CN108876375B - Block chain real name participation method and system - Google Patents

Block chain real name participation method and system Download PDF

Info

Publication number
CN108876375B
CN108876375B CN201810692345.6A CN201810692345A CN108876375B CN 108876375 B CN108876375 B CN 108876375B CN 201810692345 A CN201810692345 A CN 201810692345A CN 108876375 B CN108876375 B CN 108876375B
Authority
CN
China
Prior art keywords
user
authentication
time
block chain
broadcast message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810692345.6A
Other languages
Chinese (zh)
Other versions
CN108876375A (en
Inventor
路成业
王凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201810692345.6A priority Critical patent/CN108876375B/en
Publication of CN108876375A publication Critical patent/CN108876375A/en
Application granted granted Critical
Publication of CN108876375B publication Critical patent/CN108876375B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The invention provides a method and a system for participating in real names of block chains, wherein the method comprises the following steps: the participating nodes perform preliminary authentication according to the time difference between the authentication video recording time and the receiving time; after the preliminary authentication is passed, the mining node verifies whether the user certificate image is matched with the living user, if so, verifies whether the user certificate information is matched with the user basic information, if so, calculates the time difference between the video recording time and the receiving time, if the time difference meets a preset time range, determines that the application user real name authentication is passed, and if not, writes the block into a block chain account book. Therefore, real-name authentication of the nodes in the block chain is realized, the nodes in the block chain network correspond to real user identities in real life, and management of the nodes and maintenance of the validity of the block chain are facilitated.

Description

Block chain real name participation method and system
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and a system for participating in a block chain real name.
Background
Generally, the blockchain technology is widely used because trust cost is reduced by ensuring security of transactions based on information interaction between nodes.
At present, participation modes in a blockchain network are anonymous, and only all blockchain behaviors can be proved to be implemented by a user corresponding to a certain node but cannot be forged by other users, that is, an implementation environment of the blockchain network is separated from real life, and it is difficult to manage the user corresponding to the node in real life, for example, once there is illegal behaviors such as washing black money in the blockchain network, the network identity can only be proved but the real identity cannot be proved even if a certificate issued by a national CA (certificate authority) authority, and the CA authority needs to participate offline if the real identity is to be proved, which is very complex. Therefore, a method for effectively determining real user identities in real life corresponding to nodes in a blockchain network is needed.
Disclosure of Invention
The invention provides a method and a system for participating in real names of block chains, which aim to solve the technical problems that the nodes of the block chains cannot be effectively managed and the legality of the block chains cannot be maintained in the prior art.
A first embodiment of the present invention provides a method for participating in a block chain real name, including: the method comprises the following steps that a participating node obtains an authentication video recorded by a user, wherein the authentication video comprises: the system comprises a living user, a user certificate containing a user certificate image and user certificate information, video recording time, a time stamp server and a server, wherein the living user, the user certificate containing the user certificate image and the user certificate information and the video recording time are used for carrying out hash calculation on an authentication video to obtain a corresponding hash value and sending the hash value to the time stamp server; the timestamp server records the receiving time of the hash value, applies a private key of the timestamp server to sign the hash value and the receiving time and sends the signed hash value and the receiving time to the participating node; the participating node calculates the time difference between the video recording time and the receiving time, and if the time difference is found to meet a preset time range, the participating node applies a private key of the application user to sign an authentication broadcast message and then sends the authentication broadcast message to a block chain network, wherein the authentication broadcast message comprises the authentication broadcast message; the hash value and the receiving time signed by the private key of the timestamp server, the public key and the basic information of the application user, and the authentication video; the mining node applies the public key of the application user to carry out signature verification on the received authentication broadcast message, verifies whether the hash value is matched with the authentication video after the verification is passed, if the correct matching is obtained, verifies whether the user certificate image is matched with the living body user, if the correct matching is obtained, verifies whether the user certificate information is matched with the user basic information, if the correct matching is obtained, the time difference between the video recording time and the receiving time is calculated, if the time difference meets the preset time range after the comparison is obtained, the real-name authentication of the application user is determined to pass, and the authentication success message is written into a block and is broadcasted to the block chain network; and the mining node judges whether invalid broadcast messages which are sent by other mining nodes and indicate the block are received within preset time, if the invalid broadcast messages are not received, the block is broadcasted to the block chain network to be effective, and the block is written into a block chain account book.
A second embodiment of the present invention provides a block chain real-name authentication system, including: the system comprises participating nodes, a timestamp server and a mining node, wherein the participating nodes are used for acquiring an authentication video recorded by an application user, and the authentication video comprises: the system comprises a living user, a user certificate containing a user certificate image and user certificate information, video recording time, a time stamp server and a server, wherein the living user, the user certificate containing the user certificate image and the user certificate information and the video recording time are used for carrying out hash calculation on an authentication video to obtain a corresponding hash value and sending the hash value to the time stamp server; the timestamp server is used for recording the receiving time of the hash value, applying a private key of the timestamp server to sign the hash value and the receiving time and sending the signed hash value and the receiving time to the participating node; the participating node is used for calculating the time difference between the video recording time and the receiving time, and if the time difference is found to meet a preset time range, applying a private key of the application user to sign an authentication broadcast message and then sending the authentication broadcast message to a block chain network, wherein the authentication broadcast message comprises the authentication broadcast message; the hash value and the receiving time signed by the private key of the timestamp server, the public key and the basic information of the application user, and the authentication video; the mining node is used for performing signature verification on the received authentication broadcast message by using the public key of the application user, verifying whether the hash value is matched with the authentication video after the verification is passed, verifying whether the user certificate image is matched with the living user if correct matching is obtained, verifying whether the user certificate information is matched with the user basic information if correct matching is obtained, calculating the time difference between the video recording time and the receiving time if correct matching is obtained, determining that the real-name authentication of the application user passes if the time difference meets a preset time range after the comparison is obtained, writing the authentication success message into a block, and broadcasting the block chain network; and the mining node is used for judging whether invalid broadcast messages which are sent by other mining nodes and indicate the block are received within preset time, if the invalid broadcast messages are not received, the block is broadcasted to the block chain network to be effective, and the block is written into a block chain account book.
A third embodiment of the present invention provides a computer apparatus including: the present invention relates to a block chain real-name participation method, and more particularly, to a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor executes the computer program to implement the block chain real-name participation method according to the above embodiments.
A fourth embodiment of the present invention provides a non-transitory computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the blockchain real-name participation method as described in the above embodiments.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
the real-name authentication of the nodes in the block chain is realized, the nodes in the block chain network correspond to the real user identities in real life, and the management of the nodes and the maintenance of the validity of the block chain are facilitated.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which,
FIG. 1 is a block chain real name participation system according to an embodiment of the present invention;
FIG. 2 is an interaction diagram of a blockchain real name participation system in accordance with one embodiment of the present invention;
FIG. 3 is an interaction diagram of a blockchain real-name participation system according to another embodiment of the present invention;
FIG. 4 is a flow diagram of a blockchain real name participation method according to one embodiment of the invention;
fig. 5 is a flowchart of a blockchain real name participation method according to another embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
Based on the description of the background art, it is understood that, in the prior art, since participation modes of participating nodes in a blockchain network are anonymous, the blockchain-based network can only confirm network identities of the participating nodes, but cannot determine the real identities of operation users corresponding to the participating nodes in real life, so that the operation of the blockchain network cannot be effectively supervised.
When the development of the block chain technology is rapid, the block chain technology is increasingly applied to bear the property of the physical world, and the anonymity can derive numerous fraudulent behaviors, which restricts the popularization of the block chain technology.
In order to solve the technical problem, the invention provides a block chain real-name participation method, in which participation nodes in a block chain are closely linked with identity information of a user in the real world, so that management of the participation nodes based on the real information of the user and legality guarantee of a block chain network environment are facilitated.
For clarity of description, the blockchain real-name participation system according to an embodiment of the present invention is first described, fig. 1 is a schematic structural diagram of the blockchain real-name participation system according to an embodiment of the present invention, and as shown in fig. 1, the system includes a participation node 100, a mining node 200, and a timestamp server 300, where the participation node 100 is a node that first applies for joining a blockchain network, and after the participation node 100 successfully joins the blockchain network, the participation node serves as the mining node to perform an accounting function, and the timestamp server 300 is used for time-stamping node behaviors in the blockchain network, including transaction behaviors, and the like, so as to prevent the transaction from being forged and the like.
Referring to fig. 2, in an actual execution process, a participating node acquires an authentication video recorded by an application user (step 1), where the application user may be an individual or an enterprise, and the authentication video includes: the method comprises the steps of (1) carrying out live user, user certificate containing user certificate image and user certificate information and video recording time, marking uniqueness of the authentication video, carrying out hash calculation on the authentication video to obtain a corresponding hash value, and sending the hash value to a timestamp server (step 2).
And the timestamp server records the receiving time of the received hash value, applies a private key of the timestamp server to sign the hash value and the receiving time and sends the signed hash value and the receiving time to the participating nodes, so that the private key signature is carried out on the authentication video through the timestamp server, and the counterfeiting of the authentication video is avoided (step 3).
The participating node calculates the time difference between the video recording time and the video receiving time, if the time difference is found to meet the preset time range, the authentication video can truly reflect the true information of the application user corresponding to the participating node, and therefore the private key of the application user is applied to sign the authentication broadcast message and then the authentication broadcast message is sent to the block chain network (step 4), wherein the authentication broadcast message comprises the authentication broadcast message; the hash value and the receiving time signed by the private key of the timestamp server, the public key of the application user and the basic information of the application user, and the authentication video.
Further, the mining node applies the public key of the application user to perform signature verification on the received authentication broadcast message so as to prevent other illegal nodes from being disguised as participating nodes to perform identity authentication (step 51).
It should be understood that, in the embodiment of the present invention, identity authentication is performed on an application user corresponding to a participating node of a blockchain based on a public key certificate technology, and a core of the public key certificate technology is a pair of keys, which has the following basic principle: information content encrypted by one key can only be decrypted by another key with which it is paired. The encrypted public key can be widely sent to a correspondent, namely the mining node, and the encrypted private key needs to be stored safely. In use, the participating nodes can encrypt the broadcast information by using the signature private keys of the participating nodes and transmit the encrypted broadcast information to the mining nodes, and the mining nodes can use the encrypted public keys of the participating nodes to complete decryption.
Further, after the verification is passed, whether the hash value is matched with the authentication video is verified (step 52), so that the situation that an illegal user uses other videos to perform real-name authentication is avoided, if correct matching is obtained, whether the user certificate image is matched with a living user is verified (step 53), if correct matching is obtained, whether the user certificate information is matched with the user basic information is verified (step 54), if correct matching is obtained, the user certificate information and the like are valid, further, the time difference between the video recording time and the receiving time is calculated (step 55), if the time difference meets a preset time range after comparison, the fact that the real-name authentication of the user is passed is determined, and an authentication success message is written into a block and is broadcasted to a block chain network (step 56).
In this embodiment, in order to further verify the validity of the participating node and avoid the participating node from damaging the operating environment of the blockchain network, the mining node determines whether to receive an invalid broadcast message of an indication block sent by another mining node within a preset time, that is, whether the participating node joins the blockchain network and normally performs an accounting function is determined, if it is known that the invalid broadcast message is not received, it indicates that the participating node joins the blockchain network and normally performs the accounting function, the block is broadcasted to the blockchain network and validated, and the block is written into a blockchain account book (step 6).
In the actual implementation process, it is possible that other mining nodes have a billing error to misjudge the current participating node billing error, and an invalid broadcast message is sent, so in order to further improve the accuracy of verification when the participating node participates in the blockchain network, in an embodiment of the present invention, as shown in fig. 3, on the basis of the foregoing fig. 2, the following steps are further included: if the fact that the invalid broadcast message is received is known, whether the number of the mining nodes sending the invalid broadcast message exceeds a preset threshold value or not is judged (step 7), for example, whether the number of the mining nodes exceeds half of the number of the mining nodes is judged, if the known number is smaller than the preset threshold value, a block is broadcasted to the block chain network, the block is written into a block chain book, and if the known number is larger than or equal to the preset threshold value, the block is broadcasted to the block chain network inefficiently (step 8).
Therefore, the block chain real-name participation system of the embodiment of the invention performs real-name authentication on the living body user corresponding to the participating node when the participating node applies for joining the block chain network, and the real-name authentication has at least the following remarkable advantages:
firstly, the method comprises the following steps: since the nodes in the blockchain network are authenticated by real names, the blockchain network closely links the network with reality, so that the blockchain network can be used as a certificate, a right, a symbol of identity and the like.
Secondly, convenience is brought to management of the nodes, for example, after the user loses the key, the lost key can be fed back according to the real information of the user after the user loses the key and the technical problem that the lost key cannot be lost and found is solved.
Thirdly, under a real-name system, node behaviors and the like in the block chain network are linked with definite investors and the like, so that a social contract is formed, and strong responsibility and committed force are released.
Fourthly, according to relevant legal provisions, real-name authentication is indispensable for ensuring the property safety of users, so that the block chain network in the real-name system breaks through the opposition to the law, is beneficial to being supervised and managed, and has great significance for popularization.
Fifthly, under a real-name system, an effective and transparent management environment is formed for many illegal node behaviors, such as the problems of intelligent contracts, and the operation validity and authenticity of the block chain network are maintained.
In order to describe the details of the execution of the blockchain real-name participation system according to the embodiment of the present invention in more detail, so that those skilled in the art can make the blockchain real-name participation process of the present invention more clear, the following description focuses on the blockchain real-name participation method side to perform the details of the participation process.
Fig. 4 is a flowchart of a blockchain real name participation method according to an embodiment of the present invention, as shown in fig. 4, the method includes:
step 101, a participating node acquires an authentication video recorded by an application user, wherein the authentication video comprises: the system comprises a living user, a user certificate containing a user certificate image and user certificate information, video recording time, hash calculation on an authentication video to obtain a corresponding hash value, and sending the hash value to a timestamp server.
The video recording time includes a time electronic clock chart displaying a current specific time, for example, an electronic clock chart displaying a current year, month, day, hour, minute and second, or a current specific time read by a living user, that is, the current specific time is represented in a form of voice, and the video recording time is used for indicating a specific time for a user to record a video, so as to avoid that an authentication video uploaded by the user is recorded at a longer time and greatly differs from the real facial information of the user (for example, an application user aged 26 uploads an authentication video recorded at the age of 18).
In addition, the user certificate includes an identification card, a passport, a student card, a medical insurance card, and the like including a user certificate image and user certificate information.
Specifically, in order to implement real-name authentication of a participating node application user, a user needs to record an authentication video in advance, where the authentication video includes a living user (i.e., a real application user, rather than an image such as a human-shaped standing plate), a user certificate including a user certificate image and user certificate information, and video recording time, and further, a participating node acquires an authentication video recorded by the application user, where the participating node may acquire the authentication video in a manner of actively uploading the authentication video to the user, or may actively extract the authentication video from a related device after the user records the authentication video using a device corresponding to the participating node, such as a smart phone.
And further, the participating node calculates the hash value of the authentication video, marks the uniqueness of the authentication video through the hash value, and sends the hash value to the timestamp server, so as to further acquire a reliable time signature sent by the timestamp server.
And 102, recording the receiving time of the received hash value by the timestamp server, applying a private key of the timestamp server to sign the hash value and the receiving time, and sending the signed hash value and the receiving time to the participating nodes.
Specifically, the timestamp server records the receiving time of the received hash value, signs the hash value and the receiving time with a private key of the timestamp server, and sends the signed hash value and the receiving time to the participating node, for example, sends the signed hash value and the receiving time to the participating node through NFC (Near field communication), WiFi, and the like, so that reliable time signing of the authentication video applied by the participating node is realized.
103, calculating a time difference between video recording time and video receiving time by a participating node, and if the time difference is found to meet a preset time range, applying a private key of an application user to sign an authentication broadcast message and then sending the authentication broadcast message to a block chain network, wherein the authentication broadcast message comprises the authentication broadcast message; the hash value and the receiving time signed by the private key of the timestamp server, the public key of the application user and the basic information of the application user, and the authentication video.
It should be understood that, if the participating node determines that the difference between the receiving time of the hash value received by the timestamp server and the video recording time is large, it may be that the illegal device pretends that the hash value sent by the timestamp server to the participating node is signed and sends the signature to the participating node, so that the difference between the receiving time and the video recording time is large.
Specifically, the time difference between the video recording time and the video receiving time is calculated, for example, the video recording time displayed in a time electronic clock chart displaying the current specific time is extracted, the time difference between the video recording time and the video receiving time is calculated, whether the time difference meets a preset time range is judged, the preset time range is calibrated according to a large amount of experimental data, usually, in the preset time range, a legal participating node can finish successfully uploading the recorded authentication video to a timestamp server, and the timestamp server can finish the feedback of the signature until the participating node receives the signature.
If the time difference meets the preset time range, the signing party of the hash value is the timestamp server, and therefore the private key of the application user signs the authentication broadcast message and then sends the authentication broadcast message to the block chain network, so that the block chain network can perform re-authentication on the legality of the application user according to the authentication broadcast message. Wherein, the private key of the application user is only held by the application user.
The authentication broadcast message comprises a hash value and receiving time from a timestamp server to a private key signature, a public key of an application user, user basic information and an authentication video, wherein the user basic information comprises user identification number and other information for identifying user uniqueness, and the user name comprises user name and other information for identifying user identity, wherein the user basic information corresponds to the user certificate information, so that real-name authentication of the application user can be further performed according to the user basic information and the user certificate information.
And 104, the mining node applies the public key of the application user to carry out signature verification on the received authentication broadcast message, verifies whether the Hash value is matched with the authentication video after the verification is passed, if the correct matching is obtained, verifies whether the user certificate image is matched with the living user, if the correct matching is obtained, verifies whether the user certificate information is matched with the user basic information, if the correct matching is obtained, the time difference between the video recording time and the receiving time is calculated, if the time difference meets the preset time range after the comparison is obtained, the real-name authentication of the application user is determined to be passed, and the authentication success message is written into the block and is broadcasted to the block chain network.
As described above, the private key of the participating user and the public key of the participating user in the authentication broadcast message are a pair of passwords, so in the embodiment of the present invention, the mining node applies the public key of the applying user to perform the authentication of signing the received authentication broadcast message signed by the private key of the participating user, and when the public key of the applying user corresponds to the private key of the applying user signed in the authentication broadcast message, it indicates that the participating node itself sent the authentication broadcast message, thereby completing the re-verification of the validity of the participating node.
Further, after the verification is passed, whether the hash value is matched with the authentication video is verified, so that the authentication video sent by other participating nodes is prevented from being confused in the real-name authentication process, and if the hash value is correctly matched with the authentication video, the authentication video currently participating in the authentication is determined to be corresponding to the participating node of the corresponding user.
Further, the method comprises the steps of performing real-name authentication on the application user, verifying whether a user certificate image is matched with the living user, namely whether the living user uses the user certificate of the user to authenticate, and if the user certificate image is matched with the user basic information, verifying whether the user certificate information is matched with the user basic information to further ensure that the living user uses the relevant information of the user to perform real-name authentication.
If the certificate information of the user is matched with the basic information of the user, the fact that the living body user uses the relevant information of the user to carry out real-name authentication is indicated, and at the moment, the validity verification of the content of the authentication video is completed.
In addition, if the difference between the receiving time of the hash value received by the timestamp server and the video recording time is large, other illegal devices may intercept the hash value sent by the participating node, pretend that the participating node sends the intercepted hash value to the timestamp server, and the like, so that the difference between the receiving time and the video recording time is large. In order to avoid that an illegal user uses the authentication videos of other users to carry out real-name authentication, the time difference between the video recording time and the video receiving time is calculated again, the time difference is obtained through comparison and meets the preset time range, the authentication video is proved to be the authentication video of the corresponding application user sent by the participating node, the real-name authentication of the application user is confirmed to be passed, and the authentication success message is written into the block and is broadcasted to the block chain network.
In different application scenarios, the authentication success message may be an agreed character string indicating success of authentication, or may be specific text information indicating success of authentication, and the like, which is not limited herein.
Considering that in some scenarios, some illegal users may perform real-name authentication by intercepting and replaying authentication videos of other users, so as to further ensure that the authentication video provided by the participating node corresponds to the application user himself, in an embodiment of the present invention, the authentication video further includes a voice segment for reading a preset authentication video by a live user, as shown in fig. 5, before determining that the real-name authentication of the application user passes, the method further includes:
step 201, the mining node detects the lip language of the living user to obtain the lip language content, and compares the lip language content with the text content of the voice segment.
Step 202, if the mining node learns that the lip language content is consistent with the text content of the voice fragment, determining that the real-name authentication of the application user passes.
It can be understood that, in order to avoid being illegally utilized by other users, when an application user records an authentication video, a segment of voice containing personal information of the application user is read, for example, a segment of 'this is a video for which the block chain real name authentication is small and clear' voice, and the like is read, so that the mining node detects the lip language of a living user to acquire the lip language content, compares the lip language content with the text content of a preset voice segment, and determines that the real name authentication of the application user passes if the mining node knows that the lip language content is consistent with the text content of the voice segment. Therefore, on one hand, the legality authentication is carried out based on the lip language, the condition that an illegal user carries out voice dubbing authentication through a received video is avoided, and on the other hand, the condition that even if the illegal user intercepts the authentication video of other users, the living body of the illegal user cannot attack due to the fact that the living body of the illegal user cannot correspond to the intercepted authentication video is guaranteed.
And 105, judging whether invalid broadcast messages of the indication blocks sent by other mining nodes are received within preset time by the mining nodes, if the mining nodes know that the invalid broadcast messages are not received, enabling the broadcast blocks to take effect to the block chain network, and writing the blocks into a block chain account book.
It is understood that after the participating node successfully accesses the blockchain network, the real-name authentication is completed in time, and it is also possible that the user of the real-name authentication is an illegal user, so that in order to ensure that the participating node normally performs accounting activities, rather than illegal activities such as washing black money, it is necessary to verify whether the participating node performs normal and legal accounting activities.
Specifically, the mining node in the blockchain network compares the transaction information and the like recorded in the book with the transaction information of the same transaction recorded by the participating node, if the transaction information and the like are not consistent, the mining node judges that the accounting of the participating node is wrong, judges that a block of the authentication success message corresponding to the participating node is invalid, judges whether broadcast information indicating that the block is invalid and sent by other mining nodes is received within preset time or not, and if the broadcast information indicating that the block is invalid is not received, broadcasts the block to the blockchain network to be effective and writes the block into the blockchain book.
Certainly, in the actual execution process, it is possible that another mining node has a billing error and thus misjudges the current participating node billing error, and sends an invalid broadcast message, so to further improve the accuracy of the verification when the participating node participates in the blockchain network, in an embodiment of the present invention, if the mining node learns that the invalid broadcast message is received, it is determined whether the number of mining nodes sending the invalid broadcast message exceeds a preset threshold, where the preset threshold is related to the total number of mining nodes and the authority of the mining nodes in the blockchain network, and the larger the total number of mining nodes, the lower the authority of the mining nodes (for example, only common participating nodes), the lower the corresponding preset threshold.
If the number of the mining nodes is less than the preset threshold value, the mining nodes indicate that most mining nodes identify the block, or no authoritative mining node considers that the block is invalid, so that the block is broadcasted to the block chain network to be effective and written into the block chain book, otherwise, if the number is greater than or equal to the preset threshold value, the block is broadcasted to the block chain network to be invalid.
In summary, the method for participating in the blockchain real name according to the embodiment of the present invention implements real name authentication on the nodes in the blockchain, and associates the nodes in the blockchain network with real user identities in real life, thereby facilitating management of the nodes and maintaining the validity of the blockchain.
In order to implement the foregoing embodiments, the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the computer device implements the block chain real name participation method as described in the foregoing embodiments.
In order to implement the foregoing embodiments, the present invention also proposes a non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, is capable of implementing the blockchain real-name participation method as described in the foregoing embodiments.
In the present invention, the terms "first", "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the present invention, unless otherwise expressly stated or limited, the first feature "on" or "under" the second feature may be directly contacting the first and second features or indirectly contacting the first and second features through an intermediate. Also, a first feature "on," "over," and "above" a second feature may be directly or diagonally above the second feature, or may simply indicate that the first feature is at a higher level than the second feature. A first feature being "under," "below," and "beneath" a second feature may be directly under or obliquely under the first feature, or may simply mean that the first feature is at a lesser elevation than the second feature.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. A method for real-name participation in a blockchain, comprising:
the method comprises the following steps that a participating node obtains an authentication video recorded by a user, wherein the authentication video comprises: the system comprises a living user, a user certificate containing a user certificate image and user certificate information, video recording time, a time stamp server and a server, wherein the living user, the user certificate containing the user certificate image and the user certificate information and the video recording time are used for carrying out hash calculation on an authentication video to obtain a corresponding hash value and sending the hash value to the time stamp server;
the timestamp server records the receiving time of the hash value, applies a private key of the timestamp server to sign the hash value and the receiving time and sends the signed hash value and the receiving time to the participating node;
the participating node calculates the time difference between the video recording time and the receiving time, and if the time difference is found to meet a preset time range, the participating node applies a private key of the application user to sign an authentication broadcast message and then sends the authentication broadcast message to a block chain network, wherein the authentication broadcast message comprises the authentication broadcast message; the hash value and the receiving time signed by the private key of the timestamp server, the public key and the basic information of the application user, and the authentication video;
the mining node applies the public key of the application user to carry out signature verification on the received authentication broadcast message, verifies whether the hash value is matched with the authentication video after the verification is passed, if the correct matching is obtained, verifies whether the user certificate image is matched with the living body user, if the correct matching is obtained, verifies whether the user certificate information is matched with the user basic information, if the correct matching is obtained, the time difference between the video recording time and the receiving time is calculated, if the time difference meets the preset time range after the comparison is obtained, the real-name authentication of the application user is determined to pass, and the authentication success message is written into a block and is broadcasted to the block chain network;
and the mining node judges whether a broadcast message which is sent by other mining nodes and indicates that the block is invalid is received or not within preset time, if the broadcast message which is not received is known, the block is broadcasted to the block chain network to be effective, and the block is written into a block chain account book.
2. The method of claim 1, further comprising:
if the mining nodes know that the invalid broadcast message is received, judging whether the number of the mining nodes sending the invalid broadcast message exceeds a preset threshold value or not;
and if the mining node learns that the number is smaller than the preset threshold value, the mining node broadcasts the block to the block chain network to be effective, writes the block into a block chain account book, and broadcasts the block to the block chain network to be invalid if the mining node learns that the number is larger than or equal to the preset threshold value.
3. The method of claim 1, wherein the video recording time comprises:
displaying a time electronic clock image of the current specific time;
alternatively, the first and second electrodes may be,
the live user reads the current specific moment.
4. The method of claim 1, wherein the user credential information comprises: certificate number and user certificate name; the user basic information includes: a user identification and a user name;
the verifying whether the user certificate information is matched with the user basic information comprises:
verifying whether the certificate number is the same as the user identification, and verifying whether the user certificate name is the same as the user name.
5. The method of any of claims 1-4, wherein the authenticating video further comprises: the live user reads a preset voice segment for video authentication,
before the determining that the real-name authentication of the application user passes, the method further comprises:
the mining node detects the lip language of the living user to obtain lip language content, and compares the lip language content with the text content of the voice fragment;
and if the mining node learns that the lip language content is consistent with the text content of the voice fragment, determining that the real-name authentication of the application user passes.
6. A blockchain real-name authentication system, comprising: a participating node, a timestamp server, a mining node, wherein,
the participating node is configured to acquire an authentication video recorded by an application user, where the authentication video includes: the system comprises a living user, a user certificate containing a user certificate image and user certificate information, video recording time, a time stamp server and a server, wherein the living user, the user certificate containing the user certificate image and the user certificate information and the video recording time are used for carrying out hash calculation on an authentication video to obtain a corresponding hash value and sending the hash value to the time stamp server;
the timestamp server is used for recording the receiving time of the hash value, applying a private key of the timestamp server to sign the hash value and the receiving time and sending the signed hash value and the receiving time to the participating node;
the participating node is used for calculating the time difference between the video recording time and the receiving time, and if the time difference is found to meet a preset time range, applying a private key of the application user to sign an authentication broadcast message and then sending the authentication broadcast message to a block chain network, wherein the authentication broadcast message comprises the authentication broadcast message; the hash value and the receiving time signed by the private key of the timestamp server, the public key and the basic information of the application user, and the authentication video;
the mining node is used for performing signature verification on the received authentication broadcast message by using the public key of the application user, verifying whether the hash value is matched with the authentication video after the verification is passed, verifying whether the user certificate image is matched with the living user if correct matching is obtained, verifying whether the user certificate information is matched with the user basic information if correct matching is obtained, calculating the time difference between the video recording time and the receiving time if correct matching is obtained, determining that the real-name authentication of the application user passes if the time difference meets a preset time range after the comparison is obtained, writing the authentication success message into a block, and broadcasting the block chain network;
and the mining node is used for judging whether a broadcast message which is sent by other mining nodes and indicates that the block is invalid is received within preset time, if the broadcast message which is sent by other mining nodes and indicates that the invalid broadcast message is not received, the block is broadcasted to the block chain network to be effective, and the block is written into a block chain account book.
7. The system of claim 6, wherein the mining node is further configured to:
if the fact that the invalid broadcast message is received is known, whether the number of the mining nodes sending the invalid broadcast message exceeds a preset threshold value or not is judged;
if the number is less than the preset threshold value, broadcasting the block to the block chain network to be effective, writing the block into a block chain account book, and if the number is greater than or equal to the preset threshold value, broadcasting the block to the block chain network to be ineffective.
8. The system of claim 6, wherein the video recording time comprises:
displaying a time electronic clock image of the current specific time;
alternatively, the first and second electrodes may be,
the live user reads the current specific moment.
9. A computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the blockchain real name participation method of any one of claims 1 to 5 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the blockchain real-name participation method according to any one of claims 1 to 5.
CN201810692345.6A 2018-06-29 2018-06-29 Block chain real name participation method and system Expired - Fee Related CN108876375B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810692345.6A CN108876375B (en) 2018-06-29 2018-06-29 Block chain real name participation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810692345.6A CN108876375B (en) 2018-06-29 2018-06-29 Block chain real name participation method and system

Publications (2)

Publication Number Publication Date
CN108876375A CN108876375A (en) 2018-11-23
CN108876375B true CN108876375B (en) 2020-09-08

Family

ID=64296777

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810692345.6A Expired - Fee Related CN108876375B (en) 2018-06-29 2018-06-29 Block chain real name participation method and system

Country Status (1)

Country Link
CN (1) CN108876375B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067721B (en) * 2018-07-24 2021-02-19 中国联合网络通信集团有限公司 Block chain real-name authentication method, device, equipment and storage medium
CN109450659B (en) * 2018-12-25 2020-10-23 杭州复杂美科技有限公司 Block delay broadcasting method, equipment and storage medium
CN110532806A (en) * 2019-07-26 2019-12-03 深圳壹账通智能科技有限公司 Bidding documents management method, system and computer readable storage medium
CN110661779B (en) * 2019-08-15 2023-03-21 中国平安财产保险股份有限公司 Block chain network-based electronic certificate management method, system, device and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105490814A (en) * 2015-12-08 2016-04-13 中国人民大学 Ticket real name authentication method and system based on three-dimensional code
CN106899570A (en) * 2016-12-14 2017-06-27 阿里巴巴集团控股有限公司 The processing method of Quick Response Code, apparatus and system
WO2017116019A1 (en) * 2015-12-29 2017-07-06 주식회사 코인플러그 Method and server for authenticating and verifying file
CN107086914A (en) * 2017-04-24 2017-08-22 武汉康慧然信息技术咨询有限公司 Individual health data based on big data technology integrates distribution method and system
CN107832624A (en) * 2017-10-25 2018-03-23 济南浪潮高新科技投资发展有限公司 A kind of visualization signature system and method based on block chain
CN108055240A (en) * 2017-11-15 2018-05-18 上海国际汽车城(集团)有限公司 A kind of user authentication method of shared automobile
CN108075894A (en) * 2016-11-17 2018-05-25 广州大白互联网科技有限公司 A kind of authentication on-line processing method and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10033702B2 (en) * 2015-08-05 2018-07-24 Intralinks, Inc. Systems and methods of secure data exchange
US10915874B2 (en) * 2015-11-10 2021-02-09 Loyyal Corporation System and process for tokenization of digital media
JP6608256B2 (en) * 2015-11-26 2019-11-20 株式会社bitFlyer Blockchain Electronic data existence certification program and existence certification server
US9792742B2 (en) * 2016-02-02 2017-10-17 Live Nation Entertainment, Inc. Decentralized virtual trustless ledger for access control

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105490814A (en) * 2015-12-08 2016-04-13 中国人民大学 Ticket real name authentication method and system based on three-dimensional code
WO2017116019A1 (en) * 2015-12-29 2017-07-06 주식회사 코인플러그 Method and server for authenticating and verifying file
CN108075894A (en) * 2016-11-17 2018-05-25 广州大白互联网科技有限公司 A kind of authentication on-line processing method and system
CN106899570A (en) * 2016-12-14 2017-06-27 阿里巴巴集团控股有限公司 The processing method of Quick Response Code, apparatus and system
CN107086914A (en) * 2017-04-24 2017-08-22 武汉康慧然信息技术咨询有限公司 Individual health data based on big data technology integrates distribution method and system
CN107832624A (en) * 2017-10-25 2018-03-23 济南浪潮高新科技投资发展有限公司 A kind of visualization signature system and method based on block chain
CN108055240A (en) * 2017-11-15 2018-05-18 上海国际汽车城(集团)有限公司 A kind of user authentication method of shared automobile

Also Published As

Publication number Publication date
CN108876375A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
CN108881253B (en) Block chain real name participation method and system
CN108876374B (en) Block chain network identity document authentication method and system
US11777726B2 (en) Methods and systems for recovering data using dynamic passwords
US11082221B2 (en) Methods and systems for creating and recovering accounts using dynamic passwords
US10558974B2 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
CN108900507B (en) Block chain real-name authentication method and system
CN108696358B (en) Digital certificate management method and device, readable storage medium and service terminal
CN108876375B (en) Block chain real name participation method and system
CN108880832B (en) Block chain real-name authentication method and system
CN110098932B (en) Electronic document signing method based on safe electronic notarization technology
CN107181765A (en) Network digital identity identifying method based on block chain technology
CN108964924A (en) Digital certificate method of calibration, device, computer equipment and storage medium
CN108092779A (en) A kind of method and device for realizing electronic signature
EP3379440A1 (en) A computer implemented method for automatically certifying documents with integrity and authenticity guarantees and computer programs thereof
WO2007094165A1 (en) Id system and program, and id method
US11444784B2 (en) System and method for generation and verification of a subject's identity based on the subject's association with an organization
CN113934993A (en) Electronic seal based on electronic handwriting signature technology
CN112002436A (en) Block chain-based medical question answering method, device and medium
EP3443501B1 (en) Account access
CN108540447A (en) A kind of certification authentication method and system based on block chain
CN114285662A (en) Authentication method, device, equipment and storage medium
CN109635594A (en) Electronics execution of contract and the anti-counterfeit authentication method for signing process again
CN111385095A (en) Privacy protection-oriented digital certificate signature method
KR20180093547A (en) Electronic signature method using signer identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing

Applicant after: IALLCHAIN Co.,Ltd.

Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing.

Applicant before: IALLCHAIN Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200908

Termination date: 20210629