CN106534160A - Identity authentication method and system based on block chain - Google Patents

Identity authentication method and system based on block chain Download PDF

Info

Publication number
CN106534160A
CN106534160A CN201611094966.1A CN201611094966A CN106534160A CN 106534160 A CN106534160 A CN 106534160A CN 201611094966 A CN201611094966 A CN 201611094966A CN 106534160 A CN106534160 A CN 106534160A
Authority
CN
China
Prior art keywords
information
block chain
transaction information
transaction
script
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611094966.1A
Other languages
Chinese (zh)
Other versions
CN106534160B (en
Inventor
汪德嘉
郭宇
王少凡
柴泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Payegis Technology Co Ltd
Original Assignee
Jiangsu Payegis Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Payegis Technology Co Ltd filed Critical Jiangsu Payegis Technology Co Ltd
Priority to CN201611094966.1A priority Critical patent/CN106534160B/en
Publication of CN106534160A publication Critical patent/CN106534160A/en
Application granted granted Critical
Publication of CN106534160B publication Critical patent/CN106534160B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an identity authentication method and system based on a block chain. The method includes the steps of a terminal device sending an identity authentication request including an authentication factor to an application server, an application server receiving the identity authentication request and generating first transaction information according to the authentication factor in the identity authentication request, the application server broadcasting the first transaction information to a block chain network, the application server sending the first transaction number information of the first transaction information to the terminal device, the terminal device receiving the first transaction number information, generating second transaction information according to the first transaction number information and the authentication factor and broadcasting the second transaction information to the block chain network, and the block chain network conducting identity authentication for the terminal device according to the first transaction information and the second transaction information to obtain the authentication result. According to the technical scheme of the invention, identity authentication for a terminal device can be safety and conveniently carried out through a block chain network.

Description

Identity identifying method and system based on block chain
Technical field
The present invention relates to Internet technical field, and in particular to a kind of identity identifying method and system based on block chain.
Background technology
In Internet technology, when certain application server of User logs in, the application server is frequently necessary to user Authentication is carried out, so that it is determined that whether the user has accesses some resources and the authority using some resources, that is, determining should Whether user is authorized user, and then the access strategy of internet is reliably and efficiently performed, and prevents attacker's personation from awarding Power user obtains the access rights and access right of resource, it is ensured that the legitimate interests of data safety and authorized user.
In the prior art, authentication can be carried out by Third Party Authentication server, detailed process is:User is by eventually End equipment sends ID authentication request to Third Party Authentication server, includes application server requirement in the ID authentication request Information, then Third Party Authentication server the ID authentication request is verified, be verified rear application server will The information asked is signed, and authentication result is returned to terminal device, includes Third Party Authentication service in the authentication result The signature of the information that device application server is required, then terminal device the authentication result is sent to application server, application Server just can verify that the identity of terminal device according to the signature in authentication result.But, if Third Party Authentication server goes out Existing information leakage or information are tampered, it would be possible to can bring massive losses to the user of terminal equipment side and application server.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome the problems referred to above or at least in part solve on State the identity identifying method based on block chain and system of problem.
According to an aspect of the invention, there is provided a kind of identity identifying method based on block chain, the method includes:
Terminal device sends ID authentication request to application server;Wherein, ID authentication request includes the certification factor;
Application server receives ID authentication request, according to the certification factor in ID authentication request, generates first and concludes the business Information;
Application server broadcasts the first Transaction Information to block chain network;
Application server sends the first transaction number information of the first Transaction Information to terminal device;
Terminal device receives the first transaction number information, according to the first transaction number information and the certification factor, generates second Transaction Information, and the second Transaction Information is broadcasted to block chain network;
Block chain network carries out authentication to terminal device, obtains according to the first Transaction Information and the second Transaction Information Authentication result.
According to a further aspect in the invention, there is provided a kind of identity authorization system based on block chain, the system include:Eventually End equipment, application server and block chain network;Wherein,
Terminal device is used for:ID authentication request is sent to application server;Wherein, ID authentication request include certification because Son;
Application server is used for:ID authentication request is received, according to the certification factor in ID authentication request, first is generated Transaction Information;First Transaction Information is broadcasted to block chain network, and the first transaction number information of the first Transaction Information is sent out Deliver to terminal device;
Terminal device is further used for:Receive the first transaction number information, according to the first transaction number information and certification because Son, generates the second Transaction Information, and the second Transaction Information is broadcasted to block chain network;
Block chain network is used for:According to the first Transaction Information and the second Transaction Information, authentication is carried out to terminal device, Obtain authentication result.
According to the technical scheme that the present invention is provided, application server is according to the certification in the ID authentication request of terminal device The factor, generates the first Transaction Information, the first Transaction Information is broadcasted to block chain network, and the first of the first Transaction Information is handed over Easily number information is sent to terminal device, and then terminal device is according to the first transaction number information and the certification factor, generation second Transaction Information, and the second Transaction Information is broadcasted to block chain network, then block chain network is according to the first Transaction Information and Two Transaction Informations, carry out authentication to terminal device, obtain authentication result.According to the technical scheme that the present invention is provided, pass through Block chain network safely, conveniently can carry out authentication to terminal device, in addition, the spy that can not be distorted using block chain Property, also add the confidence level of authentication.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the specific embodiment of the present invention.
Description of the drawings
By the detailed description for reading hereafter preferred embodiment, various other advantages and benefit are common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for the purpose for illustrating preferred embodiment, and is not considered as to the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 shows the signaling process figure of the identity identifying method based on block chain according to an embodiment of the invention;
Fig. 2 shows the signaling process of the identity identifying method based on block chain in accordance with another embodiment of the present invention Figure;
Fig. 3 shows the structured flowchart of the identity authorization system based on block chain according to an embodiment of the invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here Limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Fig. 1 shows the signaling process figure of the identity identifying method based on block chain according to an embodiment of the invention, As shown in figure 1, the method comprises the steps:
Step S100, terminal device send ID authentication request to application server.
Wherein, ID authentication request includes the certification factor.Specifically, the certification factor includes following one or more:User Name information, user password information, device-fingerprint information, dynamic code and behavioural habits information.In addition, the certification factor may also include which He can be used for the information of authenticating identity, not limit herein.
Step S101, application server receive ID authentication request, according to the certification factor in ID authentication request, generate First Transaction Information.
The ID authentication request that application server receiving terminal apparatus send, then according to the certification in ID authentication request The factor, generates the first Transaction Information.
Step S102, application server broadcast the first Transaction Information to block chain network.
After the first Transaction Information is generated, application server broadcasts the first Transaction Information to block chain network.Its In, block chain has the characteristic that can not be distorted.
Step S103, application server send the first transaction number information of the first Transaction Information to terminal device.
Specifically, the first transaction number information of the first Transaction Information can be the first Transaction Information to be entered using hash algorithm Row is calculated.In order that terminal device is obtained in that the first Transaction Information, application server is by the of the first Transaction Information One transaction number information is sent to terminal device.
Step S104, terminal device receive the first transaction number information, according to the first transaction number information and the certification factor, The second Transaction Information is generated, and the second Transaction Information is broadcasted to block chain network.
Terminal device have received application server transmission the first transaction number information after, according to the first transaction number Information and the certification factor, generate the second Transaction Information, then the second Transaction Information for being generated are broadcasted to block chain network.
Step S105, block chain network carry out identity to terminal device according to the first Transaction Information and the second Transaction Information Certification, obtains authentication result.
As the first Transaction Information and the second Transaction Information are all broadcasted to block chain network, then in step S105, Block chain network can be carried out authentication to terminal device, obtain certification according to the first Transaction Information and the second Transaction Information As a result.Wherein, authentication result includes:First authentication result and the second authentication result.Specifically, the first authentication result be certification into The authentication result of work(, authentication result of second authentication result for authentification failure.
The identity identifying method based on block chain for providing according to embodiments of the present invention, application server is according to terminal device ID authentication request in the certification factor, generate the first Transaction Information, the first Transaction Information is broadcasted to block chain network, and First transaction number information of the first Transaction Information is sent to terminal device, then terminal device is believed according to the first transaction number Breath and the certification factor, generate the second Transaction Information, and the second Transaction Information are broadcasted to block chain network, then block chain network According to the first Transaction Information and the second Transaction Information, authentication is carried out to terminal device, authentication result is obtained.According to the present invention The technical scheme of offer, safely, conveniently can carry out authentication to terminal device by block chain network, in addition, utilizing The characteristic that block chain can not be distorted, also add the confidence level of authentication.
Fig. 2 shows the signaling process of the identity identifying method based on block chain in accordance with another embodiment of the present invention Figure, as shown in Fig. 2 the method comprises the steps:
Step S200, terminal device send ID authentication request to application server.
Wherein, ID authentication request includes the certification factor.Specifically, the certification factor includes following one or more:User Name information, user password information, device-fingerprint information, dynamic code and behavioural habits information.Those skilled in the art can also basis The information that other can be used for authenticating identity is actually needed as the certification factor, is not limited herein.
Step S201, application server receive ID authentication request, according to ID authentication request, generate script information.
Application server can generate script information according to ID authentication request after it have received ID authentication request.
Step S202, application server obtain mathematics change using the certification factor and script information in ID authentication request Change result.
Specifically, mathematics change is carried out to the certification factor in ID authentication request using script information, obtains mathematics change Change result.For example, using the certification factor in ID authentication request as the corresponding input information of script information, using script information Output information is obtained, resulting output information is mathematic(al) manipulation result.Wherein, mathematics change including but not limited to adds fortune Calculate, subtract computing and computing, XOR and Hash operation etc..
Step S203, application server are calculated the corresponding script cryptographic Hash of script information using hash algorithm.
Application server carries out Hash operation to script information using hash algorithm, obtains the corresponding script of script information and breathes out Uncommon value.
Step S204, application server is according to the block chain address information of script information, script cryptographic Hash and mathematic(al) manipulation As a result, generate the first Transaction Information.
Wherein, script information has corresponding block chain address information, can according to the block chain address information of script information Obtain script information.As Transaction Information includes conclude the business input information and transaction output information, then in step S204, application The block chain address of script information can be believed by server using the token of block chain as the transaction input information of the first Transaction Information The transaction output information of breath, script cryptographic Hash and mathematics transformation results as the first Transaction Information, so as to generate the first transaction letter Breath.
Step S205, application server broadcast the first Transaction Information to block chain network.
After the first Transaction Information is generated, application server broadcasts the first Transaction Information to block chain network.Phase Believe when the block chain address information of script information, script cryptographic Hash and mathematics transformation results being concluded the business with first in application server The form of breath is broadcasted to block chain network.
Step S206, application server send the first transaction number information of the first Transaction Information to terminal device.
Specifically, the first transaction number information of the first Transaction Information is the first Transaction Information to be carried out using hash algorithm It is calculated.Alternatively, before step S206, the method may also include:Application server utilizes hash algorithm to first Transaction Information is calculated, the step of obtain the first transaction number information of the first Transaction Information.
Step S207, terminal device receive the first transaction number information, according to the first transaction number information, obtain first and hand over Easy information.
As the first transaction number information of the first Transaction Information is the first Transaction Information to be counted using hash algorithm Obtain, then after terminal device have received the first transaction number information, so that it may according to the first transaction number information, obtain Take the first Transaction Information.
Step S208, terminal device obtain script information according to the first Transaction Information.
As the first Transaction Information is according to the block chain address information of script information, script cryptographic Hash and mathematic(al) manipulation knot What fruit generated, then terminal device is just obtained the block chain address information of script information according to the first Transaction Information, then root Script information is obtained just according to the block chain address information of script information.
Step S209, terminal device is according to the first transaction number information, script information, the certification factor and application server Block chain address information, generates the second Transaction Information.
Application server has corresponding block chain address information, can be true according to the block chain address information of application server Determine application server.Specifically, the first transaction number information, script information, the certification factor can be handed over by terminal device as second Easily the transaction input information of information, believes the block chain address information of application server as the transaction output of the second Transaction Information Breath, so as to generate the second Transaction Information.
Step S210, terminal device broadcast the second Transaction Information to block chain network.
After the second Transaction Information is generated, terminal device broadcasts the second Transaction Information to block chain network.Quite In terminal device by the block chain address information of the first transaction number information, script information, the certification factor and application server with The form of the second Transaction Information is broadcasted to block chain network.
Step S211, block chain network carry out identity to terminal device according to the first Transaction Information and the second Transaction Information Certification, obtains authentication result.
As the first Transaction Information and the second Transaction Information are all broadcasted to block chain network, then in step S211, Block chain network can be carried out authentication to terminal device, obtain certification according to the first Transaction Information and the second Transaction Information As a result.
As the first Transaction Information is according to the block chain address information of script information, script cryptographic Hash and mathematic(al) manipulation knot What fruit generated, then block chain network is obtained the area of the corresponding script information of the first Transaction Information according to the first Transaction Information Block chain address information, script cryptographic Hash and mathematics transformation results, in the same manner, the second Transaction Information is believed according to the first transaction number What the block chain address information of breath, script information, the certification factor and application server was generated, block chain network is according to the second transaction Information, is obtained the corresponding first transaction number information of the second Transaction Information, script information, the certification factor and application server Block chain address information.
Specifically, block chain network obtains the corresponding script information of the second Transaction Information according to the second Transaction Information;Utilize Hash algorithm is calculated to the corresponding script information of the second Transaction Information, obtains script cryptographic Hash to be certified.Block chain network According to the first Transaction Information, the corresponding script cryptographic Hash of the first Transaction Information is obtained.
After script cryptographic Hash to be certified and the corresponding script cryptographic Hash of the first Transaction Information has been obtained, block chain network Judge whether script cryptographic Hash to be certified is identical with the corresponding script cryptographic Hash of the first Transaction Information.
If block chain network judges to obtain script cryptographic Hash to be certified script cryptographic Hash corresponding with the first Transaction Information Identical, then block chain network obtains the corresponding certification factor of the second Transaction Information, and hands over according to second according to the second Transaction Information Easily the corresponding certification factor of information and script information, obtain mathematic(al) manipulation result to be certified;Then block chain network is according to first Transaction Information, obtains the corresponding mathematic(al) manipulation result of the first Transaction Information;Obtaining mathematic(al) manipulation result to be certified and first After the corresponding mathematic(al) manipulation result of Transaction Information, block chain network judges whether mathematic(al) manipulation result to be certified concludes the business with first The corresponding mathematic(al) manipulation result of information is identical.If it is determined that obtaining certification mathematic(al) manipulation result number corresponding with the first Transaction Information Transformation results are identical, then block chain network obtains the first authentication result, that is, obtain the successful authentication result of certification;If it is determined that Obtain certification mathematic(al) manipulation result not identical with the corresponding mathematic(al) manipulation result of the first Transaction Information, then block chain network obtains Two authentication results, that is, obtain the authentication result of authentification failure.
If block chain network judges to obtain script cryptographic Hash to be certified script Hash not corresponding with the first Transaction Information Value is identical, then block chain network obtains the second authentication result.
In the present embodiment, during block chain network carries out authentication to terminal device, block chain network is not Script cryptographic Hash is only verified, mathematic(al) manipulation result is also verified such that it is able to authentication is carried out more comprehensively, exactly, and then Obtain reliable authentication result.
Wherein, the mode of other checking transaction legitimacies and block chain network checking transaction legitimacy in prior art Mode is identical, and here is omitted.
In actual applications, can be by the miner's node in block chain network according to the first Transaction Information and the second transaction letter Breath, carries out authentication to terminal device.If the miner's node in Jing block chain networks carries out authentication to terminal device, Obtain the first authentication result, authentication authorization and accounting success, then miner's node broadcasts the second Transaction Information in block chain network, in block Each node in chain network writes block chain after reaching common understanding.
Step S212, block chain network send authentication result to application server.
Block chain network is obtained the block chain address information of application server according to the second Transaction Information, according to application clothes The block chain address information of business device, so that it may authentication result is sent to application server, so that application server knows that terminal sets Standby authentication whether certification success.
The identity identifying method based on block chain for providing according to embodiments of the present invention, application server is according to script information Block chain address information, script cryptographic Hash and mathematics transformation results, generate the first Transaction Information, the first Transaction Information broadcasted To block chain network, and the first transaction number information of the first Transaction Information is sent to terminal device, terminal device is according to The block chain address information of one transaction number information, script information, the certification factor and application server, generates the second transaction letter Breath, and the second Transaction Information is broadcasted to block chain network, then block chain network is according to the first Transaction Information and the second transaction Information, carries out authentication to terminal device, obtains authentication result.According to the technical scheme that the present invention is provided, by block chain Network preserves and verifies script cryptographic Hash and mathematics transformation results such that it is able to safely, conveniently, exactly terminal device is carried out Authentication, in addition, the characteristic that can not be distorted using block chain, also add the confidence level of authentication.
Fig. 3 shows the structured flowchart of the identity authorization system based on block chain according to an embodiment of the invention, such as Shown in Fig. 3, the system includes:Terminal device 310, application server 320 and block chain network 330.
Terminal device 310 is used for:ID authentication request is sent to application server 320.
Wherein, ID authentication request includes the certification factor.Those skilled in the art will can be used for recognizing according to actual needs The information of card identity is not limited herein as the certification factor.For example, the certification factor may include following one or more:User Name information, user password information, device-fingerprint information, dynamic code and behavioural habits information.
Application server 320 is used for:ID authentication request is received, according to the certification factor in ID authentication request, is generated First Transaction Information;First Transaction Information is broadcasted to block chain network, and the first transaction number of the first Transaction Information is believed Breath is sent to terminal device.
Specifically, application server 320 includes:First receiver module 321, first processing module 322, the first generation module 323rd, the first broadcast module 324 and the first sending module 325.Wherein, the first receiver module 321 is used for:Receiving authentication please Ask.First processing module 322 is used for:According to ID authentication request, script information is generated;Using the certification in ID authentication request The factor and script information, obtain mathematic(al) manipulation result;The corresponding script cryptographic Hash of script information is calculated using hash algorithm. First generation module 323 is used for:Block chain address information, script cryptographic Hash and mathematics transformation results according to script information, it is raw Into the first Transaction Information.First broadcast module 324 is used for:First Transaction Information is broadcasted to block chain network.First sends mould Block 325 is used for:First transaction number information of the first Transaction Information is sent to terminal device 310.
Wherein, the first processing module 322 in application server 320 using script information to ID authentication request in recognize The card factor carries out mathematics change, obtains mathematic(al) manipulation result.For example, believe the certification factor in ID authentication request as script Corresponding input information being ceased, output information being obtained using script information, resulting output information is mathematic(al) manipulation result.Number Learn change including but not limited to add computing, subtract computing and computing, XOR and Hash operation etc..
As Transaction Information includes conclude the business input information and transaction output information, then first in application server 320 Generation module 323 can using the token of block chain as the first Transaction Information transaction input information, by the block chain of script information The transaction output information of address information, script cryptographic Hash and mathematics transformation results as the first Transaction Information, so as to generate first Transaction Information.The first broadcast mould after the first generation module 323 generates the first Transaction Information, in application server 320 Block 324 broadcasts the first Transaction Information to block chain network 330, equivalent to the first broadcast module 324 by the block of script information Chain address information, script cryptographic Hash and mathematics transformation results are broadcasted to block chain network in the form of the first Transaction Information.
Alternatively, application server 320 is additionally operable to:The first Transaction Information is calculated using hash algorithm, obtain First transaction number information of one Transaction Information.Specifically, the first processing module 322 in application server 320 utilizes Hash Algorithm is calculated to the first Transaction Information, obtains the first transaction number information of the first Transaction Information.
Terminal device 310 is additionally operable to:Receive the first transaction number information, according to the first transaction number information and certification because Son, generates the second Transaction Information, and the second Transaction Information is broadcasted to block chain network.
Specifically, terminal device 310 includes:Second sending module 311, the second receiver module 312, Second processing module 313rd, the second generation module 314 and the second broadcast module 315.Wherein, the second sending module 311 is used for:To application server 320 Send ID authentication request.Second receiver module 312 is used for:Receive the first transaction number information.Second processing module 313 is used In:According to the first transaction number information, the first Transaction Information is obtained;According to the first Transaction Information, script information is obtained.Second life It is used for into module 314:According to the block chain address of the first transaction number information, script information, the certification factor and application server Information, generates the second Transaction Information.Second broadcast module 315 is used for:Second Transaction Information is broadcasted to block chain network 330.
As the first transaction number information of the first Transaction Information is the first Transaction Information to be counted using hash algorithm Obtain, then after the second receiver module 312 in terminal device 310 have received the first transaction number information, at second Reason module 313 obtains the first Transaction Information according to the first transaction number information.As the first Transaction Information is according to script information Block chain address information, script cryptographic Hash and mathematics transformation results generate, then Second processing module 313 is handed over according to first Easily information can obtain the block chain address information of script information, and pin is just obtained according to the block chain address information of script information This information.
Then the second generation module 314 in terminal device 310 can according to the first transaction number information, script information, The block chain address information of the certification factor and application server, generates the second Transaction Information.Specifically, the second generation module 314 Can using the first transaction number information, script information, the certification factor as the second Transaction Information transaction input information, will using clothes Transaction output information of the block chain address information of business device as the second Transaction Information, so as to generate the second Transaction Information. After two generation modules 314 generate the second Transaction Information, the second broadcast module 315 broadcasts the second Transaction Information to block chain Network 330, equivalent to the second broadcast module 315 by the first transaction number information, script information, the certification factor and application server Block chain address information broadcasted in the form of the second Transaction Information to block chain network 330.
Block chain network 330 is used for:According to the first Transaction Information and the second Transaction Information, body is carried out to terminal device 310 Part certification, obtains authentication result.
Wherein, block chain network 330 includes:3rd receiver module 331, the 3rd processing module 332, the first authentication module 333rd, fourth processing module 334, the second authentication module 335 and result-generation module 336.
3rd receiver module 331 is used for:Receive the first Transaction Information and the second Transaction Information.
3rd processing module 332 is used for:According to the second Transaction Information, the corresponding script information of the second Transaction Information is obtained; The corresponding script information of the second Transaction Information is calculated using hash algorithm, obtain script cryptographic Hash to be certified;According to One Transaction Information, obtains the corresponding script cryptographic Hash of the first Transaction Information.
First authentication module 333 is used for:Judge script cryptographic Hash to be certified script whether corresponding with the first Transaction Information Cryptographic Hash is identical.
Fourth processing module 334 is used for:If the first authentication module 333 judges that obtaining script cryptographic Hash to be certified hands over first Easily the corresponding script cryptographic Hash of information is identical, then according to the second Transaction Information, obtain the corresponding certification factor of the second Transaction Information, And according to the corresponding certification factor of the second Transaction Information and script information, obtain mathematic(al) manipulation result to be certified;Hand over according to first Easily information, obtains the corresponding mathematic(al) manipulation result of the first Transaction Information.
Second authentication module 335 is used for:Judge mathematic(al) manipulation result to be certified number whether corresponding with the first Transaction Information Learn transformation results identical.
Result-generation module 336 is used for:If the first authentication module 333 judges to obtain script cryptographic Hash to be certified not with first The corresponding script cryptographic Hash of Transaction Information is identical, then obtain the second authentication result;If the second authentication module 335 judges to obtain waiting to recognize Card mathematic(al) manipulation result is identical with the corresponding mathematic(al) manipulation result of the first Transaction Information, then obtain the first authentication result;If second Authentication module 335 judges to obtain mathematic(al) manipulation result to be certified not identical with the corresponding mathematic(al) manipulation result of the first Transaction Information, Second authentication result is obtained then.
In the present embodiment, block chain network not only verifies script cryptographic Hash, also verifies mathematic(al) manipulation result such that it is able to More comprehensively, authentication is carried out exactly, and then obtain reliable authentication result.
Alternatively, block chain network 330 is additionally operable to authentication result be sent to application server 320, so as to application service Device 320 knows the authentication whether certification success of terminal device 310.Specifically, block chain network 330 may include the 3rd transmission Module (not shown), the 3rd sending module is for authentication result is sent to application server 320.
According to the identity authorization system based on block chain that the present invention is provided, block of the application server according to script information Chain address information, script cryptographic Hash and mathematics transformation results, generate the first Transaction Information, the first Transaction Information are broadcasted to block Chain network, and the first transaction number information of the first Transaction Information is sent to terminal device, terminal device is according to the first transaction The block chain address information of number information, script information, the certification factor and application server, generates the second Transaction Information, and will Second Transaction Information is broadcasted to block chain network, and then block chain network is according to the first Transaction Information and the second Transaction Information, right Terminal device carries out authentication, obtains authentication result.According to the technical scheme that the present invention is provided, preserved by block chain network And verify script cryptographic Hash and mathematics transformation results such that it is able to safely, conveniently, identity is carried out to terminal device exactly recognize Card, in addition, the characteristic that can not be distorted using block chain, also add the confidence level of authentication.
So far, although those skilled in the art will appreciate that detailed herein illustrate and describe multiple showing for the present invention Example property embodiment, but, without departing from the spirit and scope of the present invention, still can be directly true according to disclosure of invention Determine or derive many other variations or modifications for meeting the principle of the invention.Therefore, the scope of the present invention is it should be understood that and recognize It is set to and covers all these other variations or modifications.
It will be appreciated by those skilled in the art that embodiments of the present invention can be implemented as a kind of system, device, equipment, Method or computer program.Additionally, the present invention is also not for any certain programmed language, it should be appreciated that can be using each The content that programming language realizes present invention description is planted, and the description done to language-specific above is to disclose the present invention Preferred forms.
Although it should be noted that describing in detail in superincumbent explanation in the identity authorization system based on block chain Some modules, but what this division was merely exemplary, it is not enforceable.It will be understood to those skilled in the art that Indeed, it is possible to the module in embodiment is adaptively changed, by the multiple block combiners in embodiment into one Module, also can be by a Module Division into multiple modules.
Additionally, although describing the present invention with particular order in the accompanying drawings implements operation, this does not require that or secretly Show and these operations must be performed according to the particular order, or the operation having to carry out shown in whole could realize desired knot Really.Some steps can be omitted, multiple steps is merged into into a step and is performed, or a step is divided into into multiple steps and held OK.
In sum, using the identity identifying method based on block chain of the present invention and system, by block link network Network safely, conveniently can carry out authentication to terminal device, in addition, the characteristic that can not be distorted using block chain, is also increased The confidence level of authentication.
Above the method for the present invention and specific implementation method are described in detail, and give corresponding enforcement Example.Certainly, in addition to the implementation, the present invention can also have other embodiment, all employing equivalents or equivalent transformation shape Into technical scheme, all fall within invention which is intended to be protected.
The invention discloses:
A1, a kind of identity identifying method based on block chain, it is characterised in that include:
Terminal device sends ID authentication request to application server;Wherein, the ID authentication request include certification because Son;
The application server receives the ID authentication request, according to the certification factor in the ID authentication request, Generate the first Transaction Information;
The application server broadcasts first Transaction Information to block chain network;
The application server sends the first transaction number information of the first Transaction Information to the terminal device;
The terminal device receives the first transaction number information, according to the first transaction number information and described recognizes The card factor, generates the second Transaction Information, and second Transaction Information is broadcasted to the block chain network;
The block chain network is entered to the terminal device according to first Transaction Information and second Transaction Information Row authentication, obtains authentication result.
A2, the identity identifying method based on block chain according to A1, it is characterised in that the certification factor include with The next item down is multinomial:Username information, user password information, device-fingerprint information, dynamic code and behavioural habits information.
A3, the identity identifying method based on block chain according to A1, it is characterised in that the application server is received The ID authentication request, according to the certification factor in the ID authentication request, generates the first Transaction Information and further includes:
The application server receives the ID authentication request, according to the ID authentication request, generates script information;
The application server obtains mathematics using the certification factor and the script information in the ID authentication request Transformation results;
The application server is calculated the corresponding script cryptographic Hash of the script information using hash algorithm;
The application server becomes according to the block chain address information of script information, the script cryptographic Hash and the mathematics Result is changed, the first Transaction Information is generated.
A4, the identity identifying method based on block chain according to A1, it is characterised in that will in the application server First transaction number information of the first Transaction Information is sent to before the terminal device, and methods described also includes:
The application server is calculated to first Transaction Information using hash algorithm, obtains first transaction First transaction number information of information.
A5, the identity identifying method based on block chain according to A3, it is characterised in that the terminal device receives institute The first transaction number information is stated, according to the first transaction number information and the certification factor, the second Transaction Information is generated, and Second Transaction Information is broadcasted to the block chain network and is further included:
The terminal device receives the first transaction number information, according to the first transaction number information, obtains institute State the first Transaction Information;
The terminal device obtains the script information according to first Transaction Information;
The terminal device is according to the first transaction number information, the script information, the certification factor and application The block chain address information of server, generates the second Transaction Information;
The terminal device broadcasts second Transaction Information to the block chain network.
A6, the identity identifying method based on block chain according to A5, it is characterised in that the block chain network according to First Transaction Information and second Transaction Information, carry out authentication to the terminal device, obtain authentication result and enter One step includes:
The block chain network obtains the corresponding script letter of second Transaction Information according to second Transaction Information Breath;
The block chain network is calculated to the corresponding script information of second Transaction Information using hash algorithm, is obtained To script cryptographic Hash to be certified;
The block chain network obtains the corresponding script Hash of first Transaction Information according to first Transaction Information Value;
The block chain network judges the script cryptographic Hash to be certified pin whether corresponding with first Transaction Information This cryptographic Hash is identical;
If it is corresponding with first Transaction Information that the block chain network judgement obtains the script cryptographic Hash to be certified Script cryptographic Hash is identical, then the block chain network obtains the second Transaction Information correspondence according to second Transaction Information The certification factor, and according to the corresponding certification factor of second Transaction Information and script information, obtain mathematic(al) manipulation to be certified As a result;The block chain network obtains the corresponding mathematic(al) manipulation knot of first Transaction Information according to first Transaction Information Really;The block chain network judges that the mathematic(al) manipulation result to be certified mathematics whether corresponding with first Transaction Information becomes Change result identical;If so, then the block chain network obtains the first authentication result;If it is not, then the block chain network obtains Two authentication results;
If it is not corresponding with first Transaction Information that the block chain network judgement obtains the script cryptographic Hash to be certified Script cryptographic Hash it is identical, then the block chain network obtains the second authentication result.
A7, the identity identifying method based on block chain according to any one of A1-A6, it is characterised in that in the area Block chain network carries out authentication to the terminal device, obtains according to first Transaction Information and second Transaction Information To after authentication result, methods described also includes:
The block chain network sends the authentication result to the application server.
The invention also discloses:
B8, a kind of identity authorization system based on block chain, it is characterised in that include:Terminal device, application server and Block chain network;Wherein,
The terminal device is used for:ID authentication request is sent to the application server;Wherein, the authentication please Ask including the certification factor;
The application server is used for:The ID authentication request is received, according to the certification in the ID authentication request The factor, generates the first Transaction Information;First Transaction Information is broadcasted to block chain network, and by the of the first Transaction Information One transaction number information is sent to the terminal device;
The terminal device is further used for:The first transaction number information is received, according to first transaction number Information and the certification factor, generate the second Transaction Information, and second Transaction Information are broadcasted to the block chain network;
The block chain network is used for:According to first Transaction Information and second Transaction Information, to the terminal Equipment carries out authentication, obtains authentication result.
B9, the identity authorization system based on block chain according to B8, it is characterised in that the certification factor include with The next item down is multinomial:Username information, user password information, device-fingerprint information, dynamic code and behavioural habits information.
B10, the identity authorization system based on block chain according to B8, it is characterised in that the application server bag Include:First receiver module, first processing module, the first generation module, the first broadcast module and the first sending module;
First receiver module is used for:Receive the ID authentication request;
The first processing module is used for:According to the ID authentication request, script information is generated;Recognized using the identity The certification factor and the script information in card request, obtains mathematic(al) manipulation result;The pin is calculated using hash algorithm The corresponding script cryptographic Hash of this information;
First generation module is used for:Block chain address information, the script cryptographic Hash and institute according to script information Mathematic(al) manipulation result is stated, the first Transaction Information is generated;
First broadcast module is used for:First Transaction Information is broadcasted to block chain network;
First sending module is used for:First transaction number information of the first Transaction Information is sent to the terminal and is set It is standby.
B11, the identity authorization system based on block chain according to B8, it is characterised in that the application server enters One step is used for:
First Transaction Information is calculated using hash algorithm, obtain the first transaction of first Transaction Information Number information.
B12, the identity authorization system based on block chain according to B10, it is characterised in that the terminal device bag Include:Second sending module, the second receiver module, Second processing module, the second generation module and the second broadcast module;
Second sending module is used for:The ID authentication request is sent to the application server;
Second receiver module is used for:Receive the first transaction number information;
The Second processing module is used for:According to the first transaction number information, first Transaction Information is obtained;Root According to first Transaction Information, the script information is obtained;
Second generation module is used for:According to the first transaction number information, the script information, the certification because The block chain address information of son and application server, generates the second Transaction Information;
Second broadcast module is used for:Second Transaction Information is broadcasted to the block chain network.
B13, the identity authorization system based on block chain according to B12, it is characterised in that the block chain network bag Include:3rd receiver module, the 3rd processing module, the first authentication module, fourth processing module, the second authentication module and result are generated Module;
3rd receiver module is used for:Receive first Transaction Information and second Transaction Information;
3rd processing module is used for:According to second Transaction Information, second Transaction Information is obtained corresponding Script information;The corresponding script information of second Transaction Information is calculated using hash algorithm, obtain script to be certified Cryptographic Hash;According to first Transaction Information, the corresponding script cryptographic Hash of first Transaction Information is obtained;
First authentication module is used for:Judge the script cryptographic Hash to be certified whether with first Transaction Information pair The script cryptographic Hash answered is identical;
The fourth processing module is used for:If first authentication module judge to obtain the script cryptographic Hash to be certified with The corresponding script cryptographic Hash of first Transaction Information is identical, then according to second Transaction Information, obtain second transaction The corresponding certification factor of information, and according to the corresponding certification factor of second Transaction Information and script information, obtain to be certified Mathematic(al) manipulation result;According to first Transaction Information, the corresponding mathematic(al) manipulation result of first Transaction Information is obtained;
Second authentication module is used for:Judge the mathematic(al) manipulation result to be certified whether with first Transaction Information Corresponding mathematic(al) manipulation result is identical;
The result-generation module is used for:If first authentication module judges to obtain the script cryptographic Hash to be certified not It is identical with the corresponding script cryptographic Hash of first Transaction Information, then obtain the second authentication result;If second authentication module It is identical with the corresponding mathematic(al) manipulation result of first Transaction Information that judgement obtains the mathematic(al) manipulation result to be certified, then obtain First authentication result;If second authentication module judges that obtaining the mathematic(al) manipulation result to be certified does not conclude the business with described first The corresponding mathematic(al) manipulation result of information is identical, then obtain the second authentication result.
B14, the identity authorization system based on block chain according to any one of B8-B13, it is characterised in that the area Block chain network is further used for:
The authentication result is sent to the application server.

Claims (10)

1. a kind of identity identifying method based on block chain, it is characterised in that include:
Terminal device sends ID authentication request to application server;Wherein, the ID authentication request includes the certification factor;
The application server receives the ID authentication request, according to the certification factor in the ID authentication request, generates First Transaction Information;
The application server broadcasts first Transaction Information to block chain network;
The application server sends the first transaction number information of the first Transaction Information to the terminal device;
The terminal device receives the first transaction number information, according to the first transaction number information and the certification because Son, generates the second Transaction Information, and second Transaction Information is broadcasted to the block chain network;
The block chain network carries out body to the terminal device according to first Transaction Information and second Transaction Information Part certification, obtains authentication result.
2. the identity identifying method based on block chain according to claim 1, it is characterised in that the certification factor includes One or more below:Username information, user password information, device-fingerprint information, dynamic code and behavioural habits information.
3. the identity identifying method based on block chain according to claim 1, it is characterised in that the application server connects The ID authentication request is received, according to the certification factor in the ID authentication request, the first Transaction Information is generated and is further wrapped Include:
The application server receives the ID authentication request, according to the ID authentication request, generates script information;
The application server obtains mathematic(al) manipulation using the certification factor and the script information in the ID authentication request As a result;
The application server is calculated the corresponding script cryptographic Hash of the script information using hash algorithm;
The application server is according to the block chain address information of script information, the script cryptographic Hash and mathematic(al) manipulation knot Really, generate the first Transaction Information.
4. the identity identifying method based on block chain according to claim 1, it is characterised in that in the application server First transaction number information of the first Transaction Information is sent to before the terminal device, methods described also includes:
The application server is calculated to first Transaction Information using hash algorithm, obtains first Transaction Information The first transaction number information.
5. the identity identifying method based on block chain according to claim 3, it is characterised in that the terminal device is received The first transaction number information, according to the first transaction number information and the certification factor, generates the second Transaction Information, And second Transaction Information is broadcasted to the block chain network and further include:
The terminal device receives the first transaction number information, according to the first transaction number information, obtains described the One Transaction Information;
The terminal device obtains the script information according to first Transaction Information;
The terminal device is according to the first transaction number information, the script information, the certification factor and application service The block chain address information of device, generates the second Transaction Information;
The terminal device broadcasts second Transaction Information to the block chain network.
6. the identity identifying method based on block chain according to claim 5, it is characterised in that the block chain network root According to first Transaction Information and second Transaction Information, authentication is carried out to the terminal device, authentication result is obtained Further include:
The block chain network obtains the corresponding script information of second Transaction Information according to second Transaction Information;
The block chain network is calculated to the corresponding script information of second Transaction Information using hash algorithm, is treated Authentication script cryptographic Hash;
The block chain network obtains the corresponding script cryptographic Hash of first Transaction Information according to first Transaction Information;
The block chain network judges that the script cryptographic Hash to be certified script whether corresponding with first Transaction Information is breathed out Uncommon value is identical;
If the block chain network judges to obtain the script cryptographic Hash to be certified script corresponding with first Transaction Information Cryptographic Hash is identical, then the block chain network is according to second Transaction Information, obtains that second Transaction Information is corresponding to be recognized The card factor, and according to the corresponding certification factor of second Transaction Information and script information, obtain mathematic(al) manipulation result to be certified; The block chain network obtains the corresponding mathematic(al) manipulation result of first Transaction Information according to first Transaction Information;Institute State block chain network and judge the mathematic(al) manipulation result to be certified mathematic(al) manipulation knot whether corresponding with first Transaction Information It is really identical;If so, then the block chain network obtains the first authentication result;If it is not, then the block chain network obtains second and recognizes Card result;
If the block chain network judges to obtain the script cryptographic Hash to be certified pin not corresponding with first Transaction Information This cryptographic Hash is identical, then the block chain network obtains the second authentication result.
7. the identity identifying method based on block chain according to any one of claim 1-6, it is characterised in that in the area Block chain network carries out authentication to the terminal device, obtains according to first Transaction Information and second Transaction Information To after authentication result, methods described also includes:
The block chain network sends the authentication result to the application server.
8. a kind of identity authorization system based on block chain, it is characterised in that include:Terminal device, application server and block Chain network;Wherein,
The terminal device is used for:ID authentication request is sent to the application server;Wherein, the ID authentication request bag Include the certification factor;
The application server is used for:The ID authentication request is received, according to the certification factor in the ID authentication request, Generate the first Transaction Information;First Transaction Information is broadcasted to block chain network, and the first of the first Transaction Information is handed over Easily number information is sent to the terminal device;
The terminal device is further used for:The first transaction number information is received, according to the first transaction number information With the certification factor, the second Transaction Information is generated, and second Transaction Information is broadcasted to the block chain network;
The block chain network is used for:According to first Transaction Information and second Transaction Information, to the terminal device Authentication is carried out, authentication result is obtained.
9. the identity authorization system based on block chain according to claim 8, it is characterised in that the certification factor includes One or more below:Username information, user password information, device-fingerprint information, dynamic code and behavioural habits information.
10. the identity authorization system based on block chain according to claim 8, it is characterised in that the application server Including:First receiver module, first processing module, the first generation module, the first broadcast module and the first sending module;
First receiver module is used for:Receive the ID authentication request;
The first processing module is used for:According to the ID authentication request, script information is generated;Please using the authentication The certification factor and the script information in asking, obtains mathematic(al) manipulation result;The script letter is calculated using hash algorithm Cease corresponding script cryptographic Hash;
First generation module is used for:Block chain address information, the script cryptographic Hash and the number according to script information Transformation results are learned, the first Transaction Information is generated;
First broadcast module is used for:First Transaction Information is broadcasted to block chain network;
First sending module is used for:First transaction number information of the first Transaction Information is sent to the terminal device.
CN201611094966.1A 2016-12-02 2016-12-02 Identity authentication method and system based on block chain Active CN106534160B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611094966.1A CN106534160B (en) 2016-12-02 2016-12-02 Identity authentication method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611094966.1A CN106534160B (en) 2016-12-02 2016-12-02 Identity authentication method and system based on block chain

Publications (2)

Publication Number Publication Date
CN106534160A true CN106534160A (en) 2017-03-22
CN106534160B CN106534160B (en) 2020-02-21

Family

ID=58354688

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611094966.1A Active CN106534160B (en) 2016-12-02 2016-12-02 Identity authentication method and system based on block chain

Country Status (1)

Country Link
CN (1) CN106534160B (en)

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147652A (en) * 2017-05-18 2017-09-08 电子科技大学 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain
CN107171812A (en) * 2017-07-18 2017-09-15 光载无限(北京)科技有限公司 It is a kind of based on block chain without key signature infrastructure construction method
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107332826A (en) * 2017-06-09 2017-11-07 中国联合网络通信集团有限公司 The communication means and device of block chain agent node
CN107454110A (en) * 2017-09-26 2017-12-08 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN107465698A (en) * 2017-09-26 2017-12-12 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN107493162A (en) * 2017-07-25 2017-12-19 中国联合网络通信集团有限公司 The implementation method and device of block chain node
CN107528855A (en) * 2017-09-26 2017-12-29 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN107623865A (en) * 2017-09-26 2018-01-23 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN107679149A (en) * 2017-09-26 2018-02-09 武汉斗鱼网络科技有限公司 A kind of data processing method and server
CN107682328A (en) * 2017-09-26 2018-02-09 武汉斗鱼网络科技有限公司 A kind of data verification method and client
CN108009825A (en) * 2017-11-29 2018-05-08 江苏安凰领御科技有限公司 A kind of identity management system and method based on block chain technology
CN108320173A (en) * 2017-12-12 2018-07-24 北京瑞卓喜投科技发展有限公司 Integration processing method and device based on block chain technology
CN108540553A (en) * 2018-04-08 2018-09-14 中国联合网络通信集团有限公司 Internet of Things data management method, platform and equipment
CN108809953A (en) * 2018-05-22 2018-11-13 飞天诚信科技股份有限公司 A kind of method and device of the anonymous Identity certification based on block chain
CN108882005A (en) * 2018-04-13 2018-11-23 武汉斗鱼网络科技有限公司 A kind of barrage verification method, computer equipment and storage medium
CN108875386A (en) * 2017-05-16 2018-11-23 江峰 A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism
CN108924089A (en) * 2018-05-29 2018-11-30 武汉斗鱼网络科技有限公司 A kind of client device recognition methods, device and client device
CN109194651A (en) * 2018-09-04 2019-01-11 深信服科技股份有限公司 A kind of identity identifying method, device, equipment and storage medium
CN109302415A (en) * 2018-11-09 2019-02-01 四川虹微技术有限公司 A kind of authentication method, block chain node and storage medium
CN109379357A (en) * 2018-10-18 2019-02-22 全链通有限公司 The method and device for realizing the certification of block chain system of real name is assured based on social relationships
CN109409134A (en) * 2018-09-29 2019-03-01 浙江口碑网络技术有限公司 The monitoring method and device of transaction data, storage medium and electronic equipment
CN109493202A (en) * 2018-09-27 2019-03-19 深圳壹账通智能科技有限公司 Block chain account checking method, device, system, equipment and readable storage medium storing program for executing
WO2019101156A1 (en) * 2017-11-27 2019-05-31 华为技术有限公司 Device control method, and related device for same
CN110263579A (en) * 2018-11-16 2019-09-20 腾讯科技(深圳)有限公司 A kind of data processing method, system and relevant device
WO2019101225A3 (en) * 2019-02-28 2019-12-26 Alibaba Group Holding Limited System and method for blockchain-based data management
WO2020048241A1 (en) * 2018-09-04 2020-03-12 阿里巴巴集团控股有限公司 Blockchain cross-chain authentication method and system, and server and readable storage medium
CN111193736A (en) * 2019-12-30 2020-05-22 江苏恒宝智能系统技术有限公司 Information authentication method, device, system and storage medium
CN111833976A (en) * 2020-07-02 2020-10-27 中南大学湘雅医院 Chronic arthritis patient follow-up management system based on block chain
CN112602106A (en) * 2018-08-23 2021-04-02 埃克索迪翁有限公司 Block chain-based article generation method
CN112637184A (en) * 2020-12-18 2021-04-09 珠海格力电器股份有限公司 Security authentication system, method, apparatus, device, and computer-readable storage medium
CN112685721A (en) * 2020-12-23 2021-04-20 深圳供电局有限公司 Electric energy meter authority authentication method and device, computer equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150244690A1 (en) * 2012-11-09 2015-08-27 Ent Technologies, Inc. Generalized entity network translation (gent)
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN105959307A (en) * 2016-06-30 2016-09-21 中国科学院计算技术研究所 Existence certification and authentication service method and system based on block chain technology
CN105976232A (en) * 2016-06-24 2016-09-28 深圳前海微众银行股份有限公司 Asset transaction method and device
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106096444A (en) * 2016-06-12 2016-11-09 杨鹏 A kind of identification based on bio information and social information's recording method and system
WO2016179334A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. Identity management service using a block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150244690A1 (en) * 2012-11-09 2015-08-27 Ent Technologies, Inc. Generalized entity network translation (gent)
WO2016179334A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. Identity management service using a block chain
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106096444A (en) * 2016-06-12 2016-11-09 杨鹏 A kind of identification based on bio information and social information's recording method and system
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN105976232A (en) * 2016-06-24 2016-09-28 深圳前海微众银行股份有限公司 Asset transaction method and device
CN105959307A (en) * 2016-06-30 2016-09-21 中国科学院计算技术研究所 Existence certification and authentication service method and system based on block chain technology

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108875386A (en) * 2017-05-16 2018-11-23 江峰 A kind of multicenter finite field block catenary system framework with block issue mechanism and application demand issue mechanism
CN107147652B (en) * 2017-05-18 2019-08-09 电子科技大学 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain
CN107147652A (en) * 2017-05-18 2017-09-08 电子科技大学 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain
CN107332826A (en) * 2017-06-09 2017-11-07 中国联合网络通信集团有限公司 The communication means and device of block chain agent node
CN107332826B (en) * 2017-06-09 2019-12-03 中国联合网络通信集团有限公司 The communication means and device of block chain agent node
CN107171812A (en) * 2017-07-18 2017-09-15 光载无限(北京)科技有限公司 It is a kind of based on block chain without key signature infrastructure construction method
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107493162A (en) * 2017-07-25 2017-12-19 中国联合网络通信集团有限公司 The implementation method and device of block chain node
CN107682328A (en) * 2017-09-26 2018-02-09 武汉斗鱼网络科技有限公司 A kind of data verification method and client
CN107465698A (en) * 2017-09-26 2017-12-12 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN107679149A (en) * 2017-09-26 2018-02-09 武汉斗鱼网络科技有限公司 A kind of data processing method and server
CN107454110A (en) * 2017-09-26 2017-12-08 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN107623865A (en) * 2017-09-26 2018-01-23 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN107528855A (en) * 2017-09-26 2017-12-29 武汉斗鱼网络科技有限公司 A kind of data verification method and server
WO2019101156A1 (en) * 2017-11-27 2019-05-31 华为技术有限公司 Device control method, and related device for same
CN109840766A (en) * 2017-11-27 2019-06-04 华为终端有限公司 A kind of apparatus control method and its relevant device
CN109840766B (en) * 2017-11-27 2024-03-29 华为终端有限公司 Equipment control method and related equipment thereof
CN108009825A (en) * 2017-11-29 2018-05-08 江苏安凰领御科技有限公司 A kind of identity management system and method based on block chain technology
CN108320173A (en) * 2017-12-12 2018-07-24 北京瑞卓喜投科技发展有限公司 Integration processing method and device based on block chain technology
CN108540553B (en) * 2018-04-08 2019-08-13 中国联合网络通信集团有限公司 Internet of things data management method, platform and equipment
CN108540553A (en) * 2018-04-08 2018-09-14 中国联合网络通信集团有限公司 Internet of Things data management method, platform and equipment
CN108882005A (en) * 2018-04-13 2018-11-23 武汉斗鱼网络科技有限公司 A kind of barrage verification method, computer equipment and storage medium
CN108809953B (en) * 2018-05-22 2020-09-01 飞天诚信科技股份有限公司 Anonymous identity authentication method and device based on block chain
CN108809953A (en) * 2018-05-22 2018-11-13 飞天诚信科技股份有限公司 A kind of method and device of the anonymous Identity certification based on block chain
CN108924089B (en) * 2018-05-29 2021-11-09 武汉斗鱼网络科技有限公司 Client device identification method and device and client device
CN108924089A (en) * 2018-05-29 2018-11-30 武汉斗鱼网络科技有限公司 A kind of client device recognition methods, device and client device
CN112602106A (en) * 2018-08-23 2021-04-02 埃克索迪翁有限公司 Block chain-based article generation method
CN109194651A (en) * 2018-09-04 2019-01-11 深信服科技股份有限公司 A kind of identity identifying method, device, equipment and storage medium
WO2020048241A1 (en) * 2018-09-04 2020-03-12 阿里巴巴集团控股有限公司 Blockchain cross-chain authentication method and system, and server and readable storage medium
US10979231B2 (en) 2018-09-04 2021-04-13 Advanced New Technologies Co., Ltd. Cross-chain authentication method, system, server, and computer-readable storage medium
TWI707244B (en) * 2018-09-04 2020-10-11 香港商阿里巴巴集團服務有限公司 Block chain cross-chain authentication method, system, server and readable storage medium
CN109493202A (en) * 2018-09-27 2019-03-19 深圳壹账通智能科技有限公司 Block chain account checking method, device, system, equipment and readable storage medium storing program for executing
CN109409134B (en) * 2018-09-29 2021-08-31 浙江口碑网络技术有限公司 Transaction data monitoring method and device, storage medium and electronic equipment
CN109409134A (en) * 2018-09-29 2019-03-01 浙江口碑网络技术有限公司 The monitoring method and device of transaction data, storage medium and electronic equipment
CN109379357B (en) * 2018-10-18 2021-01-08 全链通有限公司 Method and device for realizing block chain real-name system authentication based on social relationship guarantee
CN109379357A (en) * 2018-10-18 2019-02-22 全链通有限公司 The method and device for realizing the certification of block chain system of real name is assured based on social relationships
CN109302415B (en) * 2018-11-09 2019-11-01 四川虹微技术有限公司 A kind of authentication method, block chain node and storage medium
CN109302415A (en) * 2018-11-09 2019-02-01 四川虹微技术有限公司 A kind of authentication method, block chain node and storage medium
CN110263579A (en) * 2018-11-16 2019-09-20 腾讯科技(深圳)有限公司 A kind of data processing method, system and relevant device
WO2019101225A3 (en) * 2019-02-28 2019-12-26 Alibaba Group Holding Limited System and method for blockchain-based data management
US11258778B2 (en) 2019-02-28 2022-02-22 Advanced New Technologies Co., Ltd. System and method for blockchain-based data management
CN111193736A (en) * 2019-12-30 2020-05-22 江苏恒宝智能系统技术有限公司 Information authentication method, device, system and storage medium
CN111833976A (en) * 2020-07-02 2020-10-27 中南大学湘雅医院 Chronic arthritis patient follow-up management system based on block chain
CN112637184A (en) * 2020-12-18 2021-04-09 珠海格力电器股份有限公司 Security authentication system, method, apparatus, device, and computer-readable storage medium
CN112637184B (en) * 2020-12-18 2022-05-17 珠海格力电器股份有限公司 Security authentication system, method, apparatus, device, and computer-readable storage medium
CN112685721A (en) * 2020-12-23 2021-04-20 深圳供电局有限公司 Electric energy meter authority authentication method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN106534160B (en) 2020-02-21

Similar Documents

Publication Publication Date Title
CN106534160A (en) Identity authentication method and system based on block chain
CN109714167B (en) Identity authentication and key agreement method and equipment suitable for mobile application signature
CN111429254B (en) Business data processing method and device and readable storage medium
CN112019493B (en) Identity authentication method, identity authentication device, computer equipment and medium
CN107483419B (en) Method, device and system for authenticating access terminal by server, server and computer readable storage medium
CN109309685B (en) Information transmission method and device
CN101221641B (en) On-line trading method and its safety affirmation equipment
US9124571B1 (en) Network authentication method for secure user identity verification
CN112202705A (en) Digital signature verification generation and verification method and system
WO2014014793A1 (en) Anti-cloning system and method
CN106779716A (en) Authentication method, apparatus and system based on block chain account address
CN106548338B (en) Method and system for transferring resource numerical value
CN111131300B (en) Communication method, terminal and server
CN110096894B (en) Data anonymous sharing system and method based on block chain
CN106411950A (en) Block-chain transaction ID based authentication method, device and system
CN108322416A (en) A kind of safety certification implementation method, apparatus and system
CN106209793A (en) A kind of auth method and checking system
CN112055019A (en) Method for establishing communication channel and user terminal
CN115242553B (en) Data exchange method and system supporting safe multi-party calculation
CN113569263A (en) Secure processing method and device for cross-private-domain data and electronic equipment
KR102157695B1 (en) Method for Establishing Anonymous Digital Identity
KR101856530B1 (en) Encryption system providing user cognition-based encryption protocol and method for processing on-line settlement, security apparatus and transaction approval server using thereof
CN116647345A (en) Method and device for generating permission token, storage medium and computer equipment
CN116707983A (en) Authorization authentication method and device, access authentication method and device, equipment and medium
CN109145543B (en) Identity authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant