CN107196966B - Identity authentication method and system based on block chain multi-party trust - Google Patents
Identity authentication method and system based on block chain multi-party trust Download PDFInfo
- Publication number
- CN107196966B CN107196966B CN201710542619.9A CN201710542619A CN107196966B CN 107196966 B CN107196966 B CN 107196966B CN 201710542619 A CN201710542619 A CN 201710542619A CN 107196966 B CN107196966 B CN 107196966B
- Authority
- CN
- China
- Prior art keywords
- user
- application system
- block chain
- card information
- attribute card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Abstract
The invention discloses a multi-party trusted identity authentication method and system based on a block chain, belonging to the field of internet identity authentication, and aiming at solving the technical problems of how to realize identity authentication of a user facing a plurality of application systems based on the block chain, safely storing user information through the block chain in the identity authentication process and truly and completely verifying the identity of the user; the method comprises the steps that an application system generates user attribute card information according to a received registration request, encrypts the user attribute card information and then distributes the encrypted user attribute card information to a block chain, wherein the application system comprises a plurality of parties, and the encrypted user attribute card information corresponding to each party of application system is stored in the block chain; each party application verifies the user identity by means of the blockchain. The structure of the system comprises a block chain network, a client authentication module configured at a client and an application server authentication module configured and applied to the system. The invention realizes the safe and reliable storage of the real-name information of the user in the block chain and the real and complete user identity authentication through the block chain.
Description
Technical Field
The invention relates to the field of internet identity authentication, in particular to a multiparty trusted identity authentication method and system based on a block chain.
Background
In the PKI system, a digital certificate of a third party CA is a way to indicate real-name information of a user. The digital Certificate is a string of numbers which mark identity information of communication parties in Internet communication, and provides a way of verifying the identity of a communication entity on the Internet, and the digital Certificate is a file which is digitally signed by a Certificate Authority (CA for short) and contains public key owner information and a public key. People can identify the identity of each other on the network by using digital certificates. CA authentication is a centralized authentication mode, and all application systems and users need to trust the CA unconditionally, so that the authentication efficiency is low and the authentication cost is high.
The block chain is a decentralized distributed database, and is a series of data blocks which are associated by using a cryptographic method, and each data block contains information of one network transaction, and is used for verifying the validity (anti-counterfeiting) of the information and generating a next block. Blockchains have the characteristics of decentralization, information non-tampering and the like, and once information is verified and added to the blockchain, the information is stored permanently.
How to realize the identity authentication of a user facing a plurality of application systems through the blockchain, and how to safely store user information and truly and completely verify the identity of the user through the blockchain in the identity authentication process are technical problems to be solved.
Disclosure of Invention
The technical task of the invention is to provide a multi-party trusted identity authentication method and system based on a block chain, aiming at overcoming the defects, and solving the problems of how to realize identity authentication of a user facing a plurality of application systems based on the block chain, safely storing user information through the block chain in the identity authentication process and truly and completely verifying the identity of the user.
The technical task of the invention is realized by the following modes:
the identity authentication method based on multi-party trust of the block chain comprises the steps that after an application system generates user attribute card information according to a received registration request, the user attribute card information is encrypted and the encrypted user attribute card information is issued to the block chain, the application system shares multiple parties, and the encrypted user attribute card information corresponding to each party of application system is stored in the block chain; and each application system verifies the user identity by means of the block chain after receiving the authentication request, and performs multi-party trusted identity verification through multi-party encrypted user attribute card information stored in the block chain.
Further, the identity authentication method based on block chain multi-party trust of each application system comprises the following steps:
s1, user registration: when a user registers for the first time, a public key and a private key are generated, when an application system receives a registration request initiated by the user, real-name authentication is carried out on the user, user attribute card information is generated, and the user attribute card information encrypted through the public key is issued to a block chain;
s2, identity authentication: and after the application system receives the authentication request initiated by the user, the private key is verified, and after the verification is successful, the application system verifies the information of the plurality of decrypted user attribute cards submitted by the user by means of the block chain.
Furthermore, the user in the multi-party application system firstly registers the application system as a first application system, and the application systems except the first application system in the multi-party application system are residual application systems; the identity authentication method of the multi-party trust based on the block chain of each party application system comprises the following steps:
s1, user registration: the method comprises the steps that a public key and a private key are generated when a user registers for the first time in a first application system, the public key is registered when the user registers for the first time in the rest application systems, and the private key can be used for the rest application systems;
when receiving a registration request initiated by a user, an application system performs real-name authentication on the user and generates user attribute card information, and publishes the user attribute card information encrypted by a public key to a block chain;
s2, identity authentication: and after the application system receives the authentication request initiated by the user, the private key is verified, and after the verification is successful, the application system verifies the information of the plurality of decrypted user attribute cards submitted by the user by means of the block chain.
Further, in step S1, when the application system receives a registration request initiated by the user, the method performs real-name authentication on the user and generates user attribute card information, which includes the following steps:
s111, submitting real-name information, a public key, a private key and signature information of the real-name information, the public key and the private key to an application system by a user;
s112, the application system performs real-name authentication on the user through the authoritative identity authentication source;
s113, the application system calculates the real-name information, the public key and the signature of the application system on the real-name information and the public key to generate user attribute card information, wherein the user attribute card information comprises: the signature of the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification, the attribute card issuing authority public key and the attribute card issuing authority to the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification and the attribute card issuing authority public key.
Further, in step S1, the method for issuing the user attribute card information encrypted by the public key to the blockchain by the application system includes the following steps:
s121, calculating the abstract of the user attribute card information by the application system;
s122, the application system uses the public key to encrypt the user attribute card information;
and S123, the application system issues the encrypted ciphertext of the user attribute card information and the abstract of the plaintext of the user attribute card information to the block chain.
Further, in step S2, the application system verifies the private key after receiving the authentication request initiated by the user, including the following steps:
s211, the user sends an authentication request to the application system, and the application system returns an authentication challenge to the user;
s212, the user signs the authentication challenge by using a private key;
s213, the application system uses the public key to verify the authentication challenge signature, and if the verification is successful, the user is indicated to have the private key.
Further, in step S2, the method for verifying the plurality of decrypted user attribute card information submitted by the user by the application system via the blockchain includes the following steps:
s221, the user decrypts the information of each user attribute card and submits the information of the plurality of decrypted attribute cards to an application system;
s222, the application system calculates the hash of the user attribute card information, and inquires and compares hash values through a block chain;
and S223, the application system analyzes the real-name information and verifies the signature of the attribute card issuing mechanism.
Further, the carrier of the private key includes, but is not limited to, a U shield, a mobile phone shield, a password card and an encryption machine.
Further, authoritative sources of identity include, but are not limited to, police, telecommunications, and banks; the real name information includes, but is not limited to, a user name, a user identification card, and a user phone number.
The identity authentication system based on the block chain multi-party trust comprises a block chain network, a client authentication module configured on a client and an application server authentication module configured with an application system, wherein the client authentication module is used for generating a private key and a public key, executing digital signature and executing private key decryption, the application server authentication module is used for generating user attribute card information, executing signature verification and executing storage, query and comparison of a user attribute card information block chain, and the block chain storage authentication network is used for executing storage of the user attribute card information.
The identity authentication method and the identity authentication system based on the block chain multi-party trust have the following advantages that:
1. the identity of the user is identified by using the user attribute card information, and the plurality of user attribute card information corresponding to the multi-party application system are all issued to the block chain, so that the authenticity and integrity of the user attribute card information are ensured, the identity of the user is witnessed through the plurality of user attribute card information, and is more credible compared with the identity of the user witnessed through the single user attribute card information, and when the user attribute card information of the user is more and more, the identity of the user is clearer and more definite;
2. the invention takes the public cryptographic technology as the means of identity authentication, thus having high security;
3. the invention encrypts the user attribute card information through the public key, thereby ensuring that the privacy of the user attribute card information cannot be revealed.
Drawings
The invention is further described below with reference to the accompanying drawings.
Fig. 1 is a flow chart of the identity authentication method based on block chain multi-party trust in embodiment 1;
fig. 2 is a block diagram illustrating a user registration process in the identity authentication method based on block chaining for multi-party trust in embodiment 1;
fig. 3 is a block diagram of a process of authenticating a user by an application system in the identity authentication method based on block chain multi-party trust in embodiment 1.
Detailed Description
The identity authentication method and system based on block chain multi-party trust of the invention are described in detail below with reference to the drawings and specific embodiments of the specification.
Example 1:
as shown in fig. 1, fig. 2, and fig. 3, in the identity authentication method based on block chain multi-party trust of the present invention, after an application system generates user attribute card information according to a received registration request, the application system encrypts the user attribute card information and distributes the encrypted user attribute card information to a block chain, the application system has multiple parties, and the encrypted user attribute card information corresponding to each party of the application system is stored in the block chain; and each application system verifies the user identity by means of the block chain after receiving the authentication request, and performs multi-party trusted identity verification through multi-party encrypted user attribute card information stored in the block chain. The identity authentication method based on block chain multi-party trust of each application system comprises the following steps: :
(1) and user registration:
(1.1) generating a public key and a private key when a user registers for the first time, and initiating a registration request to an application system;
(1.2) submitting real-name information, a public key, a private key and signature information of the real-name information, the public key and the private key to an application system by a user;
(1.3) the application system carries out real-name authentication on the user through an authoritative identity authentication source;
(1.4) the application system calculates the real name information, the public key and the signature of the application system on the real name information and the public key to generate user attribute card information, wherein the user attribute card information comprises: the signature of the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification, the attribute card issuing authority public key and the attribute card issuing authority on the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification and the attribute card issuing authority public key;
(1.5) the application system calculates the abstract of the user attribute card information;
(1.6) the application system uses the public key to encrypt the user attribute card information;
(1.7) the application system issues the encrypted ciphertext of the user attribute card information and the abstract of the plaintext of the user attribute card information to a block chain, so that the fact that data in the user attribute card information are real, complete and cannot be tampered is guaranteed, and meanwhile, the privacy of a user is protected through encryption;
(2) and identity authentication:
(2.1) the user initiates an authentication request to the application system, the application system returns an authentication challenge to the user, and the authentication challenge is a random number;
(2.2) the user signs the authentication challenge using the private key;
(2.3) the application system uses a public key to verify the authentication challenge signature, and if the verification is successful, the user is indicated to have the private key;
(2.4) in the step (2.3), after the verification is successful, the user decrypts each user attribute card information and submits a plurality of decrypted user attribute card information to the application system;
(2.5) the application system calculates the hash of the user attribute card information, and inquires and compares the hash value through a block chain;
and (2.6) the application system analyzes the real-name information and verifies the signature of the attribute card issuing organization.
The carriers of the private key include but are not limited to a U shield, a mobile phone shield, a password card and an encryption machine; the authoritative identity authentication source comprises but is not limited to public security, telecommunication and banks, and the real-name authentication is carried out on the user through the authoritative identity authentication source so as to realize the credible identity authentication of multiple parties; the real name information includes, but is not limited to, a user name, a user identification card, and a user phone number.
In the invention, a public key and a private key are generated when a user registers for the first time, each application system carries out real-name authentication on the user through an authoritative certification authority and generates corresponding user attribute card information, and the user attribute card information is encrypted through the public key and then stored in a block chain, so that the user has the private key, and the real-name information and the public key of the user are safely stored in the block chain after being certified by a multi-party certification authority; when an application system needs a user to complete identity authentication account login, the application system verifies a private key of the user, meanwhile, the application system verifies the authenticity and integrity of a plurality of user attribute card information held by the user through a block chain, analyzes the real-name information of the user, and verifies the signature of an attribute card information issuing organization, so that real-name authentication of the user is realized. The information of the plurality of user attribute cards is equivalent to the identity of a user witnessed by multiple parties, when the information of the user attribute cards is more and more, the identity of the user is clearer and clearer, and the identity witnessed by multiple parties is more credible than the identity witnessed by a single party.
Example 2:
this embodiment is a further improvement on embodiment 1, and the difference between this embodiment and embodiment 1 is: the user in the multi-party application system firstly registers the application system as a first application system, and the application systems except the first application system in the multi-party application system are residual application systems; in the process of executing user registration and identity authentication in all the application systems, all the application systems share one private key without regeneration.
Specifically, when the user registration procedure is executed, the step (1.1) has the following differences from the embodiment 1:
and (1.1) generating a public key and a private key when the user registers for the first time in the first application system, registering the public key when the user registers for the first time in the rest application systems, using the private key by the rest application systems, and initiating a registration request to the application systems.
The other process steps in this example are identical to those in example 1.
Example 3:
the identity authentication system based on the block chain multi-party trust comprises a block chain storage network, a client authentication module configured on a client and an application server authentication module configured on each application system, wherein the client authentication module is used for generating a private key and a public key, executing digital signature and executing private key decryption, the application server authentication module is used for generating user attribute card information, executing signature verification and executing storage, query and comparison of a user attribute card information block chain, and the block chain storage network is used for executing storage of the user attribute card information.
The client authentication module is used for generating a private key and a public key and generating the public key and the private key of a user when the user registers for the first time; the client authentication module is used for executing digital signature, and performing digital signature on the public key, the private key and the real-name information before the user submits the public key, the private key and the real-name information to the application system; the client authentication module is used for executing private key decryption, signing a challenge authentication signature returned for the application system by using the private key, wherein the challenge authentication is a random number, and when a user initiates an authentication request to the application system, the application system returns the challenge authentication to the user for verifying the private key of the user.
The application server authentication module generates user attribute card information, and after the application system verifies the real-name information submitted by the user through the authoritative identity authentication source, the application server authentication module calculates the real-name information, the public key and the signature of the application system on the real-name information and the public key to generate the user attribute card information, wherein the user attribute card information comprises: the signature of the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification, the attribute card issuing authority public key and the attribute card issuing authority on the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification and the attribute card issuing authority public key;
the application server authentication module performs signature verification.
The application server authentication module executes the storage of the user attribute card information block chain, and can realize the following functions in the user registration process: calculating the abstract of the user attribute card information, encrypting the user attribute card information by using a public key, and sending the abstract of the user attribute card information and the ciphertext of the user attribute card information to a block chain; the application server authentication module executes the query and comparison of the user attribute card information block chain, and can realize the following functions in the identity authentication process: calculating hash of the user attribute card information according to the decrypted user attribute card information submitted by a plurality of users, inquiring and comparing hash values through a block chain, analyzing real-name information, and verifying the signature of an attribute card issuing organization.
The block link evidence storage network comprises a plurality of block link nodes, and user attribute card information is stored in the block link nodes.
The identity authentication system based on block chain multi-party trust can be used for realizing the identity authentication method based on block chain multi-party trust in the embodiment 1.
The present invention can be easily implemented by those skilled in the art from the above detailed description. It should be understood, however, that the intention is not to limit the invention to the particular embodiments described. On the basis of the disclosed embodiments, a person skilled in the art can combine different technical features at will, thereby implementing different technical solutions. In addition to the technical features described in the specification, the technology is known to those skilled in the art.
Claims (4)
1. The identity authentication method based on multi-party trust of the block chain is characterized in that after an application system generates user attribute card information according to a received registration request, the user attribute card information is encrypted and the encrypted user attribute card information is issued to the block chain, the application system has a plurality of parties, and the encrypted user attribute card information corresponding to each party of application system is stored in the block chain;
after receiving the authentication request, each application system verifies the user identity by means of the block chain, and performs identity verification of multi-party trust through multi-party encrypted user attribute card information stored in the block chain;
the multi-party application system is characterized in that the application system which is registered by a user firstly is a first application system, and the application systems except the first application system in the multi-party application system are residual application systems; the identity authentication method of the multi-party trust based on the block chain of each party application system comprises the following steps:
s1, user registration: the method comprises the steps that a public key and a private key are generated when a user registers for the first time in a first application system, the public key is registered when the user registers for the first time in the rest application systems, and the private key can be used for the rest application systems;
when receiving a registration request initiated by a user, an application system performs real-name authentication on the user and generates user attribute card information, and publishes the user attribute card information encrypted by a public key to a block chain;
s2, identity authentication: the application system verifies the private key after receiving an authentication request initiated by a user, and verifies a plurality of decrypted user attribute card information submitted by the user by means of a block chain after the private key is successfully verified;
in step S1, when the application system receives a registration request initiated by a user, the application system performs real-name authentication on the user and generates user attribute card information, including the following steps:
s111, submitting real-name information, a public key, a private key and signature information of the real-name information, the public key and the private key to an application system by a user;
s112, the application system performs real-name authentication on the user through the authoritative identity authentication source;
s113, the application system calculates the real-name information, the public key and the signature of the application system on the real-name information and the public key to generate user attribute card information, wherein the user attribute card information comprises: the signature of the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification, the attribute card issuing authority public key and the attribute card issuing authority on the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification and the attribute card issuing authority public key;
in step S1, the application system issues the user attribute card information encrypted by the public key to the blockchain, including the following steps:
s121, calculating the abstract of the user attribute card information by the application system;
s122, the application system uses the public key to encrypt the user attribute card information;
s123, the application system issues the encrypted ciphertext of the user attribute card information and the abstract of the plaintext of the user attribute card information to a block chain;
in step S2, the application system verifies the private key after receiving the authentication request initiated by the user, including the following steps:
s211, the user sends an authentication request to the application system, and the application system returns an authentication challenge to the user;
s212, the user signs the authentication challenge by using a private key;
s213, the application system uses a public key to verify the authentication challenge signature, and if the verification is successful, the user is indicated to have the private key;
in step S2, the method for verifying the decrypted user attribute card information submitted by the user by the application system via the blockchain includes the following steps:
s221, the user decrypts the information of each user attribute card and submits the information of the plurality of decrypted attribute cards to an application system;
s222, the application system calculates the hash of the user attribute card information, and inquires and compares hash values through a block chain;
and S223, the application system analyzes the real-name information and verifies the signature of the attribute card issuing mechanism.
2. The identity authentication method based on block chain multi-party trust of claim 1, wherein the carrier of the private key includes but is not limited to a U shield, a mobile phone shield, a password card and an encryption machine.
3. The blockchain-based multi-party trusted identity authentication method of claim 1, wherein authoritative identity authentication sources include but are not limited to police, telecommunications, and banks; the real name information includes, but is not limited to, a user name, a user identification card, and a user phone number.
4. The identity authentication system based on the block chain multi-party trust is characterized in that the identity authentication system is used for realizing the identity authentication method based on the block chain multi-party trust of any one of claims 1 to 3, and comprises a block chain network, a client authentication module configured at a client and an application server authentication module configured with an application system, wherein the client authentication module is used for generating a private key and a public key, executing a digital signature and executing decryption of the private key, the application server authentication module is used for generating user attribute card information, executing signature verification and executing storage, query and comparison of a user attribute card information block chain, and the block chain storage network is used for executing storage of the user attribute card information;
the application server authentication module executes the storage of the user attribute card information block chain, and can realize the following functions in the user registration process: calculating the abstract of the user attribute card information, encrypting the user attribute card information by using a public key, and sending the abstract of the user attribute card information and the ciphertext of the user attribute card information to a block chain; the application server authentication module executes the query and comparison of the user attribute card information block chain, and can realize the following functions in the identity authentication process: calculating hash of the user attribute card information according to the decrypted user attribute card information submitted by a plurality of users, inquiring and comparing hash values through a block chain, analyzing real-name information, and verifying the signature of an attribute card issuing organization.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710542619.9A CN107196966B (en) | 2017-07-05 | 2017-07-05 | Identity authentication method and system based on block chain multi-party trust |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710542619.9A CN107196966B (en) | 2017-07-05 | 2017-07-05 | Identity authentication method and system based on block chain multi-party trust |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107196966A CN107196966A (en) | 2017-09-22 |
CN107196966B true CN107196966B (en) | 2020-04-14 |
Family
ID=59880452
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710542619.9A Active CN107196966B (en) | 2017-07-05 | 2017-07-05 | Identity authentication method and system based on block chain multi-party trust |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107196966B (en) |
Families Citing this family (85)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109600338B (en) * | 2017-09-30 | 2021-11-19 | 卓望数码技术(深圳)有限公司 | Trusted identity management service method and system |
CN109687967B (en) * | 2017-10-18 | 2022-02-08 | 克洛斯比尔有限公司 | Electronic signature method and device |
SE541847C2 (en) * | 2017-11-19 | 2019-12-27 | Kk Deliver Ltd Hk | System and Method for Verification of Reliability and Validity of Crowd Sourcing Users |
CN107888382B (en) * | 2017-11-24 | 2019-11-19 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of methods, devices and systems of the digital identity verifying based on block chain |
CN107995197A (en) * | 2017-12-04 | 2018-05-04 | 中国电子科技集团公司第三十研究所 | A kind of method for realizing across management domain identity and authority information is shared |
CN108235805B (en) * | 2017-12-29 | 2021-07-30 | 达闼机器人有限公司 | Account unifying method and device and storage medium |
DE102018000471A1 (en) * | 2018-01-22 | 2019-07-25 | Giesecke+Devrient Mobile Security Gmbh | Blockchain-based identity system |
CN110225068A (en) * | 2018-03-01 | 2019-09-10 | 广州鼎义计算机有限公司 | Block chain identity certificate administration system |
CN108365949B (en) * | 2018-03-09 | 2021-03-23 | 北京阿尔山金融科技有限公司 | Client real-name system information management method, device and system |
CN108599954B (en) * | 2018-03-16 | 2020-04-07 | 西安电子科技大学 | Identity verification method based on distributed account book |
CN108768933B (en) * | 2018-04-11 | 2020-11-03 | 深圳技术大学 | Autonomous supervision digital identity authentication system on block chain platform |
CN108737418B (en) * | 2018-05-22 | 2020-09-15 | 飞天诚信科技股份有限公司 | Identity authentication method and system based on block chain |
CN108768608B (en) * | 2018-05-25 | 2020-05-12 | 电子科技大学 | Privacy protection identity authentication method supporting thin client under block chain PKI |
CN108684041B (en) * | 2018-05-31 | 2021-06-11 | 上海邑游网络科技有限公司 | System and method for login authentication |
CN108880795A (en) * | 2018-06-22 | 2018-11-23 | 方亚南 | A kind of block chain security mechanism and device |
CN108876374B (en) * | 2018-06-29 | 2020-10-16 | 全链通有限公司 | Block chain network identity document authentication method and system |
CN110738494A (en) * | 2018-07-19 | 2020-01-31 | 普华云创科技(北京)有限公司 | User sharing management method, device and storage medium based on block chain |
CN110753016B (en) * | 2018-07-23 | 2021-12-14 | 国网辽宁招标有限公司 | Real name authentication method based on block chain |
CN108900528B (en) * | 2018-07-24 | 2021-08-31 | 中国联合网络通信集团有限公司 | Block chain real-name authentication method, device, equipment and storage medium |
CN108881296B (en) * | 2018-07-24 | 2021-11-30 | 中国联合网络通信集团有限公司 | Block chain real-name authentication method, device, equipment and storage medium |
CN108881301A (en) * | 2018-08-02 | 2018-11-23 | 珠海宏桥高科技有限公司 | A kind of identity identifying method based on block chain |
CN109088865B (en) * | 2018-08-02 | 2021-10-12 | 京东方科技集团股份有限公司 | User identity authentication method and device, readable storage medium and computer equipment |
CN108848111B (en) * | 2018-08-06 | 2021-09-10 | 杭州云象网络技术有限公司 | Decentralized virtual private network building method based on block chain technology |
CN109409893A (en) * | 2018-08-20 | 2019-03-01 | 杭州复杂美科技有限公司 | A kind of belief system and its construction method, equipment and storage medium |
CN109005186B (en) * | 2018-08-20 | 2020-12-11 | 杭州复杂美科技有限公司 | Method, system, equipment and storage medium for isolating user identity information |
CN109145543B (en) * | 2018-09-03 | 2020-12-04 | 湖北文理学院 | Identity authentication method |
CN109150546A (en) * | 2018-09-07 | 2019-01-04 | 全链通有限公司 | The method for realizing the registration of block chain system of real name based on phone number |
CN109005033B (en) * | 2018-09-07 | 2020-12-22 | 全链通有限公司 | Method for realizing block chain real-name system registration based on mobile phone number |
CN109194487A (en) * | 2018-09-13 | 2019-01-11 | 全链通有限公司 | Construction method and system are traded or communicated to my real name based on block chain |
CN109347799B (en) * | 2018-09-13 | 2019-10-15 | 深圳市图灵奇点智能科技有限公司 | A kind of identity information management method and system based on block chain technology |
CN109039655A (en) * | 2018-09-13 | 2018-12-18 | 全链通有限公司 | Real name identity identifying method and device, identity block chain based on block chain |
CN109345245B (en) * | 2018-09-25 | 2020-11-03 | 全链通有限公司 | Short message verification method, device, network and storage medium based on block chain |
CN109450849B (en) * | 2018-09-26 | 2021-05-25 | 汤建男 | Cloud server networking method based on block chain |
CN109067801B (en) * | 2018-09-29 | 2021-09-03 | 平安科技(深圳)有限公司 | Identity authentication method, identity authentication device and computer readable medium |
CN109598518A (en) * | 2018-09-30 | 2019-04-09 | 阿里巴巴集团控股有限公司 | Method for anti-counterfeit and device, electronic equipment based on block chain |
CN109067808B (en) * | 2018-10-18 | 2021-07-13 | 全链通有限公司 | Method and device for realizing block chain real-name system authentication based on social relationship guarantee |
CN109379357B (en) * | 2018-10-18 | 2021-01-08 | 全链通有限公司 | Method and device for realizing block chain real-name system authentication based on social relationship guarantee |
CN109286632B (en) * | 2018-10-25 | 2021-01-15 | 中国信息通信研究院 | Block chain-based big data authorization and evidence-storing method and system |
CN109583230A (en) | 2018-10-31 | 2019-04-05 | 阿里巴巴集团控股有限公司 | Data based on block chain deposit card method and device, electronic equipment |
CN109949019A (en) * | 2018-11-15 | 2019-06-28 | 陕西医链区块链集团有限公司 | A kind of payment system based on medical block chain |
CN109472536A (en) * | 2018-11-23 | 2019-03-15 | 四川长虹电器股份有限公司 | Express delivery cabinet based on block chain collects part method |
CN109495490B (en) * | 2018-12-04 | 2021-04-09 | 中国电子科技集团公司第三十研究所 | Block chain-based unified identity authentication method |
CN111274612B (en) * | 2018-12-04 | 2022-12-02 | 北京京东尚科信息技术有限公司 | Practitioner trust verification method and system, witness service system and storage medium |
CN109687970B (en) * | 2018-12-07 | 2022-02-01 | 南京理工大学 | Mobile block chain full node and implementation method thereof |
CN109413102B (en) * | 2018-12-10 | 2021-04-09 | 北京八分量信息科技有限公司 | Registration system and method based on zero knowledge certification and block chaining certification system |
CN109600374A (en) * | 2018-12-12 | 2019-04-09 | 四川商通实业有限公司 | Secure user data sending method and its system based on block chain |
CN109767215A (en) * | 2018-12-29 | 2019-05-17 | 杭州趣链科技有限公司 | A kind of online block chain identity identifying method based on a variety of private key storage modes |
CN111404859A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Client authentication method and device and computer readable storage medium |
CN109743321B (en) * | 2019-01-04 | 2022-02-11 | 中国联合网络通信集团有限公司 | Block chain, application program, and user authentication method and system of application program |
CN109743167A (en) * | 2019-01-07 | 2019-05-10 | 殷鹏 | The safe identification authentication method of big data based on block chain |
CN109889503B (en) * | 2019-01-22 | 2022-02-22 | 平安科技(深圳)有限公司 | Identity management method based on block chain, electronic device and storage medium |
CN109615378B (en) * | 2019-01-24 | 2021-06-15 | 上海点融信息科技有限责任公司 | Block chain-based secure multi-party computing method and device and readable storage medium |
CN109858270A (en) * | 2019-02-22 | 2019-06-07 | 江苏金智教育信息股份有限公司 | A kind of construction method and system of decentralization digital identity |
CN111726324A (en) * | 2019-03-20 | 2020-09-29 | 上海御行信息技术有限公司 | Block chain technology-based alliance multi-node network identity authentication system |
CN109981675B (en) * | 2019-04-04 | 2021-10-26 | 西安电子科技大学 | Identity information protection method for digital identity authentication and attribute encryption |
CN110263573A (en) * | 2019-05-22 | 2019-09-20 | 西安邮电大学 | Representation method based on block chain personal identification |
CN110324314B (en) * | 2019-05-23 | 2023-04-18 | 深圳壹账通智能科技有限公司 | User registration method and device, storage medium and electronic equipment |
CN110166460B (en) * | 2019-05-24 | 2021-12-14 | 北京思源理想控股集团有限公司 | Service account registration method and device, storage medium and electronic device |
CN110430201A (en) * | 2019-08-09 | 2019-11-08 | 北京智汇信元科技有限公司 | A kind of distribution identity documents generate, verification method and system |
CN110474763B (en) * | 2019-08-28 | 2021-04-06 | 蒋勇 | Chain-based identity protection method |
CN110648139B (en) * | 2019-09-03 | 2022-04-12 | 北京航空航天大学 | Block chain transaction verification and expansion method and device based on fragmentation technology and game theory |
CN110572392A (en) * | 2019-09-09 | 2019-12-13 | 河南戎磐网络科技有限公司 | Identity authentication method based on HyperLegger network |
CN110602088A (en) * | 2019-09-11 | 2019-12-20 | 北京京东振世信息技术有限公司 | Block chain-based right management method, block chain-based right management device, block chain-based right management equipment and block chain-based right management medium |
CN112543166B (en) * | 2019-09-20 | 2023-07-21 | 朗新数据科技有限公司 | Real name login method and device |
CN110851857B (en) * | 2019-10-14 | 2022-07-01 | 上海唯链信息科技有限公司 | Method and device for realizing identity endorsement on block chain |
CN110942316A (en) * | 2019-12-04 | 2020-03-31 | 趣派(海南)信息科技有限公司 | Transfer verification method and system based on multi-party verification |
CN111132149B (en) * | 2019-12-30 | 2023-11-21 | 全链通有限公司 | Registration method of 5G user terminal, user terminal equipment and medium |
CN111355591A (en) * | 2020-02-27 | 2020-06-30 | 北京数资科技有限公司 | Block chain account safety management method based on real-name authentication technology |
CN111385755B (en) * | 2020-03-18 | 2021-12-03 | 成都西加云杉科技有限公司 | Bandwidth resource sharing method, device, equipment and readable storage medium |
CN111600900B (en) * | 2020-05-26 | 2022-09-02 | 牛津(海南)区块链研究院有限公司 | Single sign-on method, server and system based on block chain |
CN111949953B (en) * | 2020-06-23 | 2021-10-22 | 卓尔智联(武汉)研究院有限公司 | Identity authentication method, system and device based on block chain and computer equipment |
CN111859348B (en) * | 2020-07-31 | 2022-07-19 | 上海微位网络科技有限公司 | Identity authentication method and device based on user identification module and block chain technology |
CN112134698B (en) * | 2020-09-10 | 2022-10-11 | 江苏大学 | Block chain-based quick communication authentication method and system for vehicles and vehicles in Internet of vehicles |
CN112162984A (en) * | 2020-09-28 | 2021-01-01 | 彩讯科技股份有限公司 | Real name authentication method, system, equipment and storage medium based on block chain |
CN112565294B (en) * | 2020-12-23 | 2023-04-07 | 杭州天谷信息科技有限公司 | Identity authentication method based on block chain electronic signature |
CN112738106B (en) * | 2020-12-29 | 2022-06-24 | 合肥达朴汇联科技有限公司 | Block chain anonymous user auditing system |
CN112927445A (en) * | 2021-03-08 | 2021-06-08 | 安徽中科晶格技术有限公司 | ATM self-service deposit and withdrawal system and method based on block chain identity authentication |
CN113259311B (en) * | 2021-03-17 | 2022-07-12 | 西安电子科技大学 | Decentralized identity authentication system based on block chain |
CN113569210A (en) * | 2021-07-09 | 2021-10-29 | 远光软件股份有限公司 | Distributed identity authentication method, equipment access method and device |
CN113660089B (en) * | 2021-07-14 | 2024-02-06 | 方欣科技有限公司 | Tax payment user identity authentication method and device based on blockchain |
CN113872983A (en) * | 2021-10-13 | 2021-12-31 | 苏州兆晶智能科技有限公司 | Block chain chip identity authentication system and authentication method thereof |
CN114785554B (en) * | 2022-03-24 | 2023-05-05 | 福建师范大学 | Mixed trust multiparty computing system capable of trusted execution |
CN114826613B (en) * | 2022-04-21 | 2023-07-28 | 微位(深圳)网络科技有限公司 | Identity information query method, device, equipment and storage medium based on blockchain |
CN114584324B (en) * | 2022-04-28 | 2022-08-26 | 天聚地合(苏州)科技股份有限公司 | Identity authorization method and system based on block chain |
CN114978687B (en) * | 2022-05-20 | 2024-04-09 | 江苏大学 | Efficient anonymous authentication method based on blockchain technology in Internet of vehicles environment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106034122A (en) * | 2015-03-16 | 2016-10-19 | 联想(北京)有限公司 | Information processing method, electronic equipment and server |
CN106453271B (en) * | 2016-09-21 | 2019-05-03 | 江苏通付盾科技有限公司 | Identity registration method and system, identity identifying method and system |
CN106302544A (en) * | 2016-10-18 | 2017-01-04 | 深圳市金立通信设备有限公司 | A kind of safe verification method and system |
CN106611372B (en) * | 2016-12-27 | 2021-01-08 | 深圳微众信用科技股份有限公司 | Credit investigation data query method and system |
-
2017
- 2017-07-05 CN CN201710542619.9A patent/CN107196966B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN107196966A (en) | 2017-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107196966B (en) | Identity authentication method and system based on block chain multi-party trust | |
US20240007308A1 (en) | Confidential authentication and provisioning | |
CN109067524B (en) | Public and private key pair generation method and system | |
CN108599954B (en) | Identity verification method based on distributed account book | |
US11336641B2 (en) | Security enhanced technique of authentication protocol based on trusted execution environment | |
US7937584B2 (en) | Method and system for key certification | |
JP4639084B2 (en) | Encryption method and encryption apparatus for secure authentication | |
EP1969762B1 (en) | Certify and split system and method for replacing cryptographic keys | |
CN109450843B (en) | SSL certificate management method and system based on block chain | |
CN109495490A (en) | A kind of unified identity authentication method based on block chain | |
JP2020530726A (en) | NFC tag authentication to remote servers with applications that protect supply chain asset management | |
CN110971411B (en) | SM2 homomorphic signature method for encrypting private key by multiplying based on SOTP technology | |
CN108712259B (en) | Identity-based cloud storage efficient auditing method capable of uploading data by proxy | |
CN106341232A (en) | Anonymous entity identification method based on password | |
CN110020869B (en) | Method, device and system for generating block chain authorization information | |
CN114036539A (en) | Safety auditable Internet of things data sharing system and method based on block chain | |
CN113364597A (en) | Privacy information proving method and system based on block chain | |
WO2008020991A2 (en) | Notarized federated identity management | |
CN111245611B (en) | Anti-quantum computation identity authentication method and system based on secret sharing and wearable equipment | |
Hegde et al. | Hash based integrity verification for vehicular cloud environment | |
KR20080005344A (en) | System for authenticating user's terminal based on authentication server | |
US20210044435A1 (en) | Method for transmitting data from a motor vehicle and method for another vehicle to receive the data through a radio communication channel | |
CN110572257B (en) | Identity-based data source identification method and system | |
CN113641975A (en) | Identity registration method, identity verification method, device and system | |
CN110138547B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and serial number |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |