN201910222944.6A patent/CN109961292B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160188874A1 (en) * | 2014-12-29 | 2016-06-30 | Rubicon Labs, Inc. | System and method for secure code entry point control |
CN108259438A (en) * | 2016-12-29 | 2018-07-06 | 中移(苏州)软件技术有限公司 | A kind of method and apparatus of the certification based on block chain technology |
CN108235806A (en) * | 2017-12-28 | 2018-06-29 | 深圳达闼科技控股有限公司 | Method, device and system for safely accessing block chain, storage medium and electronic equipment |
CN108377189A (en) * | 2018-05-09 | 2018-08-07 | 深圳壹账通智能科技有限公司 | User's communication encrypting method, device, terminal device and storage medium on block chain |
CN109146481A (en) * | 2018-08-23 | 2019-01-04 | 泰链(厦门)科技有限公司 | Account private key automatically imported method, medium, device and the block catenary system of block chain wallet |
CN109117674A (en) * | 2018-09-25 | 2019-01-01 | 深圳市元征科技股份有限公司 | A kind of client validation encryption method, system, equipment and computer media |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112188418B (en) * | 2019-07-05 | 2022-10-14 | 青岛海链数字科技有限公司 | Short message verification method based on block chain |
CN112188418A (en) * | 2019-07-05 | 2021-01-05 | 青岛海链数字科技有限公司 | Short message verification method based on block chain |
CN110602098A (en) * | 2019-09-16 | 2019-12-20 | 北京众享比特科技有限公司 | Identity authentication method, device, equipment and storage medium |
CN110493261A (en) * | 2019-09-16 | 2019-11-22 | 腾讯科技(深圳)有限公司 | Identifying code acquisition methods, client, server and storage medium based on block chain |
CN110602098B (en) * | 2019-09-16 | 2021-08-24 | 北京众享比特科技有限公司 | Identity authentication method, device, equipment and storage medium |
CN110942300A (en) * | 2019-11-14 | 2020-03-31 | 杭州复杂美科技有限公司 | Transfer certificate submitting method, device and storage medium |
CN110942300B (en) * | 2019-11-14 | 2023-04-14 | 杭州复杂美科技有限公司 | Transfer certificate submitting method, device and storage medium |
CN111050326A (en) * | 2019-11-28 | 2020-04-21 | 泰康保险集团股份有限公司 | Short message verification method, device, equipment and medium based on block chain |
CN111050326B (en) * | 2019-11-28 | 2023-08-25 | 泰康保险集团股份有限公司 | Block chain-based short message verification method, device, equipment and medium |
CN112446988A (en) * | 2020-04-08 | 2021-03-05 | 杭州左链科技有限公司 | Access control application method, device and storage medium |
CN113489667B (en) * | 2020-04-09 | 2023-08-18 | 济南诚方网络科技有限公司 | Verification method, device and medium based on living body detection |
CN113489667A (en) * | 2020-04-09 | 2021-10-08 | 济南诚方网络科技有限公司 | Verification method, device and medium based on in-vivo detection |
CN112084509A (en) * | 2020-08-19 | 2020-12-15 | 喻婷婷 | Block chain key generation method and system based on biological identification technology |
CN112053164A (en) * | 2020-08-19 | 2020-12-08 | 吴晓庆 | Block chain-based electronic commerce data processing method and system |
CN112035879A (en) * | 2020-09-04 | 2020-12-04 | 昆明理工大学 | Information processing method and system for improving confidentiality of automatic logistics of cell |
CN114362950A (en) * | 2020-09-29 | 2022-04-15 | 中国移动通信有限公司研究院 | Information transmission method, device and terminal |
CN112488681A (en) * | 2020-12-11 | 2021-03-12 | 广东广宇科技发展有限公司 | Block chain-based authorization code payment method, system, terminal and storage medium |
CN113593082A (en) * | 2021-05-14 | 2021-11-02 | 国家电网有限公司技术学院分公司 | Five-prevention lock management method and system based on block chain |
CN113611014A (en) * | 2021-07-08 | 2021-11-05 | 国家电网有限公司技术学院分公司 | Five-prevention lock management method based on block chain |
CN113611014B (en) * | 2021-07-08 | 2023-07-21 | 国家电网有限公司技术学院分公司 | Five-prevention lockset management method based on block chain |
CN113593090A (en) * | 2021-07-30 | 2021-11-02 | 国家电网有限公司技术学院分公司 | Transformer substation five-prevention Bluetooth lockset system based on block chain |
CN113593090B (en) * | 2021-07-30 | 2023-07-18 | 国家电网有限公司技术学院分公司 | Block chain-based five-prevention Bluetooth lock system of transformer substation |
CN113904774A (en) * | 2021-08-27 | 2022-01-07 | 重庆小雨点小额贷款有限公司 | Block chain address authentication method and device and computer equipment |
CN113938499A (en) * | 2021-09-29 | 2022-01-14 | 深圳时空云科技有限公司 | Decentralized service method, device and system |
WO2024045053A1 (en) * | 2022-08-31 | 2024-03-07 | 北京京东方技术开发有限公司 | Resource distribution method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN109961292B (en) | 2022-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109961292A (en) | Block chain identifying code application method, equipment and storage medium | |
US11720891B2 (en) | Method and system for zero-knowledge and identity based key management for decentralized applications | |
JP7364724B2 (en) | Operating system for blockchain IoT devices | |
AU2021206913B2 (en) | Systems and methods for distributed data sharing with asynchronous third-party attestation | |
US20200145223A1 (en) | System and method for blockchain-based notification | |
US6957199B1 (en) | Method, system and service for conducting authenticated business transactions | |
US20180322491A1 (en) | Method and System for Blockchain-Based Combined Identity, Ownership, Integrity and Custody Management | |
US8931689B2 (en) | Systems and methods for anti-counterfeit authentication through communication networks | |
JP4682187B2 (en) | Authentication system, information providing method, and information providing system | |
CN110163751B (en) | Block chain access system oriented to alliance chain and implementation method thereof | |
JP2017208840A (en) | Method of enabling digital music content to be downloaded to and used on portable wireless computing device | |
CN106600403A (en) | Asset management method, device and system | |
CN110537346A (en) | Safe decentralization domain name system | |
CN108881167A (en) | A kind of intelligent contract of finite field block catenary system | |
CN101937528A (en) | Systems and methods for implementing supply chain visibility policies | |
US8055898B2 (en) | Tag authentication system | |
US11831636B2 (en) | Systems and techniques for trans-account device key transfer in benefit denial system | |
CN110490640A (en) | Method, apparatus and system for object distribution processor | |
CN110264207A (en) | Block chain separation processing method and system | |
CN109583915A (en) | Anti-counterfeiting authentication method, equipment and storage medium | |
Omar et al. | Decentralized identifiers and verifiable credentials for smartphone anticounterfeiting and decentralized IMEI database | |
CN109995775A (en) | Block chain identifying code application method, equipment and storage medium | |
CN109040142A (en) | Private communication method, address configuration method, equipment and storage medium | |
CN109495468A (en) | Authentication method, device, electronic equipment and storage medium | |
US20080189287A1 (en) | System and method for a central index for rfid data with data privilege indicia |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |