CN109145647A - A kind of trusted identity verifying system and method based on block chain - Google Patents
A kind of trusted identity verifying system and method based on block chain Download PDFInfo
- Publication number
- CN109145647A CN109145647A CN201811033985.2A CN201811033985A CN109145647A CN 109145647 A CN109145647 A CN 109145647A CN 201811033985 A CN201811033985 A CN 201811033985A CN 109145647 A CN109145647 A CN 109145647A
- Authority
- CN
- China
- Prior art keywords
- identity
- user
- node
- block chain
- trusted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000012795 verification Methods 0.000 claims description 19
- 238000013475 authorization Methods 0.000 claims description 12
- 230000004048 modification Effects 0.000 claims description 9
- 238000012986 modification Methods 0.000 claims description 9
- 230000008520 organization Effects 0.000 claims description 3
- 238000012549 training Methods 0.000 claims description 3
- 238000007726 management method Methods 0.000 abstract description 18
- 238000005516 engineering process Methods 0.000 abstract description 6
- 238000013500 data storage Methods 0.000 abstract description 2
- 238000013524 data verification Methods 0.000 abstract description 2
- 230000002452 interceptive effect Effects 0.000 abstract description 2
- 241000700605 Viruses Species 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000004886 process control Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
- G06Q50/205—Education administration or guidance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Educational Technology (AREA)
- Bioethics (AREA)
- Strategic Management (AREA)
- Educational Administration (AREA)
- Tourism & Hospitality (AREA)
- General Physics & Mathematics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Primary Health Care (AREA)
- Human Resources & Organizations (AREA)
- Economics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention proposes a kind of, and the trusted identity based on block chain verifies system and method, traditional data storage and verification method are replaced by using block chain technology, realize decentralization, centralization agency is not needed, it is directly realized high efficiency, large-scale interactive mode, and user cannot easily distort correct information, once certain nodal information changes, entirely each node in " block chain " can all perceive this behavior, it is ensured that the authenticity and uniqueness of related data;By using authentication server, different application permissions can be distributed for different users, realize effectively management and information protection;Whole system can prevent user information to be tampered, it is ensured that the authenticity and uniqueness of related data distribute different application permissions, the security reliability of safeguards system for different user.
Description
Technical field
The present invention relates to educational management field more particularly to a kind of trusted identity verifying systems and side based on block chain
Method.
Background technique
In most of network application processes, progress identity is required between the client and server of user's operation and is tested
Card, but due to the safety defect of client itself and there are security risk, various computer viruses or rogue program are easy to control
Client jurisdiction, thus between client and server using password verified when, password be easy by centre intercept and capture, Yong Hushen
Part is easy to be falsely used, and this verification method needs a central server, and central server exists by virus, hacker or evil
The security risk that generates after meaning process control, and data are easy to be tampered, with student's all one's life when the identity information of student
Important information is particularly susceptible to attack and distort, and block chain technology is one kind sequentially in time by data block with suitable
A kind of linked data structure that the connected mode of sequence is combined into, and can not distorting of being guaranteed in a manner of cryptography and can not forge
Distributed account book, using block chain technology can with decentralization, can not distort and can not forge, so, it is now desired to Yi Zhongji
System and method are verified in the decentralization of block chain and anti-tamper trusted identity.
Summary of the invention
In view of this, the invention proposes a kind of decentralizations based on block chain and anti-tamper trusted identity to verify system
System and method.
The technical scheme of the present invention is realized as follows: the present invention provides a kind of, the trusted identity based on block chain is verified
Method, comprising the following steps:
S101, dummy node is established for each school, training organization, association and egiional board of education;
S102, block chain identity management module is constructed for each dummy node, it will by block chain identity management module
The identity information of each agency node is connected on block chain identity management system, and is established to trust between each node and be closed
System, each node connect to form alliance's chain;
S103, some node initiate information modification application, and preselected node in alliance's chain is waited to verify the node identity information;
S104, when preselected node recognizes the identity information of the node, which enters trusted identity card authentication server
Identity verification and authorization check are carried out, otherwise, which cannot modify identity information.
On the basis of above technical scheme, it is preferred that block chain identity management module storage user's is credible in S102
Identity information automatically updates the trusted identity information of user.
On the basis of above technical scheme, it is preferred that preselected node is to select inside alliance's chain in S103 alliance chain
Node, and it is appointed as book keeping operation people.
Still more preferably, the number of preselected node is more than half of alliance's chain interior joint sum.
A kind of trusted identity based on block chain of the invention verifies system comprising login module further includes identity pipe
Manage module, authentication module and authentication server;
Identity management module is connected with authentication module signal, and authentication module is connected with authentication server signal;
Identity management module stores the initial identity information of user, and using the identity information of Encryption Algorithm protection user;
Authentication module verifies the identity information of user when user initiates modification application;
Authentication server carries out secondary verifying to the identity information of user, and user is classified, for different user point
With different application permissions.
On the basis of above technical scheme, it is preferred that the initial identity information of user includes: name, identity, identity card
Number, certificate photo, class.
On the basis of above technical scheme, it is preferred that identity management module includes that storage unit and trusted identity card are raw
At unit;
Storage unit is connect with trusted identity card generation unit and authentication module signal respectively;
The identity information of storage unit storage user;
Trusted identity card generation unit automatically generates trusted identity card according to the identity information of user.
On the basis of above technical scheme, it is preferred that authentication server includes authorization check unit and identity verification list
Member;
Identity verification unit is connect with authentication module and authorization check cell signal respectively;
The type of identity verification unit identification user;
Authorization check unit is that different user types distribute different permissions.
A kind of trusted identity verifying system and method based on block chain of the invention have following compared with the existing technology
The utility model has the advantages that
(1) traditional data storage and verification method are replaced by using block chain technology, are realized decentralization, that is, are not required to
It wants centralization to act on behalf of, is directly realized high efficiency, large-scale interactive mode, and user cannot easily carry out correct information
It distorts, once certain nodal information changes, each node in entire " block chain " can all perceive this behavior, it is ensured that related data
Authenticity and uniqueness;
(2) by using authentication server, different application permissions can be distributed for different users, realize effectively management
And information protection;
(3) whole system can prevent user information to be tampered, it is ensured that the authenticity and uniqueness of related data, for difference
User distributes different application permissions, the security reliability of safeguards system.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow chart of the trusted identity verification method based on block chain of the present invention;
Fig. 2 is the structure chart that a kind of trusted identity based on block chain of the present invention verifies system.
Specific embodiment
Below in conjunction with embodiment of the present invention, the technical solution in embodiment of the present invention is carried out clearly and completely
Description, it is clear that described embodiment is only some embodiments of the invention, rather than whole embodiments.Base
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts all
Other embodiments shall fall within the protection scope of the present invention.
Embodiment one,
As shown in Figure 1, a kind of trusted identity verification method based on block chain of the invention comprising following steps:
S101, dummy node is established for each school, training organization, association and egiional board of education;
S102, the block chain identity management module that storage user's trusted identity information is constructed for each dummy node, lead to
It crosses block chain identity management module the identity information of each agency node is connected on block chain identity management system, and is each
Trusting relationship is established between a node, each node connects to form alliance's chain;
S103, some node initiate information modification application, and the preselected node selected inside alliance's chain is waited to verify the node
Identity information;
S104, when preselected node recognizes the identity information of the node, which enters trusted identity card authentication server
Identity verification and authorization check are carried out, otherwise, which cannot modify identity information.
Wherein, block chain identity management module periodically automatically updates the trusted identity information of user, and preselected node is also referred to
It is set to book keeping operation people, the number of preselected node is more than half of alliance's chain interior joint sum, when certain node initiates modification application,
After only most of nodes recognize in alliance's chain, which could modify identity information.
Wherein, the method for trusting relationship is established are as follows:
S201, node A initiate to trade to node B, and node A records Transaction Information on the account book of oneself, and releases;
The Transaction Information of S202, Node-B receiver node A publication, node B record Transaction Information on the account book of oneself, into
Row transaction, process of exchange is released;
S203, node A receive the message of node B publication, and transaction is completed, and just establish to trust between node A and node B and close
System.
Embodiment two,
As shown in Fig. 2, a kind of trusted identity based on block chain of the invention verifies system comprising it includes logging in mould
Block, identity management module, authentication module and authentication server;
Identity management module stores the initial identity information of user, and the identity information of user is protected using Encryption Algorithm,
Periodically automatically update the identity information of user.Identity management module includes: storage unit and trusted identity card generation unit;Storage
The identity information of unit storage user;Trusted identity card generation unit automatically generates trusted identity according to the identity information of user
Card.Storage unit is connect with trusted identity card generation unit and authentication module signal respectively.
Authentication module verifies the identity information of user when user initiates modification application.The method of verifying
It is: modification application is sent to other users, other users are that user progress identity is tested according to the trusting relationship in alliance's chain
Card, after most users recognize the identity information of the user only in alliance's chain, which just can be carried out identity and modifies.Verifying
The identity information of the user of user includes: name, identity, identification card number, certificate photo, class.Authentication module respectively with body
Part management module is connected with authentication server signal.
Authentication server carries out secondary verifying to the identity information of user, user is classified, for different user point
With different application permissions.Authentication server includes: authorization check unit and identity verification unit;Identity verification unit is to entrance
User information in authentication server carries out type identification;Authorization check unit is that different user types distribute different permissions,
The range that different types of user enters campus system exercise rights is different.Identity verification unit respectively with authentication module and
The connection of authorization check cell signal.
The foregoing is merely better embodiments of the invention, are not intended to limit the invention, all of the invention
Within spirit and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (8)
1. a kind of trusted identity verification method based on block chain, it is characterised in that: the following steps are included:
S101, dummy node is established for each school, training organization, association and egiional board of education;
S102, block chain identity management module is constructed for each dummy node, it will be each by block chain identity management module
The identity information of agency node is connected on block chain identity management system, and establishes trusting relationship between each node, respectively
Node connects to form alliance's chain;
S103, some node initiate information modification application, and preselected node in alliance's chain is waited to verify the node identity information;
S104, when preselected node recognizes the identity information of the node, the node enter trusted identity card authentication server progress
Identity verification and authorization check, otherwise, the node can not modify identity information.
2. a kind of trusted identity verification method based on block chain as described in claim 1, it is characterised in that: in the S102
Block chain identity management module stores the trusted identity information of user, automatically updates the trusted identity information of user.
3. a kind of trusted identity verification method based on block chain as described in claim 1, it is characterised in that: the S103 connection
Preselected node is the node selected inside alliance's chain in alliance's chain, and is appointed as book keeping operation people.
4. a kind of trusted identity verification method based on block chain as claimed in claim 3, it is characterised in that: the pre-selection section
The number of point is more than half of alliance's chain interior joint sum.
5. a kind of trusted identity based on block chain verifies system comprising login module, it is characterised in that: further include identity pipe
Manage module, authentication module and authentication server;
The identity management module is connected with authentication module signal, and authentication module is connected with authentication server signal;
The initial identity information of the identity management module storage user, and using the identity information of Encryption Algorithm protection user;
The authentication module verifies the identity information of user when user initiates modification application;
The authentication server carries out secondary verifying to the identity information of user, and user is classified, for different user point
With different application permissions.
6. a kind of trusted identity based on block chain as claimed in claim 5 verifies system, it is characterised in that: the user's
Initial identity information includes: name, identity, identification card number, certificate photo, class.
7. a kind of trusted identity based on block chain as claimed in claim 5 verifies system, it is characterised in that: the identity pipe
Managing module includes storage unit and trusted identity card generation unit;
The storage unit is connect with trusted identity card generation unit and authentication module signal respectively;
The identity information of the storage unit storage user;
The trusted identity card generation unit automatically generates trusted identity card according to the identity information of user.
8. a kind of trusted identity based on block chain as claimed in claim 5 verifies system, it is characterised in that: the authentication clothes
Business device includes authorization check unit and identity verification unit;
The identity verification unit is connect with authentication module and authorization check cell signal respectively;
The type of the identity verification unit identification user;
The authorization check unit is that different user types distribute different permissions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811033985.2A CN109145647A (en) | 2018-09-05 | 2018-09-05 | A kind of trusted identity verifying system and method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811033985.2A CN109145647A (en) | 2018-09-05 | 2018-09-05 | A kind of trusted identity verifying system and method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109145647A true CN109145647A (en) | 2019-01-04 |
Family
ID=64827179
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811033985.2A Pending CN109145647A (en) | 2018-09-05 | 2018-09-05 | A kind of trusted identity verifying system and method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109145647A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111125745A (en) * | 2019-10-10 | 2020-05-08 | 深圳龙之牌汽车有限公司 | Block chain-based data management system for Internet |
CN111199026A (en) * | 2019-12-26 | 2020-05-26 | 安徽讯呼信息科技有限公司 | Block chain service system |
CN112215609A (en) * | 2020-11-05 | 2021-01-12 | 深圳市瀚兰区块链地产有限公司 | House property user identity authentication method and device based on super account book and electronic equipment |
CN114385996A (en) * | 2022-01-10 | 2022-04-22 | 北京新华夏信息技术有限公司 | Block chain consensus method and system based on node identity hierarchical management |
CN116644401A (en) * | 2023-07-21 | 2023-08-25 | 山东知临信息技术有限责任公司 | Identity verification method, device, equipment and medium based on blockchain technology |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503994A (en) * | 2016-11-02 | 2017-03-15 | 西安电子科技大学 | Block chain private data access control method based on encryption attribute |
CN107480555A (en) * | 2017-08-01 | 2017-12-15 | 中国联合网络通信集团有限公司 | Database-access rights control method and equipment based on block chain |
CN108389045A (en) * | 2018-02-01 | 2018-08-10 | 北京泰尔英福网络科技有限责任公司 | Network identity root zone data managing method based on block chain technology and system |
CN107733855B (en) * | 2017-08-31 | 2019-11-05 | 中国科学院信息工程研究所 | A kind of block catenary system and application method that can support publicly-owned chain, alliance's chain and privately owned chain simultaneously |
-
2018
- 2018-09-05 CN CN201811033985.2A patent/CN109145647A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503994A (en) * | 2016-11-02 | 2017-03-15 | 西安电子科技大学 | Block chain private data access control method based on encryption attribute |
CN107480555A (en) * | 2017-08-01 | 2017-12-15 | 中国联合网络通信集团有限公司 | Database-access rights control method and equipment based on block chain |
CN107733855B (en) * | 2017-08-31 | 2019-11-05 | 中国科学院信息工程研究所 | A kind of block catenary system and application method that can support publicly-owned chain, alliance's chain and privately owned chain simultaneously |
CN108389045A (en) * | 2018-02-01 | 2018-08-10 | 北京泰尔英福网络科技有限责任公司 | Network identity root zone data managing method based on block chain technology and system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111125745A (en) * | 2019-10-10 | 2020-05-08 | 深圳龙之牌汽车有限公司 | Block chain-based data management system for Internet |
CN111199026A (en) * | 2019-12-26 | 2020-05-26 | 安徽讯呼信息科技有限公司 | Block chain service system |
CN111199026B (en) * | 2019-12-26 | 2023-05-23 | 安徽讯呼信息科技有限公司 | Block chain service system |
CN112215609A (en) * | 2020-11-05 | 2021-01-12 | 深圳市瀚兰区块链地产有限公司 | House property user identity authentication method and device based on super account book and electronic equipment |
CN114385996A (en) * | 2022-01-10 | 2022-04-22 | 北京新华夏信息技术有限公司 | Block chain consensus method and system based on node identity hierarchical management |
CN116644401A (en) * | 2023-07-21 | 2023-08-25 | 山东知临信息技术有限责任公司 | Identity verification method, device, equipment and medium based on blockchain technology |
CN116644401B (en) * | 2023-07-21 | 2023-10-20 | 山东知临信息技术有限责任公司 | Identity verification method, device, equipment and medium based on blockchain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109145647A (en) | A kind of trusted identity verifying system and method based on block chain | |
CN107888382B (en) | A kind of methods, devices and systems of the digital identity verifying based on block chain | |
KR102181600B1 (en) | Method for sso service through blockchain, and terminal and server using the same | |
KR102254499B1 (en) | Method for oauth service through blockchain, and terminal and server using the same | |
EP3764308A1 (en) | Blockchain-based system, and electronic apparatus and method in the system | |
CN109447645B (en) | Equipment linkage method, block chain network and storage medium | |
CN113239382A (en) | Credible identity model based on block chain intelligent contract | |
KR102118962B1 (en) | Method and server for managing user identity using blockchain network, and method and terminal for verifying user using user identity based on blockchain network | |
KR102116235B1 (en) | Method and server for managing user identity using blockchain network, and method and terminal for verifying user using user identity based on blockchain network | |
CN106664208A (en) | System and method for establishing trust using secure transmission protocols | |
CN107835176A (en) | A kind of network authentication method and platform based on eID | |
KR102192370B1 (en) | Method for oauth service through blockchain, and terminal and server using the same | |
CN108876669B (en) | Course notarization system and method applied to multi-platform education resource sharing | |
CN104104652A (en) | Man-machine identification method, network service access method and corresponding equipment | |
CN104363207A (en) | Multi-factor security enhancement authorization and authentication method | |
CN111191283A (en) | Beidou positioning information security encryption method and device based on alliance block chain | |
CN109962890A (en) | A kind of the authentication service device and node access, user authen method of block chain | |
CN109299347A (en) | A kind of academic information query method and system based on 5G framework and block chain | |
KR102118935B1 (en) | Method and server for managing user identity using blockchain network, and method and terminal for verifying user using user identity based on blockchain network | |
CN108604990A (en) | The application method and device of local authorized certificate in terminal | |
CN110324344A (en) | The method and device of account information certification | |
CN101547097A (en) | Digital media management system and management method based on digital certificate | |
KR102118947B1 (en) | Method and server for managing user identity using blockchain network, and method and terminal for verifying user using user identity based on blockchain network | |
CN111292211A (en) | Credit management method and device | |
KR102216292B1 (en) | Method for sso service through blockchain, and terminal and server using the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190104 |