CN108282339A - A kind of digital identity method for retrieving based on intelligent contract and from social media - Google Patents

A kind of digital identity method for retrieving based on intelligent contract and from social media Download PDF

Info

Publication number
CN108282339A
CN108282339A CN201810074554.4A CN201810074554A CN108282339A CN 108282339 A CN108282339 A CN 108282339A CN 201810074554 A CN201810074554 A CN 201810074554A CN 108282339 A CN108282339 A CN 108282339A
Authority
CN
China
Prior art keywords
change
digital identity
user
media
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810074554.4A
Other languages
Chinese (zh)
Other versions
CN108282339B (en
Inventor
赵赫
周桐
李芳�
李晓风
谭海波
张中贤
王卫东
吕波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Zhongke lattice Technology Co.,Ltd.
Original Assignee
Hefei Institutes of Physical Science of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Institutes of Physical Science of CAS filed Critical Hefei Institutes of Physical Science of CAS
Priority to CN201810074554.4A priority Critical patent/CN108282339B/en
Publication of CN108282339A publication Critical patent/CN108282339A/en
Application granted granted Critical
Publication of CN108282339B publication Critical patent/CN108282339B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3215Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Abstract

The digital identity method for retrieving that the invention discloses a kind of based on intelligent contract and from social media, in the case that private cipher key of the user associated by digital identity is lost, by the social media account of oneself, the intelligent contract on block chain is relied on, giving for change for original digital identity is completed.The present invention can be in the case where private cipher key be lost, and user still can give its original identity for change by the social media account of oneself, and can continue to possess the control to its former identity, to achieve the purpose that digital identity is given for change.

Description

A kind of digital identity method for retrieving based on intelligent contract and from social media
Technical field
The present invention relates to information security fields, and in particular to a kind of based on intelligent contract and from the digital identity of social media Method for retrieving.
Background technology
Block chain as global distributed Database Systems, have can not forge distort, the characteristics such as the whole network shared data, just Due to these good characteristics, application of the block chain technology in Identity Management obtains academia's concern consistent with industrial circle. However there are following defects in existing numerous digital identity account method for retrieving at present:
1, digital identity account is given for change by backup public and private key, i.e., generates backup while generating Your Majesty's private key Public and private key gives the control of digital identity for change by the private cipher key of backup in the case where main private cipher key is lost.Big prepare more Part key and master key are stored on terminal device, and the possibility lost together is very big.If individually remembering backup keys Words, first, increase the difficulty of memory, and there is also the possibilities lost as master key for backup keys.
2, it gives digital identity for change by the way that agent object is arranged, i.e., some agent objects is set in digital identity embryonic stage, In the case where main private cipher key is lost, new public-key cryptography can be declared jointly by pre-set agent object, it is open to declare The key of title is identical and is more than half, then resets the public-key cryptography of user.This mode of giving for change needs to use by multiple third parties Family cooperates jointly, and process is complicated and can not rule out the possibility that multiple third party's user collaboratives are done evil.
Invention content
The present invention is provided a kind of based on intelligent contract and Zi She to solve above-mentioned the shortcomings of the prior art place The digital identity method for retrieving for handing over media, to merely with the social media account of intelligent contract and user oneself, it will be able to pacify Effectively give digital identity for change entirely, to improve the efficiency that digital identity is given for change, the means that abundant digital identity is given for change, and really Warranty family, which may not need, independently completes giving for change for itself digital identity by other objects.
The present invention is to solve technical problem to adopt the following technical scheme that:
A kind of present invention based on intelligent contract and from the characteristics of digital identity method for retrieving of social media is that user is in area Digital identity is possessed in block chain, and the digital identity is associated with unique public-key cryptography, the public-key cryptography is stored in institute It states in block chain, and the user itself holds the corresponding private cipher key of the public-key cryptography;The true identity of the user is logical It crosses the public-key cryptography and the private cipher key is associated with the digital identity;The user be give for change as follows it is described Digital identity:
Step 1, the user generate digital identity in the block chain by the digital identity of itself and give contract for change;
Step 2, the user obtain according to the n possessed the licensing schemes from social media in the n certainly social matchmakers One-to-one unique identity in body;
Step 3, the user store the digital identity, n from social media in the digital identity gives contract for change Title and the n from the correspondence between the Hash hashed value three of the unique identity of social media;
Step 4, when the private cipher key of the user is lost, defined variable m, and initialize m=1;
Step 5, the user select any one to give media for change as the m times social activity at the n from social media; The user gives the licensing scheme of media for change using described the m times social activity, and the social activity for obtaining the user at described the m times is looked for Return the unique identity in media;
The unique identity that step 6, the user give media for change according to described the m times social activity obtains its Hash hash Value, and submit the m times new public-key cryptography;
The digital identity, the m times social activity are given for change the title, the m times described of media by step 7, the user Social activity give for change media unique identity Hash hashed value and it is described the m times submission new public-key cryptography be sent to The digital identity, which is given for change in contract, to be verified;If being proved to be successful, the digital identity gives contract for change and carries described the m times Public-key cryptography of the new public-key cryptography handed over as the digital identity unique association, to complete giving for change for the digital identity; If m+1 is assigned to m by authentication failed;And return to step 5 executes, until being proved to be successful or until m=n.
The characteristics of digital identity method for retrieving of the present invention, lies also in:It is by as follows that the digital identity, which gives contract for change, Process is verified:
Step 7.1, the digital identity give contract for change and give matchmaker for change according to the digital identity and the m times social activity The title of body, to give the title of media for change with described the m times social activity corresponding only for inquiry in the digital identity gives contract for change The Hash hashed value of one identity is used as with reference to value;
Step 7.2, the digital identity give contract for change and judge the m times social activity that the reference value is sent with the user Whether the Hash hashed value for giving the unique identity of media for change is consistent, if when consistent, giving described the m times social activity for change matchmaker The title of body and the new public-key cryptography of the m times submission are stored in the digital identity after being associated and give for change in contract;Otherwise, table Show described the m times social activity give for change the unique identity of media Hash hashed value it is invalid, the user resubmits the m times Social activity give for change media unique identity Hash hashed value;
Number identical with the new public-key cryptography that the m times is submitted in the new public-key cryptography of m submission before step 7.3, statistics Whether n/2 is more than or equal to;If it is greater than or equal to then return is proved to be successful, and otherwise returns to authentication failed.
A kind of present invention based on intelligent contract and from the characteristics of digital identity method for retrieving of social media is that user is in area Digital identity is possessed in block chain, and the digital identity is associated with unique public-key cryptography, the public-key cryptography is stored in institute It states in block chain, and the user itself holds the corresponding private cipher key of the public-key cryptography;The true identity of the user is logical It crosses the public-key cryptography and the private cipher key is associated with the digital identity;Assuming that k can issue disclosure from social media Notice, then the user is to give the digital identity for change as follows:
Step 1, the user generate digital identity in the block chain by the digital identity of itself and give contract for change;
K social matchmaker is arranged according to the digital identity of itself in the digital identity gives contract for change by step 2, the user The title of body;
Step 3, when the private cipher key of the user is lost, defined variable w, and initialize w=1;
Step 4, the user select any one to give media for change as the w times social activity in k social media;It is described User, which using described the w times social activity gives media for change and issues the w time open to the public, to be noticed, and described the w time disclosure is noticed Declare the w times public-key cryptography;
Step 5, the user give the digital identity, the w times social activity for change the title of media and the w times public affairs The URL for opening announcement is sent to the digital identity and gives for change in contract and verified, if being proved to be successful, the digital identity is given for change The new public-key cryptography that contract declares described the w times is as the public-key cryptography of the digital identity unique association, to complete State giving for change for digital identity;If w+1 is assigned to w by authentication failed;And return to step 4 executes, until being proved to be successful or w=k Until.
The characteristics of digital identity method for retrieving of the present invention, lies also in, and it is by as follows that the digital identity, which gives contract for change, Process is verified:
It is logical by prophesy machine Oracle the w times disclosure of access of intelligent contract that step 5.1, the digital identity give contract for change The URL of announcement, obtains the public-key cryptography declared in the w time open notice, and by described the w times social activity give for change media title and The digital identity is stored in after the w times the public-key cryptography declared is associated to give for change in contract;
Number identical with the new public-key cryptography that the w times is declared in the w new public-key cryptography declared before step 5.2, statistics Whether k/2 is more than or equal to;If it is greater than or equal to then return is proved to be successful, and otherwise returns to authentication failed.
Compared with prior art, beneficial effects of the present invention embodiment is:
1, the digital identity method for retrieving based on intelligent contract and from social media that the present invention establishes, first, identity are whole End pre-sets the social media type and the user corresponding identity in social account for participating in that account is given for change;Then, In the case where private cipher key is lost, user subject obtains corresponding identity by the licensing scheme of social media account, And ballot resetting is carried out using social account identity, ensure that user subject still can possess the control of original digital identity System power, so that without backup public and private key, without agent object, just merely with the social media account of itself It gives for change with can completing digital identity.
2, the digital identity method for retrieving based on intelligent contract and from social media that the present invention establishes, first, identity are whole End, which is pre-set, participates in the social media type that account is given for change;Then, in the case where private cipher key is lost, user subject passes through Social media releases news notice, and it is close that newly disclosing of being declared in information announcement is obtained using the Oracle prophesy machines of intelligent contract Key;It equally can be complete merely with the social media account of itself without agent object without backup public and private key At digital identity give for change.
Description of the drawings
Fig. 1 is the flow diagram that new public-key cryptography is arranged in the present invention by taking wechat as an example;
Fig. 2 is the flow diagram that the present invention declares new public-key cryptography by taking Sina weibo as an example.
Specific implementation mode
In the present embodiment, a kind of digital identity method for retrieving based on intelligent contract and from social media is user in area Possessing digital identity in block chain, and digital identity is associated with unique public-key cryptography, public-key cryptography is stored in block chain, and User itself holds the corresponding private cipher key of public-key cryptography;The true identity of user passes through public-key cryptography and private cipher key and number Identity is associated;The user gives the digital identity for change as follows by the licensing scheme of wechat, as shown in Figure 1:
Step 1, user send contract transaction to ether mill block chain first, by the digital identity of itself in ether mill area Deployment, which generates, in block chain belongs to the digital identity of the user and gives contract for change;
Step 2, in the preparation stage, user (including wechat, QQ, Sina weibo, rises according to the n possessed from social media Interrogate microblogging, the mainstreams such as Facebook, Twitter social media) licensing scheme, obtained respectively at n from social media One-to-one unique identity;By taking wechat as an example, which obtains it in wechat platform according to the licensing scheme of wechat Unique identity, and Hash hashed value is carried out to the identity and calculates acquisition HopenId
The digital identity of step 3, user corresponding to its digital identity, which is given for change, stores digital identity, social media in contract Title " WeChat ", and in the social media corresponding unique identity Hash hashed value HopenIdThis three it Between correspondence;The digital identity of user and other n-1 are a a from social media from the title of social media and this n-1 In unique identity Hash hashed value three between correspondence, also stored by similarly mode;
Step 4, when user private cipher key lose when, in most cases refer to preserve the private cipher key terminal set It is standby to lose, or the private cipher key is deleted for various reasons on the terminal device for preserving user's private cipher key;Definition becomes M is measured, and initializes m=1;
Step 5, user select any one to give media for change as the m times social activity at n from social media;User utilizes The licensing scheme of media is given in the m times social activity for change, obtains unique identity of the user in media are given in the m times social activity for change; Such as wechat is selected to give media for change as the m times social activity, in the case where the private cipher key of user is lost, user still can be with Wechat application is downloaded, using itself wechat account and password login wechat, and using the licensing scheme of wechat, it is micro- to obtain user Believe unique identity in platform;
The unique identity that step 6, user give media for change according to the m times social activity obtains its Hash hashed value, here Hash is carried out to the unique identity that user obtains in wechat platform to hash to obtain HopenId', and submit the m times new public affairs Open key Kproposed
Step 7, user give digital identity, the m times social activity the title " WeChat " of media for change, the m times social activity is looked for Return the Hash hashed value H of the unique identity of mediaopenId' and the m times new public-key cryptography K submittedproposedIt is sent to Digital identity is given for change in contract and is verified;If being proved to be successful, digital identity gives contract for change, and newly disclosing for the m times submission is close Key KproposedAs the public-key cryptography of digital identity unique association, to complete giving for change for digital identity;It, will if authentication failed M+1 is assigned to m;And return to step 5 executes, until being proved to be successful or until m=n.
Wherein, it is to be verified according to the following procedure that digital identity, which gives contract for change,:
Step 7.1, digital identity give the title that contract gives media for change according to digital identity and the m times social activity for change " WeChat ", in digital identity gives contract for change inquiry give the corresponding unique identities mark of the title of media for change with the m times social activity The Hash hashed value H of knowledgeopenIdAs with reference to being worth, this reference value be the preparation stage in digital identity gives contract for change it is pre- First store;
Step 7.2, digital identity give contract for change and judge reference value HopenIdMatchmaker is given in the m times social activity sent with user for change The Hash hashed value H of the unique identity of bodyopenId' whether consistent, if when consistent, giving the m times social activity for change media The new public-key cryptography K of title " WeChat " and the m times submissionproposedIt is stored in the digital identity after being associated and gives contract for change In;Otherwise, indicate that the Hash hashed value H of the unique identity of media is given in the m times social activity for changeopenId' invalid, user is again The m times social activity is submitted to give the Hash hashed value of the unique identity of media for change;
The new public-key cryptography K submitted with the m times in the new public-key cryptography of m submission before step 7.3, statisticsproposedIt is identical Number whether be more than or equal to n/2;If it is greater than or equal to then return is proved to be successful, and otherwise returns to authentication failed.
In the present embodiment, a kind of digital identity method for retrieving based on intelligent contract and from social media is user in area Possessing digital identity in block chain, and digital identity is associated with unique public-key cryptography, public-key cryptography is stored in block chain, and User itself holds the corresponding private cipher key of public-key cryptography;The true identity of user passes through public-key cryptography and private cipher key and number Identity is associated;Assuming that k can issue open notice from social media, then user is to give the digital body for change as follows Part, as shown in Figure 2:
Step 1, user send contract transaction to ether mill block chain first, by the digital identity of itself in ether mill area Deployment, which generates, in block chain belongs to the digital identity of the user and gives contract for change;
Step 2, in the preparation stage, k society is arranged according to the digital identity of itself in user in digital identity gives contract for change The title for handing over media, includes the social media of the mainstreams such as Sina weibo, Tencent's microblogging, Facebook, Twitter, these media Disclosed notice can be issued to the public;By taking Sina weibo as an example, any user can check in the microblogging of its user of interest Hold;
Step 3, when user private cipher key lose when, in most cases refer to preserve the private cipher key terminal set It is standby to lose, or the private cipher key is deleted for various reasons on the terminal device for preserving user's private cipher key;Definition becomes W is measured, and initializes w=1;
Step 4, in the stage of giving for change, user selects any one to give matchmaker for change as the w times social activity in k social media Body;User, which using the w times social activity gives media for change and issues the w time open to the public, to be noticed, and the w time disclosure, which is noticed, declares the W public-key cryptography;If user selects microblogging to give media for change as the w times social activity, it is " my new disclosure that user, which sends content, Key is the microblogging of 0x ... ... ... .. ", and records the URL of this microblogging;
Step 5, user by the digital identity of itself, the w times social activity give for change media title " WeiBo " and the w times The URL of open notice be sent to digital identity and give for change in contract and verified, if being proved to be successful, digital identity gives contract for change The new public-key cryptography that the w times is declared is as the public-key cryptography of digital identity unique association, to complete the digital identity It gives for change;If w+1 is assigned to w by authentication failed;And return to step 4 executes, until being proved to be successful or until w=k.
Wherein, it is to be verified according to the following procedure that digital identity, which gives contract for change,:
Step 5.1, digital identity give contract for change and access the w times open notice by the prophesy machine Oracle of intelligent contract URL can obtain this microblogging according to URL and parse its content, obtain the public-key cryptography declared in the w times open notice Kproposed, and give the w times social activity for change the titles " WeiBo " of media and the w times public-key cryptography K declaredproposedIt is closed Digital identity is stored in after connection to give for change in contract;
The new public-key cryptography K declared with the w times in the w new public-key cryptography declared before step 5.2, statisticsproposedIt is identical Number whether be more than or equal to k/2;If it is greater than or equal to then return is proved to be successful, and otherwise returns to authentication failed.

Claims (4)

1. a kind of digital identity method for retrieving based on intelligent contract and from social media, characterized in that user is in block chain Digital identity is possessed, and the digital identity is associated with unique public-key cryptography, the public-key cryptography is stored in the block In chain, and the user itself holds the corresponding private cipher key of the public-key cryptography;The true identity of the user passes through described Public-key cryptography and the private cipher key are associated with the digital identity;The user is to give the digital body for change as follows Part:
Step 1, the user generate digital identity in the block chain by the digital identity of itself and give contract for change;
Step 2, the user obtain at the n according to the n possessed the licensing schemes from social media from social media One-to-one unique identity;
Step 3, the user store the digital identity, the n names from social media in the digital identity gives contract for change Claim and the n is a from the correspondence between the Hash hashed value three of the unique identity of social media;
Step 4, when the private cipher key of the user is lost, defined variable m, and initialize m=1;
Step 5, the user select any one to give media for change as the m times social activity at the n from social media;It is described User gives the licensing scheme of media for change using described the m times social activity, and matchmaker is given in the social activity for obtaining the user at described the m times for change Unique identity in body;
The unique identity that step 6, the user give media for change according to described the m times social activity obtains its Hash hashed value, And submit the m times new public-key cryptography;
Step 7, the user give the digital identity, the m times social activity for change the title of media, the m times society The new public-key cryptography of the Hash hashed value and the m times submission of handing over the unique identity for giving media for change is sent to described Digital identity is given for change in contract and is verified;If being proved to be successful, the digital identity gives what contract submitted described the m times for change New public-key cryptography of the public-key cryptography as the digital identity unique association, to complete giving for change for the digital identity;If testing Card failure, then be assigned to m by m+1;And return to step 5 executes, until being proved to be successful or until m=n.
2. digital identity method for retrieving according to claim 1, it is characterized in that:It is by such as that the digital identity, which gives contract for change, Lower process is verified:
Step 7.1, the digital identity give contract for change and give media for change according to the digital identity and the m times social activity Title, in the digital identity gives contract for change inquiry give the corresponding unique body of the title of media for change with described the m times social activity The Hash hashed value of part mark is used as with reference to value;
Step 7.2, the digital identity are given the m times social activity that contract judges that the reference value is sent with the user for change and are given for change Whether the Hash hashed value of the unique identity of media is consistent, if when consistent, giving described the m times social activity for change media Title and the new public-key cryptography of the m times submission are stored in the digital identity after being associated and give for change in contract;Otherwise, institute is indicated The Hash hashed value for the unique identity that media are given in the social activity for stating the m times for change is invalid, and the user resubmits the m times society Hand over the Hash hashed value for the unique identity for giving media for change;
Whether number identical with the new public-key cryptography that the m times is submitted in the new public-key cryptography of the preceding m submission of step 7.3, statistics More than or equal to n/2;If it is greater than or equal to then return is proved to be successful, and otherwise returns to authentication failed.
3. a kind of digital identity method for retrieving based on intelligent contract and from social media, characterized in that user is in block chain Digital identity is possessed, and the digital identity is associated with unique public-key cryptography, the public-key cryptography is stored in the block In chain, and the user itself holds the corresponding private cipher key of the public-key cryptography;The true identity of the user passes through described Public-key cryptography and the private cipher key are associated with the digital identity;Assuming that k can issue open notice from social media, then The user is to give the digital identity for change as follows:
Step 1, the user generate digital identity in the block chain by the digital identity of itself and give contract for change;
K social media is arranged in the digital identity gives contract for change according to the digital identity of itself by step 2, the user Title;
Step 3, when the private cipher key of the user is lost, defined variable w, and initialize w=1;
Step 4, the user select any one to give media for change as the w times social activity in k social media;The user The open notice that media issue to the public the w time is given for change using described the w times social activity, and described the w time disclosure, which is noticed, to be declared The w times public-key cryptography;
Step 5, the user gives the digital identity, the w times social activity the title of media for change and the w times disclosure is led to The URL of announcement, which is sent to the digital identity and gives for change in contract, to be verified, if being proved to be successful, the digital identity gives contract for change The new public-key cryptography that described the w times is declared is as the public-key cryptography of the digital identity unique association, to complete the number Body part is given for change;If w+1 is assigned to w by authentication failed;And return to step 4 executes, until being proved to be successful or w=k is Only.
4. digital identity method for retrieving according to claim 3, characterized in that it is by such as that the digital identity, which gives contract for change, Lower process is verified:
Step 5.1, the digital identity give contract for change and access the w times open notice by the prophesy machine Oracle of intelligent contract URL obtains the public-key cryptography declared in the w times open notice, and described the w times social activity is given for change to the title and w of media The secondary public-key cryptography declared is stored in the digital identity after being associated and gives for change in contract;
Whether number identical with the new public-key cryptography that the w times is declared in the preceding w new public-key cryptography declared of step 5.2, statistics More than or equal to k/2;If it is greater than or equal to then return is proved to be successful, and otherwise returns to authentication failed.
CN201810074554.4A 2018-01-25 2018-01-25 Digital identity retrieving method based on intelligent contracts and self-social media Active CN108282339B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810074554.4A CN108282339B (en) 2018-01-25 2018-01-25 Digital identity retrieving method based on intelligent contracts and self-social media

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810074554.4A CN108282339B (en) 2018-01-25 2018-01-25 Digital identity retrieving method based on intelligent contracts and self-social media

Publications (2)

Publication Number Publication Date
CN108282339A true CN108282339A (en) 2018-07-13
CN108282339B CN108282339B (en) 2020-10-30

Family

ID=62805214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810074554.4A Active CN108282339B (en) 2018-01-25 2018-01-25 Digital identity retrieving method based on intelligent contracts and self-social media

Country Status (1)

Country Link
CN (1) CN108282339B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109983466A (en) * 2018-09-27 2019-07-05 区链通网络有限公司 A kind of account management system and management method, storage medium based on block chain
CN109978551A (en) * 2019-03-29 2019-07-05 北京投肯科技有限公司 A kind of account information confirmation and method for retrieving and device based on block chain
WO2020062668A1 (en) * 2018-09-29 2020-04-02 平安科技(深圳)有限公司 Identity authentication method, identity authentication device, and computer readable medium
CN111091380A (en) * 2019-10-25 2020-05-01 趣派(海南)信息科技有限公司 Block chain asset management method based on friend covert verification
ES2774397A1 (en) * 2019-01-18 2020-07-20 Telefonica Digital Espana Slu METHOD AND SYSTEM FOR RECOVERY OF CRYPTOGRAPHIC KEYS FROM A BLOCK CHAIN NETWORK (Machine-translation by Google Translate, not legally binding)
CN111654476A (en) * 2020-05-20 2020-09-11 中国工商银行股份有限公司 User authorized access processing method and device
CN111666545A (en) * 2020-07-23 2020-09-15 光载互联(杭州)科技有限公司 Block chain-based digital identity information retrieving system and method
WO2021073202A1 (en) * 2019-10-15 2021-04-22 深圳壹账通智能科技有限公司 Intelligent contract processing method, computer device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106779708A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Participant identity management method and system on block chain based on intelligent contract
WO2017213719A1 (en) * 2016-06-06 2017-12-14 Thomson Reuters Global Resources Systems and methods for providing identity scores
CN107579998A (en) * 2017-10-17 2018-01-12 光载无限(北京)科技有限公司 Personal data center and digital identification authentication method based on block chain, digital identity and intelligent contract
CN107609876A (en) * 2017-08-18 2018-01-19 北京云知科技有限公司 A kind of method and system for recovering block chain assets

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017213719A1 (en) * 2016-06-06 2017-12-14 Thomson Reuters Global Resources Systems and methods for providing identity scores
CN106779708A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Participant identity management method and system on block chain based on intelligent contract
CN107609876A (en) * 2017-08-18 2018-01-19 北京云知科技有限公司 A kind of method and system for recovering block chain assets
CN107579998A (en) * 2017-10-17 2018-01-12 光载无限(北京)科技有限公司 Personal data center and digital identification authentication method based on block chain, digital identity and intelligent contract

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周桐: "基于区块链技术的可信数据通证化方法的研究与应用", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109983466A (en) * 2018-09-27 2019-07-05 区链通网络有限公司 A kind of account management system and management method, storage medium based on block chain
WO2020061923A1 (en) * 2018-09-27 2020-04-02 区链通网络有限公司 Blockchain-based account management system and management method, and storage medium
WO2020062668A1 (en) * 2018-09-29 2020-04-02 平安科技(深圳)有限公司 Identity authentication method, identity authentication device, and computer readable medium
ES2774397A1 (en) * 2019-01-18 2020-07-20 Telefonica Digital Espana Slu METHOD AND SYSTEM FOR RECOVERY OF CRYPTOGRAPHIC KEYS FROM A BLOCK CHAIN NETWORK (Machine-translation by Google Translate, not legally binding)
CN109978551A (en) * 2019-03-29 2019-07-05 北京投肯科技有限公司 A kind of account information confirmation and method for retrieving and device based on block chain
WO2021073202A1 (en) * 2019-10-15 2021-04-22 深圳壹账通智能科技有限公司 Intelligent contract processing method, computer device and storage medium
CN111091380A (en) * 2019-10-25 2020-05-01 趣派(海南)信息科技有限公司 Block chain asset management method based on friend covert verification
CN111091380B (en) * 2019-10-25 2023-05-09 趣派(海南)信息科技有限公司 Block chain asset management method based on friend hidden verification
CN111654476A (en) * 2020-05-20 2020-09-11 中国工商银行股份有限公司 User authorized access processing method and device
CN111654476B (en) * 2020-05-20 2022-07-29 中国工商银行股份有限公司 User authorized access processing method and device
CN111666545A (en) * 2020-07-23 2020-09-15 光载互联(杭州)科技有限公司 Block chain-based digital identity information retrieving system and method

Also Published As

Publication number Publication date
CN108282339B (en) 2020-10-30

Similar Documents

Publication Publication Date Title
CN108282339A (en) A kind of digital identity method for retrieving based on intelligent contract and from social media
Dai et al. A low storage room requirement framework for distributed ledger in blockchain
Yu et al. A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings
US11425108B2 (en) Blockchain-based service data encryption methods and apparatuses
US10356094B2 (en) Uniqueness and auditing of a data resource through an immutable record of transactions in a hash history
US10880072B2 (en) Systems and methods for controlled random endorsement in a blockchain network
CN102158468B (en) Method for sharing and acquiring data in social network service (SNS)
Ulukus et al. Private retrieval, computing, and learning: Recent progress and future challenges
Zhang et al. Cryptographic solutions for cloud storage: Challenges and research opportunities
US11625718B2 (en) Blockchain-based data verification system and method, computing device and storage medium
CN111130770B (en) Information certification method and system based on blockchain, user terminal, electronic equipment and storage medium
CN105164971A (en) Verification system and method with extra security for lower-entropy input records
US20220263660A1 (en) Authentication through use of an unforgable hash function based credential
CN113438084A (en) Green power source tracing method and system based on R-PBFT consensus algorithm and timestamp
CN107948192A (en) A kind of block chain account customization identification and login method and system
CN105847853A (en) Video content distribution method and device
Li et al. SPFM: Scalable and privacy-preserving friend matching in mobile cloud
WO2019179625A1 (en) Distributed data storage network nodes and methods
CN105183402B (en) Date storage method
US9824227B2 (en) Simulated control of a third-party database
Yoon et al. Blockchain-based object name service with tokenized authority
Zhao et al. Digital education transaction object authentication service based on blockchain technology
CN111444265A (en) Government affair information sharing system based on block chain
CN110661634B (en) User information processing method and device
CN115934832A (en) Metering test detection data credible sharing method based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220421

Address after: 230022 Room 501, block B, Anhui Institute of industrial technology innovation, No. 2221, Changjiang West Road, high tech Zone, Hefei, Anhui Province

Patentee after: Anhui Zhongke lattice Technology Co.,Ltd.

Address before: 230031 no.350 shushanhu Road, Science Island, Shushan District, Hefei City, Anhui Province

Patentee before: HEFEI INSTITUTES OF PHYSICAL SCIENCE, CHINESE ACADEMY OF SCIENCES