CN109005186A - A kind of method, system, equipment and the storage medium of user-isolated identity information - Google Patents

A kind of method, system, equipment and the storage medium of user-isolated identity information Download PDF

Info

Publication number
CN109005186A
CN109005186A CN201810950198.8A CN201810950198A CN109005186A CN 109005186 A CN109005186 A CN 109005186A CN 201810950198 A CN201810950198 A CN 201810950198A CN 109005186 A CN109005186 A CN 109005186A
Authority
CN
China
Prior art keywords
user
account
block chain
identity information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810950198.8A
Other languages
Chinese (zh)
Other versions
CN109005186B (en
Inventor
马登极
吴思进
王志文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Jiaoda Chain Technology Co.,Ltd.
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN201810950198.8A priority Critical patent/CN109005186B/en
Publication of CN109005186A publication Critical patent/CN109005186A/en
Priority to PCT/CN2019/101605 priority patent/WO2020038367A1/en
Application granted granted Critical
Publication of CN109005186B publication Critical patent/CN109005186B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The invention discloses method, system, equipment and the storage mediums of a kind of user-isolated identity information, belong to block chain technical field.Including method: user generates public key and private key by block chain;The public key and subscriber identity information of user is stored in block chain;Block chain generates multiple and different account ID to same user;User is registered in application by account ID;It further include corresponding system, equipment and storage medium, aiming at the problem that user information leakage, it can protect the privacy of user, prevent privacy of user from revealing.

Description

A kind of method, system, equipment and the storage medium of user-isolated identity information
Technical field
The present invention relates to block chain technical field more particularly to a kind of method, system, the equipment of user-isolated identity information And storage medium.
Background technique
Current Internet era various network applications emerge one after another, and drop drop is called a taxi, and are hungry, not busy fish, 58 is some with city etc. Be related to true sale requires user's real-name authentication using App, and user out of privacy concerns, is often not intended to privacy to believe Breath reveals to these using App, and with the arriving of data age, user data will be more and more valuable to application software, and user Also will increasingly pay attention to oneself privacy, be unwilling to reveal, but in order to use application software, have to reveal, with Higher attention of the government to application App safety, various application App also have to that user is allowed to provide more detailed certification material Material, it is desirable that user's real-name authentication, not only user takes pictures identity card tow sides upload, but also face is wanted to take pictures identification, If the mechanism for running application is used in ID card information elsewhere, user will not know;The privacy for causing user to reveal More and more, user increasingly dislikes, and contradiction is becoming increasingly acute.
Chinese invention patent application, publication number: CN108063752A;Publication date: 2018.05.22;The disclosure of the invention one Credible genetic test and data sharing method of the kind based on block chain and proxy re-encryption technology, are applied based on sequentially connected The application system of managed application data-layer, block link layer and Distributed Storage layer.This method is established based on block chain technology The honesty managemen scheme of testing agency and hospital, solves the problems, such as that the third-party institution arbitrarily provides testing result.Meanwhile it being based on Public key cryptography scheme protects the private data of personal user so that it is personal to the gene data of oneself have complete control and Ownership.Finally, realizing a kind of voidable proxy re-encryption scheme in block chain intelligence contract, guarantee that scientific research institution is obtaining Genomic data is obtained after to personal user's authorization.The patent is towards personal user, for this privacy number of genetic test According to leakage-preventing sharing method, can not accomplish when gene data is disclosed towards the third-party institution in absolute sense prevent it is hidden Private leakage.
Summary of the invention
1. technical problems to be solved by the inivention
In order to overcome the above technical problems, the present invention provides method, system, the equipment of a kind of user-isolated identity information And storage medium.It can protect the privacy of user, prevent privacy of user from revealing.
2. technical solution
To solve the above problems, technical solution provided by the invention are as follows:
A kind of method of user-isolated identity information, comprising the following steps:
S1, user generate public key and private key by block chain;
The mode for generating public key and private key shares 2 kinds, one is, public key and private key are randomly generated by block chain, it is another Kind is that block chain operator is according to subscriber identity information (name, gender, identification card number, cell-phone number, mailbox, sound, face figure Picture, fingerprint, home address, personal users' identity information such as registered permanent residence location or enterprise, tissue, mechanism or unit title, The community identities information such as unified social credibility code, address, duty paragraph) carry out Hash encryption after, generate private key and public key, private key is such as Fruit is lost, and can be given for change to block chain operator.
S2, the public key of user and subscriber identity information are stored in block chain;
Block chain, point of identity information are saved in after the identity information of user needs and Third Party Authentication agency qualification is signed Class difference may have different Third Party Authentication mechanisms, for example ID card information needs public security bureau of government to authenticate, and academic information needs Want colleges and universities to authenticate, bank card assets information may bank authentication, automobile information authenticated by vehicle management, is saved according to classification It is string number due to being signing messages on block chain, this string certificate signature information includes certification authority, is certified use The block chain account ID at family, and to the ciphering signature information of real information, can be identified by Third Party Authentication organization web true Reality, while specifying information is not revealed again, such as identification card number, facial information etc., while also demonstrating the true of identity information The privacy information of user is stashed, protects privacy of user by credibility, so that user privacy information can not be stolen or excessively With.Real information can also be obtained when obtaining user and agreeing to by Third Party Authentication mechanism by waiting if necessary simultaneously.
S3, block chain generate multiple and different account ID to same user;
If user only one account ID, by trading activity of the retrospect account ID on block chain or Crawler behavior will increase the risk that the account ID of the user is attacked, so that user privacy information is easy to cause to be stolen;One User's correspondence possesses multiple account ID, can not trace the behavior of the user, and then plays the role of protecting user privacy information, makes Obtaining attacker can not be determined by the behavior of some account ID to user.The quantity of account ID can be set to block chain and produce at random It is raw, it also can be set to request to generate by user, and the producing method of account ID can be and do different numbers to the public key of user Hash, that is, can produce multiple and different account ID.
S4, user are registered in application by account ID.
User does not need to provide the sensitive informations such as user identity card to application, and account ID has represented the privacy information of user It is backed up and is authenticated by block chain, the privacy information of user is stored on block chain, and the offer of block chain has represented user privacy information The account ID that is backed up and is authenticated is applying upper registration, these applications are not necessarily builds on block chain, can be fortune The software application of battalion side's independent development is also possible to the application built based on block, but each application has connection with block chain Interface, to block chain, there are certain foundation of trust to facilitate acquisition to represent user so that user in corresponding application when registering The account ID of privacy information, so that the privacy information of user and application be kept apart.
Preferably, by block chain public key and private key is randomly generated in user in step S1.
Preferably, block chain operator generates private key and public key according to subscriber identity information.The subscriber identity information Including identification card number, cell-phone number, mailbox, sound, face-image, fingerprint, home address, the user identity such as registered permanent residence location letter Breath can be given for change if private key is lost to block chain operator.
Preferably, the registration in S4 the following steps are included:
S401, user send a verifying transaction to block chain, and an account ID and private key signature information is selected to be sent to Block chain;
S402, block chain node can verify account ID and user's signature information, be verified, it was demonstrated that this account ID Belong to the user, and be not used by, is used in the upper renewal of registration of application;Verifying does not pass through, it was demonstrated that account ID is not the user All or account ID has been used, and cannot above register to use in application;
S403, it is verified, and after succeeding in registration, block chained record account ID state is to be used.
In order to avoid next time registration new opplication when reuse account ID, in order to avoid the same account ID by it is multiple using, Tracking account ID whereabouts are manufactured to attacker, and then attack the chance of user, in order to avoid become the object attacked, it can be further The privacy of user is protected not to be leaked.
A kind of system of user-isolated identity information, a kind of user-isolated identity information according to any of the above item Method, comprising: public and private key generation module generates public key and private key by block chain for user;Privacy information preserving module is used The public key and subscriber identity information generated in the public and private key generation module of preservation;Account ID generation module, is protected on block chain The user for depositing public key and subscriber identity information generates multiple and different account ID;Application module, user generate mould using account ID Account is applied in the account ID registration that block generates.
Preferably, public key and private is randomly generated according to the request of user on block chain in the public and private key generation module Key, alternatively, generating private key and public key according to subscriber identity information.
Preferably, the privacy information preserving module includes distributed storage database and the block chain operation of block chain The private data library of side.
Preferably, the application module includes account ID authentication module and registration module, and account ID authentication module is used for Whether verifying account ID belongs to corresponding user, and whether verifying account ID is used;Registration module is generated according to account ID User applies upper account information at this.
A kind of equipment, including processor, input equipment, output equipment and memory, it is the processor, input equipment, defeated Equipment and memory interconnect out, wherein for the memory for storing computer program, the computer program includes journey Sequence instruction, the processor are configured for calling described program instruction, execute method as previously discussed.
A kind of computer readable storage medium, the computer storage medium are stored with computer program, the computer Program includes program instruction, and described program instructs when being executed by a processor, and the processor is made to execute method as previously discussed.
3. beneficial effect
Using technical solution provided by the invention, compared with prior art, have the following beneficial effects:
(1) the present invention is based on block chain technologies, provide a kind of method of user-isolated identity information, by third party Using an identifiable block chain account ID is only provided, without other any information, that is, family can be used to enjoy application While brought convenient, do not have to worry leakage of private information;
(2) traditional third-party application needs to acquire the privacy information of user, grasps a large number of users information, answers in third party During with operation, it is frequently present of privacy leakage problem actively or passively, many risks, present invention benefit are brought to user It is stored with block chain information ciphertext, decentralization, the characteristic that can not be distorted is isolated by the privacy information of user with third-party application Come, registered to use on third-party application using the account ID that block chain is generated to user, third-party application can not learn with Account ID corresponds to the privacy information of user, so that also active leakage can not be carried out to the privacy of user;
(3) in a kind of method of user-isolated identity information provided by the invention, user can produce on block chain Multiple account ID are used using different account ID, i.e. multiple account ID of sole user with user in face of different Application correspond, so that it is guaranteed that user in application, account ID used is different, and then is avoiding user same using different Behavior of the one account ID in different application is traced and is collected, and behavior of the user in different application is avoided to there is passive leakage A possibility that;
(4) method of a kind of user-isolated identity information provided by the invention, user, can be to block chains in application registration Verifying transaction is sent, after being verified, could above be registered to use in application, the privacy letter that user is provided to each application is not needed Breath, and each application can also quickly obtain registration number of users group based on the trust to block chain very much;
(5) a kind of method of user-isolated identity information of the invention, the privacy information that user saves on block chain are It after Hash, is stored in the form of ciphertext on block chain, not the private key signature verifying of user, anyone is can not to obtain Know the clear content of privacy information, therefore user can control personal privacy information completely, prevent leakage of private information.
Detailed description of the invention
Fig. 1 is the application schematic diagram of method;
Fig. 2 is one of the flow diagram of method;
Fig. 3 is the two of the flow diagram of method;
Fig. 4 is verifying transaction flow figure;
Fig. 5 is system block diagram;
Fig. 6 is equipment block diagram;
Fig. 7 is one of the schematic diagram of embodiment 2;
Fig. 8 is the two of the schematic diagram of embodiment 2;
Fig. 9 is the schematic diagram of embodiment 3;
Figure 10 is the schematic diagram of embodiment 7;
Figure 11 is one of the schematic diagram of embodiment 8;
Figure 12 is the two of the schematic diagram of embodiment 8.
Specific embodiment
To further appreciate that the contents of the present invention, in conjunction with accompanying drawings and embodiments, the present invention is described in detail.
Embodiment 1
As shown in Figure 2,3, a kind of method of user-isolated identity information, comprising the following steps:
S1, user generate public key and private key by block chain;
The mode for generating public key and private key shares 2 kinds, one is, public key and private key are randomly generated by block chain, once Private key loss can not be given for change, and another kind is that block chain operator is according to subscriber identity information (name, gender, identification card number, hand Machine number, mailbox, sound, face-image, fingerprint, home address, personal users' identity information such as registered permanent residence location or enterprise, The community identities information such as tissue, the title of mechanism or unit, unified social credibility code, address, duty paragraph) carry out Hash encryption Afterwards, private key and public key are generated, if private key is lost, can be given for change to block chain operator.
S2, the public key of user and subscriber identity information are stored in block chain;
Block chain, point of identity information are saved in after the identity information of user needs and Third Party Authentication agency qualification is signed Class difference may have different Third Party Authentication mechanisms, for example ID card information needs public security bureau of government to authenticate, and academic information needs Want colleges and universities to authenticate, bank card assets information may bank authentication, automobile information authenticated by vehicle management, is saved according to classification It is string number due to being signing messages on block chain, this string certificate signature information includes certification authority, is certified use The block chain account ID at family, and to the ciphering signature information of real information, can be identified by Third Party Authentication organization web true Reality, while specifying information is not revealed again, such as identification card number, facial information etc., while also demonstrating the true of identity information The privacy information of user is stashed, protects privacy of user by credibility, so that user privacy information can not be stolen or excessively With.Real information can also be obtained when obtaining user and agreeing to by Third Party Authentication mechanism by waiting if necessary simultaneously.
The public key and subscriber identity information of user can also be stored in the private data library of block chain operator, such as Fig. 3 Shown, user information is more concentrated, rather than open and diffusion, is not needed each business application and is authenticated.
S3, block chain generate multiple and different account ID to same user;
If user only one account ID, by trading activity of the retrospect account ID on block chain or Crawler behavior will increase the risk that the account ID of the user is attacked, so that user privacy information is easy to cause to be stolen;One User's correspondence possesses multiple account ID, can not trace the behavior of the user, and then plays the role of protecting user privacy information, makes Obtaining attacker can not be determined by the behavior of some account ID to user.The quantity of account ID can be set to block chain and produce at random It is raw, it also can be set to request to generate by user, and the producing method of account ID can be and do different numbers to the public key of user Hash, that is, can produce multiple and different account ID.
S4, user are registered in application by account ID.
User does not need to provide the sensitive informations such as user identity card to application, and account ID has represented the privacy information of user It is backed up and is authenticated by block chain, the privacy information of user is stored on block chain, and the offer of block chain has represented user privacy information The account ID that is backed up and is authenticated is applying upper registration, these applications are not necessarily builds on block chain, can be fortune The software application of battalion side's independent development is also possible to the application built based on block, but each application has connection with block chain Interface, to block chain, there are certain foundation of trust to facilitate acquisition to represent user so that user in corresponding application when registering The account ID of privacy information, so that the privacy information of user and application be kept apart.
The operator of one application just knows that the account ID of user, and determines that account ID is backed up by block chain With authenticated, the operation that can be used for oneself uses, but can not obtain the privacy information of the user, so can not will use Family privacy information be used in elsewhere, the privacy information of user can not be revealed, solve user using different in application, depositing The privacy leakage the problem of.
Embodiment 2
A kind of method of user-isolated identity information, is further improved on the basis of embodiment 1, comprising the following steps:
Public key and private key is randomly generated by block chain in S1, user, as shown in Figure 7;
S2, the public key of user and subscriber identity information are stored in block chain;As privately owned chain, alliance's chain are in block chain Permit chain, each node participated in block catenary system is by license, and unauthorized node can not access system In.But if a limited number of multiple certification nodes join together to be also that can make the identity information leakage of user in license chain At what is centainly threatened, so if block chain is license chain, after the public key and subscriber identity information of user carries out Hash encryption, then It is uploaded to block chain;If block chain is publicly-owned chain, can be to the carry out Hash encryption of subscriber identity information selectivity.Such as figure Shown in 8.
S3, block chain generate multiple and different account ID to same user;
S4, user are registered in application by account ID.
Embodiment 3
A kind of method of user-isolated identity information is further improved on the basis of embodiment 1,2, including following step It is rapid:
S1, user generate private key and public key according to subscriber identity information by block chain operator, as shown in Figure 9.
If block chain is license chain, after the public key and subscriber identity information of user carries out Hash encryption, then private key is generated And public key;If block chain is publicly-owned chain, can be to the carry out Hash encryption of subscriber identity information selectivity.Wherein, described Subscriber identity information include identification card number, cell-phone number, mailbox, sound, face-image, fingerprint, home address, registered permanent residence location Equal subscriber identity informations can be given for change if private key is lost to block chain operator.
S2, the public key of user and subscriber identity information are stored in block chain;As privately owned chain, alliance's chain are in block chain Permit chain, each node participated in block catenary system is by license, and unauthorized node can not access system In.But if a limited number of multiple certification nodes join together to be also that can make the identity information leakage of user in license chain At what is centainly threatened, so if block chain is license chain, after the public key and subscriber identity information of user carries out Hash encryption, then It is uploaded to block chain;If block chain is publicly-owned chain, can be to the carry out Hash encryption of subscriber identity information selectivity.Such as figure Shown in 8.
S3, block chain generate multiple and different account ID to same user;
S4, user are registered in application by account ID.
Embodiment 4
A kind of method of user-isolated identity information is further improved on the basis of embodiment 1,2,3, including following step It is rapid:
S1, user generate public key and private key by block chain;
S2, the public key of user and subscriber identity information are stored in block chain;
S3, block chain generate multiple and different account ID to same user;
S4, user are registered in application by account ID.
As shown in Fig. 1,3 and 4, registration in S4 the following steps are included:
S401, user send a verifying transaction to block chain, and an account ID and private key signature information is selected to be sent to Block chain;
S402, block chain node can verify account ID and user's signature information, be verified, it was demonstrated that this account ID Belong to the user, and be not used by, is used in the upper renewal of registration of application;Verifying does not pass through, it was demonstrated that account ID is not the user All or account ID has been used, and cannot above register to use in application;
S403, it is verified, and after succeeding in registration, block chained record account ID state is to be used.
In order to avoid next time registration new opplication when reuse account ID, in order to avoid the same account ID by it is multiple using, Tracking account ID whereabouts are manufactured to attacker, and then attack the chance of user, in order to avoid become the object attacked, it can be further The privacy of user is protected not to be leaked.
The present embodiment stashes the privacy information of user completely, is stored using the information ciphertext of block chain, goes to center Change, distributed storage, the advantages of can not distorting, the account ID and third-party interface applications that user is generated by block chain, and Third-party application device can not but know the privacy information of user, entirely prevented third-party application operator to privacy of user The leakage of information, at the same time, user can normally be enjoyed convenient brought by third-party application mechanism.
Embodiment 5
As described in figures 1 and 5, a kind of system of user-isolated identity information, according in any one of embodiment 1-4 technical solution The method of a kind of user-isolated identity information, comprising: public and private key generation module generates public affairs by block chain for user Key and private key;Privacy information preserving module, for saving the public key and subscriber identity information that generate in public and private key generation module;Account Family ID generation module generates multiple and different account ID to the user for saving public key and subscriber identity information on block chain;It answers With module, account is applied in the account ID registration that user is generated using account ID generation module.
Embodiment 6
As described in figures 1 and 5, a kind of system of user-isolated identity information, is further improved on the basis of embodiment 5, Include: public and private key generation module, public key and private key are generated by block chain for user;Privacy information preserving module, for protecting Deposit the public key and subscriber identity information generated in public and private key generation module;Account ID generation module, it is public to being saved on block chain The user of key and subscriber identity information generates multiple and different account ID;Application module, user are raw using account ID generation module At account ID registration apply account.Further, public and private key generation module is on block chain according to the request of user, random production Raw public key and private key, alternatively, generating private key and public key according to subscriber identity information.If block chain is license chain, the public affairs of user After key and subscriber identity information carry out Hash encryption, then generate private key and public key;If block chain be publicly-owned chain, can to The carry out Hash encryption of family identity information selectivity.Wherein, the subscriber identity information includes identification card number, cell-phone number, postal Case, sound, face-image, fingerprint, home address, the subscriber identity informations such as registered permanent residence location can be to areas if private key is lost Block chain operator is given for change.
Embodiment 7
A kind of system of user-isolated identity information is further improved, comprising: public and private key on the basis of embodiment 5,6 Generation module generates public key and private key by block chain for user;Privacy information preserving module is generated for saving public and private key The public key and subscriber identity information generated in module;Account ID generation module, to preservation public key and user identity on block chain The user of information generates multiple and different account ID;Application module, user are infused using the account ID that account ID generation module generates Volume applies account.Further, as shown in Figure 10, the privacy information preserving module includes the distributed storage number of block chain According to the private data library in library and block chain operator.If be stored in private data library, subscriber identity information needs to carry out Hash encryption, to ensure that subscriber identity information reveals brought risk.
Embodiment 8
A kind of system of user-isolated identity information is further improved, comprising: public and private on the basis of embodiment 5,6,7 Key generation module generates public key and private key by block chain for user;Privacy information preserving module is produced for saving public and private key The public key and subscriber identity information generated in raw module;Account ID generation module, to preservation public key and user's body on block chain The user of part information generates multiple and different account ID;Application module, the account ID that user uses account ID generation module to generate Account is applied in registration.Further, as shown in Figure 11,12, the application module includes account ID authentication module and registration mould Block, account ID authentication module, for verifying whether account ID belongs to corresponding user, whether verifying account ID is used; Registration module, according to account ID generate user this apply upper account information.
Embodiment 9
It is the processor, defeated as shown in fig. 6, a kind of equipment, including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to interconnect, wherein the memory is for storing computer program, the computer Program includes program instruction, and the processor is configured for calling described program instruction, is executed such as any one of embodiment 1-5 skill Art scheme the method.
Embodiment 10
A kind of computer readable storage medium, the computer storage medium are stored with computer program, the computer Program includes program instruction, and described program instructs when being executed by a processor, executes the processor as embodiment 1-5 is any Item technical solution the method.
Embodiment 11
The present embodiment is based on block chain technology, a kind of method that true identity information is isolated is provided, in embodiment 1-5 Method described in any one technical solution, by only providing the account of a credible identifiable block chain user to third-party application Family ID, without other any information, thus take pictures the acquisition with the application-oriented APP of other information instead of identity card, thus Largely protect personal user's privacy.
User's (including forms such as individual, enterprise, public institution, incorporation);User information, personally for, packet Include but be not limited to personal photo, birth certificate, ID card No., mailbox, phone number, the login account of certain website, QQ number code, The data such as contact address;User information, for the mechanisms such as enterprise, public institution or incorporation, including but not limited to society It can unify the data such as credit code, organization mechanism code, scope of operation, external mailbox, office telephone.
In order to prove that certain account ID is that certain specific user is all, user can send one to block chain and test for certain network application This account ID is sent to block chain with oneself private key signature by card transaction, and block chain node can believe account ID and user's signature Breath is verified, by that can prove that this account ID belongs to this user.Do not pass through, illustrates this non-user institute of this account ID Have.This account ID can be trusted by rear network application, and user is all thus.There is no need to provide a person by user in this way The sensitive informations such as part card are to network application.
Oneself a private key is randomly generated based on block chain in personal user, while obtaining corresponding public key;It can also be by Block chain company demonstrate,proves ID one unique private of generation according to user identity and can transport to block chain when such private key for user is lost It gives for change battalion side.
User is by the authentic ID card information of Third Party Authentication mechanism acquisition, the real informations such as face acquires, simultaneously Public key information, such as ID card information are provided, facial information etc., which data such a user has all can be from the side It arrives, meets demand of the company to information of different APP.
In order to adapt to different network applications, block chain is that same user generates different account ID, is utmostly protected Individual privacy, such as the account ID, account ID of Taobao businessman etc. of net about vehicle class.
User registers oneself identity information to application by the account ID generated for network application.In order to prove this account ID is that user is all, and user can send a verifying transaction to block chain, this account ID is sent to oneself private key signature Block chain, block chain node can verify account ID and user's signature information, by that can prove that this account ID belongs to This user.Do not pass through, illustrates that this non-user of this account ID is all.
This account ID can be trusted by rear network application, and user is all thus.User is a there is no need to provide in this way The sensitive informations such as people's identity card are to network application.By above scheme, user only can provide oneself to network application company Account ID on block chain, without providing real identity card information, to utmostly protect individual subscriber privacy.And And the block chain account ID based on different application, it can be also effectively isolated the collection between different application to user information, avoid using Family information is tracked, leakage.In addition, passport information can also be replaced if in need in the future with this block chain account id information, Global general-use.
Schematically the present invention and embodiments thereof are described above, description is not limiting, institute in attached drawing What is shown is also one of embodiments of the present invention, and actual structure is not limited to this.So if the common skill of this field Art personnel are enlightened by it, without departing from the spirit of the invention, are not inventively designed and the technical solution Similar frame mode and embodiment, are within the scope of protection of the invention.

Claims (10)

1. a kind of method of user-isolated identity information, which comprises the following steps:
S1, user generate public key and private key by block chain;
S2, the public key of user and subscriber identity information are stored in block chain;
S3, block chain generate multiple and different account ID to same user;
S4, user are registered in application by account ID.
2. a kind of method of user-isolated identity information according to claim 1, which is characterized in that user is logical in step S1 It crosses block chain and public key and private key is randomly generated.
3. a kind of method of user-isolated identity information according to claim 1, which is characterized in that block chain runs root Private key and public key are generated according to subscriber identity information.
4. a kind of method of user-isolated identity information according to claim 1, which is characterized in that the registration in S4 includes Following steps:
S401, user send a verifying transaction to block chain, and an account ID and private key signature information is selected to be sent to block Chain;
S402, block chain node can verify account ID and user's signature information, be verified, it was demonstrated that this account ID belongs to The user, and be not used by, it is used in the upper renewal of registration of application;Verifying does not pass through, it was demonstrated that account ID is not that the user is all Or account ID has been used, and cannot above register to use in application;
S403, it is verified, and after succeeding in registration, block chained record account ID state is to be used.
5. a kind of system of user-isolated identity information, which is characterized in that it is according to claim 1-4 it is a kind of every Method from subscriber identity information, comprising: public and private key generation module generates public key and private key by block chain for user;It is hidden Personal letter ceases preserving module, for saving the public key and subscriber identity information that generate in public and private key generation module;Account ID generates mould Block generates multiple and different account ID to the user for saving public key and subscriber identity information on block chain;Application module, user Account is applied in the account ID registration generated using account ID generation module.
6. a kind of system of user-isolated identity information according to claim 5, which is characterized in that the public and private key produces On block chain, according to the request of user, public key and private key is randomly generated in raw module, alternatively, being generated according to subscriber identity information private Key and public key.
7. a kind of system of user-isolated identity information according to claim 5, which is characterized in that the privacy information Preserving module includes the distributed storage database of block chain and the private data library of block chain operator.
8. a kind of system of user-isolated identity information according to claim 5, which is characterized in that the application module Including account ID authentication module and registration module, account ID authentication module, for verifying whether account ID belongs to corresponding user, Whether verifying account ID is used;Registration module, according to account ID generate user this apply upper account information.
9. a kind of equipment, which is characterized in that the processor, defeated including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to interconnect, wherein the memory is for storing computer program, the computer Program includes program instruction, and the processor is configured for calling described program instruction, is executed such as any one of claim 1-5 The method.
10. a kind of computer readable storage medium, which is characterized in that the computer storage medium is stored with computer program, The computer program includes program instruction, and described program instructs when being executed by a processor, executes the processor as weighed Benefit requires any one of 1-5 the method.
CN201810950198.8A 2018-08-20 2018-08-20 Method, system, equipment and storage medium for isolating user identity information Active CN109005186B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810950198.8A CN109005186B (en) 2018-08-20 2018-08-20 Method, system, equipment and storage medium for isolating user identity information
PCT/CN2019/101605 WO2020038367A1 (en) 2018-08-20 2019-08-20 Method and system for isolating user identity information, device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810950198.8A CN109005186B (en) 2018-08-20 2018-08-20 Method, system, equipment and storage medium for isolating user identity information

Publications (2)

Publication Number Publication Date
CN109005186A true CN109005186A (en) 2018-12-14
CN109005186B CN109005186B (en) 2020-12-11

Family

ID=64592710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810950198.8A Active CN109005186B (en) 2018-08-20 2018-08-20 Method, system, equipment and storage medium for isolating user identity information

Country Status (2)

Country Link
CN (1) CN109005186B (en)
WO (1) WO2020038367A1 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109768865A (en) * 2019-01-18 2019-05-17 深圳市威赫科技有限公司 Block chain upper body part under credible performing environment digitizes realization method and system
CN110009352A (en) * 2019-03-29 2019-07-12 阿里巴巴集团控股有限公司 Method and apparatus based on biological characteristic resetting block chain account key
CN110086608A (en) * 2019-03-21 2019-08-02 深圳壹账通智能科技有限公司 User authen method, device, computer equipment and computer readable storage medium
CN110135844A (en) * 2019-04-28 2019-08-16 阿里巴巴集团控股有限公司 Credit record, querying method and device and electronic equipment based on block chain
CN110601853A (en) * 2019-09-17 2019-12-20 腾讯科技(深圳)有限公司 Block chain private key generation method and equipment
CN110781419A (en) * 2020-01-02 2020-02-11 成都四方伟业软件股份有限公司 Multi-system cooperative use method based on block chain
WO2020038367A1 (en) * 2018-08-20 2020-02-27 杭州复杂美科技有限公司 Method and system for isolating user identity information, device, and storage medium
CN111131164A (en) * 2019-11-27 2020-05-08 山东爱城市网信息技术有限公司 Block chain-based digital identity implementation method, equipment and medium
CN111193736A (en) * 2019-12-30 2020-05-22 江苏恒宝智能系统技术有限公司 Information authentication method, device, system and storage medium
CN111797373A (en) * 2020-07-08 2020-10-20 杭州云链趣链数字科技有限公司 Method, system, computer device and readable storage medium for identity information authentication
CN111832001A (en) * 2020-07-20 2020-10-27 国家信息中心 Identity management method and identity management system based on block chain
WO2021073383A1 (en) * 2019-10-14 2021-04-22 深圳市红砖坊技术有限公司 User registration method, user login method and corresponding device
CN113256290A (en) * 2021-05-14 2021-08-13 杭州链网科技有限公司 Decentralized encrypted communication and transaction system
US11100093B2 (en) 2019-04-28 2021-08-24 Advanced New Technologies Co., Ltd. Blockchain-based recording and querying operations
CN114640490A (en) * 2020-12-16 2022-06-17 智弘软体科技股份有限公司 Method and architecture for terminal use safety, monitoring and management of equipment account
TWI773025B (en) * 2020-12-16 2022-08-01 智弘軟體科技股份有限公司 Processes and method for safe of use, monitoring and management of device accounts in terminal manner
US11533306B2 (en) 2020-12-16 2022-12-20 Global Wisdom Software Technology CO. LTD. Processes and method for safe of use, monitoring and management of device accounts in terminal manner

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN106097073A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain gives the method for the numeral exclusive ID of account trading process
US20160379256A1 (en) * 2015-06-29 2016-12-29 Perk.Com Us Inc. Method and system for integrating device activity and purchase transaction data to assess and/or predict consumer interest
CN106411901A (en) * 2016-10-08 2017-02-15 北京三未信安科技发展有限公司 Digital identity-based cryptograph management method and system
CN106453271A (en) * 2016-09-21 2017-02-22 江苏通付盾科技有限公司 Identity registration method and system, identity authentication method and system
CN106779385A (en) * 2016-12-07 2017-05-31 北京信任度科技有限公司 The method and system of electronic evidence and user identity are fixed using block chain
CN106897879A (en) * 2017-03-06 2017-06-27 广东工业大学 Block chain encryption method based on the PKI CLC close algorithms of isomerization polymerization label
CN107292181A (en) * 2017-06-20 2017-10-24 无锡井通网络科技有限公司 Database Systems based on block chain and the application method using the system
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN108234478A (en) * 2017-12-29 2018-06-29 重庆小犀智能科技有限公司 A kind of personal credit information share system and method based on block chain
CN108235805A (en) * 2017-12-29 2018-06-29 深圳前海达闼云端智能科技有限公司 Account unifying method and device and storage medium
CN108259438A (en) * 2016-12-29 2018-07-06 中移(苏州)软件技术有限公司 A kind of method and apparatus of the certification based on block chain technology
US20180227130A1 (en) * 2017-02-06 2018-08-09 ShoCard, Inc. Electronic identification verification methods and systems

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9967334B2 (en) * 2015-03-02 2018-05-08 Dell Products Lp Computing device configuration and management using a secure decentralized transaction ledger
CN105701372B (en) * 2015-12-18 2019-04-09 布比(北京)网络技术有限公司 A kind of building of block chain identity and verification method
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN107196966B (en) * 2017-07-05 2020-04-14 北京信任度科技有限公司 Identity authentication method and system based on block chain multi-party trust
CN107240017B (en) * 2017-07-20 2021-08-03 捷德(中国)科技有限公司 Block chain transaction management system and method
CN109005186B (en) * 2018-08-20 2020-12-11 杭州复杂美科技有限公司 Method, system, equipment and storage medium for isolating user identity information

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160379256A1 (en) * 2015-06-29 2016-12-29 Perk.Com Us Inc. Method and system for integrating device activity and purchase transaction data to assess and/or predict consumer interest
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN106097073A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain gives the method for the numeral exclusive ID of account trading process
CN106453271A (en) * 2016-09-21 2017-02-22 江苏通付盾科技有限公司 Identity registration method and system, identity authentication method and system
CN106411901A (en) * 2016-10-08 2017-02-15 北京三未信安科技发展有限公司 Digital identity-based cryptograph management method and system
CN106779385A (en) * 2016-12-07 2017-05-31 北京信任度科技有限公司 The method and system of electronic evidence and user identity are fixed using block chain
CN108259438A (en) * 2016-12-29 2018-07-06 中移(苏州)软件技术有限公司 A kind of method and apparatus of the certification based on block chain technology
US20180227131A1 (en) * 2017-02-06 2018-08-09 ShoCard, Inc. Electronic identification verification methods and systems with storage of certification records to a side chain
US20180227130A1 (en) * 2017-02-06 2018-08-09 ShoCard, Inc. Electronic identification verification methods and systems
CN106897879A (en) * 2017-03-06 2017-06-27 广东工业大学 Block chain encryption method based on the PKI CLC close algorithms of isomerization polymerization label
CN107292181A (en) * 2017-06-20 2017-10-24 无锡井通网络科技有限公司 Database Systems based on block chain and the application method using the system
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN108235805A (en) * 2017-12-29 2018-06-29 深圳前海达闼云端智能科技有限公司 Account unifying method and device and storage medium
CN108234478A (en) * 2017-12-29 2018-06-29 重庆小犀智能科技有限公司 A kind of personal credit information share system and method based on block chain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
周致成,李立新,郭松,李作辉: "《基于区块链技术的生物特征和口令双因子跨域认证方案》", 《计算机应用》 *
张青禾: "《区块链中的身份识别和访问控制技术研究》", 《中国硕士学位论文全文数据库 信息技术辑》 *
朱兴雄,何清素,郭善琪: "《区块链技术在供应链金融中的应用》", 《中国流通经济》 *

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020038367A1 (en) * 2018-08-20 2020-02-27 杭州复杂美科技有限公司 Method and system for isolating user identity information, device, and storage medium
CN109768865A (en) * 2019-01-18 2019-05-17 深圳市威赫科技有限公司 Block chain upper body part under credible performing environment digitizes realization method and system
CN110086608A (en) * 2019-03-21 2019-08-02 深圳壹账通智能科技有限公司 User authen method, device, computer equipment and computer readable storage medium
CN110086608B (en) * 2019-03-21 2022-03-25 深圳壹账通智能科技有限公司 User authentication method, device, computer equipment and computer readable storage medium
CN110009352A (en) * 2019-03-29 2019-07-12 阿里巴巴集团控股有限公司 Method and apparatus based on biological characteristic resetting block chain account key
US11106659B2 (en) 2019-04-28 2021-08-31 Advanced New Technologies Co., Ltd. Blockchain-based recording and querying operations
CN110135844B (en) * 2019-04-28 2020-11-24 创新先进技术有限公司 Credit recording and inquiring method and device based on block chain and electronic equipment
US11886423B2 (en) 2019-04-28 2024-01-30 Advanced New Technologies Co., Ltd. Blockchain-based recording and querying operations
CN110135844A (en) * 2019-04-28 2019-08-16 阿里巴巴集团控股有限公司 Credit record, querying method and device and electronic equipment based on block chain
US11100093B2 (en) 2019-04-28 2021-08-24 Advanced New Technologies Co., Ltd. Blockchain-based recording and querying operations
CN110601853A (en) * 2019-09-17 2019-12-20 腾讯科技(深圳)有限公司 Block chain private key generation method and equipment
CN110601853B (en) * 2019-09-17 2021-05-11 腾讯科技(深圳)有限公司 Block chain private key generation method and equipment
WO2021073383A1 (en) * 2019-10-14 2021-04-22 深圳市红砖坊技术有限公司 User registration method, user login method and corresponding device
CN112733096A (en) * 2019-10-14 2021-04-30 深圳市红砖坊技术有限公司 User registration method, user login method and corresponding devices
CN112733096B (en) * 2019-10-14 2024-02-27 深圳市红砖坊技术有限公司 User registration method, user login method and corresponding device
CN111131164A (en) * 2019-11-27 2020-05-08 山东爱城市网信息技术有限公司 Block chain-based digital identity implementation method, equipment and medium
CN111193736A (en) * 2019-12-30 2020-05-22 江苏恒宝智能系统技术有限公司 Information authentication method, device, system and storage medium
CN110781419A (en) * 2020-01-02 2020-02-11 成都四方伟业软件股份有限公司 Multi-system cooperative use method based on block chain
CN111797373A (en) * 2020-07-08 2020-10-20 杭州云链趣链数字科技有限公司 Method, system, computer device and readable storage medium for identity information authentication
CN111797373B (en) * 2020-07-08 2021-07-20 杭州云链趣链数字科技有限公司 Method, system, computer device and readable storage medium for identity information authentication
CN111832001A (en) * 2020-07-20 2020-10-27 国家信息中心 Identity management method and identity management system based on block chain
CN114640490A (en) * 2020-12-16 2022-06-17 智弘软体科技股份有限公司 Method and architecture for terminal use safety, monitoring and management of equipment account
TWI773025B (en) * 2020-12-16 2022-08-01 智弘軟體科技股份有限公司 Processes and method for safe of use, monitoring and management of device accounts in terminal manner
US11533306B2 (en) 2020-12-16 2022-12-20 Global Wisdom Software Technology CO. LTD. Processes and method for safe of use, monitoring and management of device accounts in terminal manner
CN113256290A (en) * 2021-05-14 2021-08-13 杭州链网科技有限公司 Decentralized encrypted communication and transaction system

Also Published As

Publication number Publication date
CN109005186B (en) 2020-12-11
WO2020038367A1 (en) 2020-02-27

Similar Documents

Publication Publication Date Title
CN109005186A (en) A kind of method, system, equipment and the storage medium of user-isolated identity information
US20190305938A1 (en) Threshold secret share authentication proof and secure blockchain voting with hardware security modules
Bertino et al. Identity management: Concepts, technologies, and systems
CN112580102A (en) Multi-dimensional digital identity authentication system based on block chain
CN110326251A (en) The system and method that the general dispersion solution of user is verified using cross validation feature are provided
CN110036613A (en) The system and method for authentication for decentralization application are provided
WO2020038366A1 (en) Trust system and construction method therefor, device, and storage medium
CN104125199B (en) A kind of anonymous authentication method and system based on attribute
AU2020100734A4 (en) Systems and methods for secure digital file sharing and authenticating
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
Lin et al. A cloud-based authentication protocol for RFID supply chain systems
CN105978855B (en) Personal information safety protection system and method under a kind of system of real name
CN109587276A (en) A kind of data back up method, system and associated component
Adams Achieving non‐transferability in credential systems using hidden biometrics
Kumar et al. Blockchain and Internet of Things (IoT) Enabled Smart E-Voting System
CN110012024A (en) A kind of data sharing method, system, equipment and computer readable storage medium
CN109450636A (en) The integrity verification method of group data in a kind of cloud storage
Chauhan Iot network identity management using smart contract and blockchain technology
Choudhari et al. Interoperable blockchain solution for digital identity management
Kirar et al. An efficient architecture and algorithm to prevent data leakage in Cloud Computing using multi-tier security approach
Wadhwa et al. Framework for user authenticity and access control security over a cloud
CN109981662A (en) A kind of safe communication system and method
CN105743883B (en) A kind of the identity attribute acquisition methods and device of network application
CN114124392A (en) Data controlled circulation method, system, device and medium supporting access control
Chaum et al. UDM: Private user discovery with minimal information disclosure

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210421

Address after: Room 408, building 13, Tengfei science and Technology Park, 388 Xinping street, Suzhou Industrial Park, Suzhou area, China (Jiangsu) pilot Free Trade Zone, Suzhou 215123, Jiangsu Province

Patentee after: Suzhou Jiaoda Chain Technology Co.,Ltd.

Patentee after: HANGZHOU FUZAMEI TECHNOLOGY Co.,Ltd.

Address before: 310000 6 floor, 6 building, 90 East Wensanlu Road Software Park, Wensanlu Road, Hangzhou, Zhejiang.

Patentee before: HANGZHOU FUZAMEI TECHNOLOGY Co.,Ltd.