CN107196966B - Identity authentication method and system based on block chain multi-party trust - Google Patents

Identity authentication method and system based on block chain multi-party trust Download PDF

Info

Publication number
CN107196966B
CN107196966B CN201710542619.9A CN201710542619A CN107196966B CN 107196966 B CN107196966 B CN 107196966B CN 201710542619 A CN201710542619 A CN 201710542619A CN 107196966 B CN107196966 B CN 107196966B
Authority
CN
China
Prior art keywords
user
application system
block chain
card information
attribute card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710542619.9A
Other languages
Chinese (zh)
Other versions
CN107196966A (en
Inventor
马臣云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Trustdo Technology Co ltd
Original Assignee
Beijing Trustdo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Trustdo Technology Co ltd filed Critical Beijing Trustdo Technology Co ltd
Priority to CN201710542619.9A priority Critical patent/CN107196966B/en
Publication of CN107196966A publication Critical patent/CN107196966A/en
Application granted granted Critical
Publication of CN107196966B publication Critical patent/CN107196966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Abstract

The invention discloses a multi-party trusted identity authentication method and system based on a block chain, belonging to the field of internet identity authentication, and aiming at solving the technical problems of how to realize identity authentication of a user facing a plurality of application systems based on the block chain, safely storing user information through the block chain in the identity authentication process and truly and completely verifying the identity of the user; the method comprises the steps that an application system generates user attribute card information according to a received registration request, encrypts the user attribute card information and then distributes the encrypted user attribute card information to a block chain, wherein the application system comprises a plurality of parties, and the encrypted user attribute card information corresponding to each party of application system is stored in the block chain; each party application verifies the user identity by means of the blockchain. The structure of the system comprises a block chain network, a client authentication module configured at a client and an application server authentication module configured and applied to the system. The invention realizes the safe and reliable storage of the real-name information of the user in the block chain and the real and complete user identity authentication through the block chain.

Description

Identity authentication method and system based on block chain multi-party trust
Technical Field
The invention relates to the field of internet identity authentication, in particular to a multiparty trusted identity authentication method and system based on a block chain.
Background
In the PKI system, a digital certificate of a third party CA is a way to indicate real-name information of a user. The digital Certificate is a string of numbers which mark identity information of communication parties in Internet communication, and provides a way of verifying the identity of a communication entity on the Internet, and the digital Certificate is a file which is digitally signed by a Certificate Authority (CA for short) and contains public key owner information and a public key. People can identify the identity of each other on the network by using digital certificates. CA authentication is a centralized authentication mode, and all application systems and users need to trust the CA unconditionally, so that the authentication efficiency is low and the authentication cost is high.
The block chain is a decentralized distributed database, and is a series of data blocks which are associated by using a cryptographic method, and each data block contains information of one network transaction, and is used for verifying the validity (anti-counterfeiting) of the information and generating a next block. Blockchains have the characteristics of decentralization, information non-tampering and the like, and once information is verified and added to the blockchain, the information is stored permanently.
How to realize the identity authentication of a user facing a plurality of application systems through the blockchain, and how to safely store user information and truly and completely verify the identity of the user through the blockchain in the identity authentication process are technical problems to be solved.
Disclosure of Invention
The technical task of the invention is to provide a multi-party trusted identity authentication method and system based on a block chain, aiming at overcoming the defects, and solving the problems of how to realize identity authentication of a user facing a plurality of application systems based on the block chain, safely storing user information through the block chain in the identity authentication process and truly and completely verifying the identity of the user.
The technical task of the invention is realized by the following modes:
the identity authentication method based on multi-party trust of the block chain comprises the steps that after an application system generates user attribute card information according to a received registration request, the user attribute card information is encrypted and the encrypted user attribute card information is issued to the block chain, the application system shares multiple parties, and the encrypted user attribute card information corresponding to each party of application system is stored in the block chain; and each application system verifies the user identity by means of the block chain after receiving the authentication request, and performs multi-party trusted identity verification through multi-party encrypted user attribute card information stored in the block chain.
Further, the identity authentication method based on block chain multi-party trust of each application system comprises the following steps:
s1, user registration: when a user registers for the first time, a public key and a private key are generated, when an application system receives a registration request initiated by the user, real-name authentication is carried out on the user, user attribute card information is generated, and the user attribute card information encrypted through the public key is issued to a block chain;
s2, identity authentication: and after the application system receives the authentication request initiated by the user, the private key is verified, and after the verification is successful, the application system verifies the information of the plurality of decrypted user attribute cards submitted by the user by means of the block chain.
Furthermore, the user in the multi-party application system firstly registers the application system as a first application system, and the application systems except the first application system in the multi-party application system are residual application systems; the identity authentication method of the multi-party trust based on the block chain of each party application system comprises the following steps:
s1, user registration: the method comprises the steps that a public key and a private key are generated when a user registers for the first time in a first application system, the public key is registered when the user registers for the first time in the rest application systems, and the private key can be used for the rest application systems;
when receiving a registration request initiated by a user, an application system performs real-name authentication on the user and generates user attribute card information, and publishes the user attribute card information encrypted by a public key to a block chain;
s2, identity authentication: and after the application system receives the authentication request initiated by the user, the private key is verified, and after the verification is successful, the application system verifies the information of the plurality of decrypted user attribute cards submitted by the user by means of the block chain.
Further, in step S1, when the application system receives a registration request initiated by the user, the method performs real-name authentication on the user and generates user attribute card information, which includes the following steps:
s111, submitting real-name information, a public key, a private key and signature information of the real-name information, the public key and the private key to an application system by a user;
s112, the application system performs real-name authentication on the user through the authoritative identity authentication source;
s113, the application system calculates the real-name information, the public key and the signature of the application system on the real-name information and the public key to generate user attribute card information, wherein the user attribute card information comprises: the signature of the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification, the attribute card issuing authority public key and the attribute card issuing authority to the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification and the attribute card issuing authority public key.
Further, in step S1, the method for issuing the user attribute card information encrypted by the public key to the blockchain by the application system includes the following steps:
s121, calculating the abstract of the user attribute card information by the application system;
s122, the application system uses the public key to encrypt the user attribute card information;
and S123, the application system issues the encrypted ciphertext of the user attribute card information and the abstract of the plaintext of the user attribute card information to the block chain.
Further, in step S2, the application system verifies the private key after receiving the authentication request initiated by the user, including the following steps:
s211, the user sends an authentication request to the application system, and the application system returns an authentication challenge to the user;
