CN107147652B - A kind of safety fusion authentication method of the polymorphic identity of user based on block chain - Google Patents

A kind of safety fusion authentication method of the polymorphic identity of user based on block chain Download PDF

Info

Publication number
CN107147652B
CN107147652B CN201710352678.XA CN201710352678A CN107147652B CN 107147652 B CN107147652 B CN 107147652B CN 201710352678 A CN201710352678 A CN 201710352678A CN 107147652 B CN107147652 B CN 107147652B
Authority
CN
China
Prior art keywords
identity
user
identity characteristic
server
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710352678.XA
Other languages
Chinese (zh)
Other versions
CN107147652A (en
Inventor
黄可
张小松
夏琦
陈瑞东
刘小垒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201710352678.XA priority Critical patent/CN107147652B/en
Publication of CN107147652A publication Critical patent/CN107147652A/en
Application granted granted Critical
Publication of CN107147652B publication Critical patent/CN107147652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of safety fusion authentication methods of polymorphic identity of the user based on block chain, comprising steps of initialization, typing identity information, identity characteristic are extracted, fusion feature matching.The invention is characterized in that: in conjunction with polymorphic identity fusion authentication method, block chain technology, public encryption system, a set of complete mechanism is provided, to realize safe and efficient, convenient and reliable authentication.Wherein, user can carry out typing with self selective identity information, server carries out feature extraction to typing information, and pass through the record on decryption block chain, fusion matching is carried out to identity information, finally judge whether user obtains logging in authorization, scheme proposed by the present invention can be realized safe and efficient, convenient and reliable authentication.

Description

A kind of safety fusion authentication method of the polymorphic identity of user based on block chain
Technical field
The present invention relates to identity identification technical field more particularly to a kind of peaces of the polymorphic identity of user based on block chain Full fusion authentication method.
Background technique
Currently, the identity identifying technology bring limitation of single security mechanism is also more and more obvious, multiple safe mechanism Integration application is becoming new trend.This is because the authentication techniques (such as account number cipher login) based on monofactor, hold very much Easily there is the risk for being counterfeited, being stolen, the safety of system is not only improved using the maltilevel security factor, certification can also be improved Reliability.Even if user lacks the element of a certain authentication, he still can be logged in by other identity informations.This Outside, lack a set of perfect mechanism at present, user is allowed to be free to select the identity information of different shape for verifying, and Above- mentioned information are integrated, analyze and are matched by unified model storage and peace, intelligentized algorithm.Most of all, at present There are great security risks at a certain center that is stored in of identity characteristic information centralization.Once data center is broken, user Identity information can be compromised and destroy, this is a kind of catastrophic consequence.
Block chain is a kind of disclosure, transparent national consensus, the novel foundation facility controlled and shared altogether, has distributed number According to storage, it decentralization, can not distort, can be traced, the features such as trusted.Although the transparency and subscriber identity information of block chain The special conflict mutually of privacy, but we can realize subscriber identity information in conjunction with public encryption system and block chain technology Safety and reliable memory.By being recorded in block chain after encrypting subscriber identity information, Encryption Algorithm can search in conjunction with public key, We can be realized the safe and efficient and reliable storage of subscriber identity information and use.
Summary of the invention
It is an object of the invention to: it is single for the elements of certificate of above-mentioned existing monofactor authentication techniques, it is easy to go out Now personation, user information are stolen, and so as to cause the low problem of the safety in user authentication, reliability, the present invention provides one The safety fusion authentication method of user polymorphic identity of the kind based on block chain.
The technical solution adopted by the invention is as follows:
A kind of safety fusion authentication method of the polymorphic identity of user based on block chain, comprising the following steps:
(1) it initializes, generates the public key and private key of server and trusted node, generate the open parameter and service of server The public algorithm of device, wherein open parameter includes: the quantity (m) of supported different shape identity, each identity form The quantity (n) of characteristic component, identity characteristic weight accounting, similarity threshold etc., public algorithm include: that hash function, matrix become Scaling method, identity characteristic extraction algorithm, identity characteristic matching algorithm etc., concrete meaning is described during narration;
(2) with the identity information of user orientation server input user account and different shape, in the identity information of different shape Including user identity title;
Then the identity information for the different shape that server inputs user carries out feature extraction respectively, obtains identity spy The each identity characteristic extracted, is calculated the identity characteristic vector of uniform length by sign by disclosed hash function, then Matrixing is carried out to identity characteristic vector by disclosed matrixing algorithm, identity characteristic matrix is obtained, it is special to calculate identity Levy the root of matrix;
(3) it is based on typical public key encryption algorithm, the identity characteristic matrix in step (2) is encrypted, identity is obtained Eigenmatrix ciphertext;
It can search for Encryption Algorithm based on typical public key, user identity name be referred to as object, uses the public key of server User identity title is encrypted and obtains searchable cryptograph;
(4) server is respectively to the root of user account, identity characteristic matrix, identity characteristic matrix ciphertext and searchable cryptograph Private key signature is carried out, and is sent to trusted node;
(5) trusted node is retrieved on block chain according to user account, if user first logs into, trusted node is user Issue public key, create the identity information of original block record user's different shape and by user account, client public key, timestamp, Original block is written in root, identity characteristic matrix ciphertext and the searchable cryptograph of identity characteristic matrix, and broadcasts in a network;It is first It is special to obtain original identity after original identity information transformation for the identity information of the different shape of secondary login user, that is, original identity information Levy matrix, ciphertext, that is, original identity characteristic matrix ciphertext of original identity characteristic matrix;Otherwise, step (6) are executed;
(6) fusion feature matching is carried out to the identity information of user's different shape and similarity judges.
A kind of safety fusion authentication method of the polymorphic identity of user based on block chain, in step (1), generates Open parameter include: the different shape identity that identity characteristic weight accounting, similarity threshold, server are supported quantity, The quantity of the characteristic component of each identity form, the public algorithm of generation include: disclosed hash algorithm, identity characteristic extraction Algorithm, identity characteristic matching algorithm.
A kind of safety fusion authentication method of the polymorphic identity of the user based on block chain, in step (2), feature It extracts and matrixing specific steps are as follows:
(21) server for user input different shape identity information, according to step (1) generate public algorithm, Identity characteristic is extracted, each identity characteristic extracted is calculated using disclosed hash algorithm, obtains identity calculated The corresponding feature vector of feature, the corresponding feature vector of identity characteristic calculated are made of n component;
(22) feature vector for the unified format that server obtains step (21) is according to disclosed matrixing algorithm groups At eigenmatrix.
A kind of polymorphic identity of user based on block chain safety fusion authentication method, step (6) it is specific Step are as follows:
(61) original identity characteristic matrix ciphertext is sent to server by trusted node, oneself private key solution of server The original identity characteristic matrix of user is obtained after close, and extracts the original body of user one by one from the original identity characteristic matrix of user Feature vector A1、…、Am;Wherein, m represents the quantity of user's different shape identity information;
(62) server extracts identity characteristic vector A ' from the identity information of user's typing1、…、A′m, wherein m is represented The quantity of user's different shape identity information;
(63) it is special to compare each of step (62) identity according to disclosed Feature Correspondence Algorithm Match () for server The similarity of each original identity characteristic vector, obtains the comparison of each identity characteristic vector in sign vector, step (61) Similarity, the alignment similarity calculation formula of each identity characteristic vector are as follows:
r1=Match (A1、A′1)、…、rm=Match (Am、A′m);
Wherein r1…rmFor the alignment similarity of each identity characteristic vector;
(64) server calculates all identity characteristics and merges matching similarity, fusion feature matching similarity calculation formula Are as follows:
R=ω1r1+…+ωnrm,
Wherein, ω1,…,ωnRepresent the weight accounting of different shape identity characteristic;
(65) server, if R > V, authenticates success by R compared with given similarity threshold V, and authorization logs in, otherwise, It returns to failure identifier and terminates.
In conclusion by adopting the above-described technical solution, the beneficial effects of the present invention are:
One, it in the solution of the present invention, is disclosed based on block chain, transparent national consensus, the novel foundation controlled and shared altogether Facility has many characteristics, such as Distributed Storage, decentralization, can not distort, can be traced, trusted, by by user identity Information encryption after be recorded in block chain, can search for Encryption Algorithm in conjunction with public key, realize subscriber identity information it is safe and efficient and Reliable storage and use.
Two, due to being authenticated using the identity information of variform to client, do not have to worry a certain identity information Missing and caused by the problem of can not authenticating.
Three, due in the present solution, can recorde multiple and different form identity informations of the same user in block chain, because This user can freely select the identity information of different shape for verifying, and store and pacify, intelligence by unified model The algorithm of energyization is integrated above- mentioned information, analyzes and is matched.
Detailed description of the invention
Fig. 1 is a kind of flow chart of the safety fusion authentication method of the polymorphic identity of user based on block chain of the invention;
Fig. 2 is the explanatory diagram extracted for identity characteristic in the present invention with eigenmatrix;
Fig. 3 is that this is the block link composition that identity characteristic information is recorded in invention;
Specific embodiment
All features disclosed in this specification can be with any other than mutually exclusive feature and/or step Mode combines.
It elaborates below with reference to Fig. 1, Fig. 2, Fig. 3 to the present invention.
A kind of safety fusion authentication method of the polymorphic identity of user based on block chain, includes the following steps:
Initialization generates the public key and private key of server and trusted node, generates the open parameter and server of server Public algorithm, wherein disclosing parameter includes: identity characteristic weight accounting, similarity threshold, the different shape identity supported Quantity, each identity form characteristic component quantity, the public algorithm of generation includes: disclosed hash algorithm, identity Feature extraction algorithm, identity characteristic matching algorithm.Similarity threshold needs similarity to be achieved for determining that user logins successfully Threshold value, wherein identity characteristic weight accounting is different shape identity information percentage in verification process, can be according to reality Border application environment is freely set;
User by secure way (include: safe lane, safe equipment, such as: POS machine) by user account and (one Kind or variform) subscriber identity information inputs to server, subscriber identity information includes but is not limited to: password, fingerprint, rainbow Film, face, sound source.
The identity information for the different shape that server is inputted for user, respectively according to corresponding public algorithm, to difference The identity information of form carries out identity characteristic extraction, and the identity characteristic that the identity information of every kind of different shape is extracted according to Disclosed hash algorithm unified calculation, obtains the identity characteristic vector being made of n characteristic component;The identity information of different shape In include user identity title;
For example, for facial image identity information, the coordinate of record human face distribution, and be calculated by n component Identity characteristic vector is formed, such as: A1={ a1,1,…,a1,n, here, a1,iRepresent the feature point in a face feature vector Amount;
For example, for ordinary cryptographic, according to disclosed hash algorithm obtain from n password component form try feature to Amount, such as: A2={ a2,1,…,a2,n, in addition, for the identity information of other different shapes, such as iris, fingerprint, method class Seemingly;
These feature vectors are obtained identity characteristic matrix according to disclosed matrixing algorithm by server, and are calculated current The root of identity characteristic matrix, identity characteristic matrix are the matrixes being made of the multiple identity characteristic vectors of user;
It should be pointed out that user is set in advance with m different shape by open parameter in initialization procedure in we The identity of identity, each form is made of an identity characteristic vector with n characteristic component, we can simply recognize Are as follows: identity characteristic matrix is the matrix of a m × n, and wherein each element represents a kind of corresponding feature of form identity information Component;
Then, server is based on public key encryption algorithm and obtains identity with the public key encryption user identity eigenmatrix of oneself Eigenmatrix ciphertext;Public key encryption algorithm includes but is not limited to famous RSA public key encryption algorithm.RSA public key encryption algorithm Feature is: sender is encrypted using the public key of recipient, and ciphertext is transmitted in open channel, and recipient is after receiving ciphertext It is decrypted using the key of oneself.
Server is based on public key again can search for Encryption Algorithm, and user identity name is referred to as keyword, uses the public affairs of oneself Key encrypts it and obtains keyword searchable cryptograph;It includes but is not limited to Boneh et al. that public key, which can search for Encryption Algorithm, The PEKS public key of proposition can search for Encryption Algorithm.It is that user identity name is referred to as object that PEKS public key, which can search for Encryption Algorithm, User identity title is encrypted using the public key of oneself and obtains searchable cryptograph;Here, public key can search for Encryption Algorithm The characteristics of be: will after the keyword public key encryption of recipient and ciphertext send jointly to server storage, recipient use from Oneself public key and keyword generates trapdoor and is sent to server, and server is matched to the ciphertext comprising the keyword by trapdoor, And send back recipient;
Server by user account, the root of current identity characteristic matrix, identity characteristic matrix ciphertext and can search for close respectively Text sends jointly to trusted node after carrying out private key signature, is responsible for being recorded in block chain by trusted node;
It should be noted that we are recorded on block chain after being encrypted using public key algorithm to user identity eigenmatrix, It is to protect the identity information of user's various forms to mustn't go to leakage, and can search for Encryption Algorithm using public key is in order to using Identifier of the ciphertext of family identity name as user characteristics matrix ciphertext, in order to inquire, it is obvious that by user identity title Plaintext be recorded on block chain and be easy leakage privacy, and Encryption Algorithm can search for using public key, can allow trusted node and its What in the case where his all users are in plain text do not know user identity title, safety and efficient inquiry and transmission log Identity information on block chain, thus one, subscriber identity information has obtained comprehensive secret protection, while again convenient for can Retrieval;
Then, the identity characteristic matrix ciphertext that trusted node is sent according to server, holds according to the different situations of user Row is as follows:
Trusted node is retrieved on block chain according to user account, if the user logs in for the first time, i.e., there is no appoint What records the block chain of the user identity feature, and trusted node is that user issues public key, while creating original block (first first A block), for recording the initial informations such as user account, creation time, then, trusted node is successively polymorphic by user user Identity information is recorded in a block chain, and by user account, client public key, the root of identity characteristic matrix, timestamp, identity Original block is written in eigenmatrix ciphertext and searchable cryptograph, and broadcasts in a network;First log into the different shape of user Identity information, that is, original identity information, obtain original identity characteristic matrix, original identity characteristic after the transformation of original identity information The ciphertext of matrix, that is, original identity characteristic matrix ciphertext;
If user is chartered user, the block chain for recording its identity characteristic is had existed.Server It can search for Encryption Algorithm based on public key, with oneself private key and user identity title, generation can search for trapdoor, and being sent to can Believe node, trusted node is retrieved according to trapdoor, if retrieval is created less than the block comprising the new user identity title is arrived A block is built, and user account, client public key, the root of newest identity characteristic matrix, timestamp, newest identity is special The searchable cryptograph of sign matrix ciphertext and identity name is written in new block, and broadcasts in a network;
Otherwise, the block comprising the user identity name information that trusted node retrieves, and will be recorded on the block Newest identity characteristic matrix ciphertext returns to server, and server decrypts matrix ciphertext with the private key of oneself, and therefrom mentions Take out the original identity characteristic vector of user's different shape: A1、…、Am, original identity characteristic, that is, user steps on for the first time here The identity characteristic of typing when land;
Server extracts identity characteristic vector A ' from the identity information of user's typing1、…、A′m, server is according to open Feature Correspondence Algorithm Match (), input the identity characteristic vector A ' extracted respectively1、…、A′mWith original identity vector A1、…、Am, m represents the quantity of different shape identity here, the alignment similarity of each identity characteristic is finally calculated, often The calculating formula of similarity of one identity characteristic is as follows:
r1=Match (A1、A′1)、…、rm=Match (Am、A′m);
Wherein, r1…rmFor the alignment similarity of each identity characteristic.
Finally, for server with regard to disclosed Feature Correspondence Algorithm, the identity that the trusted node after user and decryption is sent back to is special Sign is compared, and matching similarity is calculated:
R=ω1r1+…+ωnrm,
Wherein, ω1,…,ωnRepresent the weight accounting (ω of respective identity feature1,…,ωnIt is set according to open parameter It is fixed), R compared with similarity threshold V, if R > V, is authenticated success by server, and authorization logs in, and otherwise, returns to failure identifier And terminate.
We are devised a set of by the fusion authentication method, block chain technology and public key encryption algorithm of polymorphic identity Complete system, to realize safe and efficient, convenient and reliable user identity authentication.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Belong to those skilled in the art in the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of, should all cover Within protection scope of the present invention.

Claims (3)

1. a kind of safety fusion authentication method of the polymorphic identity of user based on block chain, which is characterized in that including following step It is rapid:
(1) it initializes, generates the public key and private key of server and trusted node, generate the open parameter and server of server Public algorithm;
(2) identity information of user account and different shape is inputted with user orientation server, includes in the identity information of different shape User identity title;
Then the identity information for the different shape that server inputs user carries out feature extraction respectively, obtains identity characteristic, will The identity characteristic vector of uniform length is calculated by disclosed hash function for each identity characteristic extracted, then passes through public affairs The matrixing algorithm opened carries out matrixing to identity characteristic vector, obtains identity characteristic matrix, calculates identity characteristic matrix Root;
(3) it is based on public key encryption algorithm, the identity characteristic matrix in step (2) is encrypted, it is close to obtain identity characteristic matrix Text;
It can search for Encryption Algorithm based on public key, user identity name be referred to as object, using the public key of server to user identity Title is encrypted and obtains searchable cryptograph;
(4) server respectively carries out the root of user account, identity characteristic matrix, identity characteristic matrix ciphertext and searchable cryptograph Private key signature, and it is sent to trusted node;
(5) trusted node is retrieved on block chain according to user account, if user first logs into, trusted node is issued for user Public key creates the identity information of original block record user's different shape and by user account, client public key, timestamp, identity Original block is written in root, identity characteristic matrix ciphertext and the searchable cryptograph of eigenmatrix, and broadcasts in a network;It steps on for the first time The i.e. original identity information of identity information of the different shape at family is employed, obtains original identity characteristic square after original identity information transformation Battle array, ciphertext, that is, original identity characteristic matrix ciphertext of original identity characteristic matrix;Otherwise, step (6) are executed;
(6) fusion feature matching is carried out to the identity information of user's different shape and similarity judges;
The specific steps of step (6) are as follows:
(61) original identity characteristic matrix ciphertext is sent to server by trusted node, after server is decrypted with the private key of oneself The original identity characteristic matrix of user is obtained, and extracts the original identity spy of user one by one from the original identity characteristic matrix of user Levy vector A1、…、Am;Wherein, m represents the quantity of user's different shape identity information;
(62) server extracts identity characteristic vector A ' from the identity information of user's typing1、…、A′m, wherein m represents user The quantity of different shape identity information;
(63) server is according to disclosed Feature Correspondence Algorithm Match (), compare each of step (62) identity characteristic to The similarity of each original identity characteristic vector, the comparison for obtaining each identity characteristic vector are similar in amount, step (61) Degree, the alignment similarity calculation formula of each identity characteristic vector are as follows:
r1=Match (A1、A′1)、…、rm=Match (Am、A′m);
Wherein r1…rmFor the alignment similarity of each identity characteristic vector;
(64) server calculates all identity characteristics and merges matching similarity, fusion feature matching similarity calculation formula are as follows:
R=ω1r1+…+ωnrm,
Wherein, ω1,…,ωnRepresent the weight accounting of different shape identity characteristic;
(65) server, if R > V, authenticates success by R compared with given similarity threshold V, and authorization logs in, and otherwise, returns Failure identifier simultaneously terminates.
2. a kind of safety fusion authentication method of the polymorphic identity of user based on block chain according to claim 1, It is characterized in that, in step (1), the open parameter of generation includes: that identity characteristic weight accounting, similarity threshold, server are propped up The quantity of the characteristic component of the quantity for the different shape identity held, each identity form, the public algorithm of generation include: disclosure Hash algorithm, identity characteristic extraction algorithm, identity characteristic matching algorithm.
3. a kind of safety fusion authentication method of the polymorphic identity of user based on block chain as claimed in claim 2, special Sign is, in step (2), feature extraction and matrixing specific steps are as follows:
(21) server is extracted for the identity information of the different shape of user's input according to the public algorithm that step (1) generates Identity characteristic out is calculated each identity characteristic extracted using disclosed hash algorithm, obtains identity characteristic calculated Corresponding feature vector, the corresponding feature vector of identity characteristic calculated are made of n component;
(22) feature vector for the unified format that server obtains step (21) forms special according to disclosed matrixing algorithm Levy matrix.
CN201710352678.XA 2017-05-18 2017-05-18 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain Active CN107147652B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710352678.XA CN107147652B (en) 2017-05-18 2017-05-18 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710352678.XA CN107147652B (en) 2017-05-18 2017-05-18 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain

Publications (2)

Publication Number Publication Date
CN107147652A CN107147652A (en) 2017-09-08
CN107147652B true CN107147652B (en) 2019-08-09

Family

ID=59777759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710352678.XA Active CN107147652B (en) 2017-05-18 2017-05-18 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain

Country Status (1)

Country Link
CN (1) CN107147652B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084070A (en) * 2019-04-21 2019-08-02 中国科学院信息工程研究所 A kind of identity of the cross-domain isomeric data of manufacturing industry based on block chain constructs and source tracing method

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786639A (en) * 2017-09-28 2018-03-09 山东鲁能智能技术有限公司 A kind of electric automobile networked system and its method of work based on block chain technology
CN107786547A (en) * 2017-09-30 2018-03-09 厦门快商通信息技术有限公司 A kind of auth method based on block chain, device and computer-readable recording medium
CN110365626B (en) * 2018-04-09 2022-12-06 厦门雅迅网络股份有限公司 User login security authentication method for anti-collision library, terminal equipment and storage medium
CN108805573B (en) * 2018-04-21 2022-04-15 深圳市元征科技股份有限公司 Information verification method, server and storage medium
CN108933667B (en) * 2018-05-03 2021-08-10 深圳市京兰健康医疗大数据有限公司 Management method and management system of public key certificate based on block chain
CN108766509A (en) * 2018-05-16 2018-11-06 中国联合网络通信集团有限公司 Authenticating method, device, terminal based on block chain technology and storage medium
CN108809952A (en) * 2018-05-22 2018-11-13 隆正信息科技有限公司 Object authentication method and system based on more mark general unique keepsake chains of sectional
CN108882230B (en) * 2018-06-01 2022-02-01 中国联合网络通信集团有限公司 Call record management method, device and system
CN109145703A (en) * 2018-06-14 2019-01-04 北京凌云智链科技有限公司 Intelligent identification method, device, equipment and medium
CN108920908B (en) * 2018-06-28 2021-06-29 北京京东尚科信息技术有限公司 Data storage method, device and computer readable storage medium
CN108921555A (en) * 2018-06-30 2018-11-30 江苏恒宝智能系统技术有限公司 A kind of auth method and device combined based on block chain and iris recognition
CN108881287A (en) * 2018-07-18 2018-11-23 电子科技大学 A kind of Internet of things node identity identifying method based on block chain
CN109063627A (en) * 2018-07-27 2018-12-21 文志 Digital Human artificial intelligence identity unique identification control method
CN109145543B (en) * 2018-09-03 2020-12-04 湖北文理学院 Identity authentication method
CN109039655A (en) * 2018-09-13 2018-12-18 全链通有限公司 Real name identity identifying method and device, identity block chain based on block chain
CN109194487A (en) * 2018-09-13 2019-01-11 全链通有限公司 Construction method and system are traded or communicated to my real name based on block chain
CN109495478B (en) * 2018-11-20 2021-05-04 桂林电子科技大学 Block chain-based distributed secure communication method and system
CN112465635A (en) * 2019-09-09 2021-03-09 上海旺链信息科技有限公司 Block chain public encryption algorithm processing method, block chain wallet and storage medium
CN110569658A (en) * 2019-09-12 2019-12-13 腾讯科技(深圳)有限公司 User information processing method and device based on block chain network, electronic equipment and storage medium
CN110674180B (en) * 2019-09-26 2021-07-27 腾讯科技(深圳)有限公司 Business data processing method and device and readable storage medium
CN111131444B (en) * 2019-12-23 2020-09-29 广州公评科技有限公司 Network course processing system based on block chain technology
CN111353903B (en) * 2020-02-26 2021-07-06 广东工业大学 Network identity protection method and device, electronic equipment and storage medium
CN111680327B (en) * 2020-06-10 2024-02-23 中国银行股份有限公司 Block chain-based client information integration method, device, equipment and storage medium
CN113162768B (en) * 2021-02-24 2022-07-22 北京科技大学 Intelligent Internet of things equipment authentication method and system based on block chain
CN113449336B (en) * 2021-06-11 2022-11-04 电子科技大学 Shared data processing method based on safe multi-party privacy protection in block chain
CN117494221B (en) * 2024-01-03 2024-04-02 齐鲁工业大学(山东省科学院) Internet of things data sharing method for block chain assisted search

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794266A (en) * 2005-12-31 2006-06-28 清华大学 Biocharacteristics fusioned identity distinguishing and identification method
CN101170405A (en) * 2006-10-25 2008-04-30 富士通株式会社 Biometric authentication method
CN101931947A (en) * 2010-07-28 2010-12-29 南京航空航天大学 WSN (Wireless Sensor Network) data safety processing method based on searchable cryptograph
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9876646B2 (en) * 2015-05-05 2018-01-23 ShoCard, Inc. User identification management system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794266A (en) * 2005-12-31 2006-06-28 清华大学 Biocharacteristics fusioned identity distinguishing and identification method
CN101170405A (en) * 2006-10-25 2008-04-30 富士通株式会社 Biometric authentication method
CN101931947A (en) * 2010-07-28 2010-12-29 南京航空航天大学 WSN (Wireless Sensor Network) data safety processing method based on searchable cryptograph
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链在身份认证中的应用;庹小忠;《科技经济导刊》;20170125;第26-27页 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084070A (en) * 2019-04-21 2019-08-02 中国科学院信息工程研究所 A kind of identity of the cross-domain isomeric data of manufacturing industry based on block chain constructs and source tracing method

Also Published As

Publication number Publication date
CN107147652A (en) 2017-09-08

Similar Documents

Publication Publication Date Title
CN107147652B (en) A kind of safety fusion authentication method of the polymorphic identity of user based on block chain
CN106104562B (en) System and method for securely storing and recovering confidential data
US11824991B2 (en) Securing transactions with a blockchain network
WO2017164159A1 (en) 1:n biometric authentication, encryption, signature system
CN107359998B (en) A kind of foundation and operating method of portable intelligent password management system
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN109150519A (en) Anti- quantum calculation cloud storage method of controlling security and system based on public keys pond
KR20000075650A (en) Administration and utilization of secret fresh random numbers in a networked environment
JP2010220212A (en) Securing communications sent by first user to second user
CN110059458A (en) A kind of user password encryption and authentication method, apparatus and system
Qureshi et al. SeVEP: Secure and verifiable electronic polling system
CN110177134A (en) A kind of security password manager and its application method based on cloudy storage
CN110336663A (en) A kind of PUFs based on block chain technology certificate scheme group to group
JP2024511236A (en) Computer file security encryption method, decryption method and readable storage medium
TWI476629B (en) Data security and security systems and methods
CN109347923A (en) Anti- quantum calculation cloud storage method and system based on unsymmetrical key pond
JP2022542095A (en) Hardened secure encryption and decryption system
CN113507380B (en) Privacy protection remote unified biometric authentication method and device and electronic equipment
CN108156139A (en) No certificate can verify that multiple key cryptogram search system and method
CN109787747A (en) Anti- quantum calculation multi-enciphering cloud storage method and system based on multiple unsymmetrical key ponds
CN108616516A (en) A kind of third party's plaintext password method of calibration based on multiple encryption algorithms
KR101528112B1 (en) Cloud server for authenticating user to access the data server using biometric trait
CN109687960A (en) Cloud storage method and system is acted on behalf of in anti-quantum calculation based on multiple public asymmetric key ponds
KR20120069387A (en) A method for searching keyword based on public key
CN109714148B (en) Method for remote multi-party authentication of user identity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant