CN109255619A - A kind of identity identifying method and equipment based on block chain - Google Patents
A kind of identity identifying method and equipment based on block chain Download PDFInfo
- Publication number
- CN109255619A CN109255619A CN201811123678.3A CN201811123678A CN109255619A CN 109255619 A CN109255619 A CN 109255619A CN 201811123678 A CN201811123678 A CN 201811123678A CN 109255619 A CN109255619 A CN 109255619A
- Authority
- CN
- China
- Prior art keywords
- user
- block chain
- chain node
- identity
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application discloses a kind of identity identifying method and equipment based on block chain, it include: identity information of the first block chain node according to the first user, determine that there are at least one second users of incidence relation with first user, and the second block chain node logged in second user described at least one sends certification request, includes the identity information of first user in the certification request;The authentication information that at least one described first block chain node is sent is received, and according to the authentication contract of the authentication information and setting, the identity of first user is authenticated.By the characteristic that can not be distorted of block chain network, deal maker by having certification permission authenticates the identity for the deal maker for not yet passing certification, and it is realized according to the authentication information of generation and the authentication contract of setting to deal maker's authentication, effectively ensure the authenticity of deal maker's identity information, guarantee the confidence level of transaction member's identity information in the market OTC, reduces the risk traded in the market OTC.
Description
Technical field
This application involves computer disposal and financial technology technical field more particularly to a kind of identity based on block chain
Authentication method and equipment.
Background technique
OTC(Over-The-Counter;Over-the-counter trading) refer to credits, stock that market except stock exchange carries out
The transaction such as power.The mainly one-to-one transaction that is carried out by private consultation of both parties.
The market OTC and exchange market are entirely different: not having fixed-site, be not specified by membership qualification, without strictly may be used
The regulatory of control is not specified by products transactions limitation.That is, both parties need respectively to undertake letter in the market OTC
Use risk.Therefore, in the market OTC, only both sides can trade after establishing credit.
In practical business scene, in order to guarantee the security and reliability of OTC marketing, how to guarantee in the market OTC
The confidence level of transaction member's identity information becomes the technical issues of urgent need to resolve.
Summary of the invention
In view of this, the embodiment of the present application provides a kind of identity identifying method and equipment based on block chain, for solving
Certainly how to confirm the confidence level of transaction member's identity information in the market OTC.
The embodiment of the present application provides a kind of identity identifying method based on block chain, comprising:
First block chain node determines that there are incidence relations with first user according to the identity information of the first user
At least one second user;
The second block chain node transmission that the first block chain node is logged in second user described at least one is recognized
Card is requested, and includes the identity information of first user in the certification request;
The first block chain node receives the authentication information that at least one described second block chain node is sent, and according to
The authentication contract of the authentication information and setting authenticates the identity of first user.
The embodiment of the present application provides a kind of identity identifying method based on block chain, comprising:
Second block chain node receives the certification request that the first block chain node is sent, and includes first in the certification request
The identity information of user;
The second block chain node according to the identity information of first user, determine the second user that logs in it is described
Incidence relation between first user;
The second block chain node authenticates the identity of first user according to the incidence relation.
The embodiment of the present application provides a kind of ID authentication device based on block chain, including at least one processor and deposits
Reservoir, the memory are stored with program, and are configured to execute following steps by least one described processor:
According to the identity information of the first user, determining there are at least one second use of incidence relation with first user
Family;
The the second block chain node logged in second user described at least one sends certification request, the certification request
In include first user identity information;
The authentication information that at least one described second block chain node is sent is received, and according to the authentication information and setting
Authentication contract, the identity of first user is authenticated.
The embodiment of the present application provides a kind of ID authentication device based on block chain, including at least one processor and deposits
Reservoir, the memory are stored with program, and are configured to execute following steps by least one described processor:
The certification request of the first block chain node transmission is received, the identity comprising the first user is believed in the certification request
Breath;
According to the identity information of first user, being associated between the second user logged in and first user is determined
Relationship;
According to the incidence relation, the identity of first user is authenticated.
What at least one embodiment provided by the present application can reach has the beneficial effect that:
The embodiment of the present application the first block chain node is determined and is deposited with first user according to the identity information of the first user
In at least one second user of incidence relation, and the second block chain node hair logged in second user described at least one
Certification request is sent, includes the identity information of first user in the certification request;Receive at least one described second block
The authentication information that chain node is sent, and according to the authentication contract of the authentication information and setting, to first user's
Identity is authenticated.By the characteristic that can not be distorted of block chain network, by having the deal maker of certification permission to not yet passing
The identity of the deal maker of certification authenticates, and is realized according to the authentication information of generation and the authentication contract of setting to transaction
Member's authentication effectively ensures the authenticity of deal maker's identity information, and transaction member's identity information can in the guarantee market OTC
Reliability reduces the risk traded in the market OTC.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly introduced, it should be apparent that, the drawings in the following description are only some examples of the present application, for this
For the those of ordinary skill in field, without any creative labor, it can also be obtained according to these attached drawings
His attached drawing.
Fig. 1 provides a kind of flow diagram of identity identifying method based on block chain for the embodiment of the present application;
Fig. 2 provides a kind of flow diagram of identity identifying method based on block chain for the embodiment of the present application;
Fig. 3 provides a kind of structural schematic diagram of ID authentication device based on block chain for the embodiment of the present application;
Fig. 4 provides a kind of structural schematic diagram of ID authentication device based on block chain for the embodiment of the present application.
Specific embodiment
In order to realize the purpose of the application, the embodiment of the present application provide a kind of identity identifying method based on block chain and
Equipment, the first block chain node is according to the identity information of the first user, and there are incidence relations by determining and first user extremely
A few second user, and the second block chain node logged in second user described at least one sends certification request, institute
State the identity information in certification request comprising first user;Receive recognizing at least one the second block chain node transmission
Information is demonstrate,proved, and according to the authentication contract of the authentication information and setting, the identity of first user is authenticated.It borrows
The characteristic that can not be distorted for helping block chain network, by having body of the deal maker of certification permission to the deal maker for not yet passing certification
Part is authenticated, and is realized to deal maker's authentication, effectively according to the authentication information of generation and the authentication contract of setting
It ensures the authenticity of deal maker's identity information, guarantees the confidence level of transaction member's identity information in the market OTC, reduce the city OTC
The risk traded in.
It should be noted that " the first user " that is recorded in the embodiment of the present application, " first " in " second user " and "
Two " do not have particular meaning, are only used to indicate different users;" the first block chain node " recorded in the embodiment of the present application, "
" first " and " second " in two block chain nodes " does not have particular meaning, is only used to indicate arbitrary block in block chain network
Chain node.
The each embodiment of the application is described in further detail with reference to the accompanying drawings of the specification.Obviously, described
Embodiment is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field
Those of ordinary skill's all other embodiment obtained without making creative work belongs to the application protection
Range.
Fig. 1 is a kind of flow diagram of the identity identifying method based on block chain provided by the embodiments of the present application.It is described
Method can be as follows.
Step 101: according to the identity information of the first user, determining and first user exists closes the first block chain node
At least one second user of connection relationship.
In the embodiment of the present application, the first block chain node can be used as the arbitrary node in block chain network, show shape
Formula can be a system client, and user is provided after logining successfully using system by system client login system
Function.
Specifically, the first user completes registration by the first block chain node in system, and utilizes generation user information
Login system.
Firstly, the first user sends registration request, at this time the first block chain to system by the first block chain node
Node receives the registration request of first user, includes the identity information of first user in the registration request.
Here identity information is including but not limited to user name, login password, name, occupation, education background, work experience
Etc..
Such as: user initiates registration request by a certain system client, and carries in the registration request and filled in
Identity information.
Secondly, the first block chain node stores the registration request of first user.
Specifically, the first block chain node is in the case where receiving registration request, can should by way of broadcast
The identity information for including in registration request is sent to other nodes in block chain network.According to the conjunction of block chain information cochain
About, in the case where determining that the registration request is verified, store the identity information for including in the registration request, i.e., it is so-called
Identity information cochain.Here storage is not limited only to the storage of the first block chain node, further includes but is not limited to block chain network
In all block chain nodes store the identity information for including in the registration request that the first user sends.
It should be noted that implementing here according to the contract of block chain information cochain to the verifying of registration request and the application
The authentication recorded in example is different.Here verifying is the data storage technology based on block chain, and being used to determine whether should
Identity information is stored into block chain network.There are many kinds of verification modes, such as: proof of work, equity prove etc., at this
Verification mode is not specifically limited in application embodiment.
For cochain user (registering the deal maker of completion), if having certification permission, or whether can be by it
His users to trust, it is also necessary to further the identity of the user be authenticated.So the first block chain node is used according to first
The identity information at family, there are at least one second users of incidence relation with first user for lookup from block chain.
The incidence relation recorded in the embodiment of the present application includes but is not limited to that Peer Relationships (can be passed through according to the work of submission
Go through information judgement), transaction relationship (historical trading data that can be dispatched according to internet financial platform judges), acquaintance etc.
Deng.
Step 102: the second block chain link that the first block chain node is logged in second user described at least one
Point sends certification request, includes the identity information of first user in the certification request.
In the embodiment of the present application, the second block chain link that the first block chain node can be logged in determining second user
Point sends certification request, and the certification request is for requesting second user to authenticate the identity of the first user.
Specifically, the first block chain node is according to the certification permission of the different user of storage, from it is determining with it is described
First user has the second user of certification permission there are filtering out at least one second user of incidence relation, and to screening
The second block chain node that the second user that out at least one has certification permission is logged in sends certification request.
More preferably, there are at least one second use of incidence relation in determining and first user for the first block chain node
In the case where family, certification request can be sent by the way of broadcast, so that receiving other block chains of the certification request
Node realizes the authentication to the first user in the case where having certification permission.
Since there may be some second users not to authenticate permission in determining second user, in order to guarantee authentication information
Credibility, in the embodiment of the present application, firstly, whether the first block chain node determines at least one described second user
Has certification permission.
Specifically, the first block chain node executes following operation for each determining second user respectively:
Search whether second user has certification permission.
Secondly, the first block chain node logged in at least one the described second user for having certification permission the
Two block chain nodes send certification request.
Step 103: the first block chain node receives the certification letter that at least one described second block chain node is sent
Breath.
In the embodiment of the present application, the first block chain node receives what the second different block chain nodes was sent respectively
Authentication information.What needs to be explained here is that the mode that the second block chain node sends authentication information can use point-to-point transmission
Mode, can also using broadcast transmission by the way of, sending method is not specifically limited here.
More preferably, the first block chain node stores the authentication information.
Wherein, in the authentication information comprising authenticated time, authenticating tag, first user user information, described
The user information of second user, the authenticating tag characterize in the incidence relation between first user and the second user
It is at least one or a variety of.It also include the whether true information of subscriber identity information to be verified in the authentication information.
Specifically, the first block chain node is the case where receiving the authentication information of each second block chain node transmission
Under, regardless of the authentication information indicates that subscriber identity information is true or untrue, the first block chain node stores the authentication information,
Include authenticated time (can be the time for receiving authentication information), authenticating tag (i.e. the first user and the in the authentication information
Incidence relation between two users, such as: the corresponding colleague's label of Peer Relationships;Business relations correspond to service label), the first user
User information, one or more of the user information of second user.
Whether subscriber identity information to be verified here thinks that genuine information is a second user to the first user
Identity carries out what certification obtained, i.e., some second user authenticates the identity of the first user, generates subscriber identity information
Be true or subscriber identity information is false information, that is to say, that whether in authentication information comprising subscriber identity information be it is true, use
Family identity information is false one of information.
Step 104: the first block chain node is according to the authentication contract of the authentication information and setting, to described
The identity of first user authenticates.
In the embodiment of the present application, the first block chain node is receiving the transmission of each second block chain node
In the case where authentication information, " whether subscriber identity information is genuine information " in authentication information read.
For the first block chain node in determining the authentication information received, authentication information is that subscriber identity information is true
And in the case that authentication information indicates that subscriber identity information is the authentication contract that genuine quantity meets setting, by described
The authentication of first user.
Here the contract rule being arranged in the authentication contract set, which can be, indicates subscriber identity information really to recognize
The quantity for demonstrate,proving information is greater than setting numerical value, that is to say, that once the first block chain node is determining the authentication information received
In, authentication information indicates that subscriber identity information is genuine information and indicates that the quantity that subscriber identity information is genuine authentication information is big
In setting numerical value, illustrate the authentication contract for meeting setting.Once the first block chain node is recognized what determination received
It demonstrate,proves in information, authentication information indicates that the quantity that subscriber identity information is genuine information is not more than setting numerical value, illustrates to be unsatisfactory for setting
Fixed authentication contract.
Such as: the first block chain node receives the authentication information that different second block chain nodes are sent, and confirms and receives
Include in authentication information is that subscriber identity information is genuine information or subscriber identity information is false information, if authentication information
It is genuine information for subscriber identity information, then counter adds 1, otherwise, counter values are remained unchanged.When the numerical value of counter
In the case where greater than setting numerical value, pass through the authentication to first user.
More preferably, in the embodiment of the present application, the method also includes:
The first block chain node determines described first through authentication to first user
The certification permission of user, the certification permission, which characterizes first user, to authenticate the identity of other users;
Specifically, the first block chain node is through authentication to first user, for institute
It states the first user and distributes (or open-minded) certification permission, is i.e. the first user can authenticate the identity of other users.
More preferably, the first block chain node broadcasts the certification permission of first user in block chain network, with
The certification permission of the first user is stored convenient for other block chain nodes in block chain network.
In the embodiment of the present application, the executing subject of the embodiment of the present application can be any one area in block chain network
Block chain node is also possible to all block chain nodes, can also be block chain node (i.e. the first block chain that the first user logs in
Node), above-described embodiment is described using the first block chain node as executing subject, but the executing subject of this programme not office
It is limited to the first block chain node.
By technical solution provided by the embodiments of the present application, the first block chain node according to the identity information of the first user,
It determines that there are at least one second users of incidence relation with first user, and is stepped on to second user described at least one
Second block chain node of record sends certification request, includes the identity information of first user in the certification request;It receives
The authentication information that at least one described second block chain node is sent, and closed according to the authentication of the authentication information and setting
About, the identity of first user is authenticated.By the characteristic that can not be distorted of block chain network, by having certification permission
Deal maker the identity for the deal maker for not yet passing certification is authenticated, and according to the identity of the authentication information of generation and setting
It authenticates contract to realize to deal maker's authentication, effectively ensures the authenticity of deal maker's identity information, guarantee to hand in the market OTC
The confidence level of easy member identities' information, reduces the risk traded in the market OTC.
Fig. 2 is a kind of flow diagram of the identity identifying method based on block chain provided by the embodiments of the present application.It is described
Method can be as follows.
Step 201: the second block chain node receives the certification request that the first block chain node is sent, in the certification request
Identity information comprising the first user.
In the embodiment of the present application, since the first block chain node can be sent and be recognized using broadcast or point-to-point mode
Card request, then the second block chain node receives the certification request that the first block chain node is sent.
Step 202: the second block chain node determines that log in second uses according to the identity information of first user
Incidence relation between family and first user.
In the embodiment of the present application, the second block chain node is in the case where receiving certification request, according to certification request
In include the first user identity information and login second user user information, determine log in second user with it is described
It whether there is incidence relation between first user.
Such as: whether in second user friend information have first user, search the transaction pair in historical transactional information if searching
Whether there is second user etc. in hand.
Step 203: the second block chain node recognizes the identity of first user according to the incidence relation
Card.
In the embodiment of the present application, the second block chain node once it is determined that log in second user and the first user it
Between there are incidence relations, prompt information can be sent, prompt log in second user the identity of the first user is authenticated, and
According to the information that second user inputs, authentication information is generated, the first block chain node is sent to.
Fig. 3 is a kind of structural schematic diagram of the ID authentication device based on block chain provided by the embodiments of the present application.It is described
ID authentication device comprises determining that unit 301, transmission unit 302 and authentication unit 303, in which:
Determination unit 301 determines that there are incidence relations with first user for the identity information according to the first user
At least one second user;
Transmission unit 302, the second block chain node for being logged in second user described at least one send certification
It requests, includes the identity information of first user in the certification request;
Authentication unit 303, the authentication information sent for receiving at least one described second block chain node, and according to institute
The authentication contract for stating authentication information and setting authenticates the identity of first user.
In another embodiment of the application, the authentication unit 303 is according to the identity of the authentication information and setting
Contract is authenticated, the identity of first user is authenticated, comprising:
Determining that the authentication information received is to indicate that subscriber identity information is genuine information and indicates user identity
Information is in the case that the quantity of genuine information meets the authentication contract set, to be recognized by the identity to first user
Card.
In another embodiment of the application, the ID authentication device further include: certification priority assignation unit 304,
Wherein:
The certification priority assignation unit 304, for being through authentication to first user
First user distributes certification permission, and the certification permission, which characterizes first user, to carry out the identity of other users
Certification.
In another embodiment of the application, the ID authentication device further include: radio unit 305, wherein described
Radio unit 305, for broadcasting the certification permission of first user in block chain network.
In another embodiment of the application, the ID authentication device further include: storage unit 306, wherein;
The storage unit 306, for receiving at least one described second block chain node in the authentication unit 303
In the case where the authentication information of transmission, store the authentication information, in the authentication information comprising authenticated time, authenticating tag,
At least one or multiple of the user information of first user, user information of the second user, the certification letter
It further include whether subscriber identity information is genuine information in breath, the authenticating tag characterizes first user and described second and uses
Incidence relation between family.
In another embodiment of the application, the ID authentication device further include: receiving unit 307, in which:
The receiving unit 307 includes described in the registration request for receiving the registration request of first user
The identity information of first user;Store the registration request of first user.
In another embodiment of the application, the transmission unit 302 is logged in second user described at least one
The second block chain node send certification request, comprising:
Broadcast authentication is requested in block chain network;
Alternatively, having described the second of certification permission according to the certification permission of the different user of storage at least one and using
The second block chain node that family is logged in sends certification request.
It should be noted that the ID authentication device recorded in the embodiment of the present application can be realized by software mode,
It can be realized by hardware mode, be not specifically limited here.ID authentication device is determined according to the identity information of the first user
There are at least one second users of incidence relation with first user, and logged in second user described at least one
Second block chain node sends certification request, includes the identity information of first user in the certification request;It receives at least
The authentication information that one the second block chain node is sent, and according to the authentication contract of the authentication information and setting,
The identity of first user is authenticated.By the characteristic that can not be distorted of block chain network, by having certification permission
Deal maker authenticates the identity for the deal maker for not yet passing certification, and is recognized according to the authentication information of generation and the identity of setting
It demonstrate,proves contract to realize to deal maker's authentication, effectively ensures the authenticity of deal maker's identity information, guarantee to trade in the market OTC
The confidence level of member identities' information reduces the risk traded in the market OTC.
Based on the same inventive concept, the embodiment of the present application also provides a kind of ID authentication device based on block chain,
Including at least one processor and memory, the memory is stored with program, and be configured to by it is described at least one
It manages device and executes following steps:
According to the identity information of the first user, determining there are at least one second use of incidence relation with first user
Family;
The the second block chain node logged in second user described at least one sends certification request, the certification request
In include first user identity information;
The authentication information that at least one described second block chain node is sent is received, and according to the authentication information and setting
Authentication contract, the identity of first user is authenticated.
The processor recorded in the embodiment of the present application can be central processing unit, can also be other controllers, here not
It is specifically limited.
Fig. 4 is a kind of structural schematic diagram of the ID authentication device based on block chain provided by the embodiments of the present application.It is described
ID authentication device includes: receiving unit 401, determination unit 402 and authentication unit 403, in which:
Receiving unit 401, for receiving the certification request of the first block chain node transmission, comprising the in the certification request
The identity information of one user;
Determination unit 402 determines the second user logged in and described for the identity information according to first user
Incidence relation between one user;
Authentication unit 403, for being authenticated to the identity of first user according to the incidence relation.
It should be noted that ID authentication device provided by the embodiments of the present application can be realized by software mode, it can also
To be realized by hardware mode, it is not specifically limited here.
Based on the same inventive concept, the embodiment of the present application also provides a kind of ID authentication device based on block chain,
Including at least one processor and memory, the memory is stored with program, and be configured to by it is described at least one
It manages device and executes following steps:
The certification request of the first block chain node transmission is received, the identity comprising the first user is believed in the certification request
Breath;
According to the identity information of first user, being associated between the second user logged in and first user is determined
Relationship;
According to the incidence relation, the identity of first user is authenticated.
It will be understood by those skilled in the art that embodiments herein can provide as method, apparatus (equipment) or computer
Program product.Therefore, in terms of the application can be used complete hardware embodiment, complete software embodiment or combine software and hardware
Embodiment form.Moreover, it wherein includes the meter of computer usable program code that the application, which can be used in one or more,
The computer journey implemented in calculation machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of sequence product.
The application is flow chart of the reference according to method, apparatus (equipment) and computer program product of the embodiment of the present application
And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions
And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to
Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate
One machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing
The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application
Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies
Within, then the application is also intended to include these modifications and variations.
Claims (10)
1. a kind of identity identifying method based on block chain characterized by comprising
First block chain node is according to the identity information of the first user, and there are incidence relations by determining and first user at least
One second user;
The second block chain node that the first block chain node is logged in second user described at least one sends certification and asks
It asks, includes the identity information of first user in the certification request;
The first block chain node receives the authentication information that at least one described second block chain node is sent, and according to described
The authentication contract of authentication information and setting authenticates the identity of first user.
2. identity identifying method according to claim 1, which is characterized in that the first block chain node is recognized according to
The authentication contract for demonstrate,proving information and setting, authenticates the identity of first user, comprising:
The first block chain node is determining that the authentication information received expression subscriber identity information is true and expression is used
Family identity information is in the case that the quantity of genuine authentication information meets the authentication contract set, by using described first
The authentication at family.
3. identity identifying method according to claim 2, which is characterized in that the method also includes:
The first block chain node is through authentication to first user, for first user point
With certification permission, the certification permission, which characterizes first user, to authenticate the identity of other users.
4. identity identifying method according to claim 3, which is characterized in that the method also includes:
The first block chain node broadcasts the certification permission of first user in block chain network.
5. identity identifying method according to any one of claims 1 to 4, which is characterized in that the first block chain node
In the case where receiving the authentication information that at least one described second block chain node is sent, the method also includes:
The first block chain node stores the authentication information, includes authenticated time, authenticating tag, institute in the authentication information
State at least one or multiple of user information, the user information of the second user of the first user, the authentication information
In further include whether subscriber identity information is genuine information, the authenticating tag characterizes first user and the second user
Between incidence relation.
6. identity identifying method according to claim 1, which is characterized in that the method also includes:
The first block chain node receives the registration request of first user, uses in the registration request comprising described first
The identity information at family;
The first block chain node stores the registration request of first user.
7. identity identifying method according to claim 1, which is characterized in that the first block chain node at least one
The second block chain node that the second user is logged in sends certification request, comprising:
First block chain node broadcast authentication in block chain network is requested;
Alternatively, certification permission of the first block chain node according to the different user of storage, has certification power at least one
The second block chain node that the second user of limit is logged in sends certification request.
8. a kind of identity identifying method based on block chain characterized by comprising
Second block chain node receives the certification request that the first block chain node is sent, and includes the first user in the certification request
Identity information;
The second block chain node determines the second user and described first logged according to the identity information of first user
Incidence relation between user;
The second block chain node authenticates the identity of first user according to the incidence relation.
9. a kind of ID authentication device based on block chain, which is characterized in that described including at least one processor and memory
Memory is stored with program, and is configured to execute following steps by least one described processor:
According to the identity information of the first user, determine that there are at least one second users of incidence relation with first user;
The the second block chain node logged in second user described at least one sends certification request, wraps in the certification request
Identity information containing first user;
The authentication information that at least one described second block chain node is sent is received, and according to the body of the authentication information and setting
Part certification contract, authenticates the identity of first user.
10. a kind of ID authentication device based on block chain, which is characterized in that including at least one processor and memory, institute
It states memory and is stored with program, and be configured to execute following steps by least one described processor:
The certification request of the first block chain node transmission is received, includes the identity information of the first user in the certification request;
According to the identity information of first user, being associated between the second user logged in and first user is determined
System;
According to the incidence relation, the identity of first user is authenticated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811123678.3A CN109255619A (en) | 2018-09-26 | 2018-09-26 | A kind of identity identifying method and equipment based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811123678.3A CN109255619A (en) | 2018-09-26 | 2018-09-26 | A kind of identity identifying method and equipment based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109255619A true CN109255619A (en) | 2019-01-22 |
Family
ID=65047380
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811123678.3A Pending CN109255619A (en) | 2018-09-26 | 2018-09-26 | A kind of identity identifying method and equipment based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109255619A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110060060A (en) * | 2019-03-01 | 2019-07-26 | 阿里巴巴集团控股有限公司 | Method of controlling security, device, electronic equipment and computer readable storage medium |
CN110443624A (en) * | 2019-07-31 | 2019-11-12 | 中国工商银行股份有限公司 | Shou Dan trade company checking method and node apparatus based on block chain |
CN110473102A (en) * | 2019-08-15 | 2019-11-19 | 广州蚁比特区块链科技有限公司 | Transaction processing method, device and block chain node |
CN110599190A (en) * | 2019-09-27 | 2019-12-20 | 支付宝(杭州)信息技术有限公司 | Identity authentication method and device based on block chain |
CN111444271A (en) * | 2020-03-05 | 2020-07-24 | 链农(深圳)信息科技有限公司 | Information collection and judgment method and system based on block chain |
US10791122B2 (en) | 2019-07-04 | 2020-09-29 | Alibaba Group Holding Limited | Blockchain user account data |
CN112115523A (en) * | 2020-09-30 | 2020-12-22 | 海南大学 | Data self-destruction encryption storage device |
CN112134883A (en) * | 2020-09-22 | 2020-12-25 | 北京八分量信息科技有限公司 | Method and device for quickly authenticating trust relationship between nodes based on trusted computing and related products |
WO2021000578A1 (en) * | 2019-07-04 | 2021-01-07 | 创新先进技术有限公司 | Method, device and apparatus for creating user in chained-block account book |
CN113190813A (en) * | 2021-05-25 | 2021-07-30 | 数字广东网络建设有限公司 | Dual-authentication processing method, device, equipment and medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106375317A (en) * | 2016-08-31 | 2017-02-01 | 北京明朝万达科技股份有限公司 | Block chain-based big data security authentication method and system |
CN107426157A (en) * | 2017-04-21 | 2017-12-01 | 杭州趣链科技有限公司 | A kind of alliance's chain authority control method based on digital certificate and ca authentication system |
WO2018046009A1 (en) * | 2016-09-12 | 2018-03-15 | 上海鼎利信息科技有限公司 | Block chain identity system |
CN108551437A (en) * | 2018-03-13 | 2018-09-18 | 百度在线网络技术(北京)有限公司 | Method and apparatus for authentication information |
-
2018
- 2018-09-26 CN CN201811123678.3A patent/CN109255619A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106375317A (en) * | 2016-08-31 | 2017-02-01 | 北京明朝万达科技股份有限公司 | Block chain-based big data security authentication method and system |
WO2018046009A1 (en) * | 2016-09-12 | 2018-03-15 | 上海鼎利信息科技有限公司 | Block chain identity system |
CN107426157A (en) * | 2017-04-21 | 2017-12-01 | 杭州趣链科技有限公司 | A kind of alliance's chain authority control method based on digital certificate and ca authentication system |
CN108551437A (en) * | 2018-03-13 | 2018-09-18 | 百度在线网络技术(北京)有限公司 | Method and apparatus for authentication information |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110060060B (en) * | 2019-03-01 | 2023-03-31 | 创新先进技术有限公司 | Security control method and device, electronic equipment and computer readable storage medium |
CN110060060A (en) * | 2019-03-01 | 2019-07-26 | 阿里巴巴集团控股有限公司 | Method of controlling security, device, electronic equipment and computer readable storage medium |
US10791122B2 (en) | 2019-07-04 | 2020-09-29 | Alibaba Group Holding Limited | Blockchain user account data |
WO2021000578A1 (en) * | 2019-07-04 | 2021-01-07 | 创新先进技术有限公司 | Method, device and apparatus for creating user in chained-block account book |
CN110443624A (en) * | 2019-07-31 | 2019-11-12 | 中国工商银行股份有限公司 | Shou Dan trade company checking method and node apparatus based on block chain |
CN110473102A (en) * | 2019-08-15 | 2019-11-19 | 广州蚁比特区块链科技有限公司 | Transaction processing method, device and block chain node |
CN110599190A (en) * | 2019-09-27 | 2019-12-20 | 支付宝(杭州)信息技术有限公司 | Identity authentication method and device based on block chain |
CN110599190B (en) * | 2019-09-27 | 2022-10-21 | 支付宝(杭州)信息技术有限公司 | Identity authentication method and device based on block chain |
CN111444271A (en) * | 2020-03-05 | 2020-07-24 | 链农(深圳)信息科技有限公司 | Information collection and judgment method and system based on block chain |
CN112134883A (en) * | 2020-09-22 | 2020-12-25 | 北京八分量信息科技有限公司 | Method and device for quickly authenticating trust relationship between nodes based on trusted computing and related products |
CN112134883B (en) * | 2020-09-22 | 2023-05-30 | 北京八分量信息科技有限公司 | Method, device and related product for carrying out rapid authentication on trust relationship between nodes based on trusted computing |
CN112115523A (en) * | 2020-09-30 | 2020-12-22 | 海南大学 | Data self-destruction encryption storage device |
CN113190813A (en) * | 2021-05-25 | 2021-07-30 | 数字广东网络建设有限公司 | Dual-authentication processing method, device, equipment and medium |
CN113190813B (en) * | 2021-05-25 | 2024-08-02 | 数字广东网络建设有限公司 | Dual authentication processing method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109255619A (en) | A kind of identity identifying method and equipment based on block chain | |
Pasdar et al. | Connect API with blockchain: A survey on blockchain oracle implementation | |
CN108780390B (en) | System and method for providing identity scores | |
US10965668B2 (en) | Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification | |
KR102131292B1 (en) | Method for managing trust information based on block-chain | |
US9978094B2 (en) | Tokenization revocation list | |
KR102009160B1 (en) | Information trust engine system based on block-chain | |
US11539526B2 (en) | Method and apparatus for managing user authentication in a blockchain network | |
US20120159590A1 (en) | Methods, systems, and computer program products for authenticating an identity of a user by generating a confidence indicator of the identity of the user based on a combination of multiple authentication techniques | |
CN111034114A (en) | Block chain structure with recording safety | |
CN105719172A (en) | Information issuing method and device | |
CN108352021A (en) | Method and system for authentication data collection and reporting associated with online transactions | |
WO2015158874A1 (en) | Method and system for user authentication | |
JP2016521932A (en) | Terminal identification method, and method, system, and apparatus for registering machine identification code | |
CN108418808A (en) | Identity information changes method, apparatus, terminal device and storage medium | |
WO2020047116A1 (en) | Techniques for data access control utilizing blockchains | |
CN105871786A (en) | User information authentication method, device and system | |
CN113987080A (en) | Block chain excitation method and device based on reputation consensus and related products | |
CN112000744A (en) | Signature method and related equipment | |
CN112700250A (en) | Identity authentication method, device and system in financial scene | |
CN108352010A (en) | Method and system for administrative authentication services client data | |
Nabi | Comparative study on identity management methods using blockchain | |
CN110020869A (en) | For generating the method, apparatus and system of block chain authorization message | |
CN112862589A (en) | Identity verification method, device and system in financial scene | |
CN114117264A (en) | Illegal website identification method, device, equipment and storage medium based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200113 Address after: Room 0112-168, 01 Floor, 26 Shangdi Information Road, Haidian District, Beijing 100084 Applicant after: Asian Union Innovation Technology Co.,Ltd. Address before: 100088 Floor 1206, Block B, Building 8, Guanchengyuan, Haidian District, Beijing Applicant before: BEIJING AFCA STAR INFORMATION TECHNOLOGY Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190122 |