CN109067721B - Block chain real-name authentication method, device, equipment and storage medium - Google Patents

Block chain real-name authentication method, device, equipment and storage medium Download PDF

Info

Publication number
CN109067721B
CN109067721B CN201810820251.2A CN201810820251A CN109067721B CN 109067721 B CN109067721 B CN 109067721B CN 201810820251 A CN201810820251 A CN 201810820251A CN 109067721 B CN109067721 B CN 109067721B
Authority
CN
China
Prior art keywords
information
user
video information
hash value
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810820251.2A
Other languages
Chinese (zh)
Other versions
CN109067721A (en
Inventor
田新雪
马书惠
肖征荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810820251.2A priority Critical patent/CN109067721B/en
Publication of CN109067721A publication Critical patent/CN109067721A/en
Application granted granted Critical
Publication of CN109067721B publication Critical patent/CN109067721B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification numbers [PIN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the invention provides a block chain real-name authentication method, a block chain real-name authentication device, block chain real-name authentication equipment and a storage medium. The method comprises the following steps: generating a hash value of video information by a block chain participating node according to the video information of a user, wherein the video information comprises first image information of an identity document of the user and first time information when the video information is recorded; the block chain participating node sends the hash value of the video information to a timestamp server; the block chain participating node receives second time information corresponding to the hash value sent by the timestamp server; and the blockchain participating node sends the hash value, the second time information, the identification information of the user and the video information to a mining node in a blockchain network, so that the mining node performs real-name authentication on the blockchain participating node according to the hash value, the second time information, the identification information of the user and the video information. The embodiment of the invention improves the safety of the block chain network.

Description

Block chain real-name authentication method, device, equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a block chain real-name authentication method, a block chain real-name authentication device, block chain real-name authentication equipment and a storage medium.
Background
In a blockchain network, data is permanently recorded in blocks in the form of files. A block is a record set of some or all of the latest bitcoin transactions and is not recorded by other previous blocks. Each tile records all events that occurred before it was created. Each tile includes some or all recent transactions, a reference to a previous tile, and other data.
When the current blockchain participating nodes participate in the blockchain network in an anonymous mode, the security of the blockchain network is low.
Disclosure of Invention
The embodiment of the invention provides a block chain real-name authentication method, a block chain real-name authentication device, block chain real-name authentication equipment and a block chain real-name authentication storage medium, which are used for improving the safety of a block chain network.
In a first aspect, an embodiment of the present invention provides a block chain real-name authentication method, including:
generating a hash value of video information by a block chain participating node according to the video information of a user, wherein the video information comprises first image information of an identity document of the user and first time information when the video information is recorded;
the block chain participating node sends the hash value of the video information to a timestamp server;
the block chain participating node receives second time information corresponding to the hash value sent by the timestamp server;
and the block chain participating node sends the hash value, the second time information, the identification information of the user and the video information to an ore digging node in a block chain network, so that the ore digging node carries out real-name authentication on the block chain participating node according to the hash value, the second time information, the identification information of the user and the video information.
In a second aspect, an embodiment of the present invention provides a block chain real-name authentication method, including:
a mining node in a block chain network receives video information of a user, a hash value corresponding to the video information, second time information corresponding to the hash value and identification information of the user, wherein the video information is sent by a block chain participating node and comprises first image information of an identity document of the user and first time information when the video information is recorded;
and the mining node performs real-name authentication on the block chain participation node according to the hash value, the second time information, the identification information of the user and the video information.
In a third aspect, an embodiment of the present invention provides a block chain real-name authentication apparatus, including:
the generating module is used for generating a hash value of the video information according to the video information of a user, wherein the video information comprises first image information of the identity document of the user and first time information when the video information is recorded;
the sending module is used for sending the hash value of the video information to a timestamp server;
the receiving module is used for receiving second time information corresponding to the hash value sent by the timestamp server;
the sending module is further configured to: and sending the hash value, the second time information, the identification information of the user and the video information to an ore digging node in a block chain network, so that the ore digging node carries out real-name authentication on the block chain participating node according to the hash value, the second time information, the identification information of the user and the video information.
In a fourth aspect, an embodiment of the present invention provides a block chain real name authentication apparatus, including:
the receiving module is used for receiving video information of a user, a hash value corresponding to the video information, second time information corresponding to the hash value and identification information of the user, wherein the video information comprises first image information of an identity document of the user and first time information when the video information is recorded;
and the authentication module is used for performing real-name authentication on the block chain participation node according to the hash value, the second time information, the identification information of the user and the video information.
In a fifth aspect, an embodiment of the present invention provides a block link point, including:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of the first aspect.
In a sixth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, the computer program being executed by a processor to implement the method of the first aspect.
The block chain real-name authentication method, device, equipment and storage medium provided by the embodiments of the present invention generate a hash value of video information according to video information of a user by a block chain participating node, where the video information includes first image information of an identity document of the user and first time information when the video information is recorded, send the hash value of the video information to a timestamp server, the timestamp server generates second time information corresponding to the hash value, and the block chain participating node sends the hash value, the second time information, identification information of the user and the video information to a mining node in a block chain network, so that the mining node performs real-name authentication on the block chain participating node according to the hash value, the second time information, the identification information of the user and the video information, the safety of the block chain network is improved.
Drawings
Fig. 1 is a schematic diagram of an application scenario provided in an embodiment of the present invention;
fig. 2 is a flowchart of a block chain real-name authentication method according to an embodiment of the present invention;
fig. 3 is a flowchart of a block chain real-name authentication method according to an embodiment of the present invention;
fig. 4 is a flowchart of a blockchain real-name authentication method according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a blockchain real-name authentication apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a blockchain real-name authentication apparatus according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a blockchain node according to an embodiment of the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The block chain real name authentication method provided by the invention can be applied to the communication system shown in fig. 1. As shown in fig. 1, the communication system includes: access network device 11, terminal device 12 and server 13. It should be noted that the communication System shown in fig. 1 may be applicable to different network formats, for example, may be applicable to Global System for Mobile communication (GSM), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Time Division-Synchronous Code Division Multiple Access (TD-SCDMA), Long Term Evolution (Long Term Evolution, LTE), and future 5G network formats. Optionally, the communication system may be a system in a scenario of high-reliability and Low-Latency Communications (URLLC) transmission in a 5G communication system.
Therefore, optionally, the access Network device 11 may be a Base Station (BTS) and/or a Base Station Controller in GSM or CDMA, a Base Station (NodeB, NB) and/or a Radio Network Controller (RNC) in WCDMA, an evolved Node B (eNB or eNodeB) in LTE, or a relay Station or an access point, or a Base Station (gbb) in a future 5G Network, and the present invention is not limited thereto.
The terminal device 12 may be a wireless terminal or a wired terminal. A wireless terminal may refer to a device that provides voice and/or other traffic data connectivity to a user, a handheld device having wireless connection capability, or other processing device connected to a wireless modem. A wireless terminal, which may be a mobile terminal such as a mobile telephone (or "cellular" telephone) and a computer having a mobile terminal, for example, a portable, pocket, hand-held, computer-included, or vehicle-mounted mobile device, may communicate with one or more core Network devices via a Radio Access Network (RAN), and may exchange language and/or data with the RAN. For another example, the Wireless terminal may also be a Personal Communication Service (PCS) phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), and other devices. A wireless Terminal may also be referred to as a system, a Subscriber Unit (Subscriber Unit), a Subscriber Station (Subscriber Station), a Mobile Station (Mobile), a Remote Station (Remote Station), a Remote Terminal (Remote Terminal), an Access Terminal (Access Terminal), a User Terminal (User Terminal), a User Agent (User Agent), and a User Device or User Equipment (User Equipment), which are not limited herein. Optionally, the terminal device 12 may also be a smart watch, a tablet computer, or the like. The terminal device 12 and the server 13 may be nodes in a blockchain network. In addition, the blockchain network may also include other nodes.
The invention provides a block chain real-name authentication method, which aims to solve the technical problems in the prior art.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a block chain real-name authentication method according to an embodiment of the present invention. The embodiment of the invention provides a block chain real-name authentication method aiming at the technical problems in the prior art, and the method comprises the following specific steps:
step 201, generating a hash value of video information by a block chain participating node according to the video information of a user, wherein the video information comprises first image information of an identity document of the user and first time information when the video information is recorded.
In this embodiment, the blockchain participating node may specifically be a terminal device 12 as shown in fig. 1, the terminal device 12 is provided with a shooting device, and a user may record video information through the terminal device 12, where the video information is specifically video information of the user, and specifically, the user may shoot a face of the user and an identity document of the user through the terminal device 12, where the identity document may specifically be an identity card, a passport, and the like of the user, so that the video information includes image information of the identity card or the passport of the user, and the image information of the identity card or the passport of the user included in the video information is referred to as first image information. Taking the id card of the user as an example, the first image information may include a name, an id number, and head portrait information of the user on the id card of the user. In addition, the video information may further include first time information when the video information is recorded. The first time information during recording of the video information comprises the following possible implementation modes:
one possible implementation is: the video information comprises audio information of the user, and the audio information comprises first time information when the video information is recorded. For example, when the user records the video information through the terminal device 12, the user may dictate the current recording time, for example, the video information recorded in minutes and seconds on the day of the month, that is, the video information further includes the audio information of the user, which is specifically the voice information that the user dictates the recording time, and here, the current recording time dictated by the user is taken as the first time information when the video information is recorded.
Another possible implementation is: the video information comprises second image information of the timer, and the second image information comprises first time information when the video information is recorded. For example, when the user records the video information through the terminal device 12, the terminal device 12 may be aligned with and photograph a timer, which may be specifically a clock, which may be specifically a time electronic clock that displays the time of the month and the day. Here, the image information of the timer shot by the terminal device 12 is recorded as the second image information, that is, the video information recorded by the terminal device 12 includes the second image information, and the second image information includes the first time information when the video information displayed by the timer is recorded.
In this embodiment, after the terminal device 12 records the video information, the hash value of the video information is generated.
Step 202, the blockchain participating node sends the hash value of the video information to a timestamp server.
In this embodiment, the timestamp server may specifically be the server 13 shown in fig. 1, and the terminal device 12 sends the hash value of the video information to the server 13.
Step 203, the blockchain participating node receives second time information corresponding to the hash value sent by the timestamp server.
When the server 13 receives the hash value of the video information sent by the terminal device 12, the current accurate time of the server 13 is recorded, and here, the accurate time of the server 13 when the server 13 receives the hash value is taken as the second time information corresponding to the hash value. The server 13 signs the hash value and the second time information with its own private key, and sends the signed hash value and the second time information to the terminal device 12.
And 204, the blockchain participating node sends the hash value, the second time information, the identification information of the user and the video information to a mining node in a blockchain network, so that the mining node performs real-name authentication on the blockchain participating node according to the hash value, the second time information, the identification information of the user and the video information.
When the terminal device 12 receives the hash value and the second time information sent by the server 13 and signed by the private key of the server 13, the first time information dictated by the user in the video information and the second time information are compared, or the first time information recorded by a timer shot in the video information and the second time information are compared, if the time difference between the first time information and the second time information is less than or equal to a preset time difference threshold value, the terminal device 12 sends the hash value, the second time information, the identification information of the user, such as name and identification number, and the video information to an excavation node in a block chain network, such as the excavation node 14 shown in fig. 1, and in addition, the terminal device 12 sends information to the excavation node 14 except the hash value, the second time information, the identification information of the user, such as name and identification number, Besides the video information, the video information may also include identification card avatar information, a public key corresponding to the user, a user name of the user in the blockchain network, and the like. Specifically, the terminal device 12 may use its own private key to sign the hash value, the second time information, and the identification information of the user, such as a name and an identification number, identification card header information, a public key corresponding to the user, and a user name of the user in the blockchain network, and broadcast the signed information and the video information together to the blockchain network, and since the mining node 14 is a node in the blockchain network, the information broadcast by the terminal device 12 may be received. Specifically, the mining node 14 may perform real-name authentication on the blockchain participating node, such as the terminal device 12, according to the hash value, the second time information, the identification information of the user, and the video information.
The mining node performs real-name authentication on the block chain participating node according to the hash value, the second time information, the identification information of the user and the video information, and the method comprises the following steps as shown in fig. 3:
step 301, the mining node verifies whether the hash value corresponding to the video information is correct.
When the mining node 14 receives the hash value corresponding to the video information, the second time information corresponding to the hash value, the identification information of the user and the video information sent by the terminal device 12, it is first verified whether the hash value corresponding to the video information is correct. If the hash value corresponding to the video information is incorrect, the mining node 14 fails to authenticate the user by the real name.
Step 302, if the hash value corresponding to the video information is correct, the mining node obtains the face information of the user in the video information and the avatar information of the user in the first image information, and compares whether the face information of the user in the video information is consistent with the avatar information of the user in the first image information.
If the hash value corresponding to the video information is correct, the mining node 14 further performs image recognition on the video information to obtain the face information of the user in the video information and the head portrait information of the user in the identity card, and compares the face information of the user in the video information with the head portrait information of the user in the identity card, and if the similarity between the face information of the user in the video information and the head portrait information of the user in the identity card is greater than a threshold value, it is determined that the face information of the user in the video information is consistent with the head portrait information of the user in the identity card.
If the face information of the user in the video information is not consistent with the head portrait information of the user in the identity card, the mining node 14 fails to authenticate the real name of the user.
Step 303, if the face information of the user in the video information is consistent with the avatar information of the user in the first image information, the mining node compares whether the identification information of the user sent by the block chain participating node is consistent with the identification information of the user in the first image information.
Under the condition that the face information of the user in the video information is consistent with the head portrait information of the user in the identification card, the mining node 14 further obtains the name and the identification number of the identification card shot in the video information, and compares the name and the identification number of the user sent to the mining node 14 by the terminal device 12, for example, the name and the identification number of the user.
If the name and the identification number in the identification card are not consistent with the identification information of the user sent to the mining node 14 by the terminal device 12, such as the name and the identification number of the user, the mining node 14 fails to authenticate the real name of the user.
Step 304, if the identification information of the user sent by the block chain participation node is consistent with the identification information of the user in the first image information, the mining node compares the first time information with the second time information.
If the name and the identification number in the identification card are consistent with the identification information of the user sent to the mining node 14 by the terminal device 12, such as the name and the identification number of the user, the mining node 14 compares first time information when the dictated video information in the video information is recorded with second time information sent to the mining node 14 by the terminal device 12, or the mining node 14 compares the first time information when the video information recorded by a timer shot in the video information is recorded with the second time information sent to the mining node 14 by the terminal device 12.
If the time difference between the first time information and the second time information is greater than the preset time difference threshold, the mining node 14 fails to authenticate the real name of the user.
Step 305, if the time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold, the mining node determines that the real-name authentication of the block chain participating node passes.
If the time difference between the first time information and the second time information is less than or equal to the preset time difference threshold, the mining node 14 determines that the real-name authentication for the blockchain participating node, such as the terminal device 12, passes, that is, the real-name authentication for the user passes.
In addition, in other embodiments, after the mining node 14 determines that the time difference between the first time information and the second time information is less than or equal to the preset time difference threshold, the first time information may be further compared with the current time information of the mining node 14, and if the time difference between the first time information and the current time information of the mining node 14 is also less than or equal to the preset time difference threshold, the mining node 14 determines that the real name authentication of the block chain participating node, such as the terminal device 12, is passed.
In addition, after the mining node 14 determines that the real-name authentication of the blockchain participating node, for example, the terminal device 12, passes, the information that the real-name authentication of the terminal device 12 succeeds may also be written into the blockchain ledger, and other mining nodes may also perform the real-name authentication of the terminal device 12 by using the method described in this embodiment, so as to determine whether the authentication result of the mining node 14 for the terminal device 12 is correct. And if the plurality of mining nodes can accept the real-name authentication of the terminal equipment 12, then accepting the information of the successful real-name authentication of the terminal equipment 12 written in the block chain account book.
In addition, in order to avoid that the video information recorded by the user is illegally used, when the user records the video information, the voice declares that the video is used for the identity authentication of the user, and when the spoken information in the video information is identified, lip language can be adopted for identification.
According to the embodiment of the invention, the hash value of the video information is generated by the blockchain participating node according to the video information of the user, the video information comprises the first image information of the identity document of the user and the first time information during the recording of the video information, the hash value of the video information is sent to the timestamp server, the timestamp server generates the second time information corresponding to the hash value, and the blockchain participating node sends the hash value, the second time information, the identification information of the user and the video information to the mining node in the blockchain network, so that the mining node performs real-name authentication on the blockchain participating node according to the hash value, the second time information, the identification information of the user and the video information, and the safety of the blockchain network is improved.
Fig. 4 is a flowchart of a block chain real name authentication method according to another embodiment of the present invention. On the basis of the foregoing embodiment, the block chain real-name authentication method provided in this embodiment specifically includes the following steps:
step 401, a mining node in a blockchain network receives video information of a user, a hash value corresponding to the video information, second time information corresponding to the hash value, and identification information of the user, which are sent by a blockchain participating node, wherein the video information includes first image information of an identity document of the user and first time information when the video information is recorded.
And 402, the mining node performs real-name authentication on the block chain participating node according to the hash value, the second time information, the identification information of the user and the video information.
The mining node performs real-name authentication on the block chain participating node according to the hash value, the second time information, the identification information of the user and the video information, and the method comprises the following steps: the mining node verifies whether the hash value corresponding to the video information is correct or not; if the hash value corresponding to the video information is correct, the mining node acquires the face information of the user in the video information and the head portrait information of the user in the first image information, and compares whether the face information of the user in the video information is consistent with the head portrait information of the user in the first image information; if the face information of the user in the video information is consistent with the head portrait information of the user in the first image information, the mining node compares whether the identification information of the user sent by the block chain participation node is consistent with the identification information of the user in the first image information; if the identification information of the user sent by the block chain participation node is consistent with the identification information of the user in the first image information, the mining node compares the first time information with the second time information; and if the time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold value, the mining node determines that the real-name authentication of the block chain participation node passes.
The method described in this embodiment is consistent with the principle of the method described in the above embodiment, and is not described herein again.
According to the embodiment of the invention, the hash value of the video information is generated by the blockchain participating node according to the video information of the user, the video information comprises the first image information of the identity document of the user and the first time information during the recording of the video information, the hash value of the video information is sent to the timestamp server, the timestamp server generates the second time information corresponding to the hash value, and the blockchain participating node sends the hash value, the second time information, the identification information of the user and the video information to the mining node in the blockchain network, so that the mining node performs real-name authentication on the blockchain participating node according to the hash value, the second time information, the identification information of the user and the video information, and the safety of the blockchain network is improved.
Fig. 5 is a schematic structural diagram of a blockchain real-name authentication device according to an embodiment of the present invention, where the blockchain real-name authentication device may be a blockchain participating node in the above embodiments. As shown in fig. 5, the blockchain real-name authentication apparatus 50 according to an embodiment of the present invention may execute a processing procedure provided in an embodiment of a blockchain real-name authentication method, and includes: a generating module 51, a transmitting module 52 and a receiving module 53; the generating module 51 is configured to generate a hash value of video information according to video information of a user, where the video information includes first image information of an identity document of the user and first time information when the video information is recorded; the sending module 52 is configured to send the hash value of the video information to a timestamp server; the receiving module 53 is configured to receive second time information corresponding to the hash value sent by the timestamp server; the sending module 52 is further configured to: and sending the hash value, the second time information, the identification information of the user and the video information to an ore digging node in a block chain network, so that the ore digging node carries out real-name authentication on the block chain participating node according to the hash value, the second time information, the identification information of the user and the video information.
Optionally, the video information includes audio information of the user, and the audio information includes first time information when the video information is recorded.
Optionally, the video information includes second image information of the timer, and the second image information includes first time information when the video information is recorded.
The block chain real-name authentication apparatus in the embodiment shown in fig. 5 can be used to implement the technical solution of the above method embodiment, and the implementation principle and technical effect are similar, which are not described herein again.
Fig. 6 is a schematic structural diagram of a blockchain real-name authentication device according to an embodiment of the present invention, where the blockchain real-name authentication device may be a mining node in the above embodiment. As shown in fig. 6, the blockchain real-name authentication apparatus 60 includes: a receiving module 61 and an authentication module 62; the receiving module 61 is configured to receive video information of a user, a hash value corresponding to the video information, second time information corresponding to the hash value, and identification information of the user, where the video information includes first image information of an identity document of the user and first time information when the video information is recorded, and the video information is sent by a blockchain participating node; the authentication module 62 is configured to perform real-name authentication on the blockchain participating node according to the hash value, the second time information, the identification information of the user, and the video information.
Optionally, the authentication module 62 includes: an authentication unit 621, an acquisition unit 622, a comparison unit 623, a determination unit 624; the verification unit 621 is configured to verify whether the hash value corresponding to the video information is correct; the obtaining unit 622 is configured to obtain, when the hash value corresponding to the video information is correct, the face information of the user in the video information and the avatar information of the user in the first image information; the comparing unit 623 is configured to compare whether the face information of the user in the video information and the avatar information of the user in the first image information are consistent; the comparing unit 623 is further configured to compare whether the identification information of the user sent by the blockchain participating node is consistent with the identification information of the user in the first image information when the face information of the user in the video information is consistent with the avatar information of the user in the first image information; the comparing unit 623 is further configured to compare the first time information with the second time information when the identification information of the user sent by the blockchain participating node is consistent with the identification information of the user in the first image information; the determining unit 624 is configured to determine that the real-name authentication of the blockchain participating node passes when a time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold.
The block chain real-name authentication apparatus in the embodiment shown in fig. 6 can be used to implement the technical solution of the above method embodiment, and the implementation principle and technical effect are similar, and are not described herein again.
Fig. 7 is a schematic structural diagram of a blockchain node according to an embodiment of the present invention. The block link point provided by the embodiment of the present invention may execute the processing procedure provided by the block chain real-name authentication method embodiment, as shown in fig. 7, the block link point 70 includes a memory 71, a processor 72, a computer program, and a communication interface 73; wherein a computer program is stored in the memory 71 and configured to execute the blockchain real name authentication method described in the above embodiments by the processor 72.
The block link points of the embodiment shown in fig. 7 can be used to implement the technical solution of the above method embodiment, and the implementation principle and technical effect are similar, and are not described herein again.
In addition, the present embodiment also provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the blockchain real-name authentication method described in the above embodiments.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A blockchain real name authentication method is characterized by comprising the following steps:
generating a hash value of video information by a block chain participating node according to the video information of a user, wherein the video information comprises first image information of an identity document of the user and first time information when the video information is recorded;
the block chain participating node sends the hash value of the video information to a timestamp server;
the block chain participating node receives second time information corresponding to the hash value sent by the timestamp server;
the block chain participating node sends the hash value, the second time information, the identification information of the user and the video information to an ore digging node in a block chain network, so that the ore digging node carries out real-name authentication on the block chain participating node according to the hash value, the second time information, the identification information of the user and the video information;
the hash value, the second time information, the identification information of the user and the video information are used for verifying the block chain participation node, so that the mining node verifies whether the hash value corresponding to the video information is correct;
if the hash value corresponding to the video information is correct, the mining node acquires the face information of the user in the video information and the head portrait information of the user in the first image information, and compares whether the face information of the user in the video information is consistent with the head portrait information of the user in the first image information;
if the face information of the user in the video information is consistent with the head portrait information of the user in the first image information, the mining node compares whether the identification information of the user sent by the block chain participation node is consistent with the identification information of the user in the first image information;
if the identification information of the user sent by the block chain participation node is consistent with the identification information of the user in the first image information, the mining node compares the first time information with the second time information;
and if the time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold value, the mining node determines that the real-name authentication of the block chain participation node passes.
2. The method of claim 1, wherein the video information comprises audio information of the user, and wherein the audio information comprises first time information of the recording of the video information.
3. The method of claim 1, wherein the video information comprises second image information of a timer, and the second image information comprises first time information of the recording of the video information.
4. A blockchain real name authentication method is characterized by comprising the following steps:
a mining node in a block chain network receives video information of a user, a hash value corresponding to the video information, second time information corresponding to the hash value and identification information of the user, wherein the video information is sent by a block chain participating node and comprises first image information of an identity document of the user and first time information when the video information is recorded;
the mining node performs real-name authentication on the block chain participation node according to the hash value, the second time information, the identification information of the user and the video information;
the mining node performs real-name authentication on the block chain participating node according to the hash value, the second time information, the identification information of the user and the video information, and the method comprises the following steps:
the mining node verifies whether the hash value corresponding to the video information is correct or not;
if the hash value corresponding to the video information is correct, the mining node acquires the face information of the user in the video information and the head portrait information of the user in the first image information, and compares whether the face information of the user in the video information is consistent with the head portrait information of the user in the first image information;
if the face information of the user in the video information is consistent with the head portrait information of the user in the first image information, the mining node compares whether the identification information of the user sent by the block chain participation node is consistent with the identification information of the user in the first image information;
if the identification information of the user sent by the block chain participation node is consistent with the identification information of the user in the first image information, the mining node compares the first time information with the second time information;
and if the time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold value, the mining node determines that the real-name authentication of the block chain participation node passes.
5. A blockchain real name authentication apparatus, comprising:
the generating module is used for generating a hash value of the video information according to the video information of a user, wherein the video information comprises first image information of the identity document of the user and first time information when the video information is recorded;
the sending module is used for sending the hash value of the video information to a timestamp server;
the receiving module is used for receiving second time information corresponding to the hash value sent by the timestamp server;
the sending module is further configured to: sending the hash value, the second time information, the identification information of the user and the video information to a mining node in a block chain network, so that the mining node performs real-name authentication on a block chain participating node according to the hash value, the second time information, the identification information of the user and the video information;
the hash value, the second time information, the identification information of the user and the video information are used for verifying the block chain participation node, so that the mining node verifies whether the hash value corresponding to the video information is correct;
if the hash value corresponding to the video information is correct, the mining node acquires the face information of the user in the video information and the head portrait information of the user in the first image information, and compares whether the face information of the user in the video information is consistent with the head portrait information of the user in the first image information;
if the face information of the user in the video information is consistent with the head portrait information of the user in the first image information, the mining node compares whether the identification information of the user sent by the block chain participation node is consistent with the identification information of the user in the first image information;
if the identification information of the user sent by the block chain participation node is consistent with the identification information of the user in the first image information, the mining node compares the first time information with the second time information;
and if the time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold value, the mining node determines that the real-name authentication of the block chain participation node passes.
6. The blockchain real-name authentication device of claim 5, wherein the video information includes audio information of the user, and the audio information includes first time information when the video information is recorded.
7. The blockchain real name authentication device according to claim 5, wherein the video information includes second image information of a timer, and the second image information includes first time information when the video information is recorded.
8. A blockchain real name authentication apparatus, comprising:
the receiving module is used for receiving video information of a user, a hash value corresponding to the video information, second time information corresponding to the hash value and identification information of the user, wherein the video information comprises first image information of an identity document of the user and first time information when the video information is recorded;
the authentication module is used for performing real-name authentication on the block chain participation node according to the hash value, the second time information, the identification information of the user and the video information;
the authentication module includes: the device comprises a verification unit, an acquisition unit, a comparison unit and a determination unit;
the verification unit is used for verifying whether the hash value corresponding to the video information is correct or not;
the acquiring unit is used for acquiring the face information of the user in the video information and the head portrait information of the user in the first image information when the hash value corresponding to the video information is correct;
the comparison unit is used for comparing whether the face information of the user in the video information is consistent with the head portrait information of the user in the first image information;
the comparison unit is further configured to compare whether the identification information of the user sent by the blockchain participation node is consistent with the identification information of the user in the first image information when the face information of the user in the video information is consistent with the avatar information of the user in the first image information;
the comparing unit is further configured to compare the first time information with the second time information when the identification information of the user sent by the blockchain participating node is consistent with the identification information of the user in the first image information;
the determining unit is configured to determine that real-name authentication of the blockchain participating node passes when a time difference between the first time information and the second time information is smaller than or equal to a preset time difference threshold.
9. A block link point, comprising:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of any one of claims 1-4.
10. A computer-readable storage medium, having stored thereon a computer program for execution by a processor to perform the method of any one of claims 1-4.
CN201810820251.2A 2018-07-24 2018-07-24 Block chain real-name authentication method, device, equipment and storage medium Active CN109067721B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810820251.2A CN109067721B (en) 2018-07-24 2018-07-24 Block chain real-name authentication method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810820251.2A CN109067721B (en) 2018-07-24 2018-07-24 Block chain real-name authentication method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109067721A CN109067721A (en) 2018-12-21
CN109067721B true CN109067721B (en) 2021-02-19

Family

ID=64836327

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810820251.2A Active CN109067721B (en) 2018-07-24 2018-07-24 Block chain real-name authentication method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109067721B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111132155B (en) * 2019-12-30 2023-11-17 江苏全链通信息科技有限公司 5G secure communication method, device and storage medium
CN111949953B (en) * 2020-06-23 2021-10-22 卓尔智联(武汉)研究院有限公司 Identity authentication method, system and device based on block chain and computer equipment
CN112784285A (en) * 2020-12-29 2021-05-11 上海律桐智能信息科技有限公司 Evidence obtaining system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
WO2017079795A1 (en) * 2015-11-09 2017-05-18 Roger Hanna A distributed user profile identity verification system for e-commerce transaction security
CN107276765A (en) * 2017-07-04 2017-10-20 中国联合网络通信集团有限公司 The processing method and processing device known together in block chain
CN107403303A (en) * 2017-06-16 2017-11-28 兴业数字金融服务(上海)股份有限公司 A kind of signature method for the electronic contract system that card is deposited based on block chain
CN107579979A (en) * 2017-09-07 2018-01-12 成都理工大学 The sharing query method of electronic health record based on block chain technology
CN107682378A (en) * 2017-11-22 2018-02-09 国民认证科技(北京)有限公司 A kind of real name identification method and system based on block chain
CN108876375A (en) * 2018-06-29 2018-11-23 全链通有限公司 Block chain real name participatory approaches and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015066511A1 (en) * 2013-11-01 2015-05-07 Ncluud Corporation Determining identity of individuals using authenticators
US10432411B2 (en) * 2016-05-10 2019-10-01 Acronis International Gmbh System and method for file time-stamping using a blockchain network

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017079795A1 (en) * 2015-11-09 2017-05-18 Roger Hanna A distributed user profile identity verification system for e-commerce transaction security
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN107403303A (en) * 2017-06-16 2017-11-28 兴业数字金融服务(上海)股份有限公司 A kind of signature method for the electronic contract system that card is deposited based on block chain
CN107276765A (en) * 2017-07-04 2017-10-20 中国联合网络通信集团有限公司 The processing method and processing device known together in block chain
CN107579979A (en) * 2017-09-07 2018-01-12 成都理工大学 The sharing query method of electronic health record based on block chain technology
CN107682378A (en) * 2017-11-22 2018-02-09 国民认证科技(北京)有限公司 A kind of real name identification method and system based on block chain
CN108876375A (en) * 2018-06-29 2018-11-23 全链通有限公司 Block chain real name participatory approaches and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
网络可信身份认证技术问题研究;宋宪荣;《网络空间安全》;20180325;第9卷(第3期);第69-77页 *

Also Published As

Publication number Publication date
CN109067721A (en) 2018-12-21

Similar Documents

Publication Publication Date Title
CN108881296B (en) Block chain real-name authentication method, device, equipment and storage medium
CN108900528B (en) Block chain real-name authentication method, device, equipment and storage medium
CN109194481B (en) Block chain real-name authentication method, device, equipment and storage medium
CN109067724B (en) Block chain data transaction method, device, equipment and storage medium
CN109067721B (en) Block chain real-name authentication method, device, equipment and storage medium
CN108989043B (en) Block processing method and device and block link points
CN109087100B (en) Key distribution method, device, equipment and storage medium
CN109104285B (en) Block chain real-name authentication method, device, equipment and storage medium
CN109118360B (en) Block chain account checking method, device, equipment and storage medium
CN104504767A (en) Check-in information verification method and system
CN108596636B (en) Anti-counterfeiting method and device and terminal equipment
CN101316167A (en) Registration and login method of safety authentication, system and mobile terminal
CN108683727B (en) Block processing method and main node
JP2022529837A (en) Parameter transmission method and equipment
CN108876611B (en) Transaction information processing method and device and block link points
CN111065101A (en) 5G communication information encryption and decryption method and device based on block chain and storage medium
CN109379199B (en) User credit processing method, device, equipment and storage medium
CN110971830B (en) Anti-shake method for video shooting and related device
CN108768961B (en) Storage processing method and home gateway
CN102882851A (en) Generating method of address book and server
CN109087096B (en) Block chain account checking method, device, equipment and storage medium
CN108985765A (en) Enterprise user information processing method, equipment and storage medium
CN109639715B (en) Method, device and equipment for avoiding double-flower attack and computer readable storage medium
CN108768733B (en) Block chain account book processing method and device and block chain link points
CN111132155B (en) 5G secure communication method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant