CN107786547A - A kind of auth method based on block chain, device and computer-readable recording medium - Google Patents
A kind of auth method based on block chain, device and computer-readable recording medium Download PDFInfo
- Publication number
- CN107786547A CN107786547A CN201710944048.1A CN201710944048A CN107786547A CN 107786547 A CN107786547 A CN 107786547A CN 201710944048 A CN201710944048 A CN 201710944048A CN 107786547 A CN107786547 A CN 107786547A
- Authority
- CN
- China
- Prior art keywords
- identity information
- subscriber identity
- user
- information
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to field of computer technology, there is provided a kind of auth method based on block chain, includes step:Gather subscriber identity information;The subscriber identity information is issued to block catenary system;The block catenary system receives and preserves the subscriber identity information, and generates unique identifier;When carrying out subscriber authentication, based on the subscriber identity information corresponding to the identification code from block catenary system acquisition;Authentication is carried out to active user based on the subscriber identity information.By the above method, the security and credit rating of information preservation are improved, and improves the reliable and accuracy of subscriber authentication.In addition present invention also offers a kind of authentication means and computer-readable recording medium based on block chain.
Description
Technical field
The present invention on field of computer technology, more particularly to a kind of auth method based on block chain, device and
Computer-readable recording medium.
Background technology
Authentication is also referred to as " authentication " or " identity discriminating ", refers in computer and computer network system really
Recognize the process of operator's identity, so that it is determined that whether the user has access and the access right to certain resource, and then make meter
Calculation machine and the access strategy of network system can be performed reliably and efficiently, prevent attacker from palming off validated user and obtaining resource
Access rights, ensure the safety of system and data, and authorize the legitimate interests of visitor.
The principle of network identity validation is to verify identity by calling open interface at present, however, it can easily leakage is used
Family individual's real information, and anyone can be transferred through the real information data that interface arbitrarily obtains some user, credit
Spend low and fluctuation of service.
Therefore, it is necessary to design a kind of network identity validation method based on block chain, realization will not cause true identity
Leakage, raising credit rating is low, and good operation stability.
The content of the invention
Based on above-mentioned technical problem, the invention provides a kind of auth method based on block chain, device and calculating
Machine readable storage medium storing program for executing, specifically, on the one hand, the auth method provided by the invention based on block chain, include step:Adopt
Collect subscriber identity information;The subscriber identity information is issued to block catenary system;The block catenary system is received and preserved described
Subscriber identity information, and generate unique identifier;When carrying out subscriber authentication, based on the identification code from the block chain
The subscriber identity information corresponding to system acquisition;Authentication is carried out to active user based on the subscriber identity information.
In one embodiment, the collection subscriber identity information specifically includes:Obtain user biological information;Extract the use
The feature of family biological information, and generate biological data model.
In one embodiment, the collection subscriber identity information specifically includes:Receive the essential information of user's input.
In one embodiment, after the essential information step of the reception user input, further include to the basic letter
Breath is carried out
Verification.
In one embodiment, after the collection subscriber identity information step, before the issuing steps, step is further included
Suddenly:The subscriber identity information is encrypted, accordingly, it is described authentication is carried out to active user before, to from institute
The subscriber identity information corresponding to stating the acquisition of block chain is decrypted.
In one embodiment, when carrying out subscriber authentication, the identity information of collection active user is further included, accordingly
, authentication is carried out to active user based on the subscriber identity information and specifically included, according to the identity of the active user
Information with the subscriber identity information obtained from the block catenary system matched, if matching is identical, is verified.
On the other hand, the authentication means provided by the invention based on block chain, described device include:An at least client
End and an at least server, wherein, the client is used to gather subscriber identity information, and by issuing the user identity
To the block catenary system operated on the server, the block catenary system receives and preserves the user identity letter information
Breath, and unique identifier is generated, send to the client;When carrying out subscriber authentication, user passes through the client
The identification code and identity information are inputted, the client is based on corresponding to the identification code from block catenary system acquisition
The subscriber identity information, and authentication is carried out to active user based on the subscriber identity information.
In one embodiment, the client includes biomedical information acquisition equipment, for obtaining the biological information of user.
Further, present invention also offers a kind of computer-readable recording medium, computer program is stored with, wherein
The computer program, which is executed by processor, realizes the above-mentioned auth method based on block chain.
In summary, technical scheme provided by the present invention is especially by the decentralization by block catenary system, opening
Property, autonomy, information can not tamper, anonymity the features such as, preserve subscriber identity information, improve information preservation security
And credit rating;And in subscriber authentication, first based on block chain generation unique identifier carry out preliminary identification, then to
Family identity information carries out substantive checking, further improves the accuracy and reliability of subscriber identity information checking;More enter
One step, before issue subscriber identity information to block catenary system, by the encryption to subscriber identity information, can more it enter
The improving information safety degree of one step, reduce the possibility of subscriber identity information leakage.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, for those of ordinary skill in the art
Speech, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 illustrates the auth method flow chart based on block chain that a preferred embodiment of the present invention is provided;
Fig. 2 illustrates the method flow diagram that user biological information is gathered in embodiment illustrated in fig. 1;
Fig. 3 illustrates the authentication means structural representation based on block chain that a preferred embodiment of the present invention is provided.
Embodiment
In order that those skilled in the art more fully understand the technical scheme in the present invention, below in conjunction with of the invention real
The accompanying drawing in example is applied, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described implementation
Example only part of the embodiment of the present invention, rather than whole embodiments.It is common based on the embodiment in the present invention, this area
The every other embodiment that technical staff is obtained under the premise of creative work is not made, should all belong to protection of the present invention
Scope.
Fig. 1 is refer to, Fig. 1 illustrates the auth method stream based on block chain that a preferred embodiment of the present invention is provided
Cheng Tu.As shown in figure 1, methods described specifically comprises the steps of:
S101, gather subscriber identity information.
Specifically, subscriber identity information can include user biological information and essential information one or two therein, its
Middle user biological packet can be used for the biological characteristic of unique identification user identity, essential information bag containing fingerprint, vocal print, iris etc.
Containing text messages such as name, identification card numbers.
Fig. 2 is refer to, Fig. 2 illustrates the method flow diagram that user biological information is gathered in embodiment illustrated in fig. 1, such as Fig. 2 institutes
Show, when gathering user biological information, specifically comprising step:
S201, obtain user biological information.
User biological information can be specifically acquired by the collecting device of correlation according to specific demand.For example,
If the identity information of user is fingerprint, then the fingerprint of user will be obtained by fingerprint collecting equipment.
S202, extracts the feature of the user biological information, and generates biological data model.
After user biological information is got, calculation system need to be carried out to the information, in order to preserve and transmit, tool
Body, can the feature based on user biological information, by the training of training pattern, biological data model corresponding to generation.Below
It will be illustrated by instantiation.
By taking vocal print as an example, microphone apparatus that system can be carried by client, or the microphone apparatus separately set obtain
The voice signal of user's input, but because user may be by the shadow of environmental disturbances or other factors in input speech signal
Ring, cause a certain degree of distortion of voice signal collected, if subsequently directly matched using the voice signal, that
Very possible to occur matching or need the repeatedly successful phenomenon of input ability, not only user experience is poor, and
Unnecessary systematic function consumption is also resulted in, therefore the voice signal that need to be inputted to user is further processed, specifically,
Feature extraction can be carried out to voice signal, and carries out voice training structure based on those features and generates corresponding speech model.
Consequently, it is possible to during subsequent authentication matches, user experience can be lifted, and ensures to match accuracy.
It should be noted that above-mentioned example is used to illustrate technical scheme and not limit, in the present invention
Embodiment in, user biological information is configured according to the actual requirements, and corresponding model generating method also can be according to actual need
Ask and be configured, the present invention is not limited thereto.
In step S101, during as included essential information in subscriber identity information, directly it can be inputted by receiving user
The mode of essential information obtains relevant information.Further, after essential information is got, can further include to user's input
Essential information is verified, such as can be sentenced by way of being verified to the data format of user's input information, data length
Whether the information of disconnected user's input is legal, and can demonstrate,prove number to user identity by the form of online query and verify.Value
It must illustrate, technological means commonly used in the art is can be selected in specific verification mode, and the present invention is not intended to be limited in any.By setting up
The step of verification, the accuracy of the information of user's input can be ensured to a certain extent, when there is apparent error, can be carried automatically
Awake user re-starts input, also further improves the Experience Degree of user.
Further, in some preferred embodiments of the present invention, by step S101 collection subscriber identity informations
Afterwards, further include step subscriber identity information is encrypted, can further be prevented by the way that subscriber identity information is encrypted
Leakage after only data are stolen during transmission or preservation, the present invention are not limited specific cipher mode,
Related ins and outs can use conventional data encryption mode, therefore repeat no more.
S102, the subscriber identity information is issued to block catenary system.
Block chain is the new of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, AES
Application model, so-called common recognition mechanism are to realize that foundation is trusted, the mathematics of acquisition rights and interests is calculated between different nodes in block catenary system
Method.For narrow sense, block chain is a kind of a kind of chain for being sequentially in time combined into data block in a manner of being sequentially connected
Formula data structure, and the distributed account book that can not be distorted He can not forge ensured in a manner of cryptography.Broadly, block chain
Technology is to verify with data storage using block linked data structure, algorithm is known together using distributed node to generate and update number
According to, ensure using the mode of cryptography the safety of data transfer and access, utilize the intelligence being made up of automatized script code to close
About come program and a kind of brand-new distributed basis framework of operation data with calculate normal form.
Block chain technology can be applicable to the necks such as intelligent contract, securities trading, ecommerce, Internet of Things and social communication at present
Domain.Block catenary system can be divided into following three major types:
Publicly-owned block chain (PublicBlockChains) system, in particular to:Any individual or group all may be used in the world
To send transaction, and transaction can obtain effective confirmation of the block chain, and anyone can participate in its common recognition process.Publicly-owned area
Block chain is earliest block chain, and most widely used block chain at present, the virtual digit currency of major bitcoins series
Publicly-owned block chain is based on, is had in the world and block chain only corresponding to the currency type.
Combine (industry) block chain (ConsortiumBlockChains) system, in particular to:By referring to inside some colony
The node of fixed multiple pre-selections is book keeping operation people, and the generation of each block is together decided on that (preselected node participates in altogether by all preselected nodes
Knowledge process), other access nodes can participate in business, but keep aloof from accounting procedure (substantially or trustship book keeping operation, simply become
Distribution book keeping operation, preselected node number, how to determine each block book keeping operation person turn into the block chain principal risk point), its
He anyone can be defined inquiry by the API that the block chain opens.
Privately owned block chain (privateBlockChains) system, in particular to:The general ledger technology of block chain is only used only
Kept accounts, can be a company or individual, exclusively enjoy the write-in authority of the block chain, this chain is distributed with other
Formula storage scheme is without too big difference.
It is worth noting that, to the type of used block catenary system and unrestricted in the present invention, it can be according to reality
The demand on border is configured.
S103, the block catenary system receives and preserves the subscriber identity information, and generates unique identifier.
Block catenary system enters the algorithm according to setting themselves to subscriber identity information when receiving subscriber identity information
The associative operation such as row encryption and synchronous preservation, and a unique identifier is generated, return to user.
By above-mentioned steps S101 to S103, collection, issue and the preservation to subscriber authentication information have been completed, and
A unique identifier is generated, in simple terms, by above-mentioned steps, has completed user's registration, and obtain one and log in
Account.
S104, when carrying out subscriber authentication, based on institute corresponding to the identification code from block catenary system acquisition
State subscriber identity information.
When user needs to log on related service system, it is necessary to be verified to user identity, then first by using
Subscriber identity information corresponding to the identification code of family input from block catenary system acquisition.When inputting correct identification code, Cai Nengcong
Block catenary system gets corresponding subscriber identity information.If input error, can not obtain.
S105, authentication is carried out to active user based on the subscriber identity information.
When carrying out subscriber authentication, not only need to input identification code, and also need to set input to work as according to system
Preceding subscriber identity information, wherein current user identities information input content it is identical with the identity information inputted during user's registration or
Person part is identical.Specifically, according to described above, one or both of user biological information and essential information can be included.
So that authentication information only includes user biological information as an example, when user needs to log in, and carries out authentication, know in input
Also need to input user biological information, such as voice messaging after other code.
When system successfully gets the subscriber identity information being stored on block chain according to identification code, according to voice therein
Checking is identified come the voice inputted to active user in model, if being proved to be successful, shows to complete authentication, can normally step on
Land carries out other operations.
If it should be noted that before subscriber identity information is issued, have and subscriber identity information be encrypted, then
This step needs that operation first is decrypted to the subscriber identity information got from block catenary system before authentication, could normally enter
The follow-up checking work of row.
As can be seen here, in embodiments of the invention, checking and tool that the checking to subscriber identity information need to be Jing Guo identification code
Two steps of checking of body identity information can just smoothly complete, for traditional authentication, it is dual ensure that to log in test
The validity of card;Wherein identification code is that block catenary system automatically generates, and can not locally be obtained from client, therefore having itself has one
Fixed anti-degree of cracking;Further, by adding the checking of user biological information, the intrusion of malice is further prevented;
Further, subscriber identity information is stored in block catenary system, the peace of information storage is also ensure that from bigger degree
Quan Xing.
It is worth noting that, realize that user identity is tested in the user ID authentication method provided by the embodiment of the present invention
On the basis of card, the information of correlation can also be stored simultaneously, carried out authentication by rear in user, be directly displayed to user.
Based on same inventive concept, present invention also offers a kind of authentication means based on block chain.It refer to
Fig. 3, Fig. 3 illustrate the authentication means structural representation based on block chain that a preferred embodiment of the present invention is provided.Such as Fig. 3
Shown, authentication means 300, which include client 301 and operation, block catenary system 302a server 302, and both are mutual
Connection, wherein, the mode that both connect can be to pass through the connection of network service or the connection of other forms, this hair
It is bright not to be restricted.
Wherein, specifically, client 301 can be the terminal devices such as computer, mobile communication equipment, it provides user's letter
Input equipment, such as keyboard, mouse, display etc. are ceased, in certain embodiments, further includes biomedical information acquisition equipment, such as wheat
Gram wind, fingerprint capturer etc. are used for the terminal for obtaining the biological information of user.Client 301 can be used for collection user identity letter
Breath, and by issuing the subscriber identity information to the block catenary system 302a run on a server 302.
Block catenary system 302a is received and is preserved the subscriber identity information of the issue of client 301, and generates unique identifier,
Send to client 301.
When carrying out subscriber authentication, user inputs identification code and identity information, client by client 301
301 based on the subscriber identity information corresponding to the identification code from block catenary system 302a acquisitions, and is based on user's body
Part information is local to active user's progress authentication in client 301.
In the present embodiment, the method flow implemented on client 301 and server 302 can refer to real shown in Fig. 1
Example is applied, is not being repeated herein.
A client and a server are only illustrated it is worth noting that, being illustrated in the present embodiment, in its of the present invention
In his embodiment, multiple client and multiple servers being included simultaneously, is specifically defined by system design considerations, the present invention is simultaneously
It is not limited.
Authentication means provided by the present invention, rely on the safety guarantor that block catenary system realizes subscriber identity information
Deposit, it is simple in construction, it is easy to accomplish.
In addition the present invention also provides a kind of computer-readable recording medium, is stored with computer program, its Computer journey
Sequence is executed by processor the auth method based on block chain realized described in embodiment illustrated in fig. 1.
It is worth noting that, device embodiment described above is only schematical, wherein described be used as separation unit
The unit that part illustrates can be or may not be physically separate, can be as the part that unit is shown or also may be used
Not to be physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality
Need select some or all of module therein to realize the purpose of this embodiment scheme.Those of ordinary skill in the art exist
In the case of not paying performing creative labour, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on such understanding, on
The part that technical scheme substantially in other words contributes to prior art is stated to embody in the form of software product, should
Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers
Make to cause a computer equipment (can be personal computer, server, or network equipment etc.) to perform each implementation
Method described in some parts of example or embodiment.
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent substitution and improvements made etc., it should be included in the scope of the protection.
Claims (9)
1. a kind of auth method based on block chain, it is characterised in that methods described includes step:
Gather subscriber identity information;
The subscriber identity information is issued to block catenary system;
The block catenary system receives and preserves the subscriber identity information, and generates unique identifier;
When carrying out subscriber authentication, based on the user identity corresponding to the identification code from block catenary system acquisition
Information;
Authentication is carried out to active user based on the subscriber identity information.
2. verification method as claimed in claim 1, it is characterised in that the collection subscriber identity information specifically includes:
Obtain user biological information;
The feature of the user biological information is extracted, and generates biological data model.
3. verification method as claimed in claim 1, it is characterised in that the collection subscriber identity information specifically includes:
Receive the essential information of user's input.
4. verification method as claimed in claim 3, it is characterised in that it is described reception user input essential information step it
Afterwards, further include and the essential information is verified.
5. verification method as claimed in claim 1, it is characterised in that after the collection subscriber identity information step, institute
Before stating issuing steps, step is further included:The subscriber identity information is encrypted, accordingly, described to active user
Before carrying out authentication, to being decrypted from the subscriber identity information corresponding to block chain acquisition.
6. verification method as claimed in claim 1, it is characterised in that when carrying out subscriber authentication, further include collection and work as
The identity information of preceding user, accordingly, authentication is carried out to active user based on the subscriber identity information and specifically included, root
With the subscriber identity information obtained from the block catenary system matched according to the identity information of the active user, if
With identical, then it is verified.
7. a kind of authentication means based on block chain, it is characterised in that described device includes:
An at least client and at least a server, wherein, the client is used to gather subscriber identity information, and passes through hair
To the block catenary system operated on the server, the block catenary system receives and preserves institute subscriber identity information described in cloth
Subscriber identity information is stated, and generates unique identifier, is sent to the client;
When carrying out subscriber authentication, user inputs the identification code and identity information, the visitor by the client
Family end group is based on user's body in the subscriber identity information corresponding to the identification code from block catenary system acquisition
Part information carries out authentication to active user.
8. checking device as claimed in claim 7, it is characterised in that the client includes biomedical information acquisition equipment, uses
In the biological information for obtaining user.
9. a kind of computer-readable recording medium, is stored with computer program, it is characterised in that the computer program is processed
Device performs the auth method realized in claim 1 to 6 described in any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710944048.1A CN107786547A (en) | 2017-09-30 | 2017-09-30 | A kind of auth method based on block chain, device and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710944048.1A CN107786547A (en) | 2017-09-30 | 2017-09-30 | A kind of auth method based on block chain, device and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107786547A true CN107786547A (en) | 2018-03-09 |
Family
ID=61434670
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710944048.1A Pending CN107786547A (en) | 2017-09-30 | 2017-09-30 | A kind of auth method based on block chain, device and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107786547A (en) |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108711207A (en) * | 2018-05-17 | 2018-10-26 | 立旃(上海)科技有限公司 | Computer room management system based on block chain and method |
CN108712395A (en) * | 2018-04-27 | 2018-10-26 | 腾讯科技(深圳)有限公司 | Account management method, device, server based on block chain and storage medium |
CN108712431A (en) * | 2018-05-24 | 2018-10-26 | 广东工业大学 | A kind of traffic information deposit method and device based on alliance's chain |
CN108737501A (en) * | 2018-04-23 | 2018-11-02 | 北京海华鑫安生物信息技术有限责任公司 | A kind of DNA date storage methods, equipment and system based on block chain |
CN108769057A (en) * | 2018-06-15 | 2018-11-06 | 北京奇虎科技有限公司 | Personal identification method based on block chain and device |
CN108833114A (en) * | 2018-06-13 | 2018-11-16 | 上海交通大学 | A kind of decentralization identity authorization system and method based on block chain |
CN108881301A (en) * | 2018-08-02 | 2018-11-23 | 珠海宏桥高科技有限公司 | A kind of identity identifying method based on block chain |
CN108881259A (en) * | 2018-06-30 | 2018-11-23 | 江苏恒宝智能系统技术有限公司 | A kind of bank's financial management personnel authority setting method and device combined based on block chain and iris recognition |
CN108921555A (en) * | 2018-06-30 | 2018-11-30 | 江苏恒宝智能系统技术有限公司 | A kind of auth method and device combined based on block chain and iris recognition |
CN109104285A (en) * | 2018-07-24 | 2018-12-28 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN109145703A (en) * | 2018-06-14 | 2019-01-04 | 北京凌云智链科技有限公司 | Intelligent identification method, device, equipment and medium |
CN109271769A (en) * | 2018-08-24 | 2019-01-25 | 广东博云公共平台网络科技有限公司 | A kind of Subscriber Management System and user management method |
CN109361738A (en) * | 2018-09-25 | 2019-02-19 | 安徽灵图壹智能科技有限公司 | A kind of identity authorization system and method based on block chain network |
CN109407663A (en) * | 2018-09-04 | 2019-03-01 | 上海交通大学 | Unmanned information security guarantee method and system based on block chain |
CN109447604A (en) * | 2018-10-19 | 2019-03-08 | 华侨大学 | A kind of block chain payment system that security performance is high |
CN109493058A (en) * | 2018-12-14 | 2019-03-19 | 深圳壹账通智能科技有限公司 | A kind of personal identification method and relevant device based on block chain |
CN109493071A (en) * | 2018-10-22 | 2019-03-19 | 北京首汽智行科技有限公司 | Auth method based on block chain |
CN109547462A (en) * | 2018-12-14 | 2019-03-29 | 深圳壹账通智能科技有限公司 | A kind of intelligent logging-on authentication method and relevant device based on block chain |
CN109788348A (en) * | 2018-12-05 | 2019-05-21 | 安徽站乾科技有限公司 | A kind of anti-intrusion method based on Intelligent set top box |
CN109857769A (en) * | 2019-01-09 | 2019-06-07 | 平安科技(深圳)有限公司 | Drive slip control method, system, equipment and storage medium based on block chain |
CN109889479A (en) * | 2018-12-21 | 2019-06-14 | 中链科技有限公司 | User identity based on block chain deposits card, verification method and device and verification system |
CN110096861A (en) * | 2019-04-12 | 2019-08-06 | 檀鹏程 | A kind of bi-directional distributed formula authentication system based on biological characteristic |
CN110532323A (en) * | 2019-09-02 | 2019-12-03 | 腾讯科技(深圳)有限公司 | Pupilage information processing method, device, electronic equipment and storage medium in block chain network |
CN110555296A (en) * | 2019-08-01 | 2019-12-10 | 阿里巴巴集团控股有限公司 | identity verification method, device and equipment based on block chain |
CN110602114A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain-based identity authentication method and device, storage medium and electronic equipment |
CN110839002A (en) * | 2018-08-15 | 2020-02-25 | 华为技术有限公司 | Cloud account opening, authentication and access method and device |
CN110995670A (en) * | 2019-11-20 | 2020-04-10 | 深圳市雄帝科技股份有限公司 | Block chain-based digital identity information management method and system |
CN111294315A (en) * | 2018-12-07 | 2020-06-16 | 中国移动通信集团贵州有限公司 | Block chain-based security authentication method, block chain-based security authentication device, block chain-based security authentication equipment and storage medium |
US10756901B2 (en) | 2019-08-01 | 2020-08-25 | Alibaba Group Holding Limited | Blockchain-based identity authentication method, apparatus, and device |
CN111726324A (en) * | 2019-03-20 | 2020-09-29 | 上海御行信息技术有限公司 | Block chain technology-based alliance multi-node network identity authentication system |
CN112235795A (en) * | 2020-09-09 | 2021-01-15 | 广州安食通信息科技有限公司 | Wireless network configuration method, system, device and medium based on Internet of things |
CN112308060A (en) * | 2020-11-20 | 2021-02-02 | 上海技术交易所有限公司 | Identity certificate generation and identification method, system, computer equipment and storage medium |
CN112437441A (en) * | 2020-10-22 | 2021-03-02 | 山东省科学院自动化研究所 | Internet of things-oriented access control system and method based on intelligent contract |
CN112464700A (en) * | 2020-08-19 | 2021-03-09 | 中国银联股份有限公司 | Authentication method based on biological characteristic information, computer system and readable medium |
CN112513945A (en) * | 2018-07-16 | 2021-03-16 | 思他信息网络处理英国有限公司 | Identity document verification |
CN113132362A (en) * | 2021-03-31 | 2021-07-16 | 青岛中瑞汽车服务有限公司 | Trusted authorization method, trusted authorization device, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789047A (en) * | 2017-03-03 | 2017-05-31 | 钱德君 | A kind of block chain identification system |
CN106789911A (en) * | 2016-11-15 | 2017-05-31 | 深圳银链科技有限公司 | A kind of network identity validation method and system based on block chain |
US20170243213A1 (en) * | 2016-02-22 | 2017-08-24 | Bank Of America Corporation | System to enable contactless access to a transaction terminal using a process data network |
CN107147652A (en) * | 2017-05-18 | 2017-09-08 | 电子科技大学 | A kind of safety fusion authentication method of the polymorphic identity of user based on block chain |
-
2017
- 2017-09-30 CN CN201710944048.1A patent/CN107786547A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170243213A1 (en) * | 2016-02-22 | 2017-08-24 | Bank Of America Corporation | System to enable contactless access to a transaction terminal using a process data network |
CN106789911A (en) * | 2016-11-15 | 2017-05-31 | 深圳银链科技有限公司 | A kind of network identity validation method and system based on block chain |
CN106789047A (en) * | 2017-03-03 | 2017-05-31 | 钱德君 | A kind of block chain identification system |
CN107147652A (en) * | 2017-05-18 | 2017-09-08 | 电子科技大学 | A kind of safety fusion authentication method of the polymorphic identity of user based on block chain |
Cited By (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108737501A (en) * | 2018-04-23 | 2018-11-02 | 北京海华鑫安生物信息技术有限责任公司 | A kind of DNA date storage methods, equipment and system based on block chain |
CN108712395A (en) * | 2018-04-27 | 2018-10-26 | 腾讯科技(深圳)有限公司 | Account management method, device, server based on block chain and storage medium |
CN108712395B (en) * | 2018-04-27 | 2022-01-07 | 腾讯科技(深圳)有限公司 | Account management method, device, server and storage medium based on block chain |
CN108711207A (en) * | 2018-05-17 | 2018-10-26 | 立旃(上海)科技有限公司 | Computer room management system based on block chain and method |
CN108712431B (en) * | 2018-05-24 | 2021-09-21 | 广东工业大学 | Alliance chain-based traffic information storage method and device |
CN108712431A (en) * | 2018-05-24 | 2018-10-26 | 广东工业大学 | A kind of traffic information deposit method and device based on alliance's chain |
CN108833114A (en) * | 2018-06-13 | 2018-11-16 | 上海交通大学 | A kind of decentralization identity authorization system and method based on block chain |
CN109145703A (en) * | 2018-06-14 | 2019-01-04 | 北京凌云智链科技有限公司 | Intelligent identification method, device, equipment and medium |
CN108769057A (en) * | 2018-06-15 | 2018-11-06 | 北京奇虎科技有限公司 | Personal identification method based on block chain and device |
CN108881259A (en) * | 2018-06-30 | 2018-11-23 | 江苏恒宝智能系统技术有限公司 | A kind of bank's financial management personnel authority setting method and device combined based on block chain and iris recognition |
CN108921555A (en) * | 2018-06-30 | 2018-11-30 | 江苏恒宝智能系统技术有限公司 | A kind of auth method and device combined based on block chain and iris recognition |
CN112513945A (en) * | 2018-07-16 | 2021-03-16 | 思他信息网络处理英国有限公司 | Identity document verification |
CN109104285A (en) * | 2018-07-24 | 2018-12-28 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN109104285B (en) * | 2018-07-24 | 2021-01-26 | 中国联合网络通信集团有限公司 | Block chain real-name authentication method, device, equipment and storage medium |
CN108881301A (en) * | 2018-08-02 | 2018-11-23 | 珠海宏桥高科技有限公司 | A kind of identity identifying method based on block chain |
CN110839002B (en) * | 2018-08-15 | 2022-05-17 | 华为云计算技术有限公司 | Cloud account opening, authentication and access method and device |
CN110839002A (en) * | 2018-08-15 | 2020-02-25 | 华为技术有限公司 | Cloud account opening, authentication and access method and device |
CN109271769A (en) * | 2018-08-24 | 2019-01-25 | 广东博云公共平台网络科技有限公司 | A kind of Subscriber Management System and user management method |
CN109407663A (en) * | 2018-09-04 | 2019-03-01 | 上海交通大学 | Unmanned information security guarantee method and system based on block chain |
CN109361738A (en) * | 2018-09-25 | 2019-02-19 | 安徽灵图壹智能科技有限公司 | A kind of identity authorization system and method based on block chain network |
CN109447604A (en) * | 2018-10-19 | 2019-03-08 | 华侨大学 | A kind of block chain payment system that security performance is high |
CN109493071A (en) * | 2018-10-22 | 2019-03-19 | 北京首汽智行科技有限公司 | Auth method based on block chain |
CN109788348A (en) * | 2018-12-05 | 2019-05-21 | 安徽站乾科技有限公司 | A kind of anti-intrusion method based on Intelligent set top box |
CN111294315B (en) * | 2018-12-07 | 2022-08-23 | 中国移动通信集团贵州有限公司 | Block chain-based security authentication method, block chain-based security authentication device, block chain-based security authentication equipment and storage medium |
CN111294315A (en) * | 2018-12-07 | 2020-06-16 | 中国移动通信集团贵州有限公司 | Block chain-based security authentication method, block chain-based security authentication device, block chain-based security authentication equipment and storage medium |
CN109493058A (en) * | 2018-12-14 | 2019-03-19 | 深圳壹账通智能科技有限公司 | A kind of personal identification method and relevant device based on block chain |
CN109547462A (en) * | 2018-12-14 | 2019-03-29 | 深圳壹账通智能科技有限公司 | A kind of intelligent logging-on authentication method and relevant device based on block chain |
CN109889479A (en) * | 2018-12-21 | 2019-06-14 | 中链科技有限公司 | User identity based on block chain deposits card, verification method and device and verification system |
CN109889479B (en) * | 2018-12-21 | 2022-07-26 | 中积教育科技有限公司 | Block chain-based user identity verification method and device and checking system |
CN109857769A (en) * | 2019-01-09 | 2019-06-07 | 平安科技(深圳)有限公司 | Drive slip control method, system, equipment and storage medium based on block chain |
CN111726324A (en) * | 2019-03-20 | 2020-09-29 | 上海御行信息技术有限公司 | Block chain technology-based alliance multi-node network identity authentication system |
CN110096861A (en) * | 2019-04-12 | 2019-08-06 | 檀鹏程 | A kind of bi-directional distributed formula authentication system based on biological characteristic |
US10756901B2 (en) | 2019-08-01 | 2020-08-25 | Alibaba Group Holding Limited | Blockchain-based identity authentication method, apparatus, and device |
CN110555296B (en) * | 2019-08-01 | 2020-08-18 | 阿里巴巴集团控股有限公司 | Identity verification method, device and equipment based on block chain |
CN110555296A (en) * | 2019-08-01 | 2019-12-10 | 阿里巴巴集团控股有限公司 | identity verification method, device and equipment based on block chain |
CN110532323A (en) * | 2019-09-02 | 2019-12-03 | 腾讯科技(深圳)有限公司 | Pupilage information processing method, device, electronic equipment and storage medium in block chain network |
CN110532323B (en) * | 2019-09-02 | 2021-07-30 | 腾讯科技(深圳)有限公司 | Student identity information processing method and device in block chain network, electronic equipment and storage medium |
CN110602114A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain-based identity authentication method and device, storage medium and electronic equipment |
CN110995670B (en) * | 2019-11-20 | 2022-02-25 | 深圳市雄帝科技股份有限公司 | Block chain-based digital identity information management method and system |
CN110995670A (en) * | 2019-11-20 | 2020-04-10 | 深圳市雄帝科技股份有限公司 | Block chain-based digital identity information management method and system |
CN112464700A (en) * | 2020-08-19 | 2021-03-09 | 中国银联股份有限公司 | Authentication method based on biological characteristic information, computer system and readable medium |
CN112235795A (en) * | 2020-09-09 | 2021-01-15 | 广州安食通信息科技有限公司 | Wireless network configuration method, system, device and medium based on Internet of things |
CN112437441A (en) * | 2020-10-22 | 2021-03-02 | 山东省科学院自动化研究所 | Internet of things-oriented access control system and method based on intelligent contract |
CN112437441B (en) * | 2020-10-22 | 2022-08-05 | 山东省科学院自动化研究所 | Internet of things-oriented access control system and method based on intelligent contract |
CN112308060A (en) * | 2020-11-20 | 2021-02-02 | 上海技术交易所有限公司 | Identity certificate generation and identification method, system, computer equipment and storage medium |
CN113132362A (en) * | 2021-03-31 | 2021-07-16 | 青岛中瑞汽车服务有限公司 | Trusted authorization method, trusted authorization device, electronic equipment and storage medium |
CN113132362B (en) * | 2021-03-31 | 2022-03-22 | 青岛中瑞汽车服务有限公司 | Trusted authorization method, trusted authorization device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107786547A (en) | A kind of auth method based on block chain, device and computer-readable recording medium | |
CN106233663B (en) | System and method for carrying strong authentication event on the different channels | |
CN102880960B (en) | Based on the payment by using short messages method and system of fingerprint recognition mobile phone | |
CN108989278A (en) | Identification service system and method | |
CN110226165A (en) | Pass through updatable data structure detection electronic penetration person | |
CN107735999A (en) | The certification for passing through multiple approach based on functions of the equipments and user's request | |
KR101415887B1 (en) | Method for providing services of user identification processing | |
CN110326251A (en) | The system and method that the general dispersion solution of user is verified using cross validation feature are provided | |
CN106952096A (en) | Security certification system, method and the credible identifying device of client of client device | |
US20120264405A1 (en) | Verification of transactional integrity | |
CN106875173A (en) | A kind of method of authenticating transactions | |
CN106779716A (en) | Authentication method, apparatus and system based on block chain account address | |
CN105827571B (en) | Multi-modal biological characteristic authentication method and equipment based on UAF agreement | |
CN107122977A (en) | A kind of payment system based on bio-identification | |
CN107240010B (en) | Method and system for transferring digital currency to digital currency chip card | |
CN109242663A (en) | A kind of bookkeeping methods and system based on block chain technology | |
CN105550928A (en) | System and method of network remote account opening for commercial bank | |
CN103024706A (en) | Short message based device and short message based method for bidirectional multiple-factor dynamic identity authentication | |
CN105205944A (en) | Self-service deposit and withdrawal system based on intelligent terminal | |
CN104346727A (en) | Handset authentication payment system and method based on human natural characteristic matching | |
CN107548059A (en) | A kind of authentication method and system | |
CN105264817B (en) | Multi-factor authentication technology | |
CN107025558A (en) | A kind of transaction system and transaction processing method | |
CN105405005B (en) | Mobile wallet method of payment based on optic communication and near-field communication | |
CN106921655A (en) | A kind of business authorization method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180309 |