CN107786547A - A kind of auth method based on block chain, device and computer-readable recording medium - Google Patents

A kind of auth method based on block chain, device and computer-readable recording medium Download PDF

Info

Publication number
CN107786547A
CN107786547A CN201710944048.1A CN201710944048A CN107786547A CN 107786547 A CN107786547 A CN 107786547A CN 201710944048 A CN201710944048 A CN 201710944048A CN 107786547 A CN107786547 A CN 107786547A
Authority
CN
China
Prior art keywords
identity information
subscriber identity
user
information
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710944048.1A
Other languages
Chinese (zh)
Inventor
洪晓捷
肖龙源
刘晓葳
李稀敏
谭玉坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Kuaishangtong Technology Corp ltd
Original Assignee
Xiamen Kuaishangtong Technology Corp ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Kuaishangtong Technology Corp ltd filed Critical Xiamen Kuaishangtong Technology Corp ltd
Priority to CN201710944048.1A priority Critical patent/CN107786547A/en
Publication of CN107786547A publication Critical patent/CN107786547A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to field of computer technology, there is provided a kind of auth method based on block chain, includes step:Gather subscriber identity information;The subscriber identity information is issued to block catenary system;The block catenary system receives and preserves the subscriber identity information, and generates unique identifier;When carrying out subscriber authentication, based on the subscriber identity information corresponding to the identification code from block catenary system acquisition;Authentication is carried out to active user based on the subscriber identity information.By the above method, the security and credit rating of information preservation are improved, and improves the reliable and accuracy of subscriber authentication.In addition present invention also offers a kind of authentication means and computer-readable recording medium based on block chain.

Description

A kind of auth method based on block chain, device and computer-readable storage Medium
Technical field
The present invention on field of computer technology, more particularly to a kind of auth method based on block chain, device and Computer-readable recording medium.
Background technology
Authentication is also referred to as " authentication " or " identity discriminating ", refers in computer and computer network system really Recognize the process of operator's identity, so that it is determined that whether the user has access and the access right to certain resource, and then make meter Calculation machine and the access strategy of network system can be performed reliably and efficiently, prevent attacker from palming off validated user and obtaining resource Access rights, ensure the safety of system and data, and authorize the legitimate interests of visitor.
The principle of network identity validation is to verify identity by calling open interface at present, however, it can easily leakage is used Family individual's real information, and anyone can be transferred through the real information data that interface arbitrarily obtains some user, credit Spend low and fluctuation of service.
Therefore, it is necessary to design a kind of network identity validation method based on block chain, realization will not cause true identity Leakage, raising credit rating is low, and good operation stability.
The content of the invention
Based on above-mentioned technical problem, the invention provides a kind of auth method based on block chain, device and calculating Machine readable storage medium storing program for executing, specifically, on the one hand, the auth method provided by the invention based on block chain, include step:Adopt Collect subscriber identity information;The subscriber identity information is issued to block catenary system;The block catenary system is received and preserved described Subscriber identity information, and generate unique identifier;When carrying out subscriber authentication, based on the identification code from the block chain The subscriber identity information corresponding to system acquisition;Authentication is carried out to active user based on the subscriber identity information.
In one embodiment, the collection subscriber identity information specifically includes:Obtain user biological information;Extract the use The feature of family biological information, and generate biological data model.
In one embodiment, the collection subscriber identity information specifically includes:Receive the essential information of user's input.
In one embodiment, after the essential information step of the reception user input, further include to the basic letter Breath is carried out
Verification.
In one embodiment, after the collection subscriber identity information step, before the issuing steps, step is further included Suddenly:The subscriber identity information is encrypted, accordingly, it is described authentication is carried out to active user before, to from institute The subscriber identity information corresponding to stating the acquisition of block chain is decrypted.
In one embodiment, when carrying out subscriber authentication, the identity information of collection active user is further included, accordingly , authentication is carried out to active user based on the subscriber identity information and specifically included, according to the identity of the active user Information with the subscriber identity information obtained from the block catenary system matched, if matching is identical, is verified.
On the other hand, the authentication means provided by the invention based on block chain, described device include:An at least client End and an at least server, wherein, the client is used to gather subscriber identity information, and by issuing the user identity To the block catenary system operated on the server, the block catenary system receives and preserves the user identity letter information Breath, and unique identifier is generated, send to the client;When carrying out subscriber authentication, user passes through the client The identification code and identity information are inputted, the client is based on corresponding to the identification code from block catenary system acquisition The subscriber identity information, and authentication is carried out to active user based on the subscriber identity information.
In one embodiment, the client includes biomedical information acquisition equipment, for obtaining the biological information of user.
Further, present invention also offers a kind of computer-readable recording medium, computer program is stored with, wherein The computer program, which is executed by processor, realizes the above-mentioned auth method based on block chain.
In summary, technical scheme provided by the present invention is especially by the decentralization by block catenary system, opening Property, autonomy, information can not tamper, anonymity the features such as, preserve subscriber identity information, improve information preservation security And credit rating;And in subscriber authentication, first based on block chain generation unique identifier carry out preliminary identification, then to Family identity information carries out substantive checking, further improves the accuracy and reliability of subscriber identity information checking;More enter One step, before issue subscriber identity information to block catenary system, by the encryption to subscriber identity information, can more it enter The improving information safety degree of one step, reduce the possibility of subscriber identity information leakage.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, for those of ordinary skill in the art Speech, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 illustrates the auth method flow chart based on block chain that a preferred embodiment of the present invention is provided;
Fig. 2 illustrates the method flow diagram that user biological information is gathered in embodiment illustrated in fig. 1;
Fig. 3 illustrates the authentication means structural representation based on block chain that a preferred embodiment of the present invention is provided.
Embodiment
In order that those skilled in the art more fully understand the technical scheme in the present invention, below in conjunction with of the invention real The accompanying drawing in example is applied, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described implementation Example only part of the embodiment of the present invention, rather than whole embodiments.It is common based on the embodiment in the present invention, this area The every other embodiment that technical staff is obtained under the premise of creative work is not made, should all belong to protection of the present invention Scope.
Fig. 1 is refer to, Fig. 1 illustrates the auth method stream based on block chain that a preferred embodiment of the present invention is provided Cheng Tu.As shown in figure 1, methods described specifically comprises the steps of:
S101, gather subscriber identity information.
Specifically, subscriber identity information can include user biological information and essential information one or two therein, its Middle user biological packet can be used for the biological characteristic of unique identification user identity, essential information bag containing fingerprint, vocal print, iris etc. Containing text messages such as name, identification card numbers.
Fig. 2 is refer to, Fig. 2 illustrates the method flow diagram that user biological information is gathered in embodiment illustrated in fig. 1, such as Fig. 2 institutes Show, when gathering user biological information, specifically comprising step:
S201, obtain user biological information.
User biological information can be specifically acquired by the collecting device of correlation according to specific demand.For example, If the identity information of user is fingerprint, then the fingerprint of user will be obtained by fingerprint collecting equipment.
S202, extracts the feature of the user biological information, and generates biological data model.
After user biological information is got, calculation system need to be carried out to the information, in order to preserve and transmit, tool Body, can the feature based on user biological information, by the training of training pattern, biological data model corresponding to generation.Below It will be illustrated by instantiation.
By taking vocal print as an example, microphone apparatus that system can be carried by client, or the microphone apparatus separately set obtain The voice signal of user's input, but because user may be by the shadow of environmental disturbances or other factors in input speech signal Ring, cause a certain degree of distortion of voice signal collected, if subsequently directly matched using the voice signal, that Very possible to occur matching or need the repeatedly successful phenomenon of input ability, not only user experience is poor, and Unnecessary systematic function consumption is also resulted in, therefore the voice signal that need to be inputted to user is further processed, specifically, Feature extraction can be carried out to voice signal, and carries out voice training structure based on those features and generates corresponding speech model.
Consequently, it is possible to during subsequent authentication matches, user experience can be lifted, and ensures to match accuracy.
It should be noted that above-mentioned example is used to illustrate technical scheme and not limit, in the present invention Embodiment in, user biological information is configured according to the actual requirements, and corresponding model generating method also can be according to actual need Ask and be configured, the present invention is not limited thereto.
In step S101, during as included essential information in subscriber identity information, directly it can be inputted by receiving user The mode of essential information obtains relevant information.Further, after essential information is got, can further include to user's input Essential information is verified, such as can be sentenced by way of being verified to the data format of user's input information, data length Whether the information of disconnected user's input is legal, and can demonstrate,prove number to user identity by the form of online query and verify.Value It must illustrate, technological means commonly used in the art is can be selected in specific verification mode, and the present invention is not intended to be limited in any.By setting up The step of verification, the accuracy of the information of user's input can be ensured to a certain extent, when there is apparent error, can be carried automatically Awake user re-starts input, also further improves the Experience Degree of user.
Further, in some preferred embodiments of the present invention, by step S101 collection subscriber identity informations Afterwards, further include step subscriber identity information is encrypted, can further be prevented by the way that subscriber identity information is encrypted Leakage after only data are stolen during transmission or preservation, the present invention are not limited specific cipher mode, Related ins and outs can use conventional data encryption mode, therefore repeat no more.
S102, the subscriber identity information is issued to block catenary system.
Block chain is the new of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, AES Application model, so-called common recognition mechanism are to realize that foundation is trusted, the mathematics of acquisition rights and interests is calculated between different nodes in block catenary system Method.For narrow sense, block chain is a kind of a kind of chain for being sequentially in time combined into data block in a manner of being sequentially connected Formula data structure, and the distributed account book that can not be distorted He can not forge ensured in a manner of cryptography.Broadly, block chain Technology is to verify with data storage using block linked data structure, algorithm is known together using distributed node to generate and update number According to, ensure using the mode of cryptography the safety of data transfer and access, utilize the intelligence being made up of automatized script code to close About come program and a kind of brand-new distributed basis framework of operation data with calculate normal form.
Block chain technology can be applicable to the necks such as intelligent contract, securities trading, ecommerce, Internet of Things and social communication at present Domain.Block catenary system can be divided into following three major types:
Publicly-owned block chain (PublicBlockChains) system, in particular to:Any individual or group all may be used in the world To send transaction, and transaction can obtain effective confirmation of the block chain, and anyone can participate in its common recognition process.Publicly-owned area Block chain is earliest block chain, and most widely used block chain at present, the virtual digit currency of major bitcoins series Publicly-owned block chain is based on, is had in the world and block chain only corresponding to the currency type.
Combine (industry) block chain (ConsortiumBlockChains) system, in particular to:By referring to inside some colony The node of fixed multiple pre-selections is book keeping operation people, and the generation of each block is together decided on that (preselected node participates in altogether by all preselected nodes Knowledge process), other access nodes can participate in business, but keep aloof from accounting procedure (substantially or trustship book keeping operation, simply become Distribution book keeping operation, preselected node number, how to determine each block book keeping operation person turn into the block chain principal risk point), its He anyone can be defined inquiry by the API that the block chain opens.
Privately owned block chain (privateBlockChains) system, in particular to:The general ledger technology of block chain is only used only Kept accounts, can be a company or individual, exclusively enjoy the write-in authority of the block chain, this chain is distributed with other Formula storage scheme is without too big difference.
It is worth noting that, to the type of used block catenary system and unrestricted in the present invention, it can be according to reality The demand on border is configured.
S103, the block catenary system receives and preserves the subscriber identity information, and generates unique identifier.
Block catenary system enters the algorithm according to setting themselves to subscriber identity information when receiving subscriber identity information The associative operation such as row encryption and synchronous preservation, and a unique identifier is generated, return to user.
By above-mentioned steps S101 to S103, collection, issue and the preservation to subscriber authentication information have been completed, and A unique identifier is generated, in simple terms, by above-mentioned steps, has completed user's registration, and obtain one and log in Account.
S104, when carrying out subscriber authentication, based on institute corresponding to the identification code from block catenary system acquisition State subscriber identity information.
When user needs to log on related service system, it is necessary to be verified to user identity, then first by using Subscriber identity information corresponding to the identification code of family input from block catenary system acquisition.When inputting correct identification code, Cai Nengcong Block catenary system gets corresponding subscriber identity information.If input error, can not obtain.
S105, authentication is carried out to active user based on the subscriber identity information.
When carrying out subscriber authentication, not only need to input identification code, and also need to set input to work as according to system Preceding subscriber identity information, wherein current user identities information input content it is identical with the identity information inputted during user's registration or Person part is identical.Specifically, according to described above, one or both of user biological information and essential information can be included. So that authentication information only includes user biological information as an example, when user needs to log in, and carries out authentication, know in input Also need to input user biological information, such as voice messaging after other code.
When system successfully gets the subscriber identity information being stored on block chain according to identification code, according to voice therein Checking is identified come the voice inputted to active user in model, if being proved to be successful, shows to complete authentication, can normally step on Land carries out other operations.
If it should be noted that before subscriber identity information is issued, have and subscriber identity information be encrypted, then This step needs that operation first is decrypted to the subscriber identity information got from block catenary system before authentication, could normally enter The follow-up checking work of row.
As can be seen here, in embodiments of the invention, checking and tool that the checking to subscriber identity information need to be Jing Guo identification code Two steps of checking of body identity information can just smoothly complete, for traditional authentication, it is dual ensure that to log in test The validity of card;Wherein identification code is that block catenary system automatically generates, and can not locally be obtained from client, therefore having itself has one Fixed anti-degree of cracking;Further, by adding the checking of user biological information, the intrusion of malice is further prevented; Further, subscriber identity information is stored in block catenary system, the peace of information storage is also ensure that from bigger degree Quan Xing.
It is worth noting that, realize that user identity is tested in the user ID authentication method provided by the embodiment of the present invention On the basis of card, the information of correlation can also be stored simultaneously, carried out authentication by rear in user, be directly displayed to user.
Based on same inventive concept, present invention also offers a kind of authentication means based on block chain.It refer to Fig. 3, Fig. 3 illustrate the authentication means structural representation based on block chain that a preferred embodiment of the present invention is provided.Such as Fig. 3 Shown, authentication means 300, which include client 301 and operation, block catenary system 302a server 302, and both are mutual Connection, wherein, the mode that both connect can be to pass through the connection of network service or the connection of other forms, this hair It is bright not to be restricted.
Wherein, specifically, client 301 can be the terminal devices such as computer, mobile communication equipment, it provides user's letter Input equipment, such as keyboard, mouse, display etc. are ceased, in certain embodiments, further includes biomedical information acquisition equipment, such as wheat Gram wind, fingerprint capturer etc. are used for the terminal for obtaining the biological information of user.Client 301 can be used for collection user identity letter Breath, and by issuing the subscriber identity information to the block catenary system 302a run on a server 302.
Block catenary system 302a is received and is preserved the subscriber identity information of the issue of client 301, and generates unique identifier, Send to client 301.
When carrying out subscriber authentication, user inputs identification code and identity information, client by client 301 301 based on the subscriber identity information corresponding to the identification code from block catenary system 302a acquisitions, and is based on user's body Part information is local to active user's progress authentication in client 301.
In the present embodiment, the method flow implemented on client 301 and server 302 can refer to real shown in Fig. 1 Example is applied, is not being repeated herein.
A client and a server are only illustrated it is worth noting that, being illustrated in the present embodiment, in its of the present invention In his embodiment, multiple client and multiple servers being included simultaneously, is specifically defined by system design considerations, the present invention is simultaneously It is not limited.
Authentication means provided by the present invention, rely on the safety guarantor that block catenary system realizes subscriber identity information Deposit, it is simple in construction, it is easy to accomplish.
In addition the present invention also provides a kind of computer-readable recording medium, is stored with computer program, its Computer journey Sequence is executed by processor the auth method based on block chain realized described in embodiment illustrated in fig. 1.
It is worth noting that, device embodiment described above is only schematical, wherein described be used as separation unit The unit that part illustrates can be or may not be physically separate, can be as the part that unit is shown or also may be used Not to be physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality Need select some or all of module therein to realize the purpose of this embodiment scheme.Those of ordinary skill in the art exist In the case of not paying performing creative labour, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on such understanding, on The part that technical scheme substantially in other words contributes to prior art is stated to embody in the form of software product, should Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers Make to cause a computer equipment (can be personal computer, server, or network equipment etc.) to perform each implementation Method described in some parts of example or embodiment.
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent substitution and improvements made etc., it should be included in the scope of the protection.

Claims (9)

1. a kind of auth method based on block chain, it is characterised in that methods described includes step:
Gather subscriber identity information;
The subscriber identity information is issued to block catenary system;
The block catenary system receives and preserves the subscriber identity information, and generates unique identifier;
When carrying out subscriber authentication, based on the user identity corresponding to the identification code from block catenary system acquisition Information;
Authentication is carried out to active user based on the subscriber identity information.
2. verification method as claimed in claim 1, it is characterised in that the collection subscriber identity information specifically includes:
Obtain user biological information;
The feature of the user biological information is extracted, and generates biological data model.
3. verification method as claimed in claim 1, it is characterised in that the collection subscriber identity information specifically includes:
Receive the essential information of user's input.
4. verification method as claimed in claim 3, it is characterised in that it is described reception user input essential information step it Afterwards, further include and the essential information is verified.
5. verification method as claimed in claim 1, it is characterised in that after the collection subscriber identity information step, institute Before stating issuing steps, step is further included:The subscriber identity information is encrypted, accordingly, described to active user Before carrying out authentication, to being decrypted from the subscriber identity information corresponding to block chain acquisition.
6. verification method as claimed in claim 1, it is characterised in that when carrying out subscriber authentication, further include collection and work as The identity information of preceding user, accordingly, authentication is carried out to active user based on the subscriber identity information and specifically included, root With the subscriber identity information obtained from the block catenary system matched according to the identity information of the active user, if With identical, then it is verified.
7. a kind of authentication means based on block chain, it is characterised in that described device includes:
An at least client and at least a server, wherein, the client is used to gather subscriber identity information, and passes through hair To the block catenary system operated on the server, the block catenary system receives and preserves institute subscriber identity information described in cloth Subscriber identity information is stated, and generates unique identifier, is sent to the client;
When carrying out subscriber authentication, user inputs the identification code and identity information, the visitor by the client Family end group is based on user's body in the subscriber identity information corresponding to the identification code from block catenary system acquisition Part information carries out authentication to active user.
8. checking device as claimed in claim 7, it is characterised in that the client includes biomedical information acquisition equipment, uses In the biological information for obtaining user.
9. a kind of computer-readable recording medium, is stored with computer program, it is characterised in that the computer program is processed Device performs the auth method realized in claim 1 to 6 described in any one.
CN201710944048.1A 2017-09-30 2017-09-30 A kind of auth method based on block chain, device and computer-readable recording medium Pending CN107786547A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710944048.1A CN107786547A (en) 2017-09-30 2017-09-30 A kind of auth method based on block chain, device and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710944048.1A CN107786547A (en) 2017-09-30 2017-09-30 A kind of auth method based on block chain, device and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107786547A true CN107786547A (en) 2018-03-09

Family

ID=61434670

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710944048.1A Pending CN107786547A (en) 2017-09-30 2017-09-30 A kind of auth method based on block chain, device and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107786547A (en)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108711207A (en) * 2018-05-17 2018-10-26 立旃(上海)科技有限公司 Computer room management system based on block chain and method
CN108712395A (en) * 2018-04-27 2018-10-26 腾讯科技(深圳)有限公司 Account management method, device, server based on block chain and storage medium
CN108712431A (en) * 2018-05-24 2018-10-26 广东工业大学 A kind of traffic information deposit method and device based on alliance's chain
CN108737501A (en) * 2018-04-23 2018-11-02 北京海华鑫安生物信息技术有限责任公司 A kind of DNA date storage methods, equipment and system based on block chain
CN108769057A (en) * 2018-06-15 2018-11-06 北京奇虎科技有限公司 Personal identification method based on block chain and device
CN108833114A (en) * 2018-06-13 2018-11-16 上海交通大学 A kind of decentralization identity authorization system and method based on block chain
CN108881301A (en) * 2018-08-02 2018-11-23 珠海宏桥高科技有限公司 A kind of identity identifying method based on block chain
CN108881259A (en) * 2018-06-30 2018-11-23 江苏恒宝智能系统技术有限公司 A kind of bank's financial management personnel authority setting method and device combined based on block chain and iris recognition
CN108921555A (en) * 2018-06-30 2018-11-30 江苏恒宝智能系统技术有限公司 A kind of auth method and device combined based on block chain and iris recognition
CN109104285A (en) * 2018-07-24 2018-12-28 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN109145703A (en) * 2018-06-14 2019-01-04 北京凌云智链科技有限公司 Intelligent identification method, device, equipment and medium
CN109271769A (en) * 2018-08-24 2019-01-25 广东博云公共平台网络科技有限公司 A kind of Subscriber Management System and user management method
CN109361738A (en) * 2018-09-25 2019-02-19 安徽灵图壹智能科技有限公司 A kind of identity authorization system and method based on block chain network
CN109407663A (en) * 2018-09-04 2019-03-01 上海交通大学 Unmanned information security guarantee method and system based on block chain
CN109447604A (en) * 2018-10-19 2019-03-08 华侨大学 A kind of block chain payment system that security performance is high
CN109493058A (en) * 2018-12-14 2019-03-19 深圳壹账通智能科技有限公司 A kind of personal identification method and relevant device based on block chain
CN109493071A (en) * 2018-10-22 2019-03-19 北京首汽智行科技有限公司 Auth method based on block chain
CN109547462A (en) * 2018-12-14 2019-03-29 深圳壹账通智能科技有限公司 A kind of intelligent logging-on authentication method and relevant device based on block chain
CN109788348A (en) * 2018-12-05 2019-05-21 安徽站乾科技有限公司 A kind of anti-intrusion method based on Intelligent set top box
CN109857769A (en) * 2019-01-09 2019-06-07 平安科技(深圳)有限公司 Drive slip control method, system, equipment and storage medium based on block chain
CN109889479A (en) * 2018-12-21 2019-06-14 中链科技有限公司 User identity based on block chain deposits card, verification method and device and verification system
CN110096861A (en) * 2019-04-12 2019-08-06 檀鹏程 A kind of bi-directional distributed formula authentication system based on biological characteristic
CN110532323A (en) * 2019-09-02 2019-12-03 腾讯科技(深圳)有限公司 Pupilage information processing method, device, electronic equipment and storage medium in block chain network
CN110555296A (en) * 2019-08-01 2019-12-10 阿里巴巴集团控股有限公司 identity verification method, device and equipment based on block chain
CN110602114A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based identity authentication method and device, storage medium and electronic equipment
CN110839002A (en) * 2018-08-15 2020-02-25 华为技术有限公司 Cloud account opening, authentication and access method and device
CN110995670A (en) * 2019-11-20 2020-04-10 深圳市雄帝科技股份有限公司 Block chain-based digital identity information management method and system
CN111294315A (en) * 2018-12-07 2020-06-16 中国移动通信集团贵州有限公司 Block chain-based security authentication method, block chain-based security authentication device, block chain-based security authentication equipment and storage medium
US10756901B2 (en) 2019-08-01 2020-08-25 Alibaba Group Holding Limited Blockchain-based identity authentication method, apparatus, and device
CN111726324A (en) * 2019-03-20 2020-09-29 上海御行信息技术有限公司 Block chain technology-based alliance multi-node network identity authentication system
CN112235795A (en) * 2020-09-09 2021-01-15 广州安食通信息科技有限公司 Wireless network configuration method, system, device and medium based on Internet of things
CN112308060A (en) * 2020-11-20 2021-02-02 上海技术交易所有限公司 Identity certificate generation and identification method, system, computer equipment and storage medium
CN112437441A (en) * 2020-10-22 2021-03-02 山东省科学院自动化研究所 Internet of things-oriented access control system and method based on intelligent contract
CN112464700A (en) * 2020-08-19 2021-03-09 中国银联股份有限公司 Authentication method based on biological characteristic information, computer system and readable medium
CN112513945A (en) * 2018-07-16 2021-03-16 思他信息网络处理英国有限公司 Identity document verification
CN113132362A (en) * 2021-03-31 2021-07-16 青岛中瑞汽车服务有限公司 Trusted authorization method, trusted authorization device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system
CN106789911A (en) * 2016-11-15 2017-05-31 深圳银链科技有限公司 A kind of network identity validation method and system based on block chain
US20170243213A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System to enable contactless access to a transaction terminal using a process data network
CN107147652A (en) * 2017-05-18 2017-09-08 电子科技大学 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170243213A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System to enable contactless access to a transaction terminal using a process data network
CN106789911A (en) * 2016-11-15 2017-05-31 深圳银链科技有限公司 A kind of network identity validation method and system based on block chain
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system
CN107147652A (en) * 2017-05-18 2017-09-08 电子科技大学 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737501A (en) * 2018-04-23 2018-11-02 北京海华鑫安生物信息技术有限责任公司 A kind of DNA date storage methods, equipment and system based on block chain
CN108712395A (en) * 2018-04-27 2018-10-26 腾讯科技(深圳)有限公司 Account management method, device, server based on block chain and storage medium
CN108712395B (en) * 2018-04-27 2022-01-07 腾讯科技(深圳)有限公司 Account management method, device, server and storage medium based on block chain
CN108711207A (en) * 2018-05-17 2018-10-26 立旃(上海)科技有限公司 Computer room management system based on block chain and method
CN108712431B (en) * 2018-05-24 2021-09-21 广东工业大学 Alliance chain-based traffic information storage method and device
CN108712431A (en) * 2018-05-24 2018-10-26 广东工业大学 A kind of traffic information deposit method and device based on alliance's chain
CN108833114A (en) * 2018-06-13 2018-11-16 上海交通大学 A kind of decentralization identity authorization system and method based on block chain
CN109145703A (en) * 2018-06-14 2019-01-04 北京凌云智链科技有限公司 Intelligent identification method, device, equipment and medium
CN108769057A (en) * 2018-06-15 2018-11-06 北京奇虎科技有限公司 Personal identification method based on block chain and device
CN108881259A (en) * 2018-06-30 2018-11-23 江苏恒宝智能系统技术有限公司 A kind of bank's financial management personnel authority setting method and device combined based on block chain and iris recognition
CN108921555A (en) * 2018-06-30 2018-11-30 江苏恒宝智能系统技术有限公司 A kind of auth method and device combined based on block chain and iris recognition
CN112513945A (en) * 2018-07-16 2021-03-16 思他信息网络处理英国有限公司 Identity document verification
CN109104285A (en) * 2018-07-24 2018-12-28 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN109104285B (en) * 2018-07-24 2021-01-26 中国联合网络通信集团有限公司 Block chain real-name authentication method, device, equipment and storage medium
CN108881301A (en) * 2018-08-02 2018-11-23 珠海宏桥高科技有限公司 A kind of identity identifying method based on block chain
CN110839002B (en) * 2018-08-15 2022-05-17 华为云计算技术有限公司 Cloud account opening, authentication and access method and device
CN110839002A (en) * 2018-08-15 2020-02-25 华为技术有限公司 Cloud account opening, authentication and access method and device
CN109271769A (en) * 2018-08-24 2019-01-25 广东博云公共平台网络科技有限公司 A kind of Subscriber Management System and user management method
CN109407663A (en) * 2018-09-04 2019-03-01 上海交通大学 Unmanned information security guarantee method and system based on block chain
CN109361738A (en) * 2018-09-25 2019-02-19 安徽灵图壹智能科技有限公司 A kind of identity authorization system and method based on block chain network
CN109447604A (en) * 2018-10-19 2019-03-08 华侨大学 A kind of block chain payment system that security performance is high
CN109493071A (en) * 2018-10-22 2019-03-19 北京首汽智行科技有限公司 Auth method based on block chain
CN109788348A (en) * 2018-12-05 2019-05-21 安徽站乾科技有限公司 A kind of anti-intrusion method based on Intelligent set top box
CN111294315B (en) * 2018-12-07 2022-08-23 中国移动通信集团贵州有限公司 Block chain-based security authentication method, block chain-based security authentication device, block chain-based security authentication equipment and storage medium
CN111294315A (en) * 2018-12-07 2020-06-16 中国移动通信集团贵州有限公司 Block chain-based security authentication method, block chain-based security authentication device, block chain-based security authentication equipment and storage medium
CN109493058A (en) * 2018-12-14 2019-03-19 深圳壹账通智能科技有限公司 A kind of personal identification method and relevant device based on block chain
CN109547462A (en) * 2018-12-14 2019-03-29 深圳壹账通智能科技有限公司 A kind of intelligent logging-on authentication method and relevant device based on block chain
CN109889479A (en) * 2018-12-21 2019-06-14 中链科技有限公司 User identity based on block chain deposits card, verification method and device and verification system
CN109889479B (en) * 2018-12-21 2022-07-26 中积教育科技有限公司 Block chain-based user identity verification method and device and checking system
CN109857769A (en) * 2019-01-09 2019-06-07 平安科技(深圳)有限公司 Drive slip control method, system, equipment and storage medium based on block chain
CN111726324A (en) * 2019-03-20 2020-09-29 上海御行信息技术有限公司 Block chain technology-based alliance multi-node network identity authentication system
CN110096861A (en) * 2019-04-12 2019-08-06 檀鹏程 A kind of bi-directional distributed formula authentication system based on biological characteristic
US10756901B2 (en) 2019-08-01 2020-08-25 Alibaba Group Holding Limited Blockchain-based identity authentication method, apparatus, and device
CN110555296B (en) * 2019-08-01 2020-08-18 阿里巴巴集团控股有限公司 Identity verification method, device and equipment based on block chain
CN110555296A (en) * 2019-08-01 2019-12-10 阿里巴巴集团控股有限公司 identity verification method, device and equipment based on block chain
CN110532323A (en) * 2019-09-02 2019-12-03 腾讯科技(深圳)有限公司 Pupilage information processing method, device, electronic equipment and storage medium in block chain network
CN110532323B (en) * 2019-09-02 2021-07-30 腾讯科技(深圳)有限公司 Student identity information processing method and device in block chain network, electronic equipment and storage medium
CN110602114A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based identity authentication method and device, storage medium and electronic equipment
CN110995670B (en) * 2019-11-20 2022-02-25 深圳市雄帝科技股份有限公司 Block chain-based digital identity information management method and system
CN110995670A (en) * 2019-11-20 2020-04-10 深圳市雄帝科技股份有限公司 Block chain-based digital identity information management method and system
CN112464700A (en) * 2020-08-19 2021-03-09 中国银联股份有限公司 Authentication method based on biological characteristic information, computer system and readable medium
CN112235795A (en) * 2020-09-09 2021-01-15 广州安食通信息科技有限公司 Wireless network configuration method, system, device and medium based on Internet of things
CN112437441A (en) * 2020-10-22 2021-03-02 山东省科学院自动化研究所 Internet of things-oriented access control system and method based on intelligent contract
CN112437441B (en) * 2020-10-22 2022-08-05 山东省科学院自动化研究所 Internet of things-oriented access control system and method based on intelligent contract
CN112308060A (en) * 2020-11-20 2021-02-02 上海技术交易所有限公司 Identity certificate generation and identification method, system, computer equipment and storage medium
CN113132362A (en) * 2021-03-31 2021-07-16 青岛中瑞汽车服务有限公司 Trusted authorization method, trusted authorization device, electronic equipment and storage medium
CN113132362B (en) * 2021-03-31 2022-03-22 青岛中瑞汽车服务有限公司 Trusted authorization method, trusted authorization device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107786547A (en) A kind of auth method based on block chain, device and computer-readable recording medium
CN106233663B (en) System and method for carrying strong authentication event on the different channels
CN102880960B (en) Based on the payment by using short messages method and system of fingerprint recognition mobile phone
CN108989278A (en) Identification service system and method
CN110226165A (en) Pass through updatable data structure detection electronic penetration person
CN107735999A (en) The certification for passing through multiple approach based on functions of the equipments and user's request
KR101415887B1 (en) Method for providing services of user identification processing
CN110326251A (en) The system and method that the general dispersion solution of user is verified using cross validation feature are provided
CN106952096A (en) Security certification system, method and the credible identifying device of client of client device
US20120264405A1 (en) Verification of transactional integrity
CN106875173A (en) A kind of method of authenticating transactions
CN106779716A (en) Authentication method, apparatus and system based on block chain account address
CN105827571B (en) Multi-modal biological characteristic authentication method and equipment based on UAF agreement
CN107122977A (en) A kind of payment system based on bio-identification
CN107240010B (en) Method and system for transferring digital currency to digital currency chip card
CN109242663A (en) A kind of bookkeeping methods and system based on block chain technology
CN105550928A (en) System and method of network remote account opening for commercial bank
CN103024706A (en) Short message based device and short message based method for bidirectional multiple-factor dynamic identity authentication
CN105205944A (en) Self-service deposit and withdrawal system based on intelligent terminal
CN104346727A (en) Handset authentication payment system and method based on human natural characteristic matching
CN107548059A (en) A kind of authentication method and system
CN105264817B (en) Multi-factor authentication technology
CN107025558A (en) A kind of transaction system and transaction processing method
CN105405005B (en) Mobile wallet method of payment based on optic communication and near-field communication
CN106921655A (en) A kind of business authorization method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180309