CN106534160A - Identity authentication method and system based on block chain - Google Patents
Identity authentication method and system based on block chain Download PDFInfo
- Publication number
- CN106534160A CN106534160A CN201611094966.1A CN201611094966A CN106534160A CN 106534160 A CN106534160 A CN 106534160A CN 201611094966 A CN201611094966 A CN 201611094966A CN 106534160 A CN106534160 A CN 106534160A
- Authority
- CN
- China
- Prior art keywords
- information
- block chain
- transaction information
- transaction
- script
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an identity authentication method and system based on a block chain. The method includes the steps of a terminal device sending an identity authentication request including an authentication factor to an application server, an application server receiving the identity authentication request and generating first transaction information according to the authentication factor in the identity authentication request, the application server broadcasting the first transaction information to a block chain network, the application server sending the first transaction number information of the first transaction information to the terminal device, the terminal device receiving the first transaction number information, generating second transaction information according to the first transaction number information and the authentication factor and broadcasting the second transaction information to the block chain network, and the block chain network conducting identity authentication for the terminal device according to the first transaction information and the second transaction information to obtain the authentication result. According to the technical scheme of the invention, identity authentication for a terminal device can be safety and conveniently carried out through a block chain network.
Description
Technical field
The present invention relates to Internet technical field, and in particular to a kind of identity identifying method and system based on block chain.
Background technology
In Internet technology, when certain application server of User logs in, the application server is frequently necessary to user
Authentication is carried out, so that it is determined that whether the user has accesses some resources and the authority using some resources, that is, determining should
Whether user is authorized user, and then the access strategy of internet is reliably and efficiently performed, and prevents attacker's personation from awarding
Power user obtains the access rights and access right of resource, it is ensured that the legitimate interests of data safety and authorized user.
In the prior art, authentication can be carried out by Third Party Authentication server, detailed process is:User is by eventually
End equipment sends ID authentication request to Third Party Authentication server, includes application server requirement in the ID authentication request
Information, then Third Party Authentication server the ID authentication request is verified, be verified rear application server will
The information asked is signed, and authentication result is returned to terminal device, includes Third Party Authentication service in the authentication result
The signature of the information that device application server is required, then terminal device the authentication result is sent to application server, application
Server just can verify that the identity of terminal device according to the signature in authentication result.But, if Third Party Authentication server goes out
Existing information leakage or information are tampered, it would be possible to can bring massive losses to the user of terminal equipment side and application server.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome the problems referred to above or at least in part solve on
State the identity identifying method based on block chain and system of problem.
According to an aspect of the invention, there is provided a kind of identity identifying method based on block chain, the method includes:
Terminal device sends ID authentication request to application server;Wherein, ID authentication request includes the certification factor;
Application server receives ID authentication request, according to the certification factor in ID authentication request, generates first and concludes the business
Information;
Application server broadcasts the first Transaction Information to block chain network;
Application server sends the first transaction number information of the first Transaction Information to terminal device;
Terminal device receives the first transaction number information, according to the first transaction number information and the certification factor, generates second
Transaction Information, and the second Transaction Information is broadcasted to block chain network;
Block chain network carries out authentication to terminal device, obtains according to the first Transaction Information and the second Transaction Information
Authentication result.
According to a further aspect in the invention, there is provided a kind of identity authorization system based on block chain, the system include:Eventually
End equipment, application server and block chain network;Wherein,
Terminal device is used for:ID authentication request is sent to application server;Wherein, ID authentication request include certification because
Son;
Application server is used for:ID authentication request is received, according to the certification factor in ID authentication request, first is generated
Transaction Information;First Transaction Information is broadcasted to block chain network, and the first transaction number information of the first Transaction Information is sent out
Deliver to terminal device;
Terminal device is further used for:Receive the first transaction number information, according to the first transaction number information and certification because
Son, generates the second Transaction Information, and the second Transaction Information is broadcasted to block chain network;
Block chain network is used for:According to the first Transaction Information and the second Transaction Information, authentication is carried out to terminal device,
Obtain authentication result.
According to the technical scheme that the present invention is provided, application server is according to the certification in the ID authentication request of terminal device
The factor, generates the first Transaction Information, the first Transaction Information is broadcasted to block chain network, and the first of the first Transaction Information is handed over
Easily number information is sent to terminal device, and then terminal device is according to the first transaction number information and the certification factor, generation second
Transaction Information, and the second Transaction Information is broadcasted to block chain network, then block chain network is according to the first Transaction Information and
Two Transaction Informations, carry out authentication to terminal device, obtain authentication result.According to the technical scheme that the present invention is provided, pass through
Block chain network safely, conveniently can carry out authentication to terminal device, in addition, the spy that can not be distorted using block chain
Property, also add the confidence level of authentication.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, and in order to allow the above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the specific embodiment of the present invention.
Description of the drawings
By the detailed description for reading hereafter preferred embodiment, various other advantages and benefit are common for this area
Technical staff will be clear from understanding.Accompanying drawing is only used for the purpose for illustrating preferred embodiment, and is not considered as to the present invention
Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 shows the signaling process figure of the identity identifying method based on block chain according to an embodiment of the invention;
Fig. 2 shows the signaling process of the identity identifying method based on block chain in accordance with another embodiment of the present invention
Figure;
Fig. 3 shows the structured flowchart of the identity authorization system based on block chain according to an embodiment of the invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here
Limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
Fig. 1 shows the signaling process figure of the identity identifying method based on block chain according to an embodiment of the invention,
As shown in figure 1, the method comprises the steps:
Step S100, terminal device send ID authentication request to application server.
Wherein, ID authentication request includes the certification factor.Specifically, the certification factor includes following one or more:User
Name information, user password information, device-fingerprint information, dynamic code and behavioural habits information.In addition, the certification factor may also include which
He can be used for the information of authenticating identity, not limit herein.
Step S101, application server receive ID authentication request, according to the certification factor in ID authentication request, generate
First Transaction Information.
The ID authentication request that application server receiving terminal apparatus send, then according to the certification in ID authentication request
The factor, generates the first Transaction Information.
Step S102, application server broadcast the first Transaction Information to block chain network.
After the first Transaction Information is generated, application server broadcasts the first Transaction Information to block chain network.Its
In, block chain has the characteristic that can not be distorted.
Step S103, application server send the first transaction number information of the first Transaction Information to terminal device.
Specifically, the first transaction number information of the first Transaction Information can be the first Transaction Information to be entered using hash algorithm
Row is calculated.In order that terminal device is obtained in that the first Transaction Information, application server is by the of the first Transaction Information
One transaction number information is sent to terminal device.
Step S104, terminal device receive the first transaction number information, according to the first transaction number information and the certification factor,
The second Transaction Information is generated, and the second Transaction Information is broadcasted to block chain network.
Terminal device have received application server transmission the first transaction number information after, according to the first transaction number
Information and the certification factor, generate the second Transaction Information, then the second Transaction Information for being generated are broadcasted to block chain network.
Step S105, block chain network carry out identity to terminal device according to the first Transaction Information and the second Transaction Information
Certification, obtains authentication result.
As the first Transaction Information and the second Transaction Information are all broadcasted to block chain network, then in step S105,
Block chain network can be carried out authentication to terminal device, obtain certification according to the first Transaction Information and the second Transaction Information
As a result.Wherein, authentication result includes:First authentication result and the second authentication result.Specifically, the first authentication result be certification into
The authentication result of work(, authentication result of second authentication result for authentification failure.
The identity identifying method based on block chain for providing according to embodiments of the present invention, application server is according to terminal device
ID authentication request in the certification factor, generate the first Transaction Information, the first Transaction Information is broadcasted to block chain network, and
First transaction number information of the first Transaction Information is sent to terminal device, then terminal device is believed according to the first transaction number
Breath and the certification factor, generate the second Transaction Information, and the second Transaction Information are broadcasted to block chain network, then block chain network
According to the first Transaction Information and the second Transaction Information, authentication is carried out to terminal device, authentication result is obtained.According to the present invention
The technical scheme of offer, safely, conveniently can carry out authentication to terminal device by block chain network, in addition, utilizing
The characteristic that block chain can not be distorted, also add the confidence level of authentication.
Fig. 2 shows the signaling process of the identity identifying method based on block chain in accordance with another embodiment of the present invention
Figure, as shown in Fig. 2 the method comprises the steps:
Step S200, terminal device send ID authentication request to application server.
Wherein, ID authentication request includes the certification factor.Specifically, the certification factor includes following one or more:User
Name information, user password information, device-fingerprint information, dynamic code and behavioural habits information.Those skilled in the art can also basis
The information that other can be used for authenticating identity is actually needed as the certification factor, is not limited herein.
Step S201, application server receive ID authentication request, according to ID authentication request, generate script information.
Application server can generate script information according to ID authentication request after it have received ID authentication request.
Step S202, application server obtain mathematics change using the certification factor and script information in ID authentication request
Change result.
Specifically, mathematics change is carried out to the certification factor in ID authentication request using script information, obtains mathematics change
Change result.For example, using the certification factor in ID authentication request as the corresponding input information of script information, using script information
Output information is obtained, resulting output information is mathematic(al) manipulation result.Wherein, mathematics change including but not limited to adds fortune
Calculate, subtract computing and computing, XOR and Hash operation etc..
Step S203, application server are calculated the corresponding script cryptographic Hash of script information using hash algorithm.
Application server carries out Hash operation to script information using hash algorithm, obtains the corresponding script of script information and breathes out
Uncommon value.
Step S204, application server is according to the block chain address information of script information, script cryptographic Hash and mathematic(al) manipulation
As a result, generate the first Transaction Information.
Wherein, script information has corresponding block chain address information, can according to the block chain address information of script information
Obtain script information.As Transaction Information includes conclude the business input information and transaction output information, then in step S204, application
The block chain address of script information can be believed by server using the token of block chain as the transaction input information of the first Transaction Information
The transaction output information of breath, script cryptographic Hash and mathematics transformation results as the first Transaction Information, so as to generate the first transaction letter
Breath.
Step S205, application server broadcast the first Transaction Information to block chain network.
After the first Transaction Information is generated, application server broadcasts the first Transaction Information to block chain network.Phase
Believe when the block chain address information of script information, script cryptographic Hash and mathematics transformation results being concluded the business with first in application server
The form of breath is broadcasted to block chain network.
Step S206, application server send the first transaction number information of the first Transaction Information to terminal device.
Specifically, the first transaction number information of the first Transaction Information is the first Transaction Information to be carried out using hash algorithm
It is calculated.Alternatively, before step S206, the method may also include:Application server utilizes hash algorithm to first
Transaction Information is calculated, the step of obtain the first transaction number information of the first Transaction Information.
Step S207, terminal device receive the first transaction number information, according to the first transaction number information, obtain first and hand over
Easy information.
As the first transaction number information of the first Transaction Information is the first Transaction Information to be counted using hash algorithm
Obtain, then after terminal device have received the first transaction number information, so that it may according to the first transaction number information, obtain
Take the first Transaction Information.
Step S208, terminal device obtain script information according to the first Transaction Information.
As the first Transaction Information is according to the block chain address information of script information, script cryptographic Hash and mathematic(al) manipulation knot
What fruit generated, then terminal device is just obtained the block chain address information of script information according to the first Transaction Information, then root
Script information is obtained just according to the block chain address information of script information.
Step S209, terminal device is according to the first transaction number information, script information, the certification factor and application server
Block chain address information, generates the second Transaction Information.
Application server has corresponding block chain address information, can be true according to the block chain address information of application server
Determine application server.Specifically, the first transaction number information, script information, the certification factor can be handed over by terminal device as second
Easily the transaction input information of information, believes the block chain address information of application server as the transaction output of the second Transaction Information
Breath, so as to generate the second Transaction Information.
Step S210, terminal device broadcast the second Transaction Information to block chain network.
After the second Transaction Information is generated, terminal device broadcasts the second Transaction Information to block chain network.Quite
In terminal device by the block chain address information of the first transaction number information, script information, the certification factor and application server with
The form of the second Transaction Information is broadcasted to block chain network.
Step S211, block chain network carry out identity to terminal device according to the first Transaction Information and the second Transaction Information
Certification, obtains authentication result.
As the first Transaction Information and the second Transaction Information are all broadcasted to block chain network, then in step S211,
Block chain network can be carried out authentication to terminal device, obtain certification according to the first Transaction Information and the second Transaction Information
As a result.
As the first Transaction Information is according to the block chain address information of script information, script cryptographic Hash and mathematic(al) manipulation knot
What fruit generated, then block chain network is obtained the area of the corresponding script information of the first Transaction Information according to the first Transaction Information
Block chain address information, script cryptographic Hash and mathematics transformation results, in the same manner, the second Transaction Information is believed according to the first transaction number
What the block chain address information of breath, script information, the certification factor and application server was generated, block chain network is according to the second transaction
Information, is obtained the corresponding first transaction number information of the second Transaction Information, script information, the certification factor and application server
Block chain address information.
Specifically, block chain network obtains the corresponding script information of the second Transaction Information according to the second Transaction Information;Utilize
Hash algorithm is calculated to the corresponding script information of the second Transaction Information, obtains script cryptographic Hash to be certified.Block chain network
According to the first Transaction Information, the corresponding script cryptographic Hash of the first Transaction Information is obtained.
After script cryptographic Hash to be certified and the corresponding script cryptographic Hash of the first Transaction Information has been obtained, block chain network
Judge whether script cryptographic Hash to be certified is identical with the corresponding script cryptographic Hash of the first Transaction Information.
If block chain network judges to obtain script cryptographic Hash to be certified script cryptographic Hash corresponding with the first Transaction Information
Identical, then block chain network obtains the corresponding certification factor of the second Transaction Information, and hands over according to second according to the second Transaction Information
Easily the corresponding certification factor of information and script information, obtain mathematic(al) manipulation result to be certified;Then block chain network is according to first
Transaction Information, obtains the corresponding mathematic(al) manipulation result of the first Transaction Information;Obtaining mathematic(al) manipulation result to be certified and first
After the corresponding mathematic(al) manipulation result of Transaction Information, block chain network judges whether mathematic(al) manipulation result to be certified concludes the business with first
The corresponding mathematic(al) manipulation result of information is identical.If it is determined that obtaining certification mathematic(al) manipulation result number corresponding with the first Transaction Information
Transformation results are identical, then block chain network obtains the first authentication result, that is, obtain the successful authentication result of certification;If it is determined that
Obtain certification mathematic(al) manipulation result not identical with the corresponding mathematic(al) manipulation result of the first Transaction Information, then block chain network obtains
Two authentication results, that is, obtain the authentication result of authentification failure.
If block chain network judges to obtain script cryptographic Hash to be certified script Hash not corresponding with the first Transaction Information
Value is identical, then block chain network obtains the second authentication result.
In the present embodiment, during block chain network carries out authentication to terminal device, block chain network is not
Script cryptographic Hash is only verified, mathematic(al) manipulation result is also verified such that it is able to authentication is carried out more comprehensively, exactly, and then
Obtain reliable authentication result.
Wherein, the mode of other checking transaction legitimacies and block chain network checking transaction legitimacy in prior art
Mode is identical, and here is omitted.
In actual applications, can be by the miner's node in block chain network according to the first Transaction Information and the second transaction letter
Breath, carries out authentication to terminal device.If the miner's node in Jing block chain networks carries out authentication to terminal device,
Obtain the first authentication result, authentication authorization and accounting success, then miner's node broadcasts the second Transaction Information in block chain network, in block
Each node in chain network writes block chain after reaching common understanding.
Step S212, block chain network send authentication result to application server.
Block chain network is obtained the block chain address information of application server according to the second Transaction Information, according to application clothes
The block chain address information of business device, so that it may authentication result is sent to application server, so that application server knows that terminal sets
Standby authentication whether certification success.
The identity identifying method based on block chain for providing according to embodiments of the present invention, application server is according to script information
Block chain address information, script cryptographic Hash and mathematics transformation results, generate the first Transaction Information, the first Transaction Information broadcasted
To block chain network, and the first transaction number information of the first Transaction Information is sent to terminal device, terminal device is according to
The block chain address information of one transaction number information, script information, the certification factor and application server, generates the second transaction letter
Breath, and the second Transaction Information is broadcasted to block chain network, then block chain network is according to the first Transaction Information and the second transaction
Information, carries out authentication to terminal device, obtains authentication result.According to the technical scheme that the present invention is provided, by block chain
Network preserves and verifies script cryptographic Hash and mathematics transformation results such that it is able to safely, conveniently, exactly terminal device is carried out
Authentication, in addition, the characteristic that can not be distorted using block chain, also add the confidence level of authentication.
Fig. 3 shows the structured flowchart of the identity authorization system based on block chain according to an embodiment of the invention, such as
Shown in Fig. 3, the system includes:Terminal device 310, application server 320 and block chain network 330.
Terminal device 310 is used for:ID authentication request is sent to application server 320.
Wherein, ID authentication request includes the certification factor.Those skilled in the art will can be used for recognizing according to actual needs
The information of card identity is not limited herein as the certification factor.For example, the certification factor may include following one or more:User
Name information, user password information, device-fingerprint information, dynamic code and behavioural habits information.
Application server 320 is used for:ID authentication request is received, according to the certification factor in ID authentication request, is generated
First Transaction Information;First Transaction Information is broadcasted to block chain network, and the first transaction number of the first Transaction Information is believed
Breath is sent to terminal device.
Specifically, application server 320 includes:First receiver module 321, first processing module 322, the first generation module
323rd, the first broadcast module 324 and the first sending module 325.Wherein, the first receiver module 321 is used for:Receiving authentication please
Ask.First processing module 322 is used for:According to ID authentication request, script information is generated;Using the certification in ID authentication request
The factor and script information, obtain mathematic(al) manipulation result;The corresponding script cryptographic Hash of script information is calculated using hash algorithm.
First generation module 323 is used for:Block chain address information, script cryptographic Hash and mathematics transformation results according to script information, it is raw
Into the first Transaction Information.First broadcast module 324 is used for:First Transaction Information is broadcasted to block chain network.First sends mould
Block 325 is used for:First transaction number information of the first Transaction Information is sent to terminal device 310.
Wherein, the first processing module 322 in application server 320 using script information to ID authentication request in recognize
The card factor carries out mathematics change, obtains mathematic(al) manipulation result.For example, believe the certification factor in ID authentication request as script
Corresponding input information being ceased, output information being obtained using script information, resulting output information is mathematic(al) manipulation result.Number
Learn change including but not limited to add computing, subtract computing and computing, XOR and Hash operation etc..
As Transaction Information includes conclude the business input information and transaction output information, then first in application server 320
Generation module 323 can using the token of block chain as the first Transaction Information transaction input information, by the block chain of script information
The transaction output information of address information, script cryptographic Hash and mathematics transformation results as the first Transaction Information, so as to generate first
Transaction Information.The first broadcast mould after the first generation module 323 generates the first Transaction Information, in application server 320
Block 324 broadcasts the first Transaction Information to block chain network 330, equivalent to the first broadcast module 324 by the block of script information
Chain address information, script cryptographic Hash and mathematics transformation results are broadcasted to block chain network in the form of the first Transaction Information.
Alternatively, application server 320 is additionally operable to:The first Transaction Information is calculated using hash algorithm, obtain
First transaction number information of one Transaction Information.Specifically, the first processing module 322 in application server 320 utilizes Hash
Algorithm is calculated to the first Transaction Information, obtains the first transaction number information of the first Transaction Information.
Terminal device 310 is additionally operable to:Receive the first transaction number information, according to the first transaction number information and certification because
Son, generates the second Transaction Information, and the second Transaction Information is broadcasted to block chain network.
Specifically, terminal device 310 includes:Second sending module 311, the second receiver module 312, Second processing module
313rd, the second generation module 314 and the second broadcast module 315.Wherein, the second sending module 311 is used for:To application server 320
Send ID authentication request.Second receiver module 312 is used for:Receive the first transaction number information.Second processing module 313 is used
In:According to the first transaction number information, the first Transaction Information is obtained;According to the first Transaction Information, script information is obtained.Second life
It is used for into module 314:According to the block chain address of the first transaction number information, script information, the certification factor and application server
Information, generates the second Transaction Information.Second broadcast module 315 is used for:Second Transaction Information is broadcasted to block chain network 330.
As the first transaction number information of the first Transaction Information is the first Transaction Information to be counted using hash algorithm
Obtain, then after the second receiver module 312 in terminal device 310 have received the first transaction number information, at second
Reason module 313 obtains the first Transaction Information according to the first transaction number information.As the first Transaction Information is according to script information
Block chain address information, script cryptographic Hash and mathematics transformation results generate, then Second processing module 313 is handed over according to first
Easily information can obtain the block chain address information of script information, and pin is just obtained according to the block chain address information of script information
This information.
Then the second generation module 314 in terminal device 310 can according to the first transaction number information, script information,
The block chain address information of the certification factor and application server, generates the second Transaction Information.Specifically, the second generation module 314
Can using the first transaction number information, script information, the certification factor as the second Transaction Information transaction input information, will using clothes
Transaction output information of the block chain address information of business device as the second Transaction Information, so as to generate the second Transaction Information.
After two generation modules 314 generate the second Transaction Information, the second broadcast module 315 broadcasts the second Transaction Information to block chain
Network 330, equivalent to the second broadcast module 315 by the first transaction number information, script information, the certification factor and application server
Block chain address information broadcasted in the form of the second Transaction Information to block chain network 330.
Block chain network 330 is used for:According to the first Transaction Information and the second Transaction Information, body is carried out to terminal device 310
Part certification, obtains authentication result.
Wherein, block chain network 330 includes:3rd receiver module 331, the 3rd processing module 332, the first authentication module
333rd, fourth processing module 334, the second authentication module 335 and result-generation module 336.
3rd receiver module 331 is used for:Receive the first Transaction Information and the second Transaction Information.
3rd processing module 332 is used for:According to the second Transaction Information, the corresponding script information of the second Transaction Information is obtained;
The corresponding script information of the second Transaction Information is calculated using hash algorithm, obtain script cryptographic Hash to be certified;According to
One Transaction Information, obtains the corresponding script cryptographic Hash of the first Transaction Information.
First authentication module 333 is used for:Judge script cryptographic Hash to be certified script whether corresponding with the first Transaction Information
Cryptographic Hash is identical.
Fourth processing module 334 is used for:If the first authentication module 333 judges that obtaining script cryptographic Hash to be certified hands over first
Easily the corresponding script cryptographic Hash of information is identical, then according to the second Transaction Information, obtain the corresponding certification factor of the second Transaction Information,
And according to the corresponding certification factor of the second Transaction Information and script information, obtain mathematic(al) manipulation result to be certified;Hand over according to first
Easily information, obtains the corresponding mathematic(al) manipulation result of the first Transaction Information.
Second authentication module 335 is used for:Judge mathematic(al) manipulation result to be certified number whether corresponding with the first Transaction Information
Learn transformation results identical.
Result-generation module 336 is used for:If the first authentication module 333 judges to obtain script cryptographic Hash to be certified not with first
The corresponding script cryptographic Hash of Transaction Information is identical, then obtain the second authentication result;If the second authentication module 335 judges to obtain waiting to recognize
Card mathematic(al) manipulation result is identical with the corresponding mathematic(al) manipulation result of the first Transaction Information, then obtain the first authentication result;If second
Authentication module 335 judges to obtain mathematic(al) manipulation result to be certified not identical with the corresponding mathematic(al) manipulation result of the first Transaction Information,
Second authentication result is obtained then.
In the present embodiment, block chain network not only verifies script cryptographic Hash, also verifies mathematic(al) manipulation result such that it is able to
More comprehensively, authentication is carried out exactly, and then obtain reliable authentication result.
Alternatively, block chain network 330 is additionally operable to authentication result be sent to application server 320, so as to application service
Device 320 knows the authentication whether certification success of terminal device 310.Specifically, block chain network 330 may include the 3rd transmission
Module (not shown), the 3rd sending module is for authentication result is sent to application server 320.
According to the identity authorization system based on block chain that the present invention is provided, block of the application server according to script information
Chain address information, script cryptographic Hash and mathematics transformation results, generate the first Transaction Information, the first Transaction Information are broadcasted to block
Chain network, and the first transaction number information of the first Transaction Information is sent to terminal device, terminal device is according to the first transaction
The block chain address information of number information, script information, the certification factor and application server, generates the second Transaction Information, and will
Second Transaction Information is broadcasted to block chain network, and then block chain network is according to the first Transaction Information and the second Transaction Information, right
Terminal device carries out authentication, obtains authentication result.According to the technical scheme that the present invention is provided, preserved by block chain network
And verify script cryptographic Hash and mathematics transformation results such that it is able to safely, conveniently, identity is carried out to terminal device exactly recognize
Card, in addition, the characteristic that can not be distorted using block chain, also add the confidence level of authentication.
So far, although those skilled in the art will appreciate that detailed herein illustrate and describe multiple showing for the present invention
Example property embodiment, but, without departing from the spirit and scope of the present invention, still can be directly true according to disclosure of invention
Determine or derive many other variations or modifications for meeting the principle of the invention.Therefore, the scope of the present invention is it should be understood that and recognize
It is set to and covers all these other variations or modifications.
It will be appreciated by those skilled in the art that embodiments of the present invention can be implemented as a kind of system, device, equipment,
Method or computer program.Additionally, the present invention is also not for any certain programmed language, it should be appreciated that can be using each
The content that programming language realizes present invention description is planted, and the description done to language-specific above is to disclose the present invention
Preferred forms.
Although it should be noted that describing in detail in superincumbent explanation in the identity authorization system based on block chain
Some modules, but what this division was merely exemplary, it is not enforceable.It will be understood to those skilled in the art that
Indeed, it is possible to the module in embodiment is adaptively changed, by the multiple block combiners in embodiment into one
Module, also can be by a Module Division into multiple modules.
Additionally, although describing the present invention with particular order in the accompanying drawings implements operation, this does not require that or secretly
Show and these operations must be performed according to the particular order, or the operation having to carry out shown in whole could realize desired knot
Really.Some steps can be omitted, multiple steps is merged into into a step and is performed, or a step is divided into into multiple steps and held
OK.
In sum, using the identity identifying method based on block chain of the present invention and system, by block link network
Network safely, conveniently can carry out authentication to terminal device, in addition, the characteristic that can not be distorted using block chain, is also increased
The confidence level of authentication.
Above the method for the present invention and specific implementation method are described in detail, and give corresponding enforcement
Example.Certainly, in addition to the implementation, the present invention can also have other embodiment, all employing equivalents or equivalent transformation shape
Into technical scheme, all fall within invention which is intended to be protected.
The invention discloses:
A1, a kind of identity identifying method based on block chain, it is characterised in that include:
Terminal device sends ID authentication request to application server;Wherein, the ID authentication request include certification because
Son;
The application server receives the ID authentication request, according to the certification factor in the ID authentication request,
Generate the first Transaction Information;
The application server broadcasts first Transaction Information to block chain network;
The application server sends the first transaction number information of the first Transaction Information to the terminal device;
The terminal device receives the first transaction number information, according to the first transaction number information and described recognizes
The card factor, generates the second Transaction Information, and second Transaction Information is broadcasted to the block chain network;
The block chain network is entered to the terminal device according to first Transaction Information and second Transaction Information
Row authentication, obtains authentication result.
A2, the identity identifying method based on block chain according to A1, it is characterised in that the certification factor include with
The next item down is multinomial:Username information, user password information, device-fingerprint information, dynamic code and behavioural habits information.
A3, the identity identifying method based on block chain according to A1, it is characterised in that the application server is received
The ID authentication request, according to the certification factor in the ID authentication request, generates the first Transaction Information and further includes:
The application server receives the ID authentication request, according to the ID authentication request, generates script information;
The application server obtains mathematics using the certification factor and the script information in the ID authentication request
Transformation results;
The application server is calculated the corresponding script cryptographic Hash of the script information using hash algorithm;
The application server becomes according to the block chain address information of script information, the script cryptographic Hash and the mathematics
Result is changed, the first Transaction Information is generated.
A4, the identity identifying method based on block chain according to A1, it is characterised in that will in the application server
First transaction number information of the first Transaction Information is sent to before the terminal device, and methods described also includes:
The application server is calculated to first Transaction Information using hash algorithm, obtains first transaction
First transaction number information of information.
A5, the identity identifying method based on block chain according to A3, it is characterised in that the terminal device receives institute
The first transaction number information is stated, according to the first transaction number information and the certification factor, the second Transaction Information is generated, and
Second Transaction Information is broadcasted to the block chain network and is further included:
The terminal device receives the first transaction number information, according to the first transaction number information, obtains institute
State the first Transaction Information;
The terminal device obtains the script information according to first Transaction Information;
The terminal device is according to the first transaction number information, the script information, the certification factor and application
The block chain address information of server, generates the second Transaction Information;
The terminal device broadcasts second Transaction Information to the block chain network.
A6, the identity identifying method based on block chain according to A5, it is characterised in that the block chain network according to
First Transaction Information and second Transaction Information, carry out authentication to the terminal device, obtain authentication result and enter
One step includes:
The block chain network obtains the corresponding script letter of second Transaction Information according to second Transaction Information
Breath;
The block chain network is calculated to the corresponding script information of second Transaction Information using hash algorithm, is obtained
To script cryptographic Hash to be certified;
The block chain network obtains the corresponding script Hash of first Transaction Information according to first Transaction Information
Value;
The block chain network judges the script cryptographic Hash to be certified pin whether corresponding with first Transaction Information
This cryptographic Hash is identical;
If it is corresponding with first Transaction Information that the block chain network judgement obtains the script cryptographic Hash to be certified
Script cryptographic Hash is identical, then the block chain network obtains the second Transaction Information correspondence according to second Transaction Information
The certification factor, and according to the corresponding certification factor of second Transaction Information and script information, obtain mathematic(al) manipulation to be certified
As a result;The block chain network obtains the corresponding mathematic(al) manipulation knot of first Transaction Information according to first Transaction Information
Really;The block chain network judges that the mathematic(al) manipulation result to be certified mathematics whether corresponding with first Transaction Information becomes
Change result identical;If so, then the block chain network obtains the first authentication result;If it is not, then the block chain network obtains
Two authentication results;
If it is not corresponding with first Transaction Information that the block chain network judgement obtains the script cryptographic Hash to be certified
Script cryptographic Hash it is identical, then the block chain network obtains the second authentication result.
A7, the identity identifying method based on block chain according to any one of A1-A6, it is characterised in that in the area
Block chain network carries out authentication to the terminal device, obtains according to first Transaction Information and second Transaction Information
To after authentication result, methods described also includes:
The block chain network sends the authentication result to the application server.
The invention also discloses:
B8, a kind of identity authorization system based on block chain, it is characterised in that include:Terminal device, application server and
Block chain network;Wherein,
The terminal device is used for:ID authentication request is sent to the application server;Wherein, the authentication please
Ask including the certification factor;
The application server is used for:The ID authentication request is received, according to the certification in the ID authentication request
The factor, generates the first Transaction Information;First Transaction Information is broadcasted to block chain network, and by the of the first Transaction Information
One transaction number information is sent to the terminal device;
The terminal device is further used for:The first transaction number information is received, according to first transaction number
Information and the certification factor, generate the second Transaction Information, and second Transaction Information are broadcasted to the block chain network;
The block chain network is used for:According to first Transaction Information and second Transaction Information, to the terminal
Equipment carries out authentication, obtains authentication result.
B9, the identity authorization system based on block chain according to B8, it is characterised in that the certification factor include with
The next item down is multinomial:Username information, user password information, device-fingerprint information, dynamic code and behavioural habits information.
B10, the identity authorization system based on block chain according to B8, it is characterised in that the application server bag
Include:First receiver module, first processing module, the first generation module, the first broadcast module and the first sending module;
First receiver module is used for:Receive the ID authentication request;
The first processing module is used for:According to the ID authentication request, script information is generated;Recognized using the identity
The certification factor and the script information in card request, obtains mathematic(al) manipulation result;The pin is calculated using hash algorithm
The corresponding script cryptographic Hash of this information;
First generation module is used for:Block chain address information, the script cryptographic Hash and institute according to script information
Mathematic(al) manipulation result is stated, the first Transaction Information is generated;
First broadcast module is used for:First Transaction Information is broadcasted to block chain network;
First sending module is used for:First transaction number information of the first Transaction Information is sent to the terminal and is set
It is standby.
B11, the identity authorization system based on block chain according to B8, it is characterised in that the application server enters
One step is used for:
First Transaction Information is calculated using hash algorithm, obtain the first transaction of first Transaction Information
Number information.
B12, the identity authorization system based on block chain according to B10, it is characterised in that the terminal device bag
Include:Second sending module, the second receiver module, Second processing module, the second generation module and the second broadcast module;
Second sending module is used for:The ID authentication request is sent to the application server;
Second receiver module is used for:Receive the first transaction number information;
The Second processing module is used for:According to the first transaction number information, first Transaction Information is obtained;Root
According to first Transaction Information, the script information is obtained;
Second generation module is used for:According to the first transaction number information, the script information, the certification because
The block chain address information of son and application server, generates the second Transaction Information;
Second broadcast module is used for:Second Transaction Information is broadcasted to the block chain network.
B13, the identity authorization system based on block chain according to B12, it is characterised in that the block chain network bag
Include:3rd receiver module, the 3rd processing module, the first authentication module, fourth processing module, the second authentication module and result are generated
Module;
3rd receiver module is used for:Receive first Transaction Information and second Transaction Information;
3rd processing module is used for:According to second Transaction Information, second Transaction Information is obtained corresponding
Script information;The corresponding script information of second Transaction Information is calculated using hash algorithm, obtain script to be certified
Cryptographic Hash;According to first Transaction Information, the corresponding script cryptographic Hash of first Transaction Information is obtained;
First authentication module is used for:Judge the script cryptographic Hash to be certified whether with first Transaction Information pair
The script cryptographic Hash answered is identical;
The fourth processing module is used for:If first authentication module judge to obtain the script cryptographic Hash to be certified with
The corresponding script cryptographic Hash of first Transaction Information is identical, then according to second Transaction Information, obtain second transaction
The corresponding certification factor of information, and according to the corresponding certification factor of second Transaction Information and script information, obtain to be certified
Mathematic(al) manipulation result;According to first Transaction Information, the corresponding mathematic(al) manipulation result of first Transaction Information is obtained;
Second authentication module is used for:Judge the mathematic(al) manipulation result to be certified whether with first Transaction Information
Corresponding mathematic(al) manipulation result is identical;
The result-generation module is used for:If first authentication module judges to obtain the script cryptographic Hash to be certified not
It is identical with the corresponding script cryptographic Hash of first Transaction Information, then obtain the second authentication result;If second authentication module
It is identical with the corresponding mathematic(al) manipulation result of first Transaction Information that judgement obtains the mathematic(al) manipulation result to be certified, then obtain
First authentication result;If second authentication module judges that obtaining the mathematic(al) manipulation result to be certified does not conclude the business with described first
The corresponding mathematic(al) manipulation result of information is identical, then obtain the second authentication result.
B14, the identity authorization system based on block chain according to any one of B8-B13, it is characterised in that the area
Block chain network is further used for:
The authentication result is sent to the application server.
Claims (10)
1. a kind of identity identifying method based on block chain, it is characterised in that include:
Terminal device sends ID authentication request to application server;Wherein, the ID authentication request includes the certification factor;
The application server receives the ID authentication request, according to the certification factor in the ID authentication request, generates
First Transaction Information;
The application server broadcasts first Transaction Information to block chain network;
The application server sends the first transaction number information of the first Transaction Information to the terminal device;
The terminal device receives the first transaction number information, according to the first transaction number information and the certification because
Son, generates the second Transaction Information, and second Transaction Information is broadcasted to the block chain network;
The block chain network carries out body to the terminal device according to first Transaction Information and second Transaction Information
Part certification, obtains authentication result.
2. the identity identifying method based on block chain according to claim 1, it is characterised in that the certification factor includes
One or more below:Username information, user password information, device-fingerprint information, dynamic code and behavioural habits information.
3. the identity identifying method based on block chain according to claim 1, it is characterised in that the application server connects
The ID authentication request is received, according to the certification factor in the ID authentication request, the first Transaction Information is generated and is further wrapped
Include:
The application server receives the ID authentication request, according to the ID authentication request, generates script information;
The application server obtains mathematic(al) manipulation using the certification factor and the script information in the ID authentication request
As a result;
The application server is calculated the corresponding script cryptographic Hash of the script information using hash algorithm;
The application server is according to the block chain address information of script information, the script cryptographic Hash and mathematic(al) manipulation knot
Really, generate the first Transaction Information.
4. the identity identifying method based on block chain according to claim 1, it is characterised in that in the application server
First transaction number information of the first Transaction Information is sent to before the terminal device, methods described also includes:
The application server is calculated to first Transaction Information using hash algorithm, obtains first Transaction Information
The first transaction number information.
5. the identity identifying method based on block chain according to claim 3, it is characterised in that the terminal device is received
The first transaction number information, according to the first transaction number information and the certification factor, generates the second Transaction Information,
And second Transaction Information is broadcasted to the block chain network and further include:
The terminal device receives the first transaction number information, according to the first transaction number information, obtains described the
One Transaction Information;
The terminal device obtains the script information according to first Transaction Information;
The terminal device is according to the first transaction number information, the script information, the certification factor and application service
The block chain address information of device, generates the second Transaction Information;
The terminal device broadcasts second Transaction Information to the block chain network.
6. the identity identifying method based on block chain according to claim 5, it is characterised in that the block chain network root
According to first Transaction Information and second Transaction Information, authentication is carried out to the terminal device, authentication result is obtained
Further include:
The block chain network obtains the corresponding script information of second Transaction Information according to second Transaction Information;
The block chain network is calculated to the corresponding script information of second Transaction Information using hash algorithm, is treated
Authentication script cryptographic Hash;
The block chain network obtains the corresponding script cryptographic Hash of first Transaction Information according to first Transaction Information;
The block chain network judges that the script cryptographic Hash to be certified script whether corresponding with first Transaction Information is breathed out
Uncommon value is identical;
If the block chain network judges to obtain the script cryptographic Hash to be certified script corresponding with first Transaction Information
Cryptographic Hash is identical, then the block chain network is according to second Transaction Information, obtains that second Transaction Information is corresponding to be recognized
The card factor, and according to the corresponding certification factor of second Transaction Information and script information, obtain mathematic(al) manipulation result to be certified;
The block chain network obtains the corresponding mathematic(al) manipulation result of first Transaction Information according to first Transaction Information;Institute
State block chain network and judge the mathematic(al) manipulation result to be certified mathematic(al) manipulation knot whether corresponding with first Transaction Information
It is really identical;If so, then the block chain network obtains the first authentication result;If it is not, then the block chain network obtains second and recognizes
Card result;
If the block chain network judges to obtain the script cryptographic Hash to be certified pin not corresponding with first Transaction Information
This cryptographic Hash is identical, then the block chain network obtains the second authentication result.
7. the identity identifying method based on block chain according to any one of claim 1-6, it is characterised in that in the area
Block chain network carries out authentication to the terminal device, obtains according to first Transaction Information and second Transaction Information
To after authentication result, methods described also includes:
The block chain network sends the authentication result to the application server.
8. a kind of identity authorization system based on block chain, it is characterised in that include:Terminal device, application server and block
Chain network;Wherein,
The terminal device is used for:ID authentication request is sent to the application server;Wherein, the ID authentication request bag
Include the certification factor;
The application server is used for:The ID authentication request is received, according to the certification factor in the ID authentication request,
Generate the first Transaction Information;First Transaction Information is broadcasted to block chain network, and the first of the first Transaction Information is handed over
Easily number information is sent to the terminal device;
The terminal device is further used for:The first transaction number information is received, according to the first transaction number information
With the certification factor, the second Transaction Information is generated, and second Transaction Information is broadcasted to the block chain network;
The block chain network is used for:According to first Transaction Information and second Transaction Information, to the terminal device
Authentication is carried out, authentication result is obtained.
9. the identity authorization system based on block chain according to claim 8, it is characterised in that the certification factor includes
One or more below:Username information, user password information, device-fingerprint information, dynamic code and behavioural habits information.
10. the identity authorization system based on block chain according to claim 8, it is characterised in that the application server
Including:First receiver module, first processing module, the first generation module, the first broadcast module and the first sending module;
First receiver module is used for:Receive the ID authentication request;
The first processing module is used for:According to the ID authentication request, script information is generated;Please using the authentication
The certification factor and the script information in asking, obtains mathematic(al) manipulation result;The script letter is calculated using hash algorithm
Cease corresponding script cryptographic Hash;
First generation module is used for:Block chain address information, the script cryptographic Hash and the number according to script information
Transformation results are learned, the first Transaction Information is generated;
First broadcast module is used for:First Transaction Information is broadcasted to block chain network;
First sending module is used for:First transaction number information of the first Transaction Information is sent to the terminal device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611094966.1A CN106534160B (en) | 2016-12-02 | 2016-12-02 | Identity authentication method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611094966.1A CN106534160B (en) | 2016-12-02 | 2016-12-02 | Identity authentication method and system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106534160A true CN106534160A (en) | 2017-03-22 |
CN106534160B CN106534160B (en) | 2020-02-21 |
Family
ID=58354688
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611094966.1A Active CN106534160B (en) | 2016-12-02 | 2016-12-02 | Identity authentication method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534160B (en) |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107147652A (en) * | 2017-05-18 | 2017-09-08 | 电子科技大学 | A kind of safety fusion authentication method of the polymorphic identity of user based on block chain |
CN107171812A (en) * | 2017-07-18 | 2017-09-15 | 光载无限(北京)科技有限公司 | It is a kind of based on block chain without key signature infrastructure construction method |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107332826A (en) * | 2017-06-09 | 2017-11-07 | 中国联合网络通信集团有限公司 | The communication means and device of block chain agent node |
CN107454110A (en) * | 2017-09-26 | 2017-12-08 | 武汉斗鱼网络科技有限公司 | A kind of data verification method and server |
CN107465698A (en) * | 2017-09-26 | 2017-12-12 | 武汉斗鱼网络科技有限公司 | A kind of data verification method and server |
CN107493162A (en) * | 2017-07-25 | 2017-12-19 | 中国联合网络通信集团有限公司 | The implementation method and device of block chain node |
CN107528855A (en) * | 2017-09-26 | 2017-12-29 | 武汉斗鱼网络科技有限公司 | A kind of data verification method and server |
CN107623865A (en) * | 2017-09-26 | 2018-01-23 | 武汉斗鱼网络科技有限公司 | A kind of data verification method and server |
CN107679149A (en) * | 2017-09-26 | 2018-02-09 | 武汉斗鱼网络科技有限公司 | A kind of data processing method and server |
CN107682328A (en) * | 2017-09-26 | 2018-02-09 | 武汉斗鱼网络科技有限公司 | A kind of data verification method and client |
CN108009825A (en) * | 2017-11-29 | 2018-05-08 | 江苏安凰领御科技有限公司 | A kind of identity management system and method based on block chain technology |
CN108320173A (en) * | 2017-12-12 | 2018-07-24 | 北京瑞卓喜投科技发展有限公司 | Integration processing method and device based on block chain technology |
CN108540553A (en) * | 2018-04-08 | 2018-09-14 | 中国联合网络通信集团有限公司 | Internet of Things data management method, platform and equipment |
CN108809953A (en) * | 2018-05-22 | 2018-11-13 | 飞天诚信科技股份有限公司 | A kind of method and device of the anonymous Identity certification based on block chain |
CN108882005A (en) * | 2018-04-13 | 2018-11-23 | 武汉斗鱼网络科技有限公司 | A kind of barrage verification method, computer equipment and storage medium |
CN108875386A (en) * | 2017-05-16 | 2018-11-23 | 江峰 | A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism |
CN108924089A (en) * | 2018-05-29 | 2018-11-30 | 武汉斗鱼网络科技有限公司 | A kind of client device recognition methods, device and client device |
CN109194651A (en) * | 2018-09-04 | 2019-01-11 | 深信服科技股份有限公司 | A kind of identity identifying method, device, equipment and storage medium |
CN109302415A (en) * | 2018-11-09 | 2019-02-01 | 四川虹微技术有限公司 | A kind of authentication method, block chain node and storage medium |
CN109379357A (en) * | 2018-10-18 | 2019-02-22 | 全链通有限公司 | The method and device for realizing the certification of block chain system of real name is assured based on social relationships |
CN109409134A (en) * | 2018-09-29 | 2019-03-01 | 浙江口碑网络技术有限公司 | The monitoring method and device of transaction data, storage medium and electronic equipment |
CN109493202A (en) * | 2018-09-27 | 2019-03-19 | 深圳壹账通智能科技有限公司 | Block chain account checking method, device, system, equipment and readable storage medium storing program for executing |
WO2019101156A1 (en) * | 2017-11-27 | 2019-05-31 | 华为技术有限公司 | Device control method, and related device for same |
CN110263579A (en) * | 2018-11-16 | 2019-09-20 | 腾讯科技(深圳)有限公司 | A kind of data processing method, system and relevant device |
WO2019101225A3 (en) * | 2019-02-28 | 2019-12-26 | Alibaba Group Holding Limited | System and method for blockchain-based data management |
WO2020048241A1 (en) * | 2018-09-04 | 2020-03-12 | 阿里巴巴集团控股有限公司 | Blockchain cross-chain authentication method and system, and server and readable storage medium |
CN111193736A (en) * | 2019-12-30 | 2020-05-22 | 江苏恒宝智能系统技术有限公司 | Information authentication method, device, system and storage medium |
CN111833976A (en) * | 2020-07-02 | 2020-10-27 | 中南大学湘雅医院 | Chronic arthritis patient follow-up management system based on block chain |
CN112602106A (en) * | 2018-08-23 | 2021-04-02 | 埃克索迪翁有限公司 | Block chain-based article generation method |
CN112637184A (en) * | 2020-12-18 | 2021-04-09 | 珠海格力电器股份有限公司 | Security authentication system, method, apparatus, device, and computer-readable storage medium |
CN112685721A (en) * | 2020-12-23 | 2021-04-20 | 深圳供电局有限公司 | Electric energy meter authority authentication method and device, computer equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150244690A1 (en) * | 2012-11-09 | 2015-08-27 | Ent Technologies, Inc. | Generalized entity network translation (gent) |
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN105959307A (en) * | 2016-06-30 | 2016-09-21 | 中国科学院计算技术研究所 | Existence certification and authentication service method and system based on block chain technology |
CN105976232A (en) * | 2016-06-24 | 2016-09-28 | 深圳前海微众银行股份有限公司 | Asset transaction method and device |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106100847A (en) * | 2016-06-14 | 2016-11-09 | 惠众商务顾问(北京)有限公司 | Asymmetric encryption block chain identity information verification method and device |
CN106096444A (en) * | 2016-06-12 | 2016-11-09 | 杨鹏 | A kind of identification based on bio information and social information's recording method and system |
WO2016179334A1 (en) * | 2015-05-05 | 2016-11-10 | ShoCard, Inc. | Identity management service using a block chain |
-
2016
- 2016-12-02 CN CN201611094966.1A patent/CN106534160B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150244690A1 (en) * | 2012-11-09 | 2015-08-27 | Ent Technologies, Inc. | Generalized entity network translation (gent) |
WO2016179334A1 (en) * | 2015-05-05 | 2016-11-10 | ShoCard, Inc. | Identity management service using a block chain |
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106096444A (en) * | 2016-06-12 | 2016-11-09 | 杨鹏 | A kind of identification based on bio information and social information's recording method and system |
CN106100847A (en) * | 2016-06-14 | 2016-11-09 | 惠众商务顾问(北京)有限公司 | Asymmetric encryption block chain identity information verification method and device |
CN105976232A (en) * | 2016-06-24 | 2016-09-28 | 深圳前海微众银行股份有限公司 | Asset transaction method and device |
CN105959307A (en) * | 2016-06-30 | 2016-09-21 | 中国科学院计算技术研究所 | Existence certification and authentication service method and system based on block chain technology |
Cited By (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108875386A (en) * | 2017-05-16 | 2018-11-23 | 江峰 | A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism |
CN107147652B (en) * | 2017-05-18 | 2019-08-09 | 电子科技大学 | A kind of safety fusion authentication method of the polymorphic identity of user based on block chain |
CN107147652A (en) * | 2017-05-18 | 2017-09-08 | 电子科技大学 | A kind of safety fusion authentication method of the polymorphic identity of user based on block chain |
CN107332826A (en) * | 2017-06-09 | 2017-11-07 | 中国联合网络通信集团有限公司 | The communication means and device of block chain agent node |
CN107332826B (en) * | 2017-06-09 | 2019-12-03 | 中国联合网络通信集团有限公司 | The communication means and device of block chain agent node |
CN107171812A (en) * | 2017-07-18 | 2017-09-15 | 光载无限(北京)科技有限公司 | It is a kind of based on block chain without key signature infrastructure construction method |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107493162A (en) * | 2017-07-25 | 2017-12-19 | 中国联合网络通信集团有限公司 | The implementation method and device of block chain node |
CN107682328A (en) * | 2017-09-26 | 2018-02-09 | 武汉斗鱼网络科技有限公司 | A kind of data verification method and client |
CN107465698A (en) * | 2017-09-26 | 2017-12-12 | 武汉斗鱼网络科技有限公司 | A kind of data verification method and server |
CN107679149A (en) * | 2017-09-26 | 2018-02-09 | 武汉斗鱼网络科技有限公司 | A kind of data processing method and server |
CN107454110A (en) * | 2017-09-26 | 2017-12-08 | 武汉斗鱼网络科技有限公司 | A kind of data verification method and server |
CN107623865A (en) * | 2017-09-26 | 2018-01-23 | 武汉斗鱼网络科技有限公司 | A kind of data verification method and server |
CN107528855A (en) * | 2017-09-26 | 2017-12-29 | 武汉斗鱼网络科技有限公司 | A kind of data verification method and server |
WO2019101156A1 (en) * | 2017-11-27 | 2019-05-31 | 华为技术有限公司 | Device control method, and related device for same |
CN109840766A (en) * | 2017-11-27 | 2019-06-04 | 华为终端有限公司 | A kind of apparatus control method and its relevant device |
CN109840766B (en) * | 2017-11-27 | 2024-03-29 | 华为终端有限公司 | Equipment control method and related equipment thereof |
CN108009825A (en) * | 2017-11-29 | 2018-05-08 | 江苏安凰领御科技有限公司 | A kind of identity management system and method based on block chain technology |
CN108320173A (en) * | 2017-12-12 | 2018-07-24 | 北京瑞卓喜投科技发展有限公司 | Integration processing method and device based on block chain technology |
CN108540553B (en) * | 2018-04-08 | 2019-08-13 | 中国联合网络通信集团有限公司 | Internet of things data management method, platform and equipment |
CN108540553A (en) * | 2018-04-08 | 2018-09-14 | 中国联合网络通信集团有限公司 | Internet of Things data management method, platform and equipment |
CN108882005A (en) * | 2018-04-13 | 2018-11-23 | 武汉斗鱼网络科技有限公司 | A kind of barrage verification method, computer equipment and storage medium |
CN108809953B (en) * | 2018-05-22 | 2020-09-01 | 飞天诚信科技股份有限公司 | Anonymous identity authentication method and device based on block chain |
CN108809953A (en) * | 2018-05-22 | 2018-11-13 | 飞天诚信科技股份有限公司 | A kind of method and device of the anonymous Identity certification based on block chain |
CN108924089B (en) * | 2018-05-29 | 2021-11-09 | 武汉斗鱼网络科技有限公司 | Client device identification method and device and client device |
CN108924089A (en) * | 2018-05-29 | 2018-11-30 | 武汉斗鱼网络科技有限公司 | A kind of client device recognition methods, device and client device |
CN112602106A (en) * | 2018-08-23 | 2021-04-02 | 埃克索迪翁有限公司 | Block chain-based article generation method |
CN109194651A (en) * | 2018-09-04 | 2019-01-11 | 深信服科技股份有限公司 | A kind of identity identifying method, device, equipment and storage medium |
WO2020048241A1 (en) * | 2018-09-04 | 2020-03-12 | 阿里巴巴集团控股有限公司 | Blockchain cross-chain authentication method and system, and server and readable storage medium |
US10979231B2 (en) | 2018-09-04 | 2021-04-13 | Advanced New Technologies Co., Ltd. | Cross-chain authentication method, system, server, and computer-readable storage medium |
TWI707244B (en) * | 2018-09-04 | 2020-10-11 | 香港商阿里巴巴集團服務有限公司 | Block chain cross-chain authentication method, system, server and readable storage medium |
CN109493202A (en) * | 2018-09-27 | 2019-03-19 | 深圳壹账通智能科技有限公司 | Block chain account checking method, device, system, equipment and readable storage medium storing program for executing |
CN109409134B (en) * | 2018-09-29 | 2021-08-31 | 浙江口碑网络技术有限公司 | Transaction data monitoring method and device, storage medium and electronic equipment |
CN109409134A (en) * | 2018-09-29 | 2019-03-01 | 浙江口碑网络技术有限公司 | The monitoring method and device of transaction data, storage medium and electronic equipment |
CN109379357B (en) * | 2018-10-18 | 2021-01-08 | 全链通有限公司 | Method and device for realizing block chain real-name system authentication based on social relationship guarantee |
CN109379357A (en) * | 2018-10-18 | 2019-02-22 | 全链通有限公司 | The method and device for realizing the certification of block chain system of real name is assured based on social relationships |
CN109302415B (en) * | 2018-11-09 | 2019-11-01 | 四川虹微技术有限公司 | A kind of authentication method, block chain node and storage medium |
CN109302415A (en) * | 2018-11-09 | 2019-02-01 | 四川虹微技术有限公司 | A kind of authentication method, block chain node and storage medium |
CN110263579A (en) * | 2018-11-16 | 2019-09-20 | 腾讯科技(深圳)有限公司 | A kind of data processing method, system and relevant device |
WO2019101225A3 (en) * | 2019-02-28 | 2019-12-26 | Alibaba Group Holding Limited | System and method for blockchain-based data management |
US11258778B2 (en) | 2019-02-28 | 2022-02-22 | Advanced New Technologies Co., Ltd. | System and method for blockchain-based data management |
CN111193736A (en) * | 2019-12-30 | 2020-05-22 | 江苏恒宝智能系统技术有限公司 | Information authentication method, device, system and storage medium |
CN111833976A (en) * | 2020-07-02 | 2020-10-27 | 中南大学湘雅医院 | Chronic arthritis patient follow-up management system based on block chain |
CN112637184A (en) * | 2020-12-18 | 2021-04-09 | 珠海格力电器股份有限公司 | Security authentication system, method, apparatus, device, and computer-readable storage medium |
CN112637184B (en) * | 2020-12-18 | 2022-05-17 | 珠海格力电器股份有限公司 | Security authentication system, method, apparatus, device, and computer-readable storage medium |
CN112685721A (en) * | 2020-12-23 | 2021-04-20 | 深圳供电局有限公司 | Electric energy meter authority authentication method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106534160B (en) | 2020-02-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106534160A (en) | Identity authentication method and system based on block chain | |
CN109714167B (en) | Identity authentication and key agreement method and equipment suitable for mobile application signature | |
CN111429254B (en) | Business data processing method and device and readable storage medium | |
CN112019493B (en) | Identity authentication method, identity authentication device, computer equipment and medium | |
CN107483419B (en) | Method, device and system for authenticating access terminal by server, server and computer readable storage medium | |
CN109309685B (en) | Information transmission method and device | |
CN101221641B (en) | On-line trading method and its safety affirmation equipment | |
US9124571B1 (en) | Network authentication method for secure user identity verification | |
CN112202705A (en) | Digital signature verification generation and verification method and system | |
WO2014014793A1 (en) | Anti-cloning system and method | |
CN106779716A (en) | Authentication method, apparatus and system based on block chain account address | |
CN106548338B (en) | Method and system for transferring resource numerical value | |
CN111131300B (en) | Communication method, terminal and server | |
CN110096894B (en) | Data anonymous sharing system and method based on block chain | |
CN106411950A (en) | Block-chain transaction ID based authentication method, device and system | |
CN108322416A (en) | A kind of safety certification implementation method, apparatus and system | |
CN106209793A (en) | A kind of auth method and checking system | |
CN112055019A (en) | Method for establishing communication channel and user terminal | |
CN115242553B (en) | Data exchange method and system supporting safe multi-party calculation | |
CN113569263A (en) | Secure processing method and device for cross-private-domain data and electronic equipment | |
KR102157695B1 (en) | Method for Establishing Anonymous Digital Identity | |
KR101856530B1 (en) | Encryption system providing user cognition-based encryption protocol and method for processing on-line settlement, security apparatus and transaction approval server using thereof | |
CN116647345A (en) | Method and device for generating permission token, storage medium and computer equipment | |
CN116707983A (en) | Authorization authentication method and device, access authentication method and device, equipment and medium | |
CN109145543B (en) | Identity authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |