CN111143474B - One-key binding changing method for mobile phone number based on block chain technology - Google Patents

One-key binding changing method for mobile phone number based on block chain technology Download PDF

Info

Publication number
CN111143474B
CN111143474B CN201911409799.9A CN201911409799A CN111143474B CN 111143474 B CN111143474 B CN 111143474B CN 201911409799 A CN201911409799 A CN 201911409799A CN 111143474 B CN111143474 B CN 111143474B
Authority
CN
China
Prior art keywords
user
information
block chain
personal information
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911409799.9A
Other languages
Chinese (zh)
Other versions
CN111143474A (en
Inventor
程宏兵
方艺程
王晓庆
周凡凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN201911409799.9A priority Critical patent/CN111143474B/en
Publication of CN111143474A publication Critical patent/CN111143474A/en
Application granted granted Critical
Publication of CN111143474B publication Critical patent/CN111143474B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

A method for changing the binding of a mobile phone number by one key based on a block chain technology is characterized in that a user can log in a block chain platform to finish personal information editing; after the authentication is passed, the block chain platform carries out hash operation on the personal information uploaded by the user, encrypts and packs the personal information into blocks, and the blocks are stored into a block chain; and when the block chain platform receives an authorization request of an organization sent by the user side, the encrypted user personal information on the block chain is decrypted and edited in a permission mode after the block chain platform is authenticated. Through the steps, the mobile phone number information is modified at the block chain client, so that one-key binding exchange of the mobile phone login number is realized on each app registered by the user, and the method is convenient and safe.

Description

One-key mobile phone number binding changing method based on block chain technology
Technical Field
The invention relates to the field of computer information processing, in particular to a method for one-key binding change of a mobile phone number based on a block chain technology.
Background
Nowadays, with the continuous development of internet economy, a mobile phone number is not only a code for dialing a phone number, but also is similar to personal identification, and various account numbers such as a payment treasure, an internet bank and the like need to be bound with the mobile phone number. Once the mobile phone number is changed, if the information is not updated in time, the mobile phone number may be disturbed by strange information, and even the personal information is leaked. In the case of numerous app software in the market, changing one mobile phone number may require starting each app for manual short message change, and some apps may also require using the original mobile phone number for number verification, thereby causing great inconvenience.
The existing personal private information management tool is generally based on independent software or cloud service, and has the problems that data is difficult to share, is easy to leak and the like. The block chain technology has the characteristics of decentralization, difficulty in data tampering, traceability and the like, can be used for data management, but is short of a mature application mode at present.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, provides a user information management platform based on a block chain, is convenient for a user to realize one-key binding change of a mobile phone number and a login account number on each app software only through one-time short message authentication, simplifies user operation and simultaneously can ensure the safety of personal information of the user.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for changing binding of a mobile phone number by one key based on a block chain technology comprises the following steps:
step 1, a user registered on a block chain platform can log in the block chain platform through networking equipment, the equipment is not limited to personal computers, mobile terminals and other equipment with display and processing functions, and the operation of adding personal information and modifying the personal information is completed;
step 2, the block chain platform acquires personal information uploaded by a user side, wherein the personal information comprises a mobile phone number, a name, an identity card number and the like, when a stored personal information modification request and a newly added request are received, the request is authenticated, after the authentication is passed, hash operation encryption is carried out on the modified personal information uploaded by the user and the newly added personal information, the modified personal information and the newly added personal information are packaged into a block, and then the block is stored into a block chain;
and 3, when the block chain platform receives an authorization request of the mechanism sent by the user side, decrypting and screening the encrypted user information on the block chain, and sending the screened user information to the mechanism through the block chain platform.
In the method for encrypting and authorizing personal information based on a blockchain, the step of adding and modifying information requested by a user comprises:
step 4, the block chain platform acquires the user personal information uploaded by the user side, and decrypts the encrypted user information on the block chain according to the user personal digital identity card and the user key information;
and if the user uploads a request for adding new information, authenticating the request, adding new user information on the original information after the authentication is successful, carrying out Hash operation encryption on the new personal information, packaging the new personal information into a block, and storing the block into a block chain.
If the request is a request for uploading and modifying information of the user, authenticating the request, replacing the uploaded information of the user with the original information after the authentication is successful, carrying out Hash operation encryption on new personal information, packaging the new personal information into a block, and storing the block into a block chain;
the above method for changing the binding of the mobile phone number by one key based on the blockchain includes the steps of decrypting and screening the personal information of the corresponding user in the blockchain:
reading information at least comprising a personal digital identity card, a user key and a required information type from a user request; searching corresponding user personal information in the block chain through the personal digital identity card, and decrypting the user personal information by using a user key; and finally, screening out the required personal information from the decrypted personal information of the user according to the type of the required information.
Through the steps, the mobile phone number information is modified at the block chain client, so that one-key binding exchange of the mobile phone login number is realized on each app registered by the user, and the method is convenient and safe.
Drawings
Fig. 1 is a schematic diagram of a user modification and new information encryption authorization process.
Fig. 2 is a schematic flow chart illustrating a process of adding user information such as a mobile phone number to each app registered by a user for the first time.
Fig. 3 is a workflow for implementing a mobile phone login number one-key binding change on each app registered by a user.
Detailed Description
Referring to the attached drawings, a method for one-key binding change of a mobile phone number based on a block chain technology comprises the following steps:
the user personal information encryption authorization method related to the embodiment of the invention is mainly applied to user personal information encryption authorization equipment which can be equipment with display and processing functions, such as a personal computer, a mobile terminal and the like.
In the embodiment of the present invention, the user personal information encryption authorization device may include a processor (e.g., a central processing unit), a communication bus, a user interface, a network interface, and a memory. The communication bus is used for realizing connection communication among the components; the user interface may include a display screen, an input unit such as a keyboard; the network interface optionally may include a standard wired interface, a wireless interface (e.g., WI-FI interface); the memory may be a high speed RAM memory or a stable memory such as a disk memory.
The user personal information encryption authorization method is realized by user personal information encryption authorization equipment, the user personal information encryption authorization equipment can be equipment with display and processing functions, such as a personal computer, a mobile terminal and the like, and the user personal information encryption authorization method comprises the following steps:
step 1.1, the user registered in the block chain platform can log in the block chain platform through various personal information encryption and authorization devices, and the user who logs in for the first time uploads a request for adding new information.
Step 1.2, the user side uploads a request for modifying the mobile phone number information, and specifically, an authorization request containing a personal digital identity card and a private key is generated.
Step 2.1, when the block chain platform obtains a request of newly added information uploaded by a user side, the information includes a mobile phone number, a name and an identity card number, short message verification is carried out on the mobile phone number information, after the verification is passed, Hash operation encryption is carried out on the information and other personal information which does not need to be authenticated together, the information is packaged into a block, then the block is stored into a block chain, namely, equipment generates a public key (public key) and a private key (private key) of a pair of users by using an asymmetric encryption algorithm, the personal information of the authenticated users is encrypted according to the public key, and the encrypted personal information of the users is stored into the block chain. Asymmetric encryption algorithms include, but are not limited to, elliptic curve encryption algorithm, RSA encryption algorithm, Elgamal algorithm, prime number test algorithm, and D-H (Diffie-Hellman) algorithm, among others. It can be understood that the public key can be calculated by the private key, the public key is extremely difficult to calculate reversely, and the personal information of the user can be decrypted and obtained only when the user inputs the private key, so that the personal privacy is effectively protected, and the security of the personal information of the user is ensured.
And 2.2, when the block chain platform acquires an authorization request for modifying the mobile phone number information uploaded by a user side, performing short message verification on new mobile phone number information, reading a personal digital identity card and a private key from the block chain after the verification is passed, searching corresponding user personal information in the block chain through the personal digital identity card, decrypting the user personal information by using the private key, displaying the user information to the block chain platform on equipment, deleting the original mobile phone number information by a user, adding new mobile phone number information, and if the step 2.1 is used, performing hash operation encryption on the new personal information again, packaging the new personal information to a block, and storing the block to the block chain.
And 3, when a certain computer forum needs to inquire user information through the block chain, determining the information type of the personal information of the user needing to be inquired and a public key corresponding to the user through the computer forum terminal, encrypting the information type based on the public key, generating an inquiry user information authorization request containing the information type and encryption, and sending the request to the user side. The computer forum terminal comprises but is not limited to a PC, a notebook computer, a smart phone and a tablet computer, and the information type is not limited to a mobile phone number, a name and an identification number.
The user side receives the request for inquiring user information authorization sent by the computer forum terminal, decrypts the information type in the request for inquiring authorization by the private key of the device, then displays an authorization interface containing the information type, an authorization approval control and an authorization rejection control, if the user clicks the authorization rejection control, the flow of inquiring authorization is finished, and corresponding information is returned to the mechanism terminal; if the user clicks the authorization agreement control, an authorization request containing the information type, the public key, the personal digital identity card, the private key and the computer forum terminal identification code is generated, and the authorization request is sent to the equipment.
When the blockchain platform receives the authorization request sent by the user terminal, according to the authorization request of the computer forum, decrypting and screening the corresponding personal information in the blockchain, specifically, the blockchain platform reads the information type, the personal digital identity card and the private key from the authorization request, and reads the user personal information corresponding to the user personal digital ID card from the block chain, then decrypts the user personal information according to the private key, and according to the information type, screening out the required personal information from the decrypted personal information of the user, sending the personal information to the computer forum, and finally, the computer forum terminal identification code and the public key information are transmitted to the computer forum terminal corresponding to the authorization request according to the computer forum terminal identification code. And the computer forum terminal receives the user personal information sent by the equipment and decrypts the user personal information according to the private key of the computer forum.
Step 4, the block chain platform sends an authorization request for modifying user information to the computer forum, the user side sends the user information authorization request of the computer forum terminal again, the authorization request comprises the information type of the personal information of the user and a public key corresponding to the user, the private key of the equipment decrypts the information type in the inquiry authorization request, then an authorization interface containing the information type, an authorization approval control and an authorization refusal control is displayed, if the user clicks the authorization refusal control, the inquiry authorization flow is finished, and corresponding information is returned to the mechanism terminal; if the user clicks the authorization agreement control, an authorization request containing the information type, the public key, the personal digital identity card, the private key and the computer forum terminal identification code is generated, and the authorization request is sent to the equipment. When the blockchain platform receives the authorization request sent by the user terminal, according to the authorization request of the computer forum, decrypting and screening the corresponding personal information in the blockchain, specifically, the blockchain platform reads the information type, the personal digital identity card and the private key from the authorization request, and reads the user personal information corresponding to the user personal digital ID card from the block chain, then decrypts the user personal information according to the private key, and according to the information type, screening out the needed personal information from the decrypted personal information of the user, sending the personal information to the computer forum, and finally, the computer forum terminal identification code and the public key information are transmitted to the computer forum terminal corresponding to the authorization request according to the computer forum terminal identification code. And the computer forum terminal receives the user personal information sent by the equipment and decrypts the user personal information according to the private key of the computer forum. Therefore, the update of the mobile phone login number information of the forum of the computer is realized.
In the same way, the blockchain platform can realize that all mechanisms sharing information with the blockchain platform realize one-key transposition of the mobile phone number.

Claims (2)

1. A method for changing the binding of a mobile phone number by one key based on a block chain technology is characterized by comprising the following steps:
step 1, a user registered on a block chain platform can log in the block chain platform through networking equipment and complete the operation of adding personal information and modifying the personal information;
step 2, the block chain platform acquires personal information uploaded by a user side, wherein the personal information comprises a mobile phone number, a name and an identity card number, when a request for modifying and adding the stored personal information is received, the request is authenticated, after the authentication is passed, hash operation encryption is carried out on the modified and added personal information uploaded by the user and the added personal information, the modified and added personal information is packaged into a block, and then the block is stored into a block chain;
step 3, the mechanism sharing information with the block chain decrypts and screens the encrypted user information on the block chain when the user terminal sends an authorization request to the block chain platform, and sends the screened user information to the mechanism through the block chain platform,
in the method for encrypting and authorizing personal information based on a blockchain, the step of adding and modifying information requested by a user comprises:
step 4, the block chain platform acquires the user personal information uploaded by the user side, and decrypts the encrypted user information on the block chain according to the user personal digital identity card and the user key information;
if the user uploads a request for adding information, the request is authenticated, after the authentication is successful, user information is added to the original information, then the new personal information is subjected to Hash operation encryption and packaged into a block, and then the block is stored into a block chain;
and if the request is the request for uploading and modifying the information of the user, authenticating the request, replacing the uploaded information of the user with the original information after the authentication is successful, carrying out hash operation encryption on the new personal information, packaging the encrypted personal information into a block, and storing the block into a block chain.
2. The method for binding by one-key switch of a mobile phone number based on a blockchain as claimed in claim 1, wherein the step of decrypting and screening the personal information of the corresponding user in the blockchain comprises:
reading information at least comprising a personal digital identity card, a user key and a required information type from a user request; searching corresponding user personal information in the block chain through the personal digital identity card, and decrypting the user personal information by using a user key; and finally, screening out the required personal information from the decrypted personal information of the user according to the type of the required information.
CN201911409799.9A 2019-12-31 2019-12-31 One-key binding changing method for mobile phone number based on block chain technology Active CN111143474B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911409799.9A CN111143474B (en) 2019-12-31 2019-12-31 One-key binding changing method for mobile phone number based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911409799.9A CN111143474B (en) 2019-12-31 2019-12-31 One-key binding changing method for mobile phone number based on block chain technology

Publications (2)

Publication Number Publication Date
CN111143474A CN111143474A (en) 2020-05-12
CN111143474B true CN111143474B (en) 2022-07-19

Family

ID=70522474

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911409799.9A Active CN111143474B (en) 2019-12-31 2019-12-31 One-key binding changing method for mobile phone number based on block chain technology

Country Status (1)

Country Link
CN (1) CN111143474B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111600900B (en) * 2020-05-26 2022-09-02 牛津(海南)区块链研究院有限公司 Single sign-on method, server and system based on block chain
CN111709041B (en) * 2020-06-04 2022-07-22 江苏荣泽信息科技股份有限公司 Data storage and export method based on block chain
CN111709860B (en) * 2020-06-19 2023-09-22 京东科技信息技术有限公司 Method, device, equipment and storage medium for processing heritage
CN112732730B (en) * 2020-12-29 2023-06-16 中国联合网络通信集团有限公司 Block chain-based card data updating method, system and provider platform
CN113891256A (en) * 2021-09-29 2022-01-04 中国银行股份有限公司 Mobile phone number changing method and device based on block chain and 5G message

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109493058A (en) * 2018-12-14 2019-03-19 深圳壹账通智能科技有限公司 A kind of personal identification method and relevant device based on block chain
CN110309445A (en) * 2018-03-23 2019-10-08 触信(厦门)智能科技有限公司 A kind of panorama block chain two dimensional code implementation method
CN110581860A (en) * 2019-09-19 2019-12-17 腾讯科技(深圳)有限公司 identity authentication method, device, storage medium and equipment based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101780636B1 (en) * 2016-05-16 2017-09-21 주식회사 코인플러그 Method for issuing certificate information and blockchain-based server using the same

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110309445A (en) * 2018-03-23 2019-10-08 触信(厦门)智能科技有限公司 A kind of panorama block chain two dimensional code implementation method
CN109493058A (en) * 2018-12-14 2019-03-19 深圳壹账通智能科技有限公司 A kind of personal identification method and relevant device based on block chain
CN110581860A (en) * 2019-09-19 2019-12-17 腾讯科技(深圳)有限公司 identity authentication method, device, storage medium and equipment based on block chain

Also Published As

Publication number Publication date
CN111143474A (en) 2020-05-12

Similar Documents

Publication Publication Date Title
CN111143474B (en) One-key binding changing method for mobile phone number based on block chain technology
CN110493261B (en) Verification code obtaining method based on block chain, client, server and storage medium
CN102223364B (en) Method and system for accessing e-book data
WO2015180691A1 (en) Key agreement method and device for verification information
CN113364760A (en) Data encryption processing method and device, computer equipment and storage medium
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
US20150296251A1 (en) Method, terminal, and system for communication pairing of a digital television terminal and a mobile terminal
CN105553951A (en) Data transmission method and data transmission device
CN107431619A (en) The security certification system and its method that member for online website logs in
CN103929307A (en) Password input method, intelligent secret key device and client device
CN103237305B (en) Password protection method for smart card on facing moving terminal
CN106330858A (en) Method and apparatus for realizing data cloud storage
CN111294203B (en) Information transmission method
CN111787530A (en) Block chain digital identity management method based on SIM card
CN110677382A (en) Data security processing method, device, computer system and storage medium
WO2015180689A1 (en) Method and apparatus for acquiring verification information
CN107454590A (en) A kind of data ciphering method, decryption method and wireless router
CN111931209B (en) Contract information verification method and device based on zero knowledge proof
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
CN101944216A (en) Two-factor online transaction safety authentication method and system
CN115396191A (en) Vehicle-end digital key pushing method and system, electronic equipment and readable storage medium
CN106656955A (en) Communication method and system and user terminal
KR101067146B1 (en) Method for processing encrypted message in portable terminal and portable terminal
CN115189885A (en) Method for authenticating equipment login, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant