CN108769057B - Identity recognition method and device based on block chain - Google Patents

Identity recognition method and device based on block chain Download PDF

Info

Publication number
CN108769057B
CN108769057B CN201810620560.5A CN201810620560A CN108769057B CN 108769057 B CN108769057 B CN 108769057B CN 201810620560 A CN201810620560 A CN 201810620560A CN 108769057 B CN108769057 B CN 108769057B
Authority
CN
China
Prior art keywords
user
information
identity information
ciphertext
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810620560.5A
Other languages
Chinese (zh)
Other versions
CN108769057A (en
Inventor
张践鳌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201810620560.5A priority Critical patent/CN108769057B/en
Publication of CN108769057A publication Critical patent/CN108769057A/en
Application granted granted Critical
Publication of CN108769057B publication Critical patent/CN108769057B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an identity recognition method and device based on a block chain and computing equipment. Wherein, the method comprises the following steps: receiving user identity information sent by a terminal user; generating ciphertext information corresponding to the user identity information according to a preset ciphertext processing rule; binding ciphertext information corresponding to the user identity information and a user account of the terminal user into a related data record; storing the associated data records into corresponding block chain nodes; wherein the associated data record is used to identify the identity of the end user. According to the method, the identity information corresponding to the user account can not be seen by other users, so that the privacy of the user corresponding to each account is protected, fair and fair lottery activities can be performed, the account information of the matched user can be acquired according to the identity information of the user, and whether the user who is redeemed before is the user corresponding to the winning account can be judged in the lottery activities.

Description

Identity recognition method and device based on block chain
Technical Field
The invention relates to the technical field of block chains, in particular to an identity identification method and device based on a block chain.
Background
The blockchain technology is a brand new distributed infrastructure and computing mode that uses blockchain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, uses cryptography to secure data transmission and access, and uses intelligent contracts composed of automated script codes to program and manipulate data. The blockchain technique solves the trust problem in the traditional intermediary mechanism by the decentralized characteristic of the blockchain technique.
The block chain based technology can carry out various lottery activities, has high reliability, and the data on the block chain are all visible when the online lottery is carried out, so the lottery based on the block chain is relatively fair. However, in the process of implementing the present invention, the inventor finds that all the accounts in the blockchain are anonymous, and therefore, after a certain account wins, the owner of the account cannot be known, so that a certain trouble is caused in drawing a prize or an imposition phenomenon occurs.
Disclosure of Invention
In view of the above, the present invention is proposed to provide a block chain based identity recognition method and apparatus, and a computing device, which overcome the above problems or at least partially solve the above problems.
According to an aspect of the present invention, there is provided a block chain-based identity recognition method, including:
receiving user identity information sent by a terminal user;
generating ciphertext information corresponding to the user identity information according to a preset ciphertext processing rule;
binding ciphertext information corresponding to the user identity information and a user account of the terminal user into a related data record;
storing the associated data records into corresponding block chain nodes; wherein the associated data record is used to identify the identity of the end user.
According to another aspect of the present invention, there is provided an identity recognition apparatus based on a block chain, including:
the receiving module is suitable for receiving user identity information sent by a terminal user;
the generating module is suitable for generating ciphertext information corresponding to the user identity information according to a preset ciphertext processing rule;
the binding module is suitable for binding the ciphertext information corresponding to the user identity information and the user account of the terminal user into a relevant data record;
a recording module adapted to store the associated data records into corresponding blockchain nodes; wherein the associated data record is used to identify the identity of the end user.
According to yet another aspect of the present invention, there is provided a computing device comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction enables the processor to execute the operation corresponding to the identity identification method based on the block chain.
According to still another aspect of the present invention, a computer storage medium is provided, where at least one executable instruction is stored, and the executable instruction causes a processor to perform operations corresponding to the above block chain-based identity recognition method.
According to the identity recognition method and device based on the block chain, provided by the invention, the user identity information sent by the terminal user is received, and the ciphertext information corresponding to the user identity information is generated according to the preset ciphertext processing rule, so that the ciphertext information corresponding to the user identity information and the user account number of the terminal user are bound into a related data record, and the related data record is stored into the corresponding block chain node; wherein the associated data record is used to identify the identity of the end user. According to the method, the identity information corresponding to the user account can be prevented from being seen by other users, so that the privacy of the user corresponding to each account is protected, fair and fair lottery drawing activities can be performed, the account information of the matched user can be acquired according to the identity information of the user, and whether the user who is redeemed before is the user corresponding to the winning account can be judged according to the acquired identity information of the user in the lottery drawing activities.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 shows a flow chart of a block chain based identity recognition method according to an embodiment of the invention;
fig. 2 shows a flow chart of a block chain based identity recognition method according to another embodiment of the present invention;
FIG. 3 shows a functional block diagram of an apparatus for blockchain-based identification according to an embodiment of the present invention;
FIG. 4 shows a schematic structural diagram of a computing device according to an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Fig. 1 shows a flowchart of an identity recognition method based on a block chain according to an embodiment of the present invention. As shown in fig. 1, the identity recognition method based on the block chain specifically includes the following steps:
step S110, receiving user identity information sent by the terminal user.
The identity information of the user may be information of various certificates which can indicate the identity of the user, such as an identity card number, account number information, passport card number, and the like. When the user draws a lottery, the user can send identity information which can indicate the identity of the user to the system, and the system receives the user identity information sent by the terminal user. The system can receive the identity information after the user sends the identity information, and can also automatically extract the user identity information input by the user when the user registers an account.
And step S120, generating ciphertext information corresponding to the user identity information according to a preset ciphertext processing rule.
In order to prevent the identity information of the user from being seen by other users, the identity information can be processed according to a preset ciphertext processing rule in the step, so that ciphertext information corresponding to the identity information of the user is generated. Specifically, plaintext information corresponding to the identity information may be obtained, and then an encryption algorithm is used to perform an encryption operation on the plaintext information to obtain ciphertext information corresponding to the identity information. Wherein, the encryption algorithm includes but is not limited to at least one of the following: hash operation, DES encryption algorithm, AES encryption algorithm, etc. In addition to generating the ciphertext information corresponding to the user identity information in the above manner, the ciphertext information corresponding to the user identity information may be generated in other manners.
Step S130, binding the ciphertext information corresponding to the user identity information and the user account of the terminal user into a related data record.
In order to identify the identity information corresponding to each account, the ciphertext information corresponding to the user identity information and the user account of the terminal user may be bound into one associated data record, so as to implement the one-to-one correspondence relationship between the user account and the ciphertext information corresponding to the user identity information.
Step S140, storing the associated data records into the corresponding block chain nodes; wherein the associated data record is used to identify the identity of the end user.
Specifically, the identity of the terminal user can be identified by identifying ciphertext information corresponding to the user identity information in the associated data record and according to the identity information of the user. The associated data records are stored on the corresponding block chain nodes, so that the associated data on the block chain can be seen by all users, but otherwise, the identity information of the users cannot be obtained according to the associated data, so that various activities can be performed more fairly and safely, and if the users are the users corresponding to the winning accounts or not during the prize exchanging process, the user can be judged according to the identity information of the users.
According to the identity recognition method based on the block chain, ciphertext information corresponding to the user identity information is generated by receiving the user identity information sent by a terminal user according to a preset ciphertext processing rule, so that the ciphertext information corresponding to the user identity information and a user account of the terminal user are bound into a related data record, and the related data record is stored in a corresponding block chain node; wherein the associated data record is used to identify the identity of the end user. According to the method, the identity information corresponding to the user account can not be seen by other users, so that the privacy of the user corresponding to each account is protected, fair and fair lottery activities can be performed, the account information of the matched user can be acquired according to the identity information of the user, and whether the user who is cashed before is the user corresponding to the winning account can be judged according to the acquired identity information of the user in the lottery activities.
Fig. 2 shows a flowchart of an identity recognition method based on a block chain according to an embodiment of the present invention. As shown in fig. 2, the identity recognition method based on the block chain specifically includes the following steps:
step S210, receiving user identity information sent by the terminal user.
The specific steps can be referred to the content in step S110.
Step S220, generating ciphertext information corresponding to the user identity information according to a preset ciphertext processing rule.
Specifically, plaintext information corresponding to the above-described identity information is first determined. Specifically, key information corresponding to the user account of the terminal user may be determined, and then plaintext information corresponding to the user identity information may be determined according to the key information. The key information may be public key information. In particular, to implement a decentralized trust mechanism, each network node in the blockchain has a corresponding private or public key, where the public key is public and the private key is secret.
And then, carrying out encryption operation on the plaintext information through an encryption algorithm to obtain ciphertext information corresponding to the user identity information. The preset encryption algorithm may be: and (6) carrying out hash operation. The hash operation may include: the MD4 algorithm, the MD5 algorithm, the secure hash algorithm (SHA-1), etc. The hash operation may map an arbitrary length binary value to a shorter fixed length binary value, this small binary value being referred to as the hash value. Hash values are a unique and extremely compact representation of a piece of data as a value. If a piece of plaintext is hashed and even if only one letter of the piece is altered, the subsequent hash will produce a different value. The hash operation has irreversibility and no conflict, wherein the irreversibility means that when the hash value of x is known, x cannot be calculated according to the hash value; the non-collision means that when x is known, one y value cannot be obtained to make the hash values of x and y the same. According to the irreversibility of the hash operation, when the ciphertext information on the block chain is obtained, the identity information of the user cannot be reversely deduced according to the ciphertext information, so that the fairness and the reliability of the transaction can be ensured through the block chain with the public information, and the personal privacy of the user can be prevented from being leaked.
Step S230, binding the ciphertext information corresponding to the user identity information and the user account of the terminal user into a related data record.
Specifically, a comparison table of the ciphertext information and the user account of the terminal user may be preset, and after the ciphertext information corresponding to the user identity information is generated, the ciphertext information corresponding to the user identity information and the user account of the terminal user are stored in the comparison table correspondingly, so that the ciphertext information corresponding to the user identity information and the user account of the terminal user are bound into a related data record. Besides the above method, the ciphertext information corresponding to the user identity information and the user account of the terminal user may be bound into a related data record in other ways. By implementing the steps, the one-to-one correspondence relationship between the user account and the ciphertext information corresponding to the user identity information is realized.
Step S240, storing the associated data record into the corresponding block chain node; wherein the associated data record is used to identify the identity of the end user.
By identifying the ciphertext information corresponding to the user identity information in the associated data and according to the acquired identity information of the cashing user, the identity of the terminal user can be identified to judge whether the cashing user is a winning user. The cashing mainly refers to the cashing of resources, and the resources comprise various physical resources or virtual resources such as prizes, red parcels and the like. The association data records are stored in the corresponding block chain nodes, so that the association data on the block chain can be seen by all users, but the identity information of the users cannot be obtained according to the association data, so that various lottery activities can be performed more fairly and safely, and whether the users are the users corresponding to winning accounts or not can be judged according to the identity information of the users during redemption.
Step S250, receiving a resource allocation request sent by a terminal user, and determining whether to allocate corresponding resources for a user account included in an associated data record according to the resource allocation request and a preset resource allocation algorithm; and if so, determining the associated data record as the resource configuration data record.
Specifically, after various resource configuration requests such as a lottery request and the like sent by a terminal user are received, a user account included in the resource configuration request is obtained, whether resources are configured for the user account is determined according to a preset resource configuration algorithm, if yes, a relevant data record including the user account is determined, and the user account included in the relevant data record is determined to win a prize. The resource allocation request mainly refers to a lottery drawing request, and can also include a drawing request, a shaking number request and/or a red packet robbing request.
Step S260, if yes, determining the associated data record as the resource configuration data record.
And if the user account contained in the associated data record is determined to be a prize, determining the associated record as the resource configuration data record.
Step S270, acquiring the redemption identity information of the redemption user.
Specifically, a scanning result obtained by scanning the identity provided by the redemption user may be obtained, and the redemption identity information of the redemption user may be determined according to the scanning result. The identity mark can be an identity card or other certificates which can show the identity of the redemption user, and the identity card can be scanned and the scanning result is identified, so that the redemption identity information of the redemption user is determined according to the scanning result. In addition to scanning the identity card to obtain the identity information of the redemption user, the staff can manually input the card number of the identity card of the redemption user, or take a picture of the identity card, so that the identity card number in the picture is automatically identified according to the picture, and the like, to determine the redemption identity information of the redemption user.
Step S280, a ciphertext message corresponding to the redemption identity message is generated according to a preset ciphertext processing rule.
The preset ciphertext processing rule may be the same as the preset ciphertext processing rule in step S220, so that when the redemption identity information is consistent with the identity information corresponding to the winning account, ciphertext information matched with the ciphertext information in the resource configuration data record may be generated according to the step.
Step S290, it is determined whether the ciphertext information corresponding to the redemption identity information matches the ciphertext information corresponding to the user identity information included in the resource configuration data record.
And step S2010, identifying the identity of the redemption user according to the judgment result.
If it is determined in step S290 that the ciphertext information corresponding to the redemption identity information matches the ciphertext information corresponding to the user identity information contained in the resource configuration data record, it may be determined that the identity information of the redemption user is consistent with the user identity information corresponding to the ciphertext information in the resource configuration data record, and thus the redemption user is determined to be a winning user, otherwise, the redemption user is not a winning user.
According to the identity recognition method based on the block chain provided by the embodiment, the user identity information sent by the terminal user is received, and the ciphertext information corresponding to the user identity information is generated according to the preset ciphertext processing rule, so that the ciphertext information corresponding to the user identity information and the user account number of the terminal user are bound into a related data record, and the related data record is stored in the corresponding block chain node; and after acquiring the redemption identity information of the redemption user, judging whether the ciphertext information corresponding to the redemption identity information is matched with the ciphertext information corresponding to the user identity information contained in the resource configuration data record, so as to identify the identity of the redemption user according to a judgment result. According to the method, the fairness and the reliability of the activities can be ensured through the block chain with the information disclosed, the personal privacy of the user can be prevented from being revealed, and whether the user is the user corresponding to the winning account can be judged according to the identity information of the cashing user, so that the cashing accuracy is ensured, and the rights and interests of the cashing user are guaranteed.
Fig. 3 shows a functional block diagram of an identification apparatus based on a block chain according to an embodiment of the present invention. As shown in fig. 3, the apparatus includes:
a receiving module 31, adapted to receive user identity information sent by an end user;
the generating module 32 is adapted to generate ciphertext information corresponding to the user identity information according to a preset ciphertext processing rule;
the binding module 33 is adapted to bind ciphertext information corresponding to the user identity information and the user account of the terminal user into a related data record;
a recording module 34 adapted to store the associated data records into the corresponding blockchain nodes; wherein the associated data record is used to identify the identity of the end user.
Optionally, wherein the generating module 32 is specifically adapted to:
determining plaintext information corresponding to the user identity information;
and carrying out encryption operation on the plaintext information through a preset encryption algorithm to obtain ciphertext information corresponding to the user identity information.
Optionally, the preset encryption algorithm includes: and (4) carrying out a hash algorithm.
Optionally, wherein the generating module 32 is specifically adapted to:
and determining key information corresponding to the user account of the terminal user, and determining plaintext information corresponding to the user identity information according to the key information.
Optionally, the key information is public key information.
Optionally, wherein the apparatus further comprises:
the first determining module 35 is adapted to receive a resource configuration request sent by a terminal user, and determine whether to configure a corresponding resource for a user account included in the associated data record according to a preset resource configuration algorithm according to the resource configuration request; if yes, determining the associated data record as a resource configuration data record;
a second determining module 36 is adapted to determine the associated data record as the resource configuration data record if it is.
Optionally, wherein the apparatus further comprises:
an obtaining module 37 adapted to obtain redemption identity information of a redemption user;
the second generating module 38 is adapted to generate ciphertext information corresponding to the redemption identity information according to a preset ciphertext processing rule;
a judging module 39, adapted to judge whether the ciphertext information corresponding to the redeeming identity information matches the ciphertext information corresponding to the user identity information contained in the resource configuration data record;
and the identification module 310 is adapted to identify the identity of the redemption user according to the determination result.
Optionally, wherein the obtaining module 37 is specifically adapted to:
and acquiring a scanning result for scanning the identity provided by the redemption user, and determining the redemption identity information of the redemption user according to the scanning result.
Fig. 4 is a schematic structural diagram of a computing device according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the computing device.
As shown in fig. 4, the computing device may include: a processor (processor)402, a Communications Interface 404, a memory 406, and a Communications bus 408.
Wherein:
the processor 402, communication interface 404, and memory 406 communicate with each other via a communication bus 408.
A communication interface 404 for communicating with network elements of other devices, such as clients or other servers.
The processor 402 is configured to execute the program 410, and may specifically perform relevant steps in the above embodiment of the identity recognition method based on the blockchain.
In particular, program 410 may include program code comprising computer operating instructions.
The processor 402 may be a central processing unit CPU or an application Specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention. The computing device includes one or more processors, which may be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 406 for storing a program 410. Memory 406 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 410 may specifically be configured to cause the processor 402 to perform the following operations:
receiving user identity information sent by a terminal user;
generating ciphertext information corresponding to the user identity information according to a preset ciphertext processing rule;
binding ciphertext information corresponding to the user identity information and a user account of the terminal user into a related data record;
storing the associated data records into corresponding block chain nodes; wherein the associated data record is used to identify the identity of the end user.
In an alternative manner, the program 410 may be further specifically configured to cause the processor 402 to perform the following operations:
determining plaintext information corresponding to the user identity information;
and carrying out encryption operation on the plaintext information through a preset encryption algorithm to obtain ciphertext information corresponding to the user identity information.
In an alternative manner, the program 410 may be further specifically configured to cause the processor 402 to perform the following operations:
the preset encryption algorithm comprises the following steps: and (4) carrying out a hash algorithm.
In an alternative manner, the program 410 may be further specifically configured to cause the processor 402 to perform the following operations:
and determining key information corresponding to the user account of the terminal user, and determining plaintext information corresponding to the user identity information according to the key information.
In an alternative manner, the program 410 may be further specifically configured to cause the processor 402 to perform the following operations:
wherein, the key information is public key information.
In an alternative manner, the program 410 may be further specifically configured to cause the processor 402 to perform the following operations:
receiving a resource configuration request sent by a terminal user, and determining whether to configure corresponding resources for a user account included in an associated data record according to the resource configuration request and a preset resource configuration algorithm; if yes, determining the associated data record as a resource configuration data record;
and if so, determining the associated data record as the resource configuration data record.
In an alternative manner, the program 410 may be further specifically configured to cause the processor 402 to perform the following operations:
acquiring the redemption identity information of a redemption user;
generating ciphertext information corresponding to the identity information to be exchanged according to a preset ciphertext processing rule;
judging whether the ciphertext information corresponding to the redemption identity information is matched with the ciphertext information corresponding to the user identity information contained in the resource configuration data record;
and identifying the identity of the cashing user according to the judgment result.
In an alternative manner, the program 410 may be further specifically configured to cause the processor 402 to perform the following operations:
and acquiring a scanning result for scanning the identity provided by the redemption user, and determining the redemption identity information of the redemption user according to the scanning result.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components of an apparatus for real-time processing of video data according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (14)

1. An identity recognition method based on a block chain comprises the following steps:
receiving user identity information sent by a terminal user;
generating ciphertext information corresponding to the user identity information according to a preset ciphertext processing rule;
binding ciphertext information corresponding to the user identity information and a user account of the terminal user into a related data record;
storing the associated data records into corresponding block chain nodes; wherein the associated data record is used for identifying the identity of the terminal user;
determining whether the user account wins according to a preset lottery algorithm according to the lottery drawing request sent by the terminal user;
if the user account wins, determining the associated data record as a winning data record;
acquiring prize exchanging identity information of a prize exchanging user;
generating ciphertext information corresponding to the award exchanging identity information according to the preset ciphertext processing rule;
judging whether ciphertext information corresponding to the prize exchanging identity information is matched with ciphertext information corresponding to the user identity information contained in the prize winning data record or not;
and identifying the identity of the prize exchanging user according to the judgment result.
2. The method according to claim 1, wherein the step of generating ciphertext information corresponding to the user identity information according to a preset ciphertext processing rule specifically comprises:
determining plaintext information corresponding to the user identity information;
and carrying out encryption operation on the plaintext information through a preset encryption algorithm to obtain ciphertext information corresponding to the user identity information.
3. The method of claim 2, wherein presetting the encryption algorithm comprises: and (4) carrying out a hash algorithm.
4. The method according to claim 2 or 3, wherein the step of determining plaintext information corresponding to the user identity information specifically comprises:
and determining key information corresponding to the user account of the terminal user, and determining plaintext information corresponding to the user identity information according to the key information.
5. The method of claim 4, wherein the key information is public key information.
6. The method according to claim 1, wherein the step of obtaining the prize exchanging identity information of the prize exchanging user specifically comprises the following steps:
and acquiring a scanning result of scanning aiming at the identification provided by the prize exchanging user, and determining prize exchanging identification information of the prize exchanging user according to the scanning result.
7. An identity recognition device based on a blockchain, comprising:
the receiving module is suitable for receiving user identity information sent by a terminal user;
the generating module is suitable for generating ciphertext information corresponding to the user identity information according to a preset ciphertext processing rule;
the binding module is suitable for binding ciphertext information corresponding to the user identity information and a user account of the terminal user into a relevant data record;
the recording module is suitable for storing the associated data records into the corresponding block chain nodes; wherein the associated data record is used for identifying the identity of the terminal user;
the first determining module is suitable for determining whether the user account wins according to a lottery drawing request sent by the terminal user and a preset lottery drawing algorithm;
the second determination module is suitable for determining the associated data record as a winning data record if the user account wins;
the acquisition module is suitable for acquiring prize exchanging identity information of a prize exchanging user;
the second generation module is suitable for generating ciphertext information corresponding to the prize exchanging identity information according to the preset ciphertext processing rule;
the judgment module is suitable for judging whether the ciphertext information corresponding to the prize exchanging identity information is matched with the ciphertext information corresponding to the user identity information contained in the prize winning data record or not;
and the identification module is suitable for identifying the identity of the prize exchanging user according to the judgment result.
8. The apparatus according to claim 7, wherein the generating means is specifically adapted to:
determining plaintext information corresponding to the user identity information;
and carrying out encryption operation on the plaintext information through a preset encryption algorithm to obtain ciphertext information corresponding to the user identity information.
9. The apparatus of claim 8, wherein the preset encryption algorithm comprises: and (4) carrying out a hash algorithm.
10. The apparatus according to claim 8 or 9, wherein the generating means is specifically adapted to:
and determining key information corresponding to the user account of the terminal user, and determining plaintext information corresponding to the user identity information according to the key information.
11. The apparatus of claim 10, wherein the key information is public key information.
12. The apparatus according to claim 7, wherein the acquisition module is specifically adapted to:
and acquiring a scanning result of scanning aiming at the identification provided by the prize exchanging user, and determining prize exchanging identification information of the prize exchanging user according to the scanning result.
13. An electronic device, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the block chain-based identity recognition method according to any one of claims 1-6.
14. A computer storage medium having stored therein at least one executable instruction for causing a processor to perform operations corresponding to the block chain based identification method according to any one of claims 1 to 6.
CN201810620560.5A 2018-06-15 2018-06-15 Identity recognition method and device based on block chain Active CN108769057B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810620560.5A CN108769057B (en) 2018-06-15 2018-06-15 Identity recognition method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810620560.5A CN108769057B (en) 2018-06-15 2018-06-15 Identity recognition method and device based on block chain

Publications (2)

Publication Number Publication Date
CN108769057A CN108769057A (en) 2018-11-06
CN108769057B true CN108769057B (en) 2021-11-02

Family

ID=63978192

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810620560.5A Active CN108769057B (en) 2018-06-15 2018-06-15 Identity recognition method and device based on block chain

Country Status (1)

Country Link
CN (1) CN108769057B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200213100A1 (en) * 2018-11-27 2020-07-02 Shenzhen Lianbao Technology Co., Ltd. Multi-chain information management method, storage medium and blockchain identity parser
CN109493058A (en) * 2018-12-14 2019-03-19 深圳壹账通智能科技有限公司 A kind of personal identification method and relevant device based on block chain
CN109951295B (en) * 2019-02-27 2021-12-24 百度在线网络技术(北京)有限公司 Key processing and using method, device, equipment and medium
CN109951489B (en) * 2019-03-27 2020-11-03 深圳市网心科技有限公司 Digital identity authentication method, equipment, device, system and storage medium
CN110336672B (en) * 2019-04-29 2020-07-28 山东工商学院 Method, system and storage medium for citizen privacy protection based on zero-knowledge proof
CN110557403B (en) * 2019-09-26 2022-05-31 腾讯科技(深圳)有限公司 Resource allocation method and device based on block chain, storage medium and node equipment
CN111815845B (en) * 2020-07-08 2022-03-15 中钞信用卡产业发展有限公司杭州区块链技术研究院 Shaking method, device, system, equipment and medium based on heterogeneous block chain

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563798A (en) * 2017-08-22 2018-01-09 北京潘达互娱科技有限公司 Prize-winning data processing method and device
CN107968953A (en) * 2017-11-28 2018-04-27 北京潘达互娱科技有限公司 Anti- cheating user method and device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9967334B2 (en) * 2015-03-02 2018-05-08 Dell Products Lp Computing device configuration and management using a secure decentralized transaction ledger
CN105913174A (en) * 2016-04-07 2016-08-31 彭军红 Lottery issuing method based on block chains
CN106453259A (en) * 2016-09-13 2017-02-22 广州善融信息科技有限公司 Internet finance safety link realization method based on block chaining encryption technology
EP3454238B1 (en) * 2016-12-23 2022-02-09 CloudMinds (Shanghai) Robotics Co., Ltd. Registration and authorization method, device and system
CN107103097A (en) * 2017-05-22 2017-08-29 中链科技有限公司 Drawing method and terminal device based on block chain technology
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN107786547A (en) * 2017-09-30 2018-03-09 厦门快商通信息技术有限公司 A kind of auth method based on block chain, device and computer-readable recording medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563798A (en) * 2017-08-22 2018-01-09 北京潘达互娱科技有限公司 Prize-winning data processing method and device
CN107968953A (en) * 2017-11-28 2018-04-27 北京潘达互娱科技有限公司 Anti- cheating user method and device

Also Published As

Publication number Publication date
CN108769057A (en) 2018-11-06

Similar Documents

Publication Publication Date Title
CN108769057B (en) Identity recognition method and device based on block chain
EP3531649B1 (en) Method and device for allocating augmented reality-based virtual objects
CN109615383B (en) Data storage and acquisition method and device based on block chain
CN111327637B (en) Service key management method and system
CN109672693B (en) Lottery ticket prize exchanging method and device based on block chain
JP6935406B2 (en) Service implementation method and equipment
CN111030812A (en) Token verification method, device, storage medium and server
CN110362719A (en) Data processing method, device, electric terminal and storage medium
CN108701308A (en) System for issuing public certificate based on block chain and the method for issuing public certificate based on block chain using the system
CN110599342A (en) Block chain-based identity information authorization method and device
CN109067746B (en) Communication method and device between client and server
CN109286500A (en) Vehicle Electronic Control Unit ECU authentication method, device and equipment
CN110990790B (en) Data processing method and equipment
CN113536284A (en) Method, device, equipment and storage medium for verifying digital certificate
CN109391473A (en) A kind of method, apparatus and storage medium of Electronic Signature
CN112804222B (en) Data transmission method, device, equipment and storage medium based on cloud deployment
US9223782B2 (en) System for performing instructions that are dependent upon received media-based messages and associated methods and components
CN111147235B (en) Object access method and device, electronic equipment and machine-readable storage medium
CN109361712B (en) Information processing method and information processing device
CN115001714B (en) Resource access method and device, electronic equipment and storage medium
CN110443331A (en) The binding method and device of vehicle
CN109698750A (en) Block generation method, device, equipment and the readable storage medium storing program for executing of block chain
CN110866827B (en) Method and device for processing pass, storage medium and server
KR102021956B1 (en) Smart card based authentication system, device and method
CN110795749A (en) Data processing method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant