CN108551437B - Method and apparatus for authenticating information - Google Patents

Method and apparatus for authenticating information Download PDF

Info

Publication number
CN108551437B
CN108551437B CN201810205149.1A CN201810205149A CN108551437B CN 108551437 B CN108551437 B CN 108551437B CN 201810205149 A CN201810205149 A CN 201810205149A CN 108551437 B CN108551437 B CN 108551437B
Authority
CN
China
Prior art keywords
user
information
target user
registered
login request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810205149.1A
Other languages
Chinese (zh)
Other versions
CN108551437A (en
Inventor
高松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201810205149.1A priority Critical patent/CN108551437B/en
Publication of CN108551437A publication Critical patent/CN108551437A/en
Application granted granted Critical
Publication of CN108551437B publication Critical patent/CN108551437B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses a method and a device for authenticating information. One embodiment of the method comprises: authenticating a login request sent by a user, wherein the login request comprises a shared account; if the authentication result of the login request is passed, the authentication result is sent to a first target user so that the first target user can confirm the authentication result, wherein the first target user is a related user using the same shared account number as the user; if receiving the information which is sent by at least one first target user and used for confirming that the authentication result passes, generating authentication data; and sending the authentication data to a pre-constructed block chain network so as to perform consensus processing on the authentication data. The embodiment can process the login request of the user by using a block chain technology, thereby being beneficial to improving the security of the shared account.

Description

Method and apparatus for authenticating information
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to a method and a device for authenticating information.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The consensus mechanism can be understood as a mathematical algorithm for establishing trust and obtaining rights among different nodes in the blockchain system.
In a narrow sense, the blockchain may be a chain data structure that combines data blocks in a sequential manner in a chronological order, and cryptographically secures a tamper-proof and counterfeit-proof distributed ledger. Due to the characteristics of the blockchain technology, the blockchain technology is widely used in the financial industry.
Disclosure of Invention
The embodiment of the application provides a method and a device for authenticating information.
In a first aspect, an embodiment of the present application provides a method for authenticating information, including: authenticating a login request sent by a user, wherein the login request comprises a shared account; if the authentication result of the login request is passed, the authentication result is sent to a first target user so that the first target user can confirm the authentication result, wherein the first target user is a related user using the same shared account number as the user; if receiving the information which is sent by at least one first target user and used for confirming that the authentication result passes, generating authentication data; and sending the authentication data to a pre-constructed block chain network so as to perform consensus processing on the authentication data.
In some embodiments, the method further comprises: and if the number of the block chain link points passing the consensus reaches a preset threshold value, determining that the consensus processing result of the authentication data is that the consensus passes, and storing the authentication data into the block chain nodes of the block chain network.
In some embodiments, the user information of the new associated user using the same shared account is created by: acquiring a shared account and identity information of a user to be registered, and generating prompt information, wherein the identity information comprises personal identity information and/or enterprise information; sending the prompt information to a second target user, wherein the second target user is a registered associated user using the same shared account number as the user to be registered; and determining whether the user to be registered is used as a newly added associated user of the second target user or not according to feedback information which is sent by the second target user and corresponds to the prompt information.
In some embodiments, determining whether to use the user to be registered as the new associated user of the second target user according to the feedback information corresponding to the prompt information sent by the second target user includes: if the feedback information comprises information for representing and confirming the registration of the user to be registered, further sending the prompt information to a block chain network so as to perform consensus processing on the prompt information; if the consensus processing result of the prompt message is that the consensus passes, the user to be registered is used as a newly added associated user of the second target user, an identity of the newly added associated user is generated, and a newly added key pair corresponding to the identity is created; and generating user information of the newly added associated user according to the identity identifier and the newly added key pair, and storing the user information into the block chain nodes of the block chain network.
In some embodiments, the login request further comprises a public key and a digital signature, wherein the digital signature is obtained by signing from a private key of a key pair; and authenticating a login request sent by a user, comprising: and verifying the validity of the digital signature according to the public key, and if the digital signature is verified to be valid, determining that the authentication result of the login request is passed.
In some embodiments, sending the authentication result to the first target user comprises: and selecting a first target user meeting preset conditions from the first target users, and sending an authentication result to the selected first target user, wherein the preset conditions comprise that the user is currently in an online login state.
In a second aspect, an embodiment of the present application provides an apparatus for authenticating information, including: the authentication unit is configured to authenticate a login request sent by a user, wherein the login request comprises a shared account; the confirmation unit is configured to send the authentication result to a first target user if the authentication result of the login request is passed, so that the first target user confirms the authentication result, wherein the first target user is a related user using the same shared account as the user; the generating unit is configured to generate authentication data if receiving information which is sent by at least one first target user and used for confirming that an authentication result passes; and the consensus unit is configured to send the authentication data to a pre-constructed block chain network so as to perform consensus processing on the authentication data.
In some embodiments, the apparatus further comprises: and the storage unit is configured to determine that the consensus processing result of the authentication data is consensus pass if the number of the block link points which are consensus pass reaches a preset threshold value, and store the authentication data into the block link nodes of the block link network.
In some embodiments, the apparatus further includes means for creating user information for the newly added associated user, including: the system comprises an acquisition subunit, a registration unit and a display unit, wherein the acquisition subunit is configured to acquire a shared account and identity information of a user to be registered and generate prompt information, and the identity information comprises personal identity information and/or enterprise information; the sending subunit is configured to send the prompt message to a second target user, where the second target user is a registered associated user who uses the same shared account as the user to be registered; and the determining subunit is configured to determine whether to use the user to be registered as a new associated user of the second target user according to feedback information corresponding to the prompt information and sent by the second target user.
In some embodiments, the determining subunit is further configured to: if the feedback information comprises information for representing and confirming the registration of the user to be registered, further sending the prompt information to a block chain network so as to perform consensus processing on the prompt information; if the consensus processing result of the prompt message is that the consensus passes, the user to be registered is used as a newly added associated user of the second target user, an identity of the newly added associated user is generated, and a newly added key pair corresponding to the identity is created; and generating user information of the newly added associated user according to the identity identifier and the newly added key pair, and storing the user information into the block chain nodes of the block chain network.
In some embodiments, the login request further comprises a public key and a digital signature, wherein the digital signature is obtained by signing from a private key of a key pair; and the authentication unit is further configured to: and verifying the validity of the digital signature according to the public key, and if the digital signature is verified to be valid, determining that the authentication result of the login request is passed.
In some embodiments, the validation unit is further configured to: and selecting a first target user meeting preset conditions from the first target users, and sending an authentication result to the selected first target user, wherein the preset conditions comprise that the user is currently in an online login state.
In a third aspect, an embodiment of the present application provides an electronic device, including: one or more processors; storage means for storing one or more programs; when executed by one or more processors, cause the one or more processors to implement a method as described in any one of the embodiments of the first aspect above.
In a fourth aspect, the present application provides a computer-readable medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method as described in any one of the embodiments in the first aspect.
The method and the device for authenticating the information can authenticate the login request sent by the user. Wherein the login request comprises a shared account. And when the authentication result of the login request is passed, the authentication result can be sent to the first target user, so that the first target user confirms the authentication result. The first target user is an associated user using the same shared account with the user. Then, if the information that confirms that the authentication result sent by the at least one first target user passes is received, the authentication data may be generated. And the authentication data can be sent to a pre-constructed blockchain network to perform consensus processing on the authentication data. That is, after the login request that the associated user using the same shared account passes the authentication of the user is confirmed, the login request of the user can be further processed by using the block chain technology, which is helpful for improving the security of the shared account.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a method for authenticating information according to the present application;
FIG. 3 is a flowchart of one embodiment of the steps for creating user information for a newly added associated user;
FIG. 4 is a schematic diagram of an application scenario of a method for authenticating information according to the present application;
FIG. 5 is a schematic block diagram illustrating one embodiment of an apparatus for authenticating information according to the present application;
FIG. 6 is a schematic block diagram of a computer system suitable for use in implementing an electronic device according to embodiments of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 illustrates an exemplary system architecture 100 to which the method for authenticating information or the apparatus for authenticating information of the embodiments of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include terminals 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminals 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user 110 may use the terminals 101, 102, 103 to interact with the server 105 over the network 104 to receive or send messages or the like. The terminals 101, 102, 103 may have various client applications installed thereon, such as Software-as-a-Service (SAAS) applications, web browsers, shopping applications, instant messenger applications, and the like.
The terminals 101, 102, 103 may be hardware or software. When the terminals 101, 102, 103 are hardware, they may be various electronic devices with display screens, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III), laptop portable computers, desktop computers, and the like. When the terminals 101, 102, 103 are software, they can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
The server 105 may be a server providing various services, such as a background server providing support for various applications displayed on the terminals 101, 102, 103. The background server may perform analysis processing on various operations of the user 110 in the application. For example, an authentication analysis may be performed on a user's login request, and the analysis results (e.g., generated authentication data) may be sent into the blockchain network for consensus processing.
The server may be hardware or software. When the server is hardware, it may be implemented as a distributed server cluster formed by multiple servers, or may be implemented as a single server. When the server is software, it may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services), or as a single piece of software or software module. And is not particularly limited herein.
It should be noted that the method for authenticating information provided in the embodiment of the present application is generally performed by the server 105. Accordingly, means for authenticating information is generally provided in the server 105.
It should be understood that the number of terminals, networks, and servers in fig. 1 are merely illustrative. There may be any number of terminals, networks, and servers, as desired for an implementation.
With continued reference to FIG. 2, a flow 200 of one embodiment of a method for authenticating information in accordance with the present application is shown. The method for authenticating information may include the steps of:
step 201, authenticating the login request sent by the user.
In this embodiment, the execution subject of the method for authenticating information (e.g., server 105 shown in fig. 1) may authenticate the login request sent by the user. The login request may include a shared account. The shared account here may be various accounts commonly used, such as an account for logging in a certain website or application. The shared account may be used by a plurality of different users simultaneously, such as accounts in the SAAS business system. And the shared account can also be used on different applications or terminals. The shared account number may include one or more of numbers, letters, words, and symbols.
In this embodiment, the login request may be automatically initiated by the terminal according to the stored history login record when the user logs in an application on the terminal (e.g., the terminals 101, 102, 103 shown in fig. 1) used by the user. The login request may be a login request generated by a terminal used by the user after the user inputs login information and performs a corresponding operation, and the login request is sent to the execution main body. The terminal may send the login request in a wired connection manner or a wireless connection manner.
In some optional implementations of this embodiment, the login request may include a shared account and a password. In this way, the execution subject, upon receiving the login request, may query a pre-stored login data set to authenticate the shared account and password in the login request. The login data set may include a plurality of shared accounts and passwords corresponding to the shared accounts. Here, the login data set may be divided into a plurality of login data subsets. Each subset of login data may be used to store a shared account and password for a different application.
Optionally, the login request may also include a shared account and a terminal identifier. The terminal identifier may include (but is not limited to) a terminal ID (identity, identity number), a mobile phone number, and/or the like. In this way, the execution subject may perform an inquiry in the pre-stored data to determine whether the terminal identifier in the login request exists in the terminal identifiers corresponding to the shared account in the login request, thereby implementing authentication of the login request.
Further, upon user registration, the enforcement agent may assign each user a pair of keys (i.e., a public-private key pair). Specifically, reference may be made to fig. 3, which is a flowchart illustrating an embodiment of a step of creating user information of a newly added associated user. In this way, the login request may include a public key and a digital signature in addition to the shared account. Wherein, the digital signature can be obtained by signing according to a private key in a key pair. For example, a digest corresponding to the user's true identity information may be encrypted by a private key to obtain a digital signature.
At this time, after receiving the login request sent by the user, the executing entity may verify the validity of the digital signature according to the public key. If the digital signature is verified to be valid, the executing agent may determine that the authentication result of the login request is passed. For example, the executing entity may decrypt the digital signature with the public key to obtain the true identity information of the user, so that it may be determined whether the identity information is valid. If the identity information is legal and valid, which can indicate that the digital signature is valid, the executive body can determine that the login request passes the authentication.
The registered data set and the storage location of the data stored in advance are not limited in the present application. Which may be stored locally to the execution entity or in a device communicatively coupled to the execution entity.
Step 202, if the authentication result of the login request is passed, the authentication result is sent to the first target user, so that the first target user confirms the authentication result.
In this embodiment, if the authentication result of the login request in step 201 is passed, the execution main body may send the authentication result to the first target user, so that the first target user may confirm the authentication result. The authentication result may be information related to the login request that passes the authentication. And the first target user may be an associated user who uses the same shared account as the user. For example, the shared account in the login request sent by the user a is "×", then the other users who also use the "×" -shared account are the associated users of the user a, that is, the first target users. The first target user may be a user, an application or a terminal.
As an example, the login data set may further store user information. The user information may include (but is not limited to) at least one of: name, phone, identification number, mailbox, etc. In this way, the executing agent may look up user information of a user who uses the same shared account as the user who sent the login request in the login data set. Therefore, the user indicated by the searched user information can be used as the first target user, and the authentication result can be sent to the first target user according to the searched user information. Here, the authentication result may generally include user information of the user who sent the login request and the authentication pass result. In some application scenarios, the authentication result may further include (but is not limited to) a terminal identifier of a terminal that sent the login request, a sending time or an authentication passing time of the login request, and the like.
In some optional implementation manners of this embodiment, in order to improve the authentication efficiency of the information, the execution subject may select a first target user that satisfies a preset condition from the first target users, so as to send the authentication result to the selected first target user. The preset condition may be set according to an actual situation, for example, the preset condition may indicate that the user is currently in an online login state. That is, the authentication result may be sent to a portion of the first target users, particularly those first target users that are in a logged-on online state. This helps to improve the efficiency with which the execution agent receives the confirmation result from the first target user, thereby improving the processing efficiency of the login request and reducing the waiting time of the user.
It will be appreciated that in performing the above-described confirmation operations, a reward mechanism may be employed to motivate the user to actively perform the confirmation operations. For example, for first target users who send confirmation results, coupons or virtual cash vouchers and the like may be sent to these first target users.
Step 203, if receiving the information that the confirmation authentication result sent by at least one first target user passes, generating authentication data.
In this embodiment, if the execution subject receives information that at least one first target user sends a confirmation that the authentication result passes, the authentication data may be generated. The authentication data may be data related to the authentication result that the confirmation is passed, and the specific content thereof is not limited in the present application. For example, the authentication data may include an authentication result, user information of the first target user, and a confirmation result. For another example, the authentication data may further include the occurrence time of the confirmation result, and the like.
It should be noted that, in order to improve the information processing efficiency, the execution subject may send the authentication result to a plurality of first target users at the same time. For the first target users, the execution subject may determine that the authentication result passes as long as information indicating that the authentication result passes is received from at least one of the first target users.
And step 204, sending the authentication data to a pre-constructed block chain network so as to perform consensus processing on the authentication data.
In this embodiment, in order to avoid the risk that the confirmation operation of the first target user in step 203 is stored in forgery or cheating, the execution principal may send the authentication data to a pre-constructed blockchain network, so that the blockchain network performs consensus processing on the authentication data. The block chain network has the advantages of being distributed, completely open, incapable of being modified and the like, so that the safety of the consensus processing result can be effectively guaranteed, and the reliability of the result is improved.
Here, a large number of blockchain nodes may typically be included in a pre-created blockchain network. Each block link point may correspond to each user using a different shared account. As an example, a blockchain network may be created from a large number of users using each shared account using blockchain techniques. As another example, a blockchain network may also be created from users who are logged on online using blockchain techniques.
The block chain technique is abbreviated as bt (block chain technology), and is also called as distributed book technique. The method is an Internet database technology and is characterized in that centralization and openness are realized, and everyone can participate in database records. The technology is widely applied to the industries such as finance and the like, and is not described in detail herein.
In some optional implementations of this embodiment, if the result of the consensus processing of the authentication data is that the consensus passes, the execution subject may store the authentication data in a blockchain node of the blockchain network. As an example, if the number of block link points that the consensus passes reaches a preset threshold, the consensus processing result of the authentication data may be determined to be the consensus passing. At this time, the execution subject may store the authentication data in the newly generated block, and use the block as a blockchain node of the blockchain network, thereby implementing storage of the authentication data in the blockchain network.
The preset threshold value can be set according to practical situations, for example, it can be 51% (i.e. the number of the commonly-passing blockchain nodes accounts for 51% of the total number of blockchain nodes). At this time, if an attacker wants to modify data in the blockchain network, the attacker needs to have 51% of calculation power of the whole network, and the implementation is basically impossible. And the larger the preset threshold, the less likely the data is to be modified. That is to say, the security of the shared account can be effectively ensured through the consensus processing of the block chain network.
Further, if the result of the consensus process of the authentication data is that the consensus is passed, the execution subject may send a prompt message to the terminal used by the user to indicate that the login request authentication is passed, such as "login successful". Or after the consensus is passed, the execution main body can send the page in the login state to the terminal, so that the user can perform corresponding operation on the page in the login state. Meanwhile, the execution main body can record the operation behaviors of the user in the block chain network, so that the traceability of the record can be realized, and the reliability and persuasion of the record are improved. And a blockchain network may be exposed so that a user can supervise it and obtain self data from it.
The method for authenticating information provided by the embodiment can authenticate the login request sent by the user. And when the authentication result of the login request is passed, the authentication result can be sent to the first target user, so that the first target user confirms the authentication result. Then, if the information that confirms that the authentication result sent by the at least one first target user passes is received, the authentication data may be generated. And the authentication data can be sent to a pre-constructed blockchain network to perform consensus processing on the authentication data. That is, after the login request that the associated user using the same shared account passes the authentication of the user is confirmed, the login request of the user can be further processed by using the block chain technology, which is helpful for improving the security of the shared account.
With further reference to fig. 3, a flow 300 of one embodiment of the steps for creating user information for the newly added associated user is illustrated. The step of creating the user information of the newly added associated user may specifically include the following steps:
step 301, obtaining a shared account and identity information of a user to be registered, and generating prompt information.
In this embodiment, an executing subject (for example, the server 105 shown in fig. 1) of the method for authenticating information may acquire the shared account and the identity information of the user to be registered in a wired connection manner or a wireless connection manner, so as to generate the prompt information. The prompt information may be information for prompting a user to be registered who applies for using the shared account. For example, the prompt message may include identity information of the user to be registered and a shared account number applied for use. For another example, the prompt message may further include an application time and/or a current location of the user to be registered.
In this embodiment, the identity information generally refers to legal and valid identity information. The identity information may include personal identity information and/or business information. The personal identity information may include (but is not limited to): name, identification card number, mobile phone number, etc. The business information may include (but is not limited to): a license registration number, an organization code, a tax registration number, and the like.
It is understood that the user to be registered may enter the shared account and identity information in a page displayed by the terminal (e.g., terminals 101, 102, 103 shown in fig. 1) used by the user. Wherein. The input mode is not limited in this application, and may be, for example, voice input, keyboard input, paste, and the like.
Step 302, sending the prompt message to a second target user.
In this embodiment, the execution subject may send the prompt message generated in step 301 to the second target user through a wired connection manner or a wireless connection manner. The second target user may be a registered associated user who uses the same shared account as the user to be registered. For a specific process, reference may be made to the related description of step 202 in fig. 2, which is not described herein again.
In this embodiment, the manner of displaying the prompt information to the second target user is not limited in this application, and may be, for example, text display, two-dimensional code display, and/or voice playing.
Optionally, in order to improve the processing efficiency of the information, the execution main body may also send the prompt information to a second target user meeting the preset condition. The preset conditions here are the same as the above-described preset conditions.
Step 303, determining whether the user to be registered is a new associated user of the second target user according to the feedback information corresponding to the prompt information sent by the second target user.
In this embodiment, the executing entity may determine whether to use the user to be registered as the new associated user of the second target user according to the feedback information sent by the second target user. The feedback information here may be information corresponding to the prompt information, that is, information for feeding back the prompt information.
In this embodiment, if the feedback information represents that the user to be registered agrees to register, it may be determined that the user to be registered is a new associated user of the second target user, and the step 304 is continuously performed. If the feedback information representation does not agree with the registration of the user to be registered, it can be determined that the user to be registered cannot be used as a new associated user of the second target user. At this time, the execution main body may also send prompt information indicating registration failure to the user to be registered.
It can be understood that the prompt message is sent to the second target user using the same shared account, so that the registered user can know the condition of the shared account in time. And only under the condition that the registered user agrees or authorizes, the user to be registered can register to use the shared account, so that the security of the shared account is improved.
And step 304, if the feedback information includes information for representing and confirming that the user to be registered is registered, further sending the prompt information to the block chain network so as to perform consensus processing on the prompt information.
In this embodiment, if the feedback information includes information indicating that the user to be registered is confirmed to be registered, that is, the user to be registered is agreed to be registered, the execution main body may further send the prompt information to the blockchain network, so that the blockchain network performs consensus processing on the prompt information. Here, the way of sending the feedback information by the second target user is also not limited in this application, for example, the second target user may directly reply the feedback information by using the terminal, or perform scanning and identification of the two-dimensional code by using the terminal.
It should be noted that, in order to further improve the information processing efficiency, for each second target user that receives the notification information, the execution subject may send the notification information to the block chain network when receiving feedback information, sent by at least one of the second target users, for indicating that registration is agreed. At this time, the execution subject may also send user information, feedback information, and the like of the second target user to the blockchain network for consensus processing.
And 305, if the consensus processing result of the prompt message is that the consensus passes, taking the user to be registered as a new associated user of the second target user, generating an identity of the new associated user, and creating a new key pair corresponding to the identity.
In this embodiment, if the result of the consensus process of the prompt message is that the consensus passes, the execution subject may use the user to be registered as the new associated user of the second target user. And generating an identity of the newly added associated user, and creating a newly added key pair corresponding to the identity.
In this embodiment, the identity identifier may be identity information of the new associated user (i.e., the user to be registered), or may be an identifier generated by the execution subject and used for uniquely indicating the new associated user. For example, the virtual account may be decentralized and may be bound with the identity information of the newly added associated user. The newly added key pair here may be a public-private key pair.
And step 306, generating user information of the newly added associated user according to the identity identifier and the newly added key pair, and storing the user information into the block chain node of the block chain network.
In this embodiment, the executing entity may generate the user information of the newly added associated user according to the identity of the newly added associated user and the newly added key pair. And the user information of the newly added associated user may be stored in a blockchain node of the blockchain network. The user information may include a shared account, an identity, a key pair corresponding to the identity, identity information, and the like.
In addition, the executive body can send the shared account number, the identity identification, the key and the like to the newly-added associated user. Thus, the newly-added associated user can use the user information to operate the application installed on the terminal.
The step of creating the user information of the new associated user provided in this embodiment may ensure the security of the shared account in the process of registering the new associated user. And the block chain network is used for storing related data, which is beneficial to improving the reliability of the data.
With continued reference to fig. 4, a schematic diagram of one application scenario of a method for authenticating information according to the present application is shown. As shown in fig. 4, user a sends a login request to server B. The server B may then authenticate the login request, and if the authentication result of the login request is passed, may send the authentication result to the at least one first target user C. The first target user C may then confirm the authentication result and may return confirmation information containing the confirmation result to the server B. After the server B receives the information that the authentication result sent by the at least one first target user C is confirmed to pass, that is, the server B may analyze the received confirmation information, if at least one piece of confirmation information exists in the confirmation information, the authentication data may be generated, and then the authentication data may be sent to a pre-constructed blockchain network to perform consensus processing on the authentication data, and then if the consensus processing result is that the consensus passes, the authentication data may be stored in a blockchain node of the blockchain network, and finally, a prompt message or a page in a login state may be sent to the user a.
As can be seen from fig. 4, the method for authenticating information according to this embodiment can perform preliminary confirmation on a login request initiated by a user by using a first target user of the same shared account. And after the first target user passes the confirmation, further sending the generated authentication data to the block chain network for consensus processing. Therefore, the first target user can know the condition of the shared account in time conveniently. Meanwhile, the data volume required to be processed by the server is reduced, and the data volume in the block chain network is reduced. And the block chain network is utilized, so that the safety of the shared account can be ensured, and the reliability of the recorded data is improved.
With further reference to fig. 5, the present application provides one embodiment of an apparatus for authenticating information as an implementation of the methods illustrated in the above figures. The embodiment of the device corresponds to the embodiment of the method shown in fig. 2, and the device can be applied to various electronic devices.
As shown in fig. 5, the apparatus 500 for authenticating information of the present embodiment may include: an authentication unit 501, configured to authenticate a login request sent by a user, where the login request includes a shared account; a confirming unit 502, configured to send the authentication result to a first target user if the authentication result of the login request is passed, so that the first target user confirms the authentication result, where the first target user is an associated user who uses the same shared account as the user; a generating unit 503 configured to generate authentication data if receiving information that confirms that the authentication result sent by the at least one first target user passes; the consensus unit 504 is configured to send the authentication data to a pre-constructed blockchain network to perform consensus processing on the authentication data.
In some optional implementations of this embodiment, the apparatus 500 may further include: and a storage unit (not shown in the figure) configured to determine that the consensus processing result of the authentication data is consensus, if the number of the block link points that are consensus-passed reaches a preset threshold, and store the authentication data into the block link nodes of the block link network.
In some embodiments, the apparatus 500 may further include a unit (not shown in the figure) for creating user information of the newly added associated user. The unit may include: the system comprises an acquisition subunit, a registration unit and a display unit, wherein the acquisition subunit is configured to acquire a shared account and identity information of a user to be registered and generate prompt information, and the identity information comprises personal identity information and/or enterprise information; the sending subunit is configured to send the prompt message to a second target user, where the second target user is a registered associated user who uses the same shared account as the user to be registered; and the determining subunit is configured to determine whether to use the user to be registered as a new associated user of the second target user according to feedback information corresponding to the prompt information and sent by the second target user.
Optionally, the determining subunit may be further configured to: if the feedback information comprises information for representing and confirming the registration of the user to be registered, further sending the prompt information to a block chain network so as to perform consensus processing on the prompt information; if the consensus processing result of the prompt message is that the consensus passes, the user to be registered is used as a newly added associated user of the second target user, an identity of the newly added associated user is generated, and a newly added key pair corresponding to the identity is created; and generating user information of the newly added associated user according to the identity identifier and the newly added key pair, and storing the user information into the block chain nodes of the block chain network.
Further, the login request may further include a public key and a digital signature, wherein the digital signature is obtained by signing a private key of a key pair; and the authentication unit 501 may be further configured to: and verifying the validity of the digital signature according to the public key, and if the digital signature is verified to be valid, determining that the authentication result of the login request is passed.
In some embodiments, the validation unit 502 may be further configured to: and selecting a first target user meeting preset conditions from the first target users, and sending an authentication result to the selected first target user, wherein the preset conditions comprise that the user is currently in an online login state.
The units recited in the apparatus 500 correspond to the various steps in the method described with reference to fig. 2. Thus, the operations and features described above for the method are equally applicable to the apparatus 500 and the units included therein, and are not described in detail here.
The apparatus 500 for authenticating information of the present embodiment can authenticate a login request sent by a user through an authentication unit. And the confirming unit may send the authentication result to the first target user when the authentication result of the login request is passed, so that the first target user confirms the authentication result. The generating unit may then generate the authentication data if it receives information that confirms that the authentication result sent by the at least one first target user passes. And the consensus unit may send the authentication data to a pre-constructed blockchain network to perform consensus processing on the authentication data. That is, after the login request that the associated user using the same shared account passes the authentication of the user is confirmed, the login request of the user can be further processed by using the block chain technology, which is helpful for improving the security of the shared account.
Referring now to FIG. 6, shown is a block diagram of a computer system 600 suitable for use in implementing the electronic device of an embodiment of the present application. The electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 6, the computer system 600 includes a Central Processing Unit (CPU)601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the system 600 are also stored. The CPU 601, ROM 602, and RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a touch screen, a keyboard, a mouse, and the like; an output portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted in the storage section 608 as necessary.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611. The computer program performs the above-described functions defined in the method of the present application when executed by a Central Processing Unit (CPU) 601. It should be noted that the computer readable medium of the present application can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes an authentication unit, a confirmation unit, a generation unit, and a consensus unit. The names of these units do not in some cases constitute a limitation on the unit itself, and for example, the authentication unit may also be described as a "unit that authenticates a login request sent by a user".
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: authenticating a login request sent by a user, wherein the login request comprises a shared account; if the authentication result of the login request is passed, the authentication result is sent to a first target user so that the first target user can confirm the authentication result, wherein the first target user is a related user using the same shared account number as the user; if receiving the information which is sent by at least one first target user and used for confirming that the authentication result passes, generating authentication data; and sending the authentication data to a pre-constructed block chain network so as to perform consensus processing on the authentication data.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (14)

1. A method for authenticating information, comprising:
authenticating a login request sent by a user, wherein the login request comprises a shared account which can be used by a plurality of different users at the same time;
if the authentication result of the login request is passed, sending the authentication result to a first target user so that the first target user can confirm the authentication result, wherein the first target user is an associated user using the same shared account number as the user;
if receiving at least one message which is sent by the first target user and confirms that the authentication result passes, generating authentication data;
and sending the authentication data to a pre-constructed block chain network so as to perform consensus processing on the authentication data.
2. The method of claim 1, wherein the method further comprises:
and if the number of the block chain link points passing the consensus reaches a preset threshold value, determining that the consensus processing result of the authentication data is that the consensus passes, and storing the authentication data into the block chain nodes of the block chain network.
3. The method of claim 1, wherein the user information of the new associated user using the same shared account is created by:
acquiring a shared account and identity information of a user to be registered, and generating prompt information, wherein the identity information comprises personal identity information and/or enterprise information;
sending the prompt information to a second target user, wherein the second target user is a registered associated user using the same shared account number as the user to be registered;
and determining whether the user to be registered is used as a new associated user of the second target user or not according to feedback information which is sent by the second target user and corresponds to the prompt information.
4. The method according to claim 3, wherein the determining whether to use the user to be registered as the new associated user of the second target user according to the feedback information corresponding to the prompt information sent by the second target user includes:
if the feedback information comprises information for representing and confirming that the user to be registered is registered, further sending the prompt information to the block chain network so as to perform consensus processing on the prompt information;
if the consensus processing result of the prompt message is that consensus passes, taking the user to be registered as a newly added associated user of the second target user, generating an identity of the newly added associated user, and creating a newly added key pair corresponding to the identity;
and generating user information of the newly added associated user according to the identity identifier and the newly added key pair, and storing the user information into a block chain node of the block chain network.
5. The method of claim 4, wherein the login request further comprises a public key and a digital signature, wherein the digital signature is obtained by signing a private key of a key pair; and
the authentication of the login request sent by the user comprises the following steps:
and verifying the validity of the digital signature according to the public key, and if the digital signature is verified to be valid, determining that the authentication result of the login request is passed.
6. The method of any of claims 1-5, wherein the sending the authentication result to the first target user comprises:
and selecting a first target user meeting preset conditions from the first target users, and sending an authentication result to the selected first target user, wherein the preset conditions comprise that the user is currently in an online login state.
7. An apparatus for authenticating information, comprising:
the authentication unit is configured to authenticate a login request sent by a user, wherein the login request comprises a shared account which can be used by a plurality of different users at the same time;
a confirming unit, configured to send an authentication result to a first target user if the authentication result of the login request is passed, so that the first target user confirms the authentication result, where the first target user is an associated user using the same shared account as the user;
the generating unit is configured to generate authentication data if receiving information which is sent by at least one first target user and used for confirming that the authentication result passes;
and the consensus unit is configured to send the authentication data to a pre-constructed block chain network so as to perform consensus processing on the authentication data.
8. The apparatus of claim 7, wherein the apparatus further comprises:
and the storage unit is configured to determine that the consensus processing result of the authentication data is consensus, and store the authentication data into the blockchain node of the blockchain network, if the number of the block chain nodes passing the consensus reaches a preset threshold value.
9. The apparatus of claim 7, wherein the apparatus further comprises means for creating user information for the newly added associated user, comprising:
the system comprises an acquisition subunit, a registration unit and a display unit, wherein the acquisition subunit is configured to acquire a shared account and identity information of a user to be registered and generate prompt information, and the identity information comprises personal identity information and/or enterprise information;
a sending subunit, configured to send the prompt message to a second target user, where the second target user is a registered associated user who uses the same shared account as the user to be registered;
and the determining subunit is configured to determine whether to use the user to be registered as a new associated user of the second target user according to feedback information corresponding to the prompt information and sent by the second target user.
10. The apparatus of claim 9, wherein the determining subunit is further configured to:
if the feedback information comprises information for representing and confirming that the user to be registered is registered, further sending the prompt information to the block chain network so as to perform consensus processing on the prompt information;
if the consensus processing result of the prompt message is that consensus passes, taking the user to be registered as a newly added associated user of the second target user, generating an identity of the newly added associated user, and creating a newly added key pair corresponding to the identity;
and generating user information of the newly added associated user according to the identity identifier and the newly added key pair, and storing the user information into a block chain node of the block chain network.
11. The apparatus of claim 10, wherein the login request further comprises a public key and a digital signature, wherein the digital signature is obtained by signing from a private key of a key pair; and
the authentication unit is further configured to:
and verifying the validity of the digital signature according to the public key, and if the digital signature is verified to be valid, determining that the authentication result of the login request is passed.
12. The apparatus according to one of claims 7-11, wherein the confirmation unit is further configured to:
and selecting a first target user meeting preset conditions from the first target users, and sending an authentication result to the selected first target user, wherein the preset conditions comprise that the user is currently in an online login state.
13. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-6.
14. A computer-readable medium, on which a computer program is stored, wherein the computer program, when being executed by a processor, carries out the method according to any one of claims 1-6.
CN201810205149.1A 2018-03-13 2018-03-13 Method and apparatus for authenticating information Active CN108551437B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810205149.1A CN108551437B (en) 2018-03-13 2018-03-13 Method and apparatus for authenticating information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810205149.1A CN108551437B (en) 2018-03-13 2018-03-13 Method and apparatus for authenticating information

Publications (2)

Publication Number Publication Date
CN108551437A CN108551437A (en) 2018-09-18
CN108551437B true CN108551437B (en) 2021-04-02

Family

ID=63516050

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810205149.1A Active CN108551437B (en) 2018-03-13 2018-03-13 Method and apparatus for authenticating information

Country Status (1)

Country Link
CN (1) CN108551437B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067791B (en) * 2018-09-25 2020-05-12 阿里巴巴集团控股有限公司 User identity authentication method and device in network
CN109255619A (en) * 2018-09-26 2019-01-22 北京亚联之星信息技术有限公司 A kind of identity identifying method and equipment based on block chain
CN108900562B (en) * 2018-10-11 2021-07-20 北京京东尚科信息技术有限公司 Login state sharing method and device, electronic equipment and medium
CN109492433A (en) * 2018-11-08 2019-03-19 中链科技有限公司 It deposits the building of card information inquiry port, deposit the querying method and system of card information
CN109598149B (en) * 2018-11-20 2020-04-07 阿里巴巴集团控股有限公司 Service processing method and device
CN109829321B (en) * 2019-01-17 2022-08-26 北京三快在线科技有限公司 Method, device, equipment and storage medium for authenticating identity
CN109936569B (en) * 2019-02-21 2021-05-28 领信智链(北京)科技有限公司 Decentralized digital identity login management system based on Ether house block chain
PL3602457T3 (en) * 2019-02-28 2021-10-25 Advanced New Technologies Co., Ltd. System and method for blockchain-based data management
CN111027036B (en) * 2019-12-09 2022-10-21 武汉信安珞珈科技有限公司 Identity association method based on block chain
CN111352996B (en) * 2020-02-26 2023-09-19 百度在线网络技术(北京)有限公司 Data sharing method, device, equipment and medium based on block chain network
CN113449944A (en) * 2020-03-27 2021-09-28 中国移动通信集团山东有限公司 Work order processing method and device based on hardware sharing and computer equipment
CN111552982B (en) * 2020-04-27 2023-03-10 支付宝(杭州)信息技术有限公司 Account association relation identification method and device for protecting privacy
CN111552952B (en) * 2020-05-22 2021-12-17 厦门理工学院 Software testing technology platform based on big data interconnection
CN114079578B (en) * 2020-08-21 2023-05-16 腾讯科技(深圳)有限公司 Login information processing method and device, storage medium and electronic equipment
CN115001798A (en) * 2022-05-30 2022-09-02 中国银行股份有限公司 Mobile phone bank login method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801656A (en) * 2012-08-29 2012-11-28 腾讯科技(深圳)有限公司 State control and modification method, equipment and system for implementing instant messaging application
CN103532983A (en) * 2013-10-31 2014-01-22 北京云巢动脉科技有限公司 Multipoint login processing method and device
CN106549971A (en) * 2016-11-24 2017-03-29 飞驰镁物(北京)信息服务有限公司 The method and device that a kind of account joint is logged in
CN107257340A (en) * 2017-06-19 2017-10-17 阿里巴巴集团控股有限公司 A kind of authentication method, authentication data processing method and equipment based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10402792B2 (en) * 2015-08-13 2019-09-03 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801656A (en) * 2012-08-29 2012-11-28 腾讯科技(深圳)有限公司 State control and modification method, equipment and system for implementing instant messaging application
CN103532983A (en) * 2013-10-31 2014-01-22 北京云巢动脉科技有限公司 Multipoint login processing method and device
CN106549971A (en) * 2016-11-24 2017-03-29 飞驰镁物(北京)信息服务有限公司 The method and device that a kind of account joint is logged in
CN107257340A (en) * 2017-06-19 2017-10-17 阿里巴巴集团控股有限公司 A kind of authentication method, authentication data processing method and equipment based on block chain

Also Published As

Publication number Publication date
CN108551437A (en) 2018-09-18

Similar Documents

Publication Publication Date Title
CN108551437B (en) Method and apparatus for authenticating information
JP6985576B2 (en) Business process systems, business data processing methods and equipment
US10790976B1 (en) System and method of blockchain wallet recovery
EP3864551B1 (en) Distributed ledger-based profile verification
CN109274652B (en) Identity information verification system, method and device and computer storage medium
US20180374097A1 (en) A distributed user profile identity verification system for e-commerce transaction security
KR20180017734A (en) System and method for authentication, user terminal, authentication server and service server for executing the same
US11455362B2 (en) System and method for sharing information using a machine-readable code on a mobile device
US20080015986A1 (en) Systems, methods and computer program products for controlling online access to an account
CN103220344A (en) Method and system for using microblog authorization
CN110189184B (en) Electronic invoice storage method and device
US20210241270A1 (en) System and method of blockchain transaction verification
CN105099707A (en) Offline authentication method, server and system
US20180316509A1 (en) Method and System for Authentication of Electronic Documents
CN113179282A (en) Method and device for merging account numbers and server
CN112966309A (en) Service implementation method and device based on block chain
CN116325654B (en) Tenant aware mutual TLS authentication
CN111050326B (en) Block chain-based short message verification method, device, equipment and medium
CN105141586B (en) A kind of method and system verified to user
CN112767142A (en) Processing method, device, computing equipment and medium for transaction file
CN111786936A (en) Method and device for authentication
US10708301B2 (en) Method of, and apparatus for, secure online electronic communication
CN110611656B (en) Identity management method, device and system based on master identity multiple mapping
CN114157414B (en) Identity certificate generation method, verification method and system for digital currency
CN115085997B (en) Open authorization method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant