CN109145647A - A kind of trusted identity verifying system and method based on block chain - Google Patents

A kind of trusted identity verifying system and method based on block chain Download PDF

Info

Publication number
CN109145647A
CN109145647A CN201811033985.2A CN201811033985A CN109145647A CN 109145647 A CN109145647 A CN 109145647A CN 201811033985 A CN201811033985 A CN 201811033985A CN 109145647 A CN109145647 A CN 109145647A
Authority
CN
China
Prior art keywords
identity
user
node
block chain
trusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811033985.2A
Other languages
Chinese (zh)
Inventor
聂晶
潘浩
周洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Smile Technology Co Ltd
Original Assignee
Wuhan Smile Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Smile Technology Co Ltd filed Critical Wuhan Smile Technology Co Ltd
Priority to CN201811033985.2A priority Critical patent/CN109145647A/en
Publication of CN109145647A publication Critical patent/CN109145647A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Educational Technology (AREA)
  • Bioethics (AREA)
  • Strategic Management (AREA)
  • Educational Administration (AREA)
  • Tourism & Hospitality (AREA)
  • General Physics & Mathematics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Primary Health Care (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention proposes a kind of, and the trusted identity based on block chain verifies system and method, traditional data storage and verification method are replaced by using block chain technology, realize decentralization, centralization agency is not needed, it is directly realized high efficiency, large-scale interactive mode, and user cannot easily distort correct information, once certain nodal information changes, entirely each node in " block chain " can all perceive this behavior, it is ensured that the authenticity and uniqueness of related data;By using authentication server, different application permissions can be distributed for different users, realize effectively management and information protection;Whole system can prevent user information to be tampered, it is ensured that the authenticity and uniqueness of related data distribute different application permissions, the security reliability of safeguards system for different user.

Description

A kind of trusted identity verifying system and method based on block chain
Technical field
The present invention relates to educational management field more particularly to a kind of trusted identity verifying systems and side based on block chain Method.
Background technique
In most of network application processes, progress identity is required between the client and server of user's operation and is tested Card, but due to the safety defect of client itself and there are security risk, various computer viruses or rogue program are easy to control Client jurisdiction, thus between client and server using password verified when, password be easy by centre intercept and capture, Yong Hushen Part is easy to be falsely used, and this verification method needs a central server, and central server exists by virus, hacker or evil The security risk that generates after meaning process control, and data are easy to be tampered, with student's all one's life when the identity information of student Important information is particularly susceptible to attack and distort, and block chain technology is one kind sequentially in time by data block with suitable A kind of linked data structure that the connected mode of sequence is combined into, and can not distorting of being guaranteed in a manner of cryptography and can not forge Distributed account book, using block chain technology can with decentralization, can not distort and can not forge, so, it is now desired to Yi Zhongji System and method are verified in the decentralization of block chain and anti-tamper trusted identity.
Summary of the invention
In view of this, the invention proposes a kind of decentralizations based on block chain and anti-tamper trusted identity to verify system System and method.
The technical scheme of the present invention is realized as follows: the present invention provides a kind of, the trusted identity based on block chain is verified Method, comprising the following steps:
S101, dummy node is established for each school, training organization, association and egiional board of education;
S102, block chain identity management module is constructed for each dummy node, it will by block chain identity management module The identity information of each agency node is connected on block chain identity management system, and is established to trust between each node and be closed System, each node connect to form alliance's chain;
S103, some node initiate information modification application, and preselected node in alliance's chain is waited to verify the node identity information;
S104, when preselected node recognizes the identity information of the node, which enters trusted identity card authentication server Identity verification and authorization check are carried out, otherwise, which cannot modify identity information.
On the basis of above technical scheme, it is preferred that block chain identity management module storage user's is credible in S102 Identity information automatically updates the trusted identity information of user.
On the basis of above technical scheme, it is preferred that preselected node is to select inside alliance's chain in S103 alliance chain Node, and it is appointed as book keeping operation people.
Still more preferably, the number of preselected node is more than half of alliance's chain interior joint sum.
A kind of trusted identity based on block chain of the invention verifies system comprising login module further includes identity pipe Manage module, authentication module and authentication server;
Identity management module is connected with authentication module signal, and authentication module is connected with authentication server signal;
Identity management module stores the initial identity information of user, and using the identity information of Encryption Algorithm protection user;
Authentication module verifies the identity information of user when user initiates modification application;
Authentication server carries out secondary verifying to the identity information of user, and user is classified, for different user point With different application permissions.
On the basis of above technical scheme, it is preferred that the initial identity information of user includes: name, identity, identity card Number, certificate photo, class.
On the basis of above technical scheme, it is preferred that identity management module includes that storage unit and trusted identity card are raw At unit;
Storage unit is connect with trusted identity card generation unit and authentication module signal respectively;
The identity information of storage unit storage user;
Trusted identity card generation unit automatically generates trusted identity card according to the identity information of user.
On the basis of above technical scheme, it is preferred that authentication server includes authorization check unit and identity verification list Member;
Identity verification unit is connect with authentication module and authorization check cell signal respectively;
The type of identity verification unit identification user;
Authorization check unit is that different user types distribute different permissions.
A kind of trusted identity verifying system and method based on block chain of the invention have following compared with the existing technology The utility model has the advantages that
(1) traditional data storage and verification method are replaced by using block chain technology, are realized decentralization, that is, are not required to It wants centralization to act on behalf of, is directly realized high efficiency, large-scale interactive mode, and user cannot easily carry out correct information It distorts, once certain nodal information changes, each node in entire " block chain " can all perceive this behavior, it is ensured that related data Authenticity and uniqueness;
(2) by using authentication server, different application permissions can be distributed for different users, realize effectively management And information protection;
(3) whole system can prevent user information to be tampered, it is ensured that the authenticity and uniqueness of related data, for difference User distributes different application permissions, the security reliability of safeguards system.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow chart of the trusted identity verification method based on block chain of the present invention;
Fig. 2 is the structure chart that a kind of trusted identity based on block chain of the present invention verifies system.
Specific embodiment
Below in conjunction with embodiment of the present invention, the technical solution in embodiment of the present invention is carried out clearly and completely Description, it is clear that described embodiment is only some embodiments of the invention, rather than whole embodiments.Base Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all Other embodiments shall fall within the protection scope of the present invention.
Embodiment one,
As shown in Figure 1, a kind of trusted identity verification method based on block chain of the invention comprising following steps:
S101, dummy node is established for each school, training organization, association and egiional board of education;
S102, the block chain identity management module that storage user's trusted identity information is constructed for each dummy node, lead to It crosses block chain identity management module the identity information of each agency node is connected on block chain identity management system, and is each Trusting relationship is established between a node, each node connects to form alliance's chain;
S103, some node initiate information modification application, and the preselected node selected inside alliance's chain is waited to verify the node Identity information;
S104, when preselected node recognizes the identity information of the node, which enters trusted identity card authentication server Identity verification and authorization check are carried out, otherwise, which cannot modify identity information.
Wherein, block chain identity management module periodically automatically updates the trusted identity information of user, and preselected node is also referred to It is set to book keeping operation people, the number of preselected node is more than half of alliance's chain interior joint sum, when certain node initiates modification application, After only most of nodes recognize in alliance's chain, which could modify identity information.
Wherein, the method for trusting relationship is established are as follows:
S201, node A initiate to trade to node B, and node A records Transaction Information on the account book of oneself, and releases;
The Transaction Information of S202, Node-B receiver node A publication, node B record Transaction Information on the account book of oneself, into Row transaction, process of exchange is released;
S203, node A receive the message of node B publication, and transaction is completed, and just establish to trust between node A and node B and close System.
Embodiment two,
As shown in Fig. 2, a kind of trusted identity based on block chain of the invention verifies system comprising it includes logging in mould Block, identity management module, authentication module and authentication server;
Identity management module stores the initial identity information of user, and the identity information of user is protected using Encryption Algorithm, Periodically automatically update the identity information of user.Identity management module includes: storage unit and trusted identity card generation unit;Storage The identity information of unit storage user;Trusted identity card generation unit automatically generates trusted identity according to the identity information of user Card.Storage unit is connect with trusted identity card generation unit and authentication module signal respectively.
Authentication module verifies the identity information of user when user initiates modification application.The method of verifying It is: modification application is sent to other users, other users are that user progress identity is tested according to the trusting relationship in alliance's chain Card, after most users recognize the identity information of the user only in alliance's chain, which just can be carried out identity and modifies.Verifying The identity information of the user of user includes: name, identity, identification card number, certificate photo, class.Authentication module respectively with body Part management module is connected with authentication server signal.
Authentication server carries out secondary verifying to the identity information of user, user is classified, for different user point With different application permissions.Authentication server includes: authorization check unit and identity verification unit;Identity verification unit is to entrance User information in authentication server carries out type identification;Authorization check unit is that different user types distribute different permissions, The range that different types of user enters campus system exercise rights is different.Identity verification unit respectively with authentication module and The connection of authorization check cell signal.
The foregoing is merely better embodiments of the invention, are not intended to limit the invention, all of the invention Within spirit and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (8)

1. a kind of trusted identity verification method based on block chain, it is characterised in that: the following steps are included:
S101, dummy node is established for each school, training organization, association and egiional board of education;
S102, block chain identity management module is constructed for each dummy node, it will be each by block chain identity management module The identity information of agency node is connected on block chain identity management system, and establishes trusting relationship between each node, respectively Node connects to form alliance's chain;
S103, some node initiate information modification application, and preselected node in alliance's chain is waited to verify the node identity information;
S104, when preselected node recognizes the identity information of the node, the node enter trusted identity card authentication server progress Identity verification and authorization check, otherwise, the node can not modify identity information.
2. a kind of trusted identity verification method based on block chain as described in claim 1, it is characterised in that: in the S102 Block chain identity management module stores the trusted identity information of user, automatically updates the trusted identity information of user.
3. a kind of trusted identity verification method based on block chain as described in claim 1, it is characterised in that: the S103 connection Preselected node is the node selected inside alliance's chain in alliance's chain, and is appointed as book keeping operation people.
4. a kind of trusted identity verification method based on block chain as claimed in claim 3, it is characterised in that: the pre-selection section The number of point is more than half of alliance's chain interior joint sum.
5. a kind of trusted identity based on block chain verifies system comprising login module, it is characterised in that: further include identity pipe Manage module, authentication module and authentication server;
The identity management module is connected with authentication module signal, and authentication module is connected with authentication server signal;
The initial identity information of the identity management module storage user, and using the identity information of Encryption Algorithm protection user;
The authentication module verifies the identity information of user when user initiates modification application;
The authentication server carries out secondary verifying to the identity information of user, and user is classified, for different user point With different application permissions.
6. a kind of trusted identity based on block chain as claimed in claim 5 verifies system, it is characterised in that: the user's Initial identity information includes: name, identity, identification card number, certificate photo, class.
7. a kind of trusted identity based on block chain as claimed in claim 5 verifies system, it is characterised in that: the identity pipe Managing module includes storage unit and trusted identity card generation unit;
The storage unit is connect with trusted identity card generation unit and authentication module signal respectively;
The identity information of the storage unit storage user;
The trusted identity card generation unit automatically generates trusted identity card according to the identity information of user.
8. a kind of trusted identity based on block chain as claimed in claim 5 verifies system, it is characterised in that: the authentication clothes Business device includes authorization check unit and identity verification unit;
The identity verification unit is connect with authentication module and authorization check cell signal respectively;
The type of the identity verification unit identification user;
The authorization check unit is that different user types distribute different permissions.
CN201811033985.2A 2018-09-05 2018-09-05 A kind of trusted identity verifying system and method based on block chain Pending CN109145647A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811033985.2A CN109145647A (en) 2018-09-05 2018-09-05 A kind of trusted identity verifying system and method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811033985.2A CN109145647A (en) 2018-09-05 2018-09-05 A kind of trusted identity verifying system and method based on block chain

Publications (1)

Publication Number Publication Date
CN109145647A true CN109145647A (en) 2019-01-04

Family

ID=64827179

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811033985.2A Pending CN109145647A (en) 2018-09-05 2018-09-05 A kind of trusted identity verifying system and method based on block chain

Country Status (1)

Country Link
CN (1) CN109145647A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125745A (en) * 2019-10-10 2020-05-08 深圳龙之牌汽车有限公司 Block chain-based data management system for Internet
CN111199026A (en) * 2019-12-26 2020-05-26 安徽讯呼信息科技有限公司 Block chain service system
CN112215609A (en) * 2020-11-05 2021-01-12 深圳市瀚兰区块链地产有限公司 House property user identity authentication method and device based on super account book and electronic equipment
CN114385996A (en) * 2022-01-10 2022-04-22 北京新华夏信息技术有限公司 Block chain consensus method and system based on node identity hierarchical management
CN116644401A (en) * 2023-07-21 2023-08-25 山东知临信息技术有限责任公司 Identity verification method, device, equipment and medium based on blockchain technology

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503994A (en) * 2016-11-02 2017-03-15 西安电子科技大学 Block chain private data access control method based on encryption attribute
CN107480555A (en) * 2017-08-01 2017-12-15 中国联合网络通信集团有限公司 Database-access rights control method and equipment based on block chain
CN108389045A (en) * 2018-02-01 2018-08-10 北京泰尔英福网络科技有限责任公司 Network identity root zone data managing method based on block chain technology and system
CN107733855B (en) * 2017-08-31 2019-11-05 中国科学院信息工程研究所 A kind of block catenary system and application method that can support publicly-owned chain, alliance's chain and privately owned chain simultaneously

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503994A (en) * 2016-11-02 2017-03-15 西安电子科技大学 Block chain private data access control method based on encryption attribute
CN107480555A (en) * 2017-08-01 2017-12-15 中国联合网络通信集团有限公司 Database-access rights control method and equipment based on block chain
CN107733855B (en) * 2017-08-31 2019-11-05 中国科学院信息工程研究所 A kind of block catenary system and application method that can support publicly-owned chain, alliance's chain and privately owned chain simultaneously
CN108389045A (en) * 2018-02-01 2018-08-10 北京泰尔英福网络科技有限责任公司 Network identity root zone data managing method based on block chain technology and system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125745A (en) * 2019-10-10 2020-05-08 深圳龙之牌汽车有限公司 Block chain-based data management system for Internet
CN111199026A (en) * 2019-12-26 2020-05-26 安徽讯呼信息科技有限公司 Block chain service system
CN111199026B (en) * 2019-12-26 2023-05-23 安徽讯呼信息科技有限公司 Block chain service system
CN112215609A (en) * 2020-11-05 2021-01-12 深圳市瀚兰区块链地产有限公司 House property user identity authentication method and device based on super account book and electronic equipment
CN114385996A (en) * 2022-01-10 2022-04-22 北京新华夏信息技术有限公司 Block chain consensus method and system based on node identity hierarchical management
CN116644401A (en) * 2023-07-21 2023-08-25 山东知临信息技术有限责任公司 Identity verification method, device, equipment and medium based on blockchain technology
CN116644401B (en) * 2023-07-21 2023-10-20 山东知临信息技术有限责任公司 Identity verification method, device, equipment and medium based on blockchain technology

Similar Documents

Publication Publication Date Title
CN109145647A (en) A kind of trusted identity verifying system and method based on block chain
CN107888382B (en) A kind of methods, devices and systems of the digital identity verifying based on block chain
KR102181600B1 (en) Method for sso service through blockchain, and terminal and server using the same
KR102254499B1 (en) Method for oauth service through blockchain, and terminal and server using the same
EP3764308A1 (en) Blockchain-based system, and electronic apparatus and method in the system
CN109447645B (en) Equipment linkage method, block chain network and storage medium
CN113239382A (en) Credible identity model based on block chain intelligent contract
KR102118962B1 (en) Method and server for managing user identity using blockchain network, and method and terminal for verifying user using user identity based on blockchain network
KR102116235B1 (en) Method and server for managing user identity using blockchain network, and method and terminal for verifying user using user identity based on blockchain network
CN106664208A (en) System and method for establishing trust using secure transmission protocols
CN107835176A (en) A kind of network authentication method and platform based on eID
KR102192370B1 (en) Method for oauth service through blockchain, and terminal and server using the same
CN108876669B (en) Course notarization system and method applied to multi-platform education resource sharing
CN104104652A (en) Man-machine identification method, network service access method and corresponding equipment
CN104363207A (en) Multi-factor security enhancement authorization and authentication method
CN111191283A (en) Beidou positioning information security encryption method and device based on alliance block chain
CN109962890A (en) A kind of the authentication service device and node access, user authen method of block chain
CN109299347A (en) A kind of academic information query method and system based on 5G framework and block chain
KR102118935B1 (en) Method and server for managing user identity using blockchain network, and method and terminal for verifying user using user identity based on blockchain network
CN108604990A (en) The application method and device of local authorized certificate in terminal
CN110324344A (en) The method and device of account information certification
CN101547097A (en) Digital media management system and management method based on digital certificate
KR102118947B1 (en) Method and server for managing user identity using blockchain network, and method and terminal for verifying user using user identity based on blockchain network
CN111292211A (en) Credit management method and device
KR102216292B1 (en) Method for sso service through blockchain, and terminal and server using the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190104