s212, the user signs the authentication challenge by using a private key;
s213, the application system uses the public key to verify the authentication challenge signature, and if the verification is successful, the user is indicated to have the private key.
Further, in step S2, the method for verifying the plurality of decrypted user attribute card information submitted by the user by the application system via the blockchain includes the following steps:
s221, the user decrypts the information of each user attribute card and submits the information of the plurality of decrypted attribute cards to an application system;
s222, the application system calculates the hash of the user attribute card information, and inquires and compares hash values through a block chain;
and S223, the application system analyzes the real-name information and verifies the signature of the attribute card issuing mechanism.
Further, the carrier of the private key includes, but is not limited to, a U shield, a mobile phone shield, a password card and an encryption machine.
Further, authoritative sources of identity include, but are not limited to, police, telecommunications, and banks; the real name information includes, but is not limited to, a user name, a user identification card, and a user phone number.
The identity authentication system based on the block chain multi-party trust comprises a block chain network, a client authentication module configured on a client and an application server authentication module configured with an application system, wherein the client authentication module is used for generating a private key and a public key, executing digital signature and executing private key decryption, the application server authentication module is used for generating user attribute card information, executing signature verification and executing storage, query and comparison of a user attribute card information block chain, and the block chain storage authentication network is used for executing storage of the user attribute card information.
The identity authentication method and the identity authentication system based on the block chain multi-party trust have the following advantages that:
1. the identity of the user is identified by using the user attribute card information, and the plurality of user attribute card information corresponding to the multi-party application system are all issued to the block chain, so that the authenticity and integrity of the user attribute card information are ensured, the identity of the user is witnessed through the plurality of user attribute card information, and is more credible compared with the identity of the user witnessed through the single user attribute card information, and when the user attribute card information of the user is more and more, the identity of the user is clearer and more definite;
2. the invention takes the public cryptographic technology as the means of identity authentication, thus having high security;
3. the invention encrypts the user attribute card information through the public key, thereby ensuring that the privacy of the user attribute card information cannot be revealed.
Drawings
The invention is further described below with reference to the accompanying drawings.
Fig. 1 is a flow chart of the identity authentication method based on block chain multi-party trust in embodiment 1;
fig. 2 is a block diagram illustrating a user registration process in the identity authentication method based on block chaining for multi-party trust in embodiment 1;
fig. 3 is a block diagram of a process of authenticating a user by an application system in the identity authentication method based on block chain multi-party trust in embodiment 1.
Detailed Description
The identity authentication method and system based on block chain multi-party trust of the invention are described in detail below with reference to the drawings and specific embodiments of the specification.
Example 1:
as shown in fig. 1, fig. 2, and fig. 3, in the identity authentication method based on block chain multi-party trust of the present invention, after an application system generates user attribute card information according to a received registration request, the application system encrypts the user attribute card information and distributes the encrypted user attribute card information to a block chain, the application system has multiple parties, and the encrypted user attribute card information corresponding to each party of the application system is stored in the block chain; and each application system verifies the user identity by means of the block chain after receiving the authentication request, and performs multi-party trusted identity verification through multi-party encrypted user attribute card information stored in the block chain. The identity authentication method based on block chain multi-party trust of each application system comprises the following steps: :
(1) and user registration:
(1.1) generating a public key and a private key when a user registers for the first time, and initiating a registration request to an application system;
(1.2) submitting real-name information, a public key, a private key and signature information of the real-name information, the public key and the private key to an application system by a user;
(1.3) the application system carries out real-name authentication on the user through an authoritative identity authentication source;
(1.4) the application system calculates the real name information, the public key and the signature of the application system on the real name information and the public key to generate user attribute card information, wherein the user attribute card information comprises: the signature of the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification, the attribute card issuing authority public key and the attribute card issuing authority on the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification and the attribute card issuing authority public key;
(1.5) the application system calculates the abstract of the user attribute card information;
(1.6) the application system uses the public key to encrypt the user attribute card information;
(1.7) the application system issues the encrypted ciphertext of the user attribute card information and the abstract of the plaintext of the user attribute card information to a block chain, so that the fact that data in the user attribute card information are real, complete and cannot be tampered is guaranteed, and meanwhile, the privacy of a user is protected through encryption;
(2) and identity authentication:
(2.1) the user initiates an authentication request to the application system, the application system returns an authentication challenge to the user, and the authentication challenge is a random number;
(2.2) the user signs the authentication challenge using the private key;
(2.3) the application system uses a public key to verify the authentication challenge signature, and if the verification is successful, the user is indicated to have the private key;
(2.4) in the step (2.3), after the verification is successful, the user decrypts each user attribute card information and submits a plurality of decrypted user attribute card information to the application system;
(2.5) the application system calculates the hash of the user attribute card information, and inquires and compares the hash value through a block chain;
and (2.6) the application system analyzes the real-name information and verifies the signature of the attribute card issuing organization.
The carriers of the private key include but are not limited to a U shield, a mobile phone shield, a password card and an encryption machine; the authoritative identity authentication source comprises but is not limited to public security, telecommunication and banks, and the real-name authentication is carried out on the user through the authoritative identity authentication source so as to realize the credible identity authentication of multiple parties; the real name information includes, but is not limited to, a user name, a user identification card, and a user phone number.
In the invention, a public key and a private key are generated when a user registers for the first time, each application system carries out real-name authentication on the user through an authoritative certification authority and generates corresponding user attribute card information, and the user attribute card information is encrypted through the public key and then stored in a block chain, so that the user has the private key, and the real-name information and the public key of the user are safely stored in the block chain after being certified by a multi-party certification authority; when an application system needs a user to complete identity authentication account login, the application system verifies a private key of the user, meanwhile, the application system verifies the authenticity and integrity of a plurality of user attribute card information held by the user through a block chain, analyzes the real-name information of the user, and verifies the signature of an attribute card information issuing organization, so that real-name authentication of the user is realized. The information of the plurality of user attribute cards is equivalent to the identity of a user witnessed by multiple parties, when the information of the user attribute cards is more and more, the identity of the user is clearer and clearer, and the identity witnessed by multiple parties is more credible than the identity witnessed by a single party.
Example 2:
this embodiment is a further improvement on embodiment 1, and the difference between this embodiment and embodiment 1 is: the user in the multi-party application system firstly registers the application system as a first application system, and the application systems except the first application system in the multi-party application system are residual application systems; in the process of executing user registration and identity authentication in all the application systems, all the application systems share one private key without regeneration.
Specifically, when the user registration procedure is executed, the step (1.1) has the following differences from the embodiment 1:
and (1.1) generating a public key and a private key when the user registers for the first time in the first application system, registering the public key when the user registers for the first time in the rest application systems, using the private key by the rest application systems, and initiating a registration request to the application systems.
The other process steps in this example are identical to those in example 1.
Example 3:
the identity authentication system based on the block chain multi-party trust comprises a block chain storage network, a client authentication module configured on a client and an application server authentication module configured on each application system, wherein the client authentication module is used for generating a private key and a public key, executing digital signature and executing private key decryption, the application server authentication module is used for generating user attribute card information, executing signature verification and executing storage, query and comparison of a user attribute card information block chain, and the block chain storage network is used for executing storage of the user attribute card information.
The client authentication module is used for generating a private key and a public key and generating the public key and the private key of a user when the user registers for the first time; the client authentication module is used for executing digital signature, and performing digital signature on the public key, the private key and the real-name information before the user submits the public key, the private key and the real-name information to the application system; the client authentication module is used for executing private key decryption, signing a challenge authentication signature returned for the application system by using the private key, wherein the challenge authentication is a random number, and when a user initiates an authentication request to the application system, the application system returns the challenge authentication to the user for verifying the private key of the user.
The application server authentication module generates user attribute card information, and after the application system verifies the real-name information submitted by the user through the authoritative identity authentication source, the application server authentication module calculates the real-name information, the public key and the signature of the application system on the real-name information and the public key to generate the user attribute card information, wherein the user attribute card information comprises: the signature of the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification, the attribute card issuing authority public key and the attribute card issuing authority on the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification and the attribute card issuing authority public key;
the application server authentication module performs signature verification.
The application server authentication module executes the storage of the user attribute card information block chain, and can realize the following functions in the user registration process: calculating the abstract of the user attribute card information, encrypting the user attribute card information by using a public key, and sending the abstract of the user attribute card information and the ciphertext of the user attribute card information to a block chain; the application server authentication module executes the query and comparison of the user attribute card information block chain, and can realize the following functions in the identity authentication process: calculating hash of the user attribute card information according to the decrypted user attribute card information submitted by a plurality of users, inquiring and comparing hash values through a block chain, analyzing real-name information, and verifying the signature of an attribute card issuing organization.
The block link evidence storage network comprises a plurality of block link nodes, and user attribute card information is stored in the block link nodes.
The identity authentication system based on block chain multi-party trust can be used for realizing the identity authentication method based on block chain multi-party trust in the embodiment 1.
The present invention can be easily implemented by those skilled in the art from the above detailed description. It should be understood, however, that the intention is not to limit the invention to the particular embodiments described. On the basis of the disclosed embodiments, a person skilled in the art can combine different technical features at will, thereby implementing different technical solutions. In addition to the technical features described in the specification, the technology is known to those skilled in the art.

Claims (4)

1. The identity authentication method based on multi-party trust of the block chain is characterized in that after an application system generates user attribute card information according to a received registration request, the user attribute card information is encrypted and the encrypted user attribute card information is issued to the block chain, the application system has a plurality of parties, and the encrypted user attribute card information corresponding to each party of application system is stored in the block chain;
after receiving the authentication request, each application system verifies the user identity by means of the block chain, and performs identity verification of multi-party trust through multi-party encrypted user attribute card information stored in the block chain;
the multi-party application system is characterized in that the application system which is registered by a user firstly is a first application system, and the application systems except the first application system in the multi-party application system are residual application systems; the identity authentication method of the multi-party trust based on the block chain of each party application system comprises the following steps:
s1, user registration: the method comprises the steps that a public key and a private key are generated when a user registers for the first time in a first application system, the public key is registered when the user registers for the first time in the rest application systems, and the private key can be used for the rest application systems;
when receiving a registration request initiated by a user, an application system performs real-name authentication on the user and generates user attribute card information, and publishes the user attribute card information encrypted by a public key to a block chain;
s2, identity authentication: the application system verifies the private key after receiving an authentication request initiated by a user, and verifies a plurality of decrypted user attribute card information submitted by the user by means of a block chain after the private key is successfully verified;
in step S1, when the application system receives a registration request initiated by a user, the application system performs real-name authentication on the user and generates user attribute card information, including the following steps:
s111, submitting real-name information, a public key, a private key and signature information of the real-name information, the public key and the private key to an application system by a user;
s112, the application system performs real-name authentication on the user through the authoritative identity authentication source;
s113, the application system calculates the real-name information, the public key and the signature of the application system on the real-name information and the public key to generate user attribute card information, wherein the user attribute card information comprises: the signature of the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification, the attribute card issuing authority public key and the attribute card issuing authority on the user ID, the real-name information, the real-name authentication source, the public key, the attribute card issuing authority identification and the attribute card issuing authority public key;
in step S1, the application system issues the user attribute card information encrypted by the public key to the blockchain, including the following steps:
s121, calculating the abstract of the user attribute card information by the application system;
s122, the application system uses the public key to encrypt the user attribute card information;
s123, the application system issues the encrypted ciphertext of the user attribute card information and the abstract of the plaintext of the user attribute card information to a block chain;
in step S2, the application system verifies the private key after receiving the authentication request initiated by the user, including the following steps:
s211, the user sends an authentication request to the application system, and the application system returns an authentication challenge to the user;
s212, the user signs the authentication challenge by using a private key;
s213, the application system uses a public key to verify the authentication challenge signature, and if the verification is successful, the user is indicated to have the private key;
in step S2, the method for verifying the decrypted user attribute card information submitted by the user by the application system via the blockchain includes the following steps:
s221, the user decrypts the information of each user attribute card and submits the information of the plurality of decrypted attribute cards to an application system;
s222, the application system calculates the hash of the user attribute card information, and inquires and compares hash values through a block chain;
and S223, the application system analyzes the real-name information and verifies the signature of the attribute card issuing mechanism.
2. The identity authentication method based on block chain multi-party trust of claim 1, wherein the carrier of the private key includes but is not limited to a U shield, a mobile phone shield, a password card and an encryption machine.
3. The blockchain-based multi-party trusted identity authentication method of claim 1, wherein authoritative identity authentication sources include but are not limited to police, telecommunications, and banks; the real name information includes, but is not limited to, a user name, a user identification card, and a user phone number.
4. The identity authentication system based on the block chain multi-party trust is characterized in that the identity authentication system is used for realizing the identity authentication method based on the block chain multi-party trust of any one of claims 1 to 3, and comprises a block chain network, a client authentication module configured at a client and an application server authentication module configured with an application system, wherein the client authentication module is used for generating a private key and a public key, executing a digital signature and executing decryption of the private key, the application server authentication module is used for generating user attribute card information, executing signature verification and executing storage, query and comparison of a user attribute card information block chain, and the block chain storage network is used for executing storage of the user attribute card information;
the application server authentication module executes the storage of the user attribute card information block chain, and can realize the following functions in the user registration process: calculating the abstract of the user attribute card information, encrypting the user attribute card information by using a public key, and sending the abstract of the user attribute card information and the ciphertext of the user attribute card information to a block chain; the application server authentication module executes the query and comparison of the user attribute card information block chain, and can realize the following functions in the identity authentication process: calculating hash of the user attribute card information according to the decrypted user attribute card information submitted by a plurality of users, inquiring and comparing hash values through a block chain, analyzing real-name information, and verifying the signature of an attribute card issuing organization.
CN201710542619.9A 2017-07-05 2017-07-05 Identity authentication method and system based on block chain multi-party trust Active CN107196966B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710542619.9A CN107196966B (en) 2017-07-05 2017-07-05 Identity authentication method and system based on block chain multi-party trust

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710542619.9A CN107196966B (en) 2017-07-05 2017-07-05 Identity authentication method and system based on block chain multi-party trust

Publications (2)

Publication Number Publication Date
CN107196966A CN107196966A (en) 2017-09-22
CN107196966B true CN107196966B (en) 2020-04-14

Family

ID=59880452

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710542619.9A Active CN107196966B (en) 2017-07-05 2017-07-05 Identity authentication method and system based on block chain multi-party trust

Country Status (1)

Country Link
CN (1) CN107196966B (en)

Families Citing this family (85)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600338B (en) * 2017-09-30 2021-11-19 卓望数码技术(深圳)有限公司 Trusted identity management service method and system
CN109687967B (en) * 2017-10-18 2022-02-08 克洛斯比尔有限公司 Electronic signature method and device
SE541847C2 (en) * 2017-11-19 2019-12-27 Kk Deliver Ltd Hk System and Method for Verification of Reliability and Validity of Crowd Sourcing Users
CN107888382B (en) * 2017-11-24 2019-11-19 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of methods, devices and systems of the digital identity verifying based on block chain
CN107995197A (en) * 2017-12-04 2018-05-04 中国电子科技集团公司第三十研究所 A kind of method for realizing across management domain identity and authority information is shared
CN108235805B (en) * 2017-12-29 2021-07-30 达闼机器人有限公司 Account unifying method and device and storage medium
DE102018000471A1 (en) * 2018-01-22 2019-07-25 Giesecke+Devrient Mobile Security Gmbh Blockchain-based identity system
CN110225068A (en) * 2018-03-01 2019-09-10 广州鼎义计算机有限公司 Block chain identity certificate administration system
CN108365949B (en) * 2018-03-09 2021-03-23 北京阿尔山金融科技有限公司 Client real-name system information management method, device and system
CN108599954B (en) * 2018-03-16 2020-04-07 西安电子科技大学 Identity verification method based on distributed account book
CN108768933B (en) * 2018-04-11 2020-11-03 深圳技术大学 Autonomous supervision digital identity authentication system on block chain platform
CN108737418B (en) * 2018-05-22 2020-09-15 飞天诚信科技股份有限公司 Identity authentication method and system based on block chain
CN108768608B (en) * 2018-05-25 2020-05-12 电子科技大学 Privacy protection identity authentication method supporting thin client under block chain PKI
CN108684041B (en) * 2018-05-31 2021-06-11 上海邑游网络科技有限公司 System and method for login authentication
CN108880795A (en) * 2018-06-22 2018-11-23 方亚南 A kind of block chain security mechanism and device
CN108876374B (en) * 2018-06-29 2020-10-16 全链通有限公司 Block chain network identity document authentication method and system
CN110738494A (en) * 2018-07-19 2020-01-31 普华云创科技(北京)有限公司 User sharing management method, device and storage medium based on block chain
CN110753016B (en) * 2018-07-23 2021-12-14 国网辽宁招标有限公司 Real name authentication method based on block chain
CN108900528B (en) * 2018-07-24 2021-08-31 中国联合网络通信集团有限公司 Block chain real-name authentication method, device, equipment and storage medium
CN108881296B (en) * 2018-07-24 2021-11-30 中国联合网络通信集团有限公司 Block chain real-name authentication method, device, equipment and storage medium
CN108881301A (en) * 2018-08-02 2018-11-23 珠海宏桥高科技有限公司 A kind of identity identifying method based on block chain
CN109088865B (en) * 2018-08-02 2021-10-12 京东方科技集团股份有限公司 User identity authentication method and device, readable storage medium and computer equipment
CN108848111B (en) * 2018-08-06 2021-09-10 杭州云象网络技术有限公司 Decentralized virtual private network building method based on block chain technology
CN109409893A (en) * 2018-08-20 2019-03-01 杭州复杂美科技有限公司 A kind of belief system and its construction method, equipment and storage medium
CN109005186B (en) * 2018-08-20 2020-12-11 杭州复杂美科技有限公司 Method, system, equipment and storage medium for isolating user identity information
CN109145543B (en) * 2018-09-03 2020-12-04 湖北文理学院 Identity authentication method
CN109150546A (en) * 2018-09-07 2019-01-04 全链通有限公司 The method for realizing the registration of block chain system of real name based on phone number
CN109005033B (en) * 2018-09-07 2020-12-22 全链通有限公司 Method for realizing block chain real-name system registration based on mobile phone number
CN109194487A (en) * 2018-09-13 2019-01-11 全链通有限公司 Construction method and system are traded or communicated to my real name based on block chain
CN109347799B (en) * 2018-09-13 2019-10-15 深圳市图灵奇点智能科技有限公司 A kind of identity information management method and system based on block chain technology
CN109039655A (en) * 2018-09-13 2018-12-18 全链通有限公司 Real name identity identifying method and device, identity block chain based on block chain
CN109345245B (en) * 2018-09-25 2020-11-03 全链通有限公司 Short message verification method, device, network and storage medium based on block chain
CN109450849B (en) * 2018-09-26 2021-05-25 汤建男 Cloud server networking method based on block chain
CN109067801B (en) * 2018-09-29 2021-09-03 平安科技(深圳)有限公司 Identity authentication method, identity authentication device and computer readable medium
CN109598518A (en) * 2018-09-30 2019-04-09 阿里巴巴集团控股有限公司 Method for anti-counterfeit and device, electronic equipment based on block chain
CN109067808B (en) * 2018-10-18 2021-07-13 全链通有限公司 Method and device for realizing block chain real-name system authentication based on social relationship guarantee
CN109379357B (en) * 2018-10-18 2021-01-08 全链通有限公司 Method and device for realizing block chain real-name system authentication based on social relationship guarantee
CN109286632B (en) * 2018-10-25 2021-01-15 中国信息通信研究院 Block chain-based big data authorization and evidence-storing method and system
CN109583230A (en) 2018-10-31 2019-04-05 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment
CN109949019A (en) * 2018-11-15 2019-06-28 陕西医链区块链集团有限公司 A kind of payment system based on medical block chain
CN109472536A (en) * 2018-11-23 2019-03-15 四川长虹电器股份有限公司 Express delivery cabinet based on block chain collects part method
CN109495490B (en) * 2018-12-04 2021-04-09 中国电子科技集团公司第三十研究所 Block chain-based unified identity authentication method
CN111274612B (en) * 2018-12-04 2022-12-02 北京京东尚科信息技术有限公司 Practitioner trust verification method and system, witness service system and storage medium
CN109687970B (en) * 2018-12-07 2022-02-01 南京理工大学 Mobile block chain full node and implementation method thereof
CN109413102B (en) * 2018-12-10 2021-04-09 北京八分量信息科技有限公司 Registration system and method based on zero knowledge certification and block chaining certification system
CN109600374A (en) * 2018-12-12 2019-04-09 四川商通实业有限公司 Secure user data sending method and its system based on block chain
CN109767215A (en) * 2018-12-29 2019-05-17 杭州趣链科技有限公司 A kind of online block chain identity identifying method based on a variety of private key storage modes
CN111404859A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Client authentication method and device and computer readable storage medium
CN109743321B (en) * 2019-01-04 2022-02-11 中国联合网络通信集团有限公司 Block chain, application program, and user authentication method and system of application program
CN109743167A (en) * 2019-01-07 2019-05-10 殷鹏 The safe identification authentication method of big data based on block chain
CN109889503B (en) * 2019-01-22 2022-02-22 平安科技(深圳)有限公司 Identity management method based on block chain, electronic device and storage medium
CN109615378B (en) * 2019-01-24 2021-06-15 上海点融信息科技有限责任公司 Block chain-based secure multi-party computing method and device and readable storage medium
CN109858270A (en) * 2019-02-22 2019-06-07 江苏金智教育信息股份有限公司 A kind of construction method and system of decentralization digital identity
CN111726324A (en) * 2019-03-20 2020-09-29 上海御行信息技术有限公司 Block chain technology-based alliance multi-node network identity authentication system
CN109981675B (en) * 2019-04-04 2021-10-26 西安电子科技大学 Identity information protection method for digital identity authentication and attribute encryption
CN110263573A (en) * 2019-05-22 2019-09-20 西安邮电大学 Representation method based on block chain personal identification
CN110324314B (en) * 2019-05-23 2023-04-18 深圳壹账通智能科技有限公司 User registration method and device, storage medium and electronic equipment
CN110166460B (en) * 2019-05-24 2021-12-14 北京思源理想控股集团有限公司 Service account registration method and device, storage medium and electronic device
CN110430201A (en) * 2019-08-09 2019-11-08 北京智汇信元科技有限公司 A kind of distribution identity documents generate, verification method and system
CN110474763B (en) * 2019-08-28 2021-04-06 蒋勇 Chain-based identity protection method
CN110648139B (en) * 2019-09-03 2022-04-12 北京航空航天大学 Block chain transaction verification and expansion method and device based on fragmentation technology and game theory
CN110572392A (en) * 2019-09-09 2019-12-13 河南戎磐网络科技有限公司 Identity authentication method based on HyperLegger network
CN110602088A (en) * 2019-09-11 2019-12-20 北京京东振世信息技术有限公司 Block chain-based right management method, block chain-based right management device, block chain-based right management equipment and block chain-based right management medium
CN112543166B (en) * 2019-09-20 2023-07-21 朗新数据科技有限公司 Real name login method and device
CN110851857B (en) * 2019-10-14 2022-07-01 上海唯链信息科技有限公司 Method and device for realizing identity endorsement on block chain
CN110942316A (en) * 2019-12-04 2020-03-31 趣派(海南)信息科技有限公司 Transfer verification method and system based on multi-party verification
CN111132149B (en) * 2019-12-30 2023-11-21 全链通有限公司 Registration method of 5G user terminal, user terminal equipment and medium
CN111355591A (en) * 2020-02-27 2020-06-30 北京数资科技有限公司 Block chain account safety management method based on real-name authentication technology
CN111385755B (en) * 2020-03-18 2021-12-03 成都西加云杉科技有限公司 Bandwidth resource sharing method, device, equipment and readable storage medium
CN111600900B (en) * 2020-05-26 2022-09-02 牛津(海南)区块链研究院有限公司 Single sign-on method, server and system based on block chain
CN111949953B (en) * 2020-06-23 2021-10-22 卓尔智联(武汉)研究院有限公司 Identity authentication method, system and device based on block chain and computer equipment
CN111859348B (en) * 2020-07-31 2022-07-19 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology
CN112134698B (en) * 2020-09-10 2022-10-11 江苏大学 Block chain-based quick communication authentication method and system for vehicles and vehicles in Internet of vehicles
CN112162984A (en) * 2020-09-28 2021-01-01 彩讯科技股份有限公司 Real name authentication method, system, equipment and storage medium based on block chain
CN112565294B (en) * 2020-12-23 2023-04-07 杭州天谷信息科技有限公司 Identity authentication method based on block chain electronic signature
CN112738106B (en) * 2020-12-29 2022-06-24 合肥达朴汇联科技有限公司 Block chain anonymous user auditing system
CN112927445A (en) * 2021-03-08 2021-06-08 安徽中科晶格技术有限公司 ATM self-service deposit and withdrawal system and method based on block chain identity authentication
CN113259311B (en) * 2021-03-17 2022-07-12 西安电子科技大学 Decentralized identity authentication system based on block chain
CN113569210A (en) * 2021-07-09 2021-10-29 远光软件股份有限公司 Distributed identity authentication method, equipment access method and device
CN113660089B (en) * 2021-07-14 2024-02-06 方欣科技有限公司 Tax payment user identity authentication method and device based on blockchain
CN113872983A (en) * 2021-10-13 2021-12-31 苏州兆晶智能科技有限公司 Block chain chip identity authentication system and authentication method thereof
CN114785554B (en) * 2022-03-24 2023-05-05 福建师范大学 Mixed trust multiparty computing system capable of trusted execution
CN114826613B (en) * 2022-04-21 2023-07-28 微位(深圳)网络科技有限公司 Identity information query method, device, equipment and storage medium based on blockchain
CN114584324B (en) * 2022-04-28 2022-08-26 天聚地合(苏州)科技股份有限公司 Identity authorization method and system based on block chain
CN114978687B (en) * 2022-05-20 2024-04-09 江苏大学 Efficient anonymous authentication method based on blockchain technology in Internet of vehicles environment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106034122A (en) * 2015-03-16 2016-10-19 联想(北京)有限公司 Information processing method, electronic equipment and server
CN106453271B (en) * 2016-09-21 2019-05-03 江苏通付盾科技有限公司 Identity registration method and system, identity identifying method and system
CN106302544A (en) * 2016-10-18 2017-01-04 深圳市金立通信设备有限公司 A kind of safe verification method and system
CN106611372B (en) * 2016-12-27 2021-01-08 深圳微众信用科技股份有限公司 Credit investigation data query method and system

Also Published As

Publication number Publication date
CN107196966A (en) 2017-09-22

Similar Documents

Publication Publication Date Title
CN107196966B (en) Identity authentication method and system based on block chain multi-party trust
US20240007308A1 (en) Confidential authentication and provisioning
CN109067524B (en) Public and private key pair generation method and system
CN108599954B (en) Identity verification method based on distributed account book
US11336641B2 (en) Security enhanced technique of authentication protocol based on trusted execution environment
US7937584B2 (en) Method and system for key certification
JP4639084B2 (en) Encryption method and encryption apparatus for secure authentication
EP1969762B1 (en) Certify and split system and method for replacing cryptographic keys
CN109450843B (en) SSL certificate management method and system based on block chain
CN109495490A (en) A kind of unified identity authentication method based on block chain
JP2020530726A (en) NFC tag authentication to remote servers with applications that protect supply chain asset management
CN110971411B (en) SM2 homomorphic signature method for encrypting private key by multiplying based on SOTP technology
CN108712259B (en) Identity-based cloud storage efficient auditing method capable of uploading data by proxy
CN106341232A (en) Anonymous entity identification method based on password
CN110020869B (en) Method, device and system for generating block chain authorization information
CN114036539A (en) Safety auditable Internet of things data sharing system and method based on block chain
CN113364597A (en) Privacy information proving method and system based on block chain
WO2008020991A2 (en) Notarized federated identity management
CN111245611B (en) Anti-quantum computation identity authentication method and system based on secret sharing and wearable equipment
Hegde et al. Hash based integrity verification for vehicular cloud environment
KR20080005344A (en) System for authenticating user's terminal based on authentication server
US20210044435A1 (en) Method for transmitting data from a motor vehicle and method for another vehicle to receive the data through a radio communication channel
CN110572257B (en) Identity-based data source identification method and system
CN113641975A (en) Identity registration method, identity verification method, device and system
CN110138547B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and serial number

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant