CN107888382A - A kind of methods, devices and systems of the digital identity checking based on block chain - Google Patents

A kind of methods, devices and systems of the digital identity checking based on block chain Download PDF

Info

Publication number
CN107888382A
CN107888382A CN201711195091.9A CN201711195091A CN107888382A CN 107888382 A CN107888382 A CN 107888382A CN 201711195091 A CN201711195091 A CN 201711195091A CN 107888382 A CN107888382 A CN 107888382A
Authority
CN
China
Prior art keywords
certificate
wallet
password
application
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711195091.9A
Other languages
Chinese (zh)
Other versions
CN107888382B (en
Inventor
张波波
张锋
张一锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongchao Credit Card Industry Development Co Ltd Hangzhou Blockchain Technology Research Institute
Original Assignee
Zhongchao Credit Card Industry Development Co Ltd Hangzhou Blockchain Technology Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongchao Credit Card Industry Development Co Ltd Hangzhou Blockchain Technology Research Institute filed Critical Zhongchao Credit Card Industry Development Co Ltd Hangzhou Blockchain Technology Research Institute
Priority to CN201711195091.9A priority Critical patent/CN107888382B/en
Publication of CN107888382A publication Critical patent/CN107888382A/en
Application granted granted Critical
Publication of CN107888382B publication Critical patent/CN107888382B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The method for the checking of the digital identity based on block chain that the application provides, including:When receiving the certificates constructing instruction of application side, the first random number is obtained so that application server applies square certificate using the first generating random number;Application side's certificate and factor of safety are obtained, whether the public key verifications in application root certificate are effective using square certificate;If so, then utilize factor of safety generation wallet certificate;After the password for receiving input, the second random number is obtained, digest value is calculated according to the second random number and password, and verify whether digest value is correct;If so, the private key in being serviced using wallet Transaction Information and factor of safety is signed so that whether application server legal and effective using signature verification wallet certificate.By using random number, signature, the mode of various certificates realizes the digital identification authentication of block interchain high security.Present invention also provides the device and system of the checking of the digital identity based on block chain, there is above-mentioned beneficial effect.

Description

A kind of methods, devices and systems of the digital identity checking based on block chain
Technical field
The application is related to e-payment field, the method for more particularly to a kind of digital identity checking based on block chain, dress Put and system.
Background technology
For now, the digital cash such as bit coin, ether coin is issued on dedicated block chain, circulated, merchandised.Number Word currency wallet is provided convenience for the use of various digital cash, and user can select different suppliers according to the hobby of oneself Service, oneself establish, take care of, safeguard digital cash wallet.For example client initiates a payment transaction using bit coin, need to login Digital cash wallet, simply enters collecting account, the amount of money, and simple operations can be completed.
Digital cash wallet core is ownership of the user to private key, and the cold storage mode of generally use protects wallet offline Deposit, specifically, user generates respective digital currency address and private key on offline computer or mobile phone, and it is properly protected Store away.But the possibility that computer, cell phone system are attacked by number of ways such as virus, wooden horses, the private key preserved in any form is all Security risk be present.There is the digital cash wallet based on hardware carrier in existing market, by the way that private key is stored in into hardware Safe unit reaches the security for improving sensitive data (private key), need to connect hardware device during transaction, and complete in safe unit Into data signature.This not only adds the threshold that uses of user, and security risk is still had during transaction.
After legal digital cash occurs, to proposing higher requirement safely, it is necessary to multi-party between the side of being traded Checking.
The content of the invention
The purpose of the application is to provide a kind of methods, devices and systems of the digital identity checking based on block chain, solves Authentication Questions between user, mobile terminal, application server etc. are multi-party.
In order to solve the above technical problems, the application provides a kind of method of the digital identity checking based on block chain, technology Scheme is as follows:
When receiving the certificates constructing instruction of application side, the first random number is obtained so that application server utilizes described first Generating random number applies square certificate;
Application side's certificate and factor of safety are obtained, using side's card described in the public key verifications in application root certificate Whether book is effective;
If so, then utilize factor of safety generation wallet certificate;
After the password for receiving input, the second random number is obtained, is calculated according to second random number and the password Digest value, and verify whether the digest value is correct;
If so, Transaction Information and the factor of safety are signed using the private key in the wallet service so that institute It is whether legal and whether effective using wallet certificate described in the signature verification to state application server.
Wherein, after the application server verifies that the wallet certificate is legal and effective, in addition to:
The application server request authentication center is really weighed to digital cash;
After by the authentication center really power, transaction data is uploaded to distributed account book system;
After the distributed account book system confirms that transaction is legal, send transaction and successfully notify mobile terminal.
Wherein, before receiving the certificates constructing instruction of application side, in addition to:
The mobile terminal receives user name and the login key that user is set, and applies opening the wallet service;
The mobile terminal, which is sent, checks whether wallet service described in instruction checking individualizes;
If it is not, then the mobile terminal receives the wallet service according to the first key centering for checking and instructing and generating The first public key;
First public key is sent to wallet service distributing side by the mobile terminal, and asks of the wallet service Peopleization data;
The wallet service distributing side parses first public key, judges whether the system of account of the user supports numeral Currency wallet;
If so, then authentication center described in the wallet service distributing direction asks first publisher's root certificate, and generate the One applies root certificate;
The wallet service distributing root utilizes the first publisher root certificate and first application according to distribution strategy First man data described in root certificates constructing, and the first man data are sent to mobile terminal;
The mobile terminal receives the first man data, and the first man data are write into the wallet Service.
Wherein, methods described also includes:
When the wallet public key certificate updates, whether wallet service described in the mobile terminal check individualizes;
If so, then the mobile terminal receives the second key pair of the wallet service creation, and to the wallet service Publisher sends certificate update request;
After the wallet service distributing side receives the certificate update request, to the distribution of authentication center request second Root certificate, and generate second and apply root certificate;
The wallet service distributing root utilizes the second publisher root certificate and described second according to the distribution strategy Using root certificates constructing wallet public key certificate data;
The mobile terminal parses the wallet public key certificate data, and the wallet service is write with sets requirement.
Wherein, methods described also includes:
When password updates, the mobile terminal receives the old password and new password of change password application and input;
Whether old password described in the wallet service verification and the password stored in the wallet service are consistent;
If so, whether new password described in the wallet service inspection is legal;
If so, new password described in the wallet service memory and prompt be updated successfully.
Wherein, methods described also includes:
When password is reset, the mobile terminal receives reset password application and the second new password;
The mobile terminal is sent to described using the reset password application and second new password generation message Wallet service distributing side;
Verify whether the message is legal in the wallet service distributing side;
If so, the wallet service distributing side encrypts to form ciphertext password and send to the shifting to second new password Dynamic terminal;
The mobile terminal sends the ciphertext password to the wallet service;
The wallet service verification by and after storing the ciphertext password safely, the mobile terminal shows password weight Put successful information.
Wherein, application side's certificate, the wallet certificate, it is described using root certificate be the certificate based on ECC algorithm.
The application also provides a kind of device of the digital identity checking based on block chain, including:
Using square certificates constructing module, when being instructed for receiving application side's certificates constructing, the first random number is obtained so that Application server applies square certificate using first generating random number;
First authentication module, for obtaining application side's certificate and factor of safety, according to the public affairs in application root certificate Key verifies whether application side's certificate is effective;
Wallet certificates constructing module, when applying square certificate effective described in the public key verifications in root certificate for applying, profit Wallet certificate is generated with the factor of safety;
Second authentication module, after the password for receiving input, the second random number is obtained, according to second random number Digest value is calculated with the password, and verifies whether the digest value is correct;
3rd authentication module, for the digest value it is correct when, the money is utilized to Transaction Information and the factor of safety Private key in bag service is signed so that whether the application server is legal using wallet certificate described in the signature verification It is and whether effective.
The application also provides a kind of system of the digital identity checking based on block chain, including:
Mobile terminal, when being instructed for receiving application side's certificates constructing, obtain the first random number so that application server Square certificate is applied using first generating random number;Application side's certificate and factor of safety are obtained, is demonstrate,proved according to application root It is whether effective using square certificate described in public key verifications in book;If so, then utilize factor of safety generation wallet certificate;Receive To after the password of input, the second random number is obtained, digest value is calculated according to second random number and the password, and verify Whether the digest value is correct;If so, the private key in being serviced using the wallet Transaction Information and the factor of safety is carried out Signature so that whether the application server legal and effective using wallet certificate described in the signature verification;
Application server, for applying square certificate according to the first generating random number of acquisition for mobile terminal;By the application Square certificate and factor of safety are sent to the mobile terminal;Transaction Information and the factor of safety are utilized in the mobile terminal After private key in the wallet service is signed, verify whether the wallet certificate is legal and whether effective.
Wherein, the system also includes:
Wallet service distributing side, for receiving the individualized application of wallet service and the certificate update Shen that mobile terminal is sent Please;Publisher's root certificate is asked to authentication center, root certificate is applied in generation.
A kind of method of digital identity checking based on block chain provided herein, including:Receive application side's card Inteilectual obtains the first random number so that application server applies square certificate using first generating random number into during instruction;Obtain Application side's certificate and factor of safety are taken, whether is had using square certificate described in the public key verifications in application root certificate Effect;If so, then utilize factor of safety generation wallet certificate;After the password for receiving input, the second random number is obtained, according to Second random number and the password calculate digest value, and verify whether the digest value is correct;If so, to Transaction Information Signed with the factor of safety using the private key in the wallet service so that the application server utilizes the signature Verify whether the wallet certificate is legal and whether effective.By using random number, signature, the mode of various certificates realizes area The digital identification authentication of block interchain greater security.Present invention also provides the checking device of the digital identity based on block chain and it is System, has above-mentioned beneficial effect, here is omitted.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of application, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
The flow chart for the method that a kind of digital identity based on block chain that Fig. 1 is provided by the embodiment of the present application is verified;
The flow for the process of exchange that a kind of digital identity based on block chain that Fig. 2 is provided by the embodiment of the present application is verified Schematic diagram;
The wallet service registry that a kind of digital identity based on block chain that Fig. 3 is provided by the embodiment of the present application is verified Schematic flow sheet;
The wallet public key certificate that a kind of digital identity based on block chain that Fig. 4 is provided by the embodiment of the present application is verified is more New schematic flow sheet;
The flow that the password that a kind of digital identity based on block chain that Fig. 5 is provided by the embodiment of the present application is verified updates Schematic diagram;
The flow that the password that a kind of digital identity based on block chain that Fig. 6 is provided by the embodiment of the present application is verified is reset Schematic diagram;
The schematic diagram for the device that a kind of digital identity based on block chain that Fig. 7 is provided by the embodiment of the present application is verified;
The schematic diagram for the system that a kind of digital identity based on block chain that Fig. 8 is provided by the embodiment of the present application is verified.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belong to the scope of the application protection.
It refer to Fig. 1, the method that a kind of digital identity based on block chain that Fig. 1 is provided by the embodiment of the present application is verified Flow chart;It is applied to the digital identity checking to being merchandised in zone digit money-system in block chain, can by this method To ensure the safety of moneytary operations in the zone digit money-system based on block chain technology.
S101:When receiving the certificates constructing instruction of application side, the first random number is obtained so that described in application server utilizes First generating random number applies square certificate;
When receiving the instruction of application side certificates constructing, refer to that mobile terminal receives the instruction, specifically, can be with It is Mobile solution meeting after user logins the application on mobile terminal (hereinafter referred to as " Mobile solution ") by user name, key To wallet service send a random number of request instruction acquisition request first, wallet service then can to Mobile solution return first with Machine number.These processes occur inside mobile terminal.Here Mobile solution can be Mobile banking, digital wallet or one Proprietary application (wherein, using can exist in the form of APP or One function plug-in unit etc.).Wallet service is usual Refer to positioned at the safe unit of mobile terminal in, support control transaction flow, safety storage, publisher manage etc. function;Exploitation Generally require and meet javacard, globalplatform technical standard.In the application, interacted in mobile terminal internal information When, such as between mobile terminal and wallet service, can be equal between Mobile solution and wallet service, i.e. mobile terminal and shifting Dynamic application is it is considered that unified concept;Believe when being related to the exterior terminal such as mobile terminal and application server, wallet service distributing side During breath interaction, mobile terminal and Mobile solution are not then identical concept.
S102:Application side's certificate and factor of safety are obtained, should described in the public key verifications in application root certificate It is whether effective with square certificate;
First random number and a request instruction are sent to application server by mobile terminal, and request instruction is acquisition request Using the instruction of the authentication information data such as square certificate, factor of safety, and the first random number can participate in the generation using square certificate. Using needing application server to return it to mobile terminal after square certificates constructing, mobile terminal will be sent to using square certificate again Internal wallet service, can organize APDU (Application Protocol Data Unit, Application Protocol Data Unit) Instruction is sent to the wallet service of inside.And thering is one to apply root certificate in wallet service, wallet service is according to using root Whether the public key verifications of certificate are effective using square certificate.This digital identity authentication failed if authentication failed.Specific wallet Service content can be with detailed in Example two.
S103:If so, then utilize factor of safety generation wallet certificate;
The factor of safety, is the synthesis of some authentication information data, including exchange hour stamp, dynamic random number etc. number According to these can be referred to as factor of safety.When wallet service verification is effective using square certificate, wallet service can be protected temporarily Factor of safety is deposited, because factor of safety participates in the calculating of wallet certificate.For wallet service, its Certification system generally wraps Include:Publisher's root certificate, publisher's certificate, wallet public key certificate and wallet certificate.Wherein publisher's root certificate is typically by supervising Mechanism generates;Publisher's certificate provides related data, public key by wallet service distributing side, and regulator is given birth to using private key signature Into;Wallet public key certificate, generated by the signature of wallet service distributing side;Publisher's root certificate verifies publisher's certificate legitimacy; Publisher's certificate includes a public key, can verify wallet public key certificate legitimacy.And wallet certificate basis in wallet service Transaction dynamic generation every time, is signed, it is therefore an objective to which application server is by verifying wallet certificate using private key to transaction data Correctness, determine the legitimacy of the wallet service.Therefore, wallet service can also return to the money for calculating generation to mobile terminal Bag certificate, publisher's certificate.
S104:After the password for receiving input, the second random number is obtained, according to second random number and the password meter Digest value is calculated, and verifies whether the digest value is correct;
After wallet certificates constructing, mobile terminal receives the password of input.Password can be ejected a peace by mobile terminal Full password keyboard, prompts user to input password.Key when password and user log in is not a concept, key during login Login key as user only as user log on mobile terminal using and authentication when password is as transaction When transaction password.User can allow for log in mobile terminal to prepare to merchandise equivalent to key is logged in, and password is only permission User can Successful Transaction, the difference of the two is apparent.
After password is received, Mobile solution again to one random number of wallet service acquisition, referred to herein as second with Machine number, the second random number participate in calculating the summary of user password and obtain digest value.This process is typically in Mobile solution Carry out.Mobile solution is sent to wallet service after digest value is calculated.Wallet service can verify the correctness of digest value, if Fail then this same digital identity authentication failed.
S105:If so, being signed to Transaction Information and the factor of safety using the private key in the wallet service, make It is whether legal and whether effective using wallet certificate described in the signature verification to obtain the application server.
When wallet service verification digest value is correct, Transaction Information can be sent to money by Mobile solution according to certain form Bag is serviced and asked for an autograph.It is related to transaction that Transaction Information generally comprises exchange hour, dealing money, application server coding etc. Information.After wallet service receives Transaction Information, pass through the factor of safety that is preserved to Transaction Information and before of private key of inside Signed, and signature is returned into Mobile solution.
After Mobile solution receives signature, signature and wallet certificates constructing message send message to application server.Should It is whether legal and whether effective with server by utilizing signature verification wallet certificate.It is because legal not necessarily to have for certificate Effect, it is effectively not necessarily legal.Only when wallet certificate is legal and effective, between user, mobile terminal and application server Digital identity verification process just passes through.
It is worth noting that, wallet certificate, using square certificate, using root certificate even other certificates can be based on The certificate of ECC algorithm, because ECC algorithm can reach same equivalent to the RSA Algorithm of main flow using shorter safe key Level of security.In addition, the generation using square certificate based on ECC algorithm includes random number, dynamic generation, security is higher.Example Such as, can be as shown in table 1 to table 6, publisher's root certificate based on ECC algorithm that table 1 is provided by the embodiment of the present application;Table 2 The publisher's certificate based on ECC algorithm provided by the embodiment of the present application;Table 3 by the embodiment of the present application provide based on The wallet public key certificate of ECC algorithm;The wallet certificate based on ECC algorithm that table 4 is provided by the embodiment of the present application;Table 5 is this What application embodiment was provided applies root certificate based on ECC algorithm;Table 6 by the embodiment of the present application provide based on ECC Application side's certificate of algorithm.
The publisher's root certificate of table 1
The publisher's certificate of table 2
The wallet public key certificate of table 3
The wallet certificate of table 4
Table 5 applies root certificate
The application side's certificate of table 6
Certainly, after digital identity is verified, it is possible to be traded process.Fig. 2 is participated in, Fig. 2 is based on block chain Digital identity checking transaction schematic flow sheet, include above-mentioned authentication process itself and follow-up process of exchange.Work as application When server has verified that wallet certificate is legal and effective, it is true that application server can ask authentication center to carry out digital cash Power.Center to be certified is really after power, and the data in whole process of exchange are uploaded to distributed account book system by application server, when this After system confirms that transaction is legal, send message notifying to mobile terminal and merchandise successfully.Of course, it is possible on mobile terminals with text The modes such as word, sound vibrations are prompted to merchandise successfully, and the application is not limited thereto.
The embodiment of the present application provides a kind of method of the digital identity checking based on block chain, can pass through the above method Tripartite's checking before transaction can be realized, generally includes user, mobile terminal and application server.Improve digital identity checking Reliability, numeral transaction security.
Embodiment two
Based on above-described embodiment, before digital identity checking, the registration process of wallet service can also be included.Referring to figure 3, Fig. 3 be the schematic flow sheet of wallet service registry, and concrete technical scheme is as follows:
S201:The mobile terminal receives user name and the login key that user is set, and applies opening wallet service;
This step can be that user logs in mobile terminal, initiate to open wallet service Shen in the selection interface of Mobile solution Please, and user name is set and logs in key.Mobile terminal receives the information such as application for registration and user name, the login key of user Afterwards, wallet service is opened in application.
S202:The mobile terminal, which is sent, checks whether wallet service described in instruction checking individualizes;
The user name of application that mobile terminal is submitted according to user and correlation, log in the information such as key and send an inspection and refer to Wallet service is made, checks whether wallet service individualizes.It is individualized to refer to defining according to wallet service distributing side, sent out The write-in wallet service of the information such as capable data, key.
S203:If it is not, then the mobile terminal receives the wallet service and instructs the first close of generation according to described check First public key of key centering;
If wallet service is not individualized, wallet service can generate a pair of secret keys according to checking, including public key and private key, Public key is sent to Mobile solution, namely mobile terminal.
S204:First public key is sent to wallet service distributing side by the mobile terminal, and asks the wallet to take The personal data of business;
Mobile terminal can apply for public key the individualized number of wallet service in the form of message to wallet service distributing side According to.
S205:The wallet service distributing side parses first public key, judges whether the system of account of the user props up Hold digital cash wallet;
The message that wallet service distributing side parsing mobile terminal is sent, judges whether the system of account of the user supports numeral Currency wallet.If not supporting, an error message is returned to mobile terminal;
S206:If so, then authentication center described in the wallet service distributing direction asks first publisher's root certificate, and it is raw Root certificate is applied into first;
If the system of account of the user supports digital cash wallet, wallet service distributing side generates a pair of secret keys, equally Publisher's root certificate is asked including public key and private key, and to authentication center, root certificate is applied in itself generation.
S207:The wallet service distributing root utilizes the first publisher root certificate and described first according to distribution strategy Sent using first man data described in root certificates constructing, and by the first man data to mobile terminal;
After center to be certified returns to publisher's root certificate, wallet service distributing side can utilize publisher's root certificate and application Root certificate, further according to the personal data of distribution strategy generating wallet service, including wallet public key certificate, distribution root card Book, publisher's certificate etc., are according to fixed format sent to mobile terminal.Here set form is typically to be sent out by wallet service Row side is set, and is not herein limited.
S208:The mobile terminal receives the first man data, and the first man data are write into institute State wallet service.
After mobile terminal receives personal data, personal data is parsed, according to the assembled individualized instruction of code requirement Stream, wallet service can be write one by one, complete the individualized of wallet service.Because the data that every instruction is sent are no more than 255 bytes, and according to the difference of data type, different instructions can be used to perform and send order.
Embodiment three
Based on above-described embodiment, the method for the digital identity checking based on block chain can also include wallet certificate update Process, referring to Fig. 4, Fig. 4 is the schematic flow sheet of wallet certificate update, and technical scheme is as follows;
S301:When the wallet public key certificate updates, whether wallet service described in the mobile terminal check individualizes;
When wallet public key certificate needs renewal, whether wallet service has individualized described in mobile terminal check, because not having There is personalized wallet service to update wallet certificate.
S302:If so, then the mobile terminal receives the second key pair of the wallet service creation, and to the wallet Service distributing side sends certificate update request;
When wallet service individualizes, wallet service can regenerating key to being public key and private key, equally will again The public key of generation is sent to mobile terminal.
After mobile terminal receives public key, Generate Certificate and update request message and sent to wallet service distributing side.
S303:After the wallet service distributing side receives certificate update request, to authentication center request the Two publisher's root certificates, and generate second and apply root certificate;
Likewise, after wallet service distributing side receives certificate update request message, please be look for novelty to authentication center again Publisher's root certificate, and generate new application root certificate.For the certificate being different from during registration wallet service, referred to herein as the Two publisher's root certificates and second apply root certificate.
S304:The wallet service distributing root is tactful using the second publisher root certificate and described according to the distribution Second applies root certificates constructing wallet public key certificate data;
S305:The mobile terminal parses the wallet public key certificate data, and the wallet service is write with sets requirement.
It is similar during with opening wallet service, mobile terminal parsing wallet public key certificate data, demonstrate,proved according to code requirement is assembled Book instruction stream, wallet service is write one by one.It is worth noting that, Certification system is one in the personal data of wallet service Point, in other words, above all wallet Certification system, but also include other data in personal data, such as user password Deng.
Example IV
Based on above-described embodiment, the digital identity checking system based on block chain can also include password renewal process, join See Fig. 5, flow chart when picture and text are the password renewal that the embodiment of the present application provides is illustrated, and technical scheme is as follows:
S401:When password updates, the mobile terminal receives the old password and new password of change password application and input;
When password updates, when usually user changes password, user, which first passes through user name and logs in key, logins movement Using selection interface submits change password application, can now occur corresponding dialog box on the interface of mobile terminal to prompt User inputs old password and new password.Mobile terminal takes after change password application, old password and new password is received to wallet Business mode sends related data.
S402:Whether old password described in the wallet service verification and the password stored in the wallet service are consistent;
S403:If so, whether new password described in the wallet service inspection is legal;
Instantly different system is in the species, length etc. that the security consideration of itself may require that password, or even some are Some passwords of legal provisions must not be less than several digits.Therefore need to check whether new password is legal.If needing special provision, Such as require that password needs to include the combination etc. of Roman number, letter, character, all should be in the protection domain of the application.
S404:If so, new password described in the wallet service memory and prompt be updated successfully.
When new password is legal, or when meeting set in advance require, new password described in wallet service memory.Herein simultaneously Not limiting needs to delete old password, can be stored in case of need.But afterwards in use, there was only new password certainly In effective status.After storage, wallet service can be prompted to be updated successfully to mobile terminal, and mobile terminal, which is reresented, afterwards uses the registered permanent residence Order is updated successfully.Certainly, prompting mode is not limited here, such as is shaken, prompting frame etc..
Embodiment five
Based on above-described embodiment, the digital identity checking system based on block chain can also include password and reset, referring to figure 6, Fig. 6 illustrate for the flow chart of password reset process, and technical scheme is as follows:
S501:The mobile terminal is sent using the reset password application and second new password generation message To the wallet service distributing side;
When password is lost or user forgets, password replacement can be carried out.User is logined by user name and login key After Mobile solution, selection interface submits reset password application, inputs new password.Mobile terminal will contain reset password application and new The message of the information such as password uploads to wallet service distributing side.
S502:Verify whether the message is legal in the wallet service distributing side;
Here can whether legal according to the content verification in reset password application, such as include and can include in this application The information related to registration such as user's registration time, the information that inspected user fills in it is whether correct and judge whether it is legal.
S503:If so, the wallet service distributing side encrypts to form ciphertext password and send extremely to second new password The mobile terminal;
If wallet service distributing side judges that message is legal, new password is encrypted to form ciphertext password and send to movement Terminal.The mode of encryption is not limited herein, can be symmetric cryptography or asymmetric encryption.Asymmetric encryption safety Property is higher, and simply the number of information transfer is more.
S504:The mobile terminal sends the ciphertext password to the wallet service;
S505:The wallet service verification by and after storing the ciphertext password safely, the mobile terminal is shown Password resets successful information.
The correctness and legitimacy of wallet service verification ciphertext password.In the individualized stage of wallet service, can pass through Password protection key is write wallet service by encrypted test mode, therefore, can now be decrypted and be verified the ciphertext password.It is proved to be successful Then safety storage new password, and notify mobile terminal prompts the user with to reset successfully.Equally, to the mode species of prompting herein not It is limited in any way.
The device that a kind of digital identity based on block chain provided below the embodiment of the present application is verified is introduced, under The device of the checking of the digital identity based on block chain of text description and the above-described digital identity checking based on block chain Method can be mutually to should refer to.
With reference to figure 7, a kind of digital identity based on block chain that Fig. 7 is provided by the embodiment of the present application verifies showing for device It is intended to, including:
Using square certificates constructing module 100, when can be used for receiving the certificates constructing instruction of application side, it is random to obtain first Number so that application server applies square certificate using first generating random number;
First authentication module 200, it can be used for obtaining application side's certificate and factor of safety, according to using root certificate In public key verifications described in using square certificate it is whether effective;
Wallet certificates constructing module 300, can be used for applying described in the public key verifications in root certificate has using square certificate During effect, wallet certificate is generated using the factor of safety;
Second authentication module 400, after can be used for receiving the password of input, the second random number is obtained, according to described the Two random numbers and the password calculate digest value, and verify whether the digest value is correct;
3rd authentication module 500, can be used for the digest value it is correct when, Transaction Information and the factor of safety are utilized Private key in the wallet service is signed so that the application server is using wallet certificate described in the signature verification It is no legal and whether effective.
Based on above-described embodiment, as preferred embodiment, described device can also include:
Transaction modules, for application server request, authentication center is really weighed to digital cash;Recognized by described Transaction data really after power, is uploaded to distributed account book system by card center;The distributed account book system confirms that transaction is legal Afterwards, send transaction and successfully notify mobile terminal.
Based on above-described embodiment, as preferred embodiment, described device can also include:
Registering modules, user name and the login key that user is set are received for the mobile terminal, applies opening wallet Service;The mobile terminal, which is sent, checks whether wallet service described in instruction checking individualizes;If it is not, then the mobile terminal connects Receive first public key of the wallet service according to the first key centering for checking and instructing generation;The mobile terminal is by described in First public key is sent to wallet service distributing side, and asks the personal data of the wallet service;The wallet service distributing Side parses first public key, judges whether the system of account of the user supports digital cash wallet;If so, the then wallet Authentication center described in service distributing direction asks first publisher's root certificate, and generates first and apply root certificate;The wallet Service distributing root is according to distribution strategy using described in the first publisher root certificate and the first application root certificates constructing First man data, and the first man data are sent to mobile terminal;The mobile terminal receives described first Personal data, and the first man data are write into the wallet service.
Based on above-described embodiment, as preferred embodiment, described device can also include:
Certificate update module, for when the wallet public key certificate updates, wallet described in the mobile terminal check to take Whether business individualizes;If so, then the mobile terminal receives the second key pair of the wallet service creation, and to the wallet Service distributing side sends certificate update request;After the wallet service distributing side receives certificate update request, to described Authentication center asks second publisher's root certificate, and generates second and apply root certificate;The wallet service distributing root is according to institute State distribution strategy and apply root certificates constructing wallet public key certificate data using the second publisher root certificate and described second; The mobile terminal parses the wallet public key certificate data, and the wallet service is write with sets requirement.
Based on above-described embodiment, as preferred embodiment, described device can also include:
Password update module, for when password updates, the mobile terminal to receive change password application and inputted old Password and new password;Whether old password described in the wallet service verification and the password stored in the wallet service are consistent;If It is whether new password described in the wallet service inspection is legal;If so, new password described in the wallet service memory and prompt more New success.
Based on above-described embodiment, as preferred embodiment, described device can also include:
Password resets module, and when password is reset, the mobile terminal receives reset password application and the second new password;Institute Mobile terminal is stated using the reset password application and second new password generation message, and sends to the wallet service and sends out Row side;Verify whether the message is legal in the wallet service distributing side;If so, the wallet service distributing side is to described second New password is encrypted to form ciphertext password and send to the mobile terminal;The mobile terminal sends the ciphertext password to institute State wallet service;The wallet service verification by and after storing the ciphertext password safely, the mobile terminal shows mouth Order resets successful information.
The system that a kind of digital identity based on block chain provided below the embodiment of the present application is verified is introduced, under The system of the checking of the digital identity based on block chain of text description and the above-described digital identity checking based on block chain Method can be mutually to should refer to.Referring to Fig. 8, a kind of digital identity based on block chain that Fig. 8 is provided by the embodiment of the present application The schematic diagram of the system of checking.The system can include:
Mobile terminal 10, when being instructed for receiving application side's certificates constructing, obtain the first random number so that application service Device applies square certificate using first generating random number;Application side's certificate and factor of safety are obtained, according to using root It is whether effective using square certificate described in public key verifications in certificate;If so, then utilize factor of safety generation wallet certificate;Connect After the password for receiving input, the second random number is obtained, digest value is calculated according to second random number and the password, and test Whether correct demonstrate,prove the digest value;If so, Transaction Information and the factor of safety are entered using the private key in the wallet service Row signature so that whether the application server legal and effective using wallet certificate described in the signature verification;
Application server 20, for applying square certificate according to the first generating random number of acquisition for mobile terminal;Described it will answer The mobile terminal is sent to square certificate and factor of safety;In the mobile terminal to Transaction Information and factor of safety profit After being signed with the private key in the wallet service, verify whether the wallet certificate is legal and whether effective.
Based on said system, as preferred embodiment, the system can also include:
Wallet service distributing side, for receiving the individualized application of wallet service and the certificate update Shen that mobile terminal is sent Please;Publisher's root certificate is asked to authentication center, root certificate is applied in generation.
Each embodiment is described by the way of progressive in specification, and what each embodiment stressed is and other realities Apply the difference of example, between each embodiment identical similar portion mutually referring to.For embodiment provide system and Speech, because it is corresponding with the method that embodiment provides, so description is fairly simple, related part is referring to method part illustration .
The methods, devices and systems verified above to a kind of digital identity based on block chain provided herein are carried out It is discussed in detail.Specific case used herein is set forth to the principle and embodiment of the application, above example Explanation be only intended to help and understand the present processes and its core concept.It should be pointed out that for the common of the art For technical staff, on the premise of the application principle is not departed from, some improvement and modification can also be carried out to the application, these Improve and modification is also fallen into the application scope of the claims.
It should also be noted that, in this manual, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except other identical element in the process including the key element, method, article or equipment being also present.

Claims (10)

  1. A kind of 1. method of the digital identity checking based on block chain, it is characterised in that including:
    When receiving the certificates constructing instruction of application side, the first random number is obtained so that application server is random using described first Number generation application side's certificate;
    Application side's certificate and factor of safety are obtained, is using square certificate described in the public key verifications in application root certificate It is no effective;
    If so, then utilize factor of safety generation wallet certificate;
    After the password for receiving input, the second random number is obtained, summary is calculated according to second random number and the password Value, and verify whether the digest value is correct;
    If so, the private key in being serviced using wallet Transaction Information and the factor of safety is signed so that the application clothes Whether whether business device legal and effective using wallet certificate described in the signature verification.
  2. 2. according to the method for claim 1, it is characterised in that when the application server verifies that the wallet certificate is legal And effectively after, in addition to:
    The application server request authentication center is really weighed to digital cash;
    After by the authentication center really power, transaction data is uploaded to distributed account book system;
    After the distributed account book system confirms that transaction is legal, send transaction and successfully notify mobile terminal.
  3. 3. according to the method for claim 2, it is characterised in that before receiving the certificates constructing instruction of application side, in addition to:
    The mobile terminal receives user name and the login key that user is set, and applies opening the wallet service;
    The mobile terminal, which is sent, checks whether wallet service described in instruction checking individualizes;
    If it is not, then the mobile terminal receives the wallet service and instructs the of the first key centering of generation according to described check One public key;
    First public key is sent to wallet service distributing side by the mobile terminal, and asks the individualized of the wallet service Data;
    The wallet service distributing side parses first public key, judges whether the system of account of the user supports digital cash Wallet;
    If so, then authentication center described in the wallet service distributing direction asks first publisher's root certificate, and generate first and answer With root certificate;
    The wallet service distributing root applies root according to distribution strategy using the first publisher root certificate and described first First man data described in certificates constructing, and the first man data are sent to mobile terminal;
    The mobile terminal receives the first man data, and the first man data are write into the wallet and taken Business.
  4. 4. according to the method for claim 3, it is characterised in that also include:
    When the wallet public key certificate updates, whether wallet service described in the mobile terminal check individualizes;
    If so, then the mobile terminal receives the second key pair of the wallet service creation, and to the wallet service distributing Side sends certificate update request;
    After the wallet service distributing side receives the certificate update request, to authentication center request the second distribution root Certificate, and generate second and apply root certificate;
    The wallet service distributing root utilizes the second publisher root certificate and second application according to the distribution strategy Root certificates constructing wallet public key certificate data;
    The mobile terminal parses the wallet public key certificate data, and the wallet service is write with sets requirement.
  5. 5. according to the method for claim 4, it is characterised in that also include:
    When password updates, the mobile terminal receives the old password and new password of change password application and input;
    Whether old password described in the wallet service verification and the password stored in the wallet service are consistent;
    If so, whether new password described in the wallet service inspection is legal;
    If so, new password described in the wallet service memory and prompt be updated successfully.
  6. 6. according to the method for claim 5, it is characterised in that also include:
    When password is reset, the mobile terminal receives reset password application and the second new password;
    The mobile terminal is sent to the wallet using the reset password application and second new password generation message Service distributing side;
    Verify whether the message is legal in the wallet service distributing side;
    If so, the wallet service distributing side encrypts to form ciphertext password and send to described mobile whole to second new password End;
    The mobile terminal sends the ciphertext password to the wallet service;
    The wallet service verification by and after storing the ciphertext password safely, the mobile terminal shows that password is reset to Work(information.
  7. 7. according to the method described in claim any one of 1-6, it is characterised in that application side's certificate, the wallet certificate, Described using root certificate is the certificate based on ECC algorithm.
  8. A kind of 8. device of the digital identity checking based on block chain, it is characterised in that including;
    Using square certificates constructing module, when being instructed for receiving application side's certificates constructing, the first random number is obtained so that application First generating random number described in server by utilizing applies square certificate;
    First authentication module, for obtaining application side's certificate and factor of safety, the public key in application root certificate is tested Whether effective demonstrate,prove application side's certificate;
    Wallet certificates constructing module, when applying square certificate effective described in the public key verifications in root certificate for applying, utilize institute State factor of safety generation wallet certificate;
    Second authentication module, after the password for receiving input, the second random number is obtained, according to second random number and institute State password and calculate digest value, and verify whether the digest value is correct;
    3rd authentication module, for the digest value it is correct when, utilize the wallet to take Transaction Information and the factor of safety Private key in business is signed so that the application server is using whether wallet certificate is legal described in the signature verification and is It is no effective.
  9. A kind of 9. system of the digital identity checking based on block chain, it is characterised in that including:
    Mobile terminal, when being instructed for receiving application side's certificates constructing, obtain the first random number so that application server utilizes First generating random number applies square certificate;Application side's certificate and factor of safety are obtained, according in application root certificate Public key verifications described in using square certificate it is whether effective;If so, then utilize factor of safety generation wallet certificate;Receive defeated After the password entered, the second random number is obtained, digest value is calculated according to second random number and the password, and described in checking Whether digest value is correct;If so, Transaction Information and the factor of safety are signed using the private key in the wallet service, So that whether the application server legal and effective using wallet certificate described in the signature verification;
    Application server, for applying square certificate according to the first generating random number of acquisition for mobile terminal;The application side is demonstrate,proved Book and factor of safety are sent to the mobile terminal;Described in being utilized in the mobile terminal to Transaction Information and the factor of safety After private key in wallet service is signed, verify whether the wallet certificate is legal and whether effective.
  10. 10. system according to claim 9, it is characterised in that also include:
    Wallet service distributing side, the individualized application of wallet service and certificate update application sent for receiving mobile terminal;To Authentication center asks publisher's root certificate, and root certificate is applied in generation.
CN201711195091.9A 2017-11-24 2017-11-24 A kind of methods, devices and systems of the digital identity verifying based on block chain Active CN107888382B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711195091.9A CN107888382B (en) 2017-11-24 2017-11-24 A kind of methods, devices and systems of the digital identity verifying based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711195091.9A CN107888382B (en) 2017-11-24 2017-11-24 A kind of methods, devices and systems of the digital identity verifying based on block chain

Publications (2)

Publication Number Publication Date
CN107888382A true CN107888382A (en) 2018-04-06
CN107888382B CN107888382B (en) 2019-11-19

Family

ID=61775179

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711195091.9A Active CN107888382B (en) 2017-11-24 2017-11-24 A kind of methods, devices and systems of the digital identity verifying based on block chain

Country Status (1)

Country Link
CN (1) CN107888382B (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737106A (en) * 2018-05-09 2018-11-02 深圳壹账通智能科技有限公司 User authentication method, device, terminal device and storage medium on block catenary system
CN108880803A (en) * 2018-07-12 2018-11-23 佛山伊苏巨森科技有限公司 A kind of method and system signed using digital signature to block chain affairs
CN108985760A (en) * 2018-06-15 2018-12-11 杭州复杂美科技有限公司 Method of payment and system, equipment and storage medium
CN109003081A (en) * 2018-07-13 2018-12-14 北京创世智链信息技术研究院 A kind of method of commerce and system based on block chain
CN109033788A (en) * 2018-06-15 2018-12-18 北京文创园投资管理有限公司 A kind of certificate management method and device based on block chain technology
CN109063450A (en) * 2018-07-13 2018-12-21 王刚 A kind of control method of secure storage medium, secure storage medium and system
CN109413084A (en) * 2018-11-15 2019-03-01 北京信安世纪科技股份有限公司 A kind of password update method, apparatus and system
CN109547200A (en) * 2018-11-21 2019-03-29 上海点融信息科技有限责任公司 Certificate distribution method and corresponding calculating equipment and medium in block chain network
CN109660346A (en) * 2019-01-16 2019-04-19 中钞信用卡产业发展有限公司杭州区块链技术研究院 Information trustship method, apparatus, equipment and computer storage medium
CN109740319A (en) * 2018-12-06 2019-05-10 中国联合网络通信集团有限公司 Digital identity verification method and server
CN109918874A (en) * 2019-03-14 2019-06-21 上海优扬新媒信息技术有限公司 A kind of material object information storage means and device, information searching method in kind and device
CN110022316A (en) * 2019-03-29 2019-07-16 阿里巴巴集团控股有限公司 The method and apparatus for creating block chain account and resetting account key
CN110493273A (en) * 2018-06-28 2019-11-22 腾讯科技(深圳)有限公司 Identification authentication data processing method, device, computer equipment and storage medium
CN110598375A (en) * 2019-09-20 2019-12-20 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN110677376A (en) * 2018-07-03 2020-01-10 中国电信股份有限公司 Authentication method, related device and system and computer readable storage medium
CN111194441A (en) * 2018-04-25 2020-05-22 重庆小雨点小额贷款有限公司 Data management method based on block chain and related system
CN111275419A (en) * 2020-01-17 2020-06-12 上海佩俪信息科技有限公司 Block chain wallet signature right confirming method, device and system
CN111275433A (en) * 2019-12-31 2020-06-12 陕西医链区块链集团有限公司 Method for realizing personal wallet of block chain mobile equipment end
CN111340485A (en) * 2020-02-19 2020-06-26 北京众享比特科技有限公司 Configuration method of digital certificate for alliance block chain, terminal and root certificate server
CN111740839A (en) * 2020-05-26 2020-10-02 深圳市共进电子股份有限公司 Certificate verification method, device, terminal equipment and medium
WO2021012732A1 (en) * 2019-07-25 2021-01-28 深圳壹账通智能科技有限公司 Blockchain-based information verification apparatus and method, and storage medium
CN113141259A (en) * 2019-09-12 2021-07-20 腾讯科技(深圳)有限公司 Method and device for replacing identity certificate in block chain network
CN113472521A (en) * 2020-03-30 2021-10-01 山东浪潮质量链科技有限公司 Block chain-based real-name digital identity management method, signature device and verification device
CN113497709A (en) * 2020-04-02 2021-10-12 浪潮云信息技术股份公司 Trusted data source management method based on block chain, signature device and verification device
CN114553426A (en) * 2020-11-26 2022-05-27 中移物联网有限公司 Signature verification method, key management platform, security terminal and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078742A (en) * 2013-01-10 2013-05-01 天地融科技股份有限公司 Generation method and system of digital certificate
CN105474575A (en) * 2013-08-22 2016-04-06 日本电信电话株式会社 Multi-party secure authentication system, authentication server, intermediate server, multi-party secure authentication method, and program
US20160098730A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and Method for Block-Chain Verification of Goods
CN106790253A (en) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Authentication method and device based on block chain
US20170180128A1 (en) * 2015-12-22 2017-06-22 Gemalto Inc. Method for managing a trusted identity
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107196966A (en) * 2017-07-05 2017-09-22 北京信任度科技有限公司 The identity identifying method and system of multi-party trust based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078742A (en) * 2013-01-10 2013-05-01 天地融科技股份有限公司 Generation method and system of digital certificate
CN105474575A (en) * 2013-08-22 2016-04-06 日本电信电话株式会社 Multi-party secure authentication system, authentication server, intermediate server, multi-party secure authentication method, and program
US20160098730A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and Method for Block-Chain Verification of Goods
US20170180128A1 (en) * 2015-12-22 2017-06-22 Gemalto Inc. Method for managing a trusted identity
CN106790253A (en) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Authentication method and device based on block chain
CN107196966A (en) * 2017-07-05 2017-09-22 北京信任度科技有限公司 The identity identifying method and system of multi-party trust based on block chain
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111194441A (en) * 2018-04-25 2020-05-22 重庆小雨点小额贷款有限公司 Data management method based on block chain and related system
CN111194441B (en) * 2018-04-25 2023-10-10 重庆小雨点小额贷款有限公司 Data management method and related system based on block chain
CN108737106A (en) * 2018-05-09 2018-11-02 深圳壹账通智能科技有限公司 User authentication method, device, terminal device and storage medium on block catenary system
CN109033788B (en) * 2018-06-15 2021-06-11 北京文创园投资管理有限公司 Certificate management method and device based on block chain technology
CN108985760A (en) * 2018-06-15 2018-12-11 杭州复杂美科技有限公司 Method of payment and system, equipment and storage medium
CN109033788A (en) * 2018-06-15 2018-12-18 北京文创园投资管理有限公司 A kind of certificate management method and device based on block chain technology
CN110493273A (en) * 2018-06-28 2019-11-22 腾讯科技(深圳)有限公司 Identification authentication data processing method, device, computer equipment and storage medium
CN110493273B (en) * 2018-06-28 2021-03-16 腾讯科技(深圳)有限公司 Identity authentication data processing method and device, computer equipment and storage medium
CN110677376B (en) * 2018-07-03 2022-03-22 中国电信股份有限公司 Authentication method, related device and system and computer readable storage medium
CN110677376A (en) * 2018-07-03 2020-01-10 中国电信股份有限公司 Authentication method, related device and system and computer readable storage medium
CN108880803A (en) * 2018-07-12 2018-11-23 佛山伊苏巨森科技有限公司 A kind of method and system signed using digital signature to block chain affairs
CN109003081B (en) * 2018-07-13 2021-11-02 北京创世智链信息技术研究院 Transaction method, system and storage medium based on block chain
CN109063450A (en) * 2018-07-13 2018-12-21 王刚 A kind of control method of secure storage medium, secure storage medium and system
CN109003081A (en) * 2018-07-13 2018-12-14 北京创世智链信息技术研究院 A kind of method of commerce and system based on block chain
CN109413084B (en) * 2018-11-15 2021-08-31 北京信安世纪科技股份有限公司 Password updating method, device and system
CN109413084A (en) * 2018-11-15 2019-03-01 北京信安世纪科技股份有限公司 A kind of password update method, apparatus and system
CN109547200A (en) * 2018-11-21 2019-03-29 上海点融信息科技有限责任公司 Certificate distribution method and corresponding calculating equipment and medium in block chain network
CN109740319A (en) * 2018-12-06 2019-05-10 中国联合网络通信集团有限公司 Digital identity verification method and server
CN109660346A (en) * 2019-01-16 2019-04-19 中钞信用卡产业发展有限公司杭州区块链技术研究院 Information trustship method, apparatus, equipment and computer storage medium
CN109660346B (en) * 2019-01-16 2021-09-17 中钞信用卡产业发展有限公司杭州区块链技术研究院 Information hosting method, device, equipment and computer storage medium
CN109918874A (en) * 2019-03-14 2019-06-21 上海优扬新媒信息技术有限公司 A kind of material object information storage means and device, information searching method in kind and device
CN110022316A (en) * 2019-03-29 2019-07-16 阿里巴巴集团控股有限公司 The method and apparatus for creating block chain account and resetting account key
WO2021012732A1 (en) * 2019-07-25 2021-01-28 深圳壹账通智能科技有限公司 Blockchain-based information verification apparatus and method, and storage medium
CN113141259A (en) * 2019-09-12 2021-07-20 腾讯科技(深圳)有限公司 Method and device for replacing identity certificate in block chain network
CN113141259B (en) * 2019-09-12 2022-04-29 腾讯科技(深圳)有限公司 Method and device for replacing identity certificate in block chain network
CN110598375B (en) * 2019-09-20 2021-03-16 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN110598375A (en) * 2019-09-20 2019-12-20 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN111275433A (en) * 2019-12-31 2020-06-12 陕西医链区块链集团有限公司 Method for realizing personal wallet of block chain mobile equipment end
CN111275419B (en) * 2020-01-17 2023-04-11 上海简苏网络科技有限公司 Block chain wallet signature right confirming method, device and system
CN111275419A (en) * 2020-01-17 2020-06-12 上海佩俪信息科技有限公司 Block chain wallet signature right confirming method, device and system
CN111340485A (en) * 2020-02-19 2020-06-26 北京众享比特科技有限公司 Configuration method of digital certificate for alliance block chain, terminal and root certificate server
CN111340485B (en) * 2020-02-19 2023-03-14 北京众享比特科技有限公司 Configuration method of digital certificate for alliance block chain, terminal and root certificate server
CN113472521A (en) * 2020-03-30 2021-10-01 山东浪潮质量链科技有限公司 Block chain-based real-name digital identity management method, signature device and verification device
CN113497709A (en) * 2020-04-02 2021-10-12 浪潮云信息技术股份公司 Trusted data source management method based on block chain, signature device and verification device
CN111740839B (en) * 2020-05-26 2023-02-17 深圳市共进电子股份有限公司 Certificate verification method, device, terminal equipment and medium
CN111740839A (en) * 2020-05-26 2020-10-02 深圳市共进电子股份有限公司 Certificate verification method, device, terminal equipment and medium
CN114553426A (en) * 2020-11-26 2022-05-27 中移物联网有限公司 Signature verification method, key management platform, security terminal and electronic equipment
CN114553426B (en) * 2020-11-26 2023-08-15 中移物联网有限公司 Signature verification method, key management platform, security terminal and electronic equipment

Also Published As

Publication number Publication date
CN107888382B (en) 2019-11-19

Similar Documents

Publication Publication Date Title
CN107888382B (en) A kind of methods, devices and systems of the digital identity verifying based on block chain
KR102044751B1 (en) Method for providing reward according to user authentication based on blockchain
US11757627B2 (en) Cryptoasset custodial system with proof-of-stake blockchain support
US11139984B2 (en) Information processing system, devices and methods
CN105427099B (en) The method for network authorization of secure electronic transaction
US11494763B2 (en) Cryptoasset custodial system with custom logic
WO2021008453A1 (en) Method and system for offline blockchain transaction based on identifier authentication
CN106664208A (en) System and method for establishing trust using secure transmission protocols
CN103854180B (en) Credit voucher generating method and system, and application authorization method and system
CN102281138B (en) Method and system for improving safety of verification code
CN111160909B (en) Hidden static supervision system and method for blockchain supply chain transaction
CN1921395B (en) Method for improving security of network software
JPH113033A (en) Method for identifying client for client-server electronic transaction, smart card and server relating to the same, and method and system for deciding approval for co-operation by user and verifier
KR100939725B1 (en) Certification method for a mobile phone
CN106411950A (en) Block-chain transaction ID based authentication method, device and system
CN107920052A (en) A kind of encryption method and intelligent apparatus
CN116151827B (en) Digital wallet security system and double off-line transaction method based on security system
US20190007218A1 (en) Second dynamic authentication of an electronic signature using a secure hardware module
CN106056419A (en) Method, system and device for realizing independent transaction by using electronic signature equipment
CN104835038A (en) Networking payment device and networking payment method
CN103813333B (en) A kind of data processing method based on arranging key
US10867326B2 (en) Reputation system and method
CN108496194A (en) A kind of method, server-side and the system of verification terminal legality
CN107248997A (en) Authentication method based on smart card under environment of multi-server
US20120102327A1 (en) Method and device for authenticating components within an automatic teller machine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant