CN109347865A - A kind of user data authentication based on block chain technology deposits the method and system of card - Google Patents

A kind of user data authentication based on block chain technology deposits the method and system of card Download PDF

Info

Publication number
CN109347865A
CN109347865A CN201811412768.4A CN201811412768A CN109347865A CN 109347865 A CN109347865 A CN 109347865A CN 201811412768 A CN201811412768 A CN 201811412768A CN 109347865 A CN109347865 A CN 109347865A
Authority
CN
China
Prior art keywords
information
data
party
terminal
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811412768.4A
Other languages
Chinese (zh)
Other versions
CN109347865B (en
Inventor
何立鹏
胡先建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Xing Zheng E-Government Operations Services Ltd
Original Assignee
Chengdu Xing Zheng E-Government Operations Services Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Xing Zheng E-Government Operations Services Ltd filed Critical Chengdu Xing Zheng E-Government Operations Services Ltd
Priority to CN201811412768.4A priority Critical patent/CN109347865B/en
Publication of CN109347865A publication Critical patent/CN109347865A/en
Application granted granted Critical
Publication of CN109347865B publication Critical patent/CN109347865B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The present invention relates to a kind of, and the user data authentication based on block chain technology deposits the method and system of card, the method is applied to the client connecting with server end and third party's terminal, and the client includes client node, the client node is added in block chain, and by the block chain to Web Publishing;The server end includes server-side node, and the server-side node is added in block chain, and by the block chain to Web Publishing;Third party's terminal includes third party's terminal node, and third party's terminal node is added in block chain, and by the block chain to Web Publishing.How the present invention is allowing the user safely, with closing rule to use individual privacy data in the prior art for solving, the legitimate rights and interests without influencing third party's terminal, and the technical issues of how to supervise and store these data.

Description

A kind of user data authentication based on block chain technology deposits the method and system of card
Technical field
The present invention relates to the safe mutual trust fields of citizen's information opening, and in particular to a kind of authentication based on block chain technology is deposited The method and system of card.
Background technique
With the development of the times, the personal data that government affairs system is related to are more and more full and accurate, and each social framework (visitor Family end) it is also further strong to the personal data demand of government affairs system (server end) generation.Government affairs system discloses a People's private data may damage third party's terminal legitimate rights and interests after open, therefore, should obtain the agreement of third party's terminal.But In a conventional manner, user uses my private data involved in government information in client authorization, if authorization message It is stored in the localisation database of client, and is sent to server end by way of interface, and this database is also It is by the client maintenance, then can have very big conjunction rule risk.Therefore, how to allow the individual privacy of government affairs system Data are open to the society, how to allow user safely, with closing rule can use these data, the legal power without influencing third party's terminal Benefit has become a pendulum problem preceding in terms of supervision layer and data storage.
Summary of the invention
In view of the problems of the existing technology, the embodiment of the invention provides a kind of user data based on block chain technology Authentication deposits the method and system of card, how to allow the user safely, with closing rule to use individual privacy in the prior art for solving Data, the legitimate rights and interests without influencing third party's terminal, and the technical issues of how to supervise and store these data;Passing through will Authorized user message can not be distorted by decentralization, can be traced, and store shared use using the block chain technology of safety Family authorization message is finally reached the purpose of the safe mutual trust of citizen's information opening.
The technical scheme to solve the above technical problems is that
In a first aspect, this application provides a kind of, the user data based on block chain technology authenticates the method for depositing card, described Method is applied to the client connecting with server end and third party's terminal, and the client includes client node, described Client node is added in block chain, and by the block chain to Web Publishing, comprising the following steps:
The authorization message for sending the authorization message of user data to server end and being processed using third party's terminal, and Authorized user message is deposited into card to block chain;
First data request information is encoded, generates the first authentication information, and by the first area authentication information Cun Zhengdao On block chain;
The first data request information is sent to server end;
Receive the second feedback data information of third party's terminal;
It verifies whether the second feedback data information is tampered according to the 4th authentication information, if being not tampered with, completes user Data authentication deposits card.
Second aspect provides a kind of method that the user data authentication based on block chain technology deposits card, the method application In the server end connecting with client and third party's terminal, the server end includes server-side node, the server End node is added in block chain, and by the block chain to Web Publishing, comprising the following steps:
Receive the first data request information of client;
According to the first data request information, the second requesting data information is generated, and issues the second request to third party's terminal Data information;
Receive the third requesting data information of third party's terminal sending, and third number of request is verified according to third authentication information It is believed that whether breath is tampered, if being not tampered with, whether user is verified to client and third party's authorization terminal, if authorization, Encapsulate user authorization data;
It is fed back according to third requesting data information, the first feedback data information is generated, by the first feedback data information It is encoded, generates the second authentication information, and the second authentication information is deposited into card to block chain;
The first feedback data information is sent to third party's terminal.
The third aspect provides a kind of method that the user data authentication based on block chain technology deposits card, the method application In the third party's terminal connecting with client and server end, third party's terminal includes third party's terminal node, and described Tripartite's terminal node is added in block chain, and by the block chain to Web Publishing, comprising the following steps:
Receive the second data request information that server end is sent;
It verifies whether the second data request information is tampered according to the first authentication information, if being not tampered with, verifies user Whether to client authorization;
If authorization receives the second requesting data information of server end transmission, according to the second requesting data information, generate Third requesting data information encodes third requesting data information, generates third authentication information, and by third authentication information Card is deposited to block chain;
The first feedback data information of server end is received, it is no according to first the second authentication information of feedback data Information Authentication It is tampered;
If being not tampered with, the first feedback data information is processed, obtains the second feedback data information, it is anti-by second Feedback data information is encoded, and generates the 4th authentication information, and the 4th authentication information is deposited card to block chain;
The second feedback data information is sent to client.
Fourth aspect provides a kind of client, and based on method described in above-mentioned first aspect, the client is separately connected Server end and third party's terminal, and the client includes client node, the client node is added in block chain, And by the block chain to Web Publishing comprising:
Authorization module, for sending the authorization message of user data to server end and being processed using third party's terminal Authorization message, and authorized user message is deposited into card on block chain;
First authentication information module generates the first authentication information, and will for encoding the first data request information First authentication information deposits card to block chain;
Sending module, for sending the first data request information to server end;
Receiving module, for receiving the second feedback data information of third party's terminal;
Authentication module, for verifying whether the second feedback data information is tampered according to the 4th authentication information, if not usurped Change, then completes user data authentication and deposit card.
5th aspect, provides a kind of server end, based on method described in above-mentioned second aspect, the server end difference Connection client is connected with third party's terminal, and the server end includes server-side node, and the server-side node is added Into block chain, and by the block chain to Web Publishing comprising:
Receiving module, for receiving the first data request information of client;
First sending module, for according to the first data request information, generating the second requesting data information, and to third party Terminal issues the second requesting data information;
Authentication module, for receiving the third requesting data information of third party's terminal sending, and according to third authentication information Whether verifying third requesting data information is tampered, if being not tampered with, whether verifies user to client and third party's terminal Authorization, if authorization, encapsulates user authorization data;
Second authentication information module, for being fed back according to third requesting data information, generate the first feedback coefficient it is believed that Breath, the first feedback data information is encoded, and generates the second authentication information, and the second authentication information is deposited card to block chain On;
Second sending module, for sending the first feedback data information to third party's terminal.
6th aspect, provides a kind of third party's terminal, based on method described in the above-mentioned third aspect, third party's terminal It is separately connected client and server end, third party's terminal includes third party's terminal node, third party's terminal node It is added in block chain, and by the block chain to Web Publishing comprising:
Receiving module, for receiving the second data request information of server end transmission;
First authentication module, for verifying whether the second data request information is tampered according to the first authentication information, if not It is tampered, then whether verifies user to client authorization;
Third authentication information module, if receiving the second requesting data information of server end transmission for authorizing, according to Second requesting data information generates third requesting data information, third requesting data information is encoded, and generates third authentication Information, and third authentication information is deposited into card to block chain;
Second authentication module is verified for receiving the first feedback data information of server end according to the second authentication information Whether the first feedback data information is tampered;
4th authentication information module, if being processed to the first feedback data information for being not tampered with, obtaining second Feedback data information encodes the second feedback data information, generates the 4th authentication information, and the 4th authentication information is deposited card Onto block chain;
Sending module, for sending the second feedback data information to client.
7th aspect provides a kind of system that the user data authentication based on block chain technology deposits card, including fourth aspect Client, the 5th aspect server end and the 6th aspect third party's terminal;
The client the following steps are included:
The authorization message for sending the authorization message of user data to server end and being processed using third party's terminal, and Authorized user message is deposited into card to block chain;
First data request information is encoded, generates the first authentication information, and by the first area authentication information Cun Zhengdao On block chain;
The first data request information is sent to server end;
Receive the second feedback data information of third party's terminal;
It verifies whether the second feedback data information is tampered according to the 4th authentication information, if being not tampered with, completes user Data authentication deposits card;
The server end the following steps are included:
Receive the first data request information of client;
According to the first data request information, the second requesting data information is generated, and issues the second request to third party's terminal Data information;
Receive the third requesting data information of third party's terminal sending, and third number of request is verified according to third authentication information It is believed that whether breath is tampered, if being not tampered with, whether user is verified to client and third party's authorization terminal, if authorization, Encapsulate user authorization data;
It is fed back according to third requesting data information, the first feedback data information is generated, by the first feedback data information It is encoded, generates the second authentication information, and the second authentication information is deposited into card to block chain;
The first feedback data information is sent to third party's terminal;
Third party's terminal the following steps are included:
Receive the second data request information that server end is sent;
It verifies whether the second data request information is tampered according to the first authentication information, if being not tampered with, verifies user Whether to client authorization;
If authorization receives the second requesting data information of server end transmission, according to the second requesting data information, generate Third requesting data information encodes third requesting data information, generates third authentication information, and by third authentication information Card is deposited to block chain;
The the first feedback data information for receiving server end, verifying the first feedback data information according to the second authentication information is It is no to be tampered;
If being not tampered with, the first feedback data information is processed, obtains the second feedback data information, it is anti-by second Feedback data information is encoded, and generates the 4th authentication information, and the 4th authentication information is deposited card to block chain;
The second feedback data information is sent to client.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
The embodiment of the invention provides a kind of, and the user data authentication based on block chain technology deposits the method and system of card, by In block chain technology itself have decentralization, data transparency, can not distort, collective maintenance the features such as, pass through the alliance of selection Block chain constructs block chain authentication that is traceable, anti-tamper, can supervising and guarantee privacy and deposits card system, which includes Client, third party's terminal and server end, not only can the act of authorization to user, third party's terminal and server end authentication Behavior is recorded entirely and can not be distorted, while monitoring party being allowed to supervise all records, it is ensured that data authentication process is closed It is legal to advise.
Detailed description of the invention
Fig. 1 is the method flow diagram that data authentication of the present invention deposits card;
Fig. 2 is the schematic diagram of client of the present invention;
Fig. 3 is the schematic diagram of server end of the present invention;
Fig. 4 is the schematic diagram of third party's terminal of the present invention.
Specific embodiment
The principle and features of the present invention will be described below with reference to the accompanying drawings, and the given examples are served only to explain the present invention, and It is non-to be used to limit the scope of the invention.
As shown in Figure 1, the present embodiment provides a kind of, the user data based on block chain technology authenticates the method for depositing card, described Method is applied to the client connecting with server end and third party's terminal, and the client includes client node, described Client node is added in block chain, and by the block chain to Web Publishing;The server end includes server end segment Point, the server-side node are added in block chain, and by the block chain to Web Publishing;Third party's terminal includes Third party's terminal node, third party's terminal node are added in block chain, and the block chain is wrapped to Web Publishing Include following steps:
The authorization that client is sent the authorization message of user data and processed using third party's terminal Information, and authorized user message is deposited into card to block chain;Authorization data includes transaction id, client coding, third party's terminal Coding, authorization data catalogue, authorization data catalogue fingerprint;
Client encodes the first data request information, generates the first authentication information, and the first authentication information is deposited It demonstrate,proves on block chain, the first solicited message includes the information such as ID card No., title number, license plate number, the first authentication information Including transaction id, client coding, the first solicited message data fingerprint, timestamp etc.;
Client sends the first data request information;
Server end receives the first data request information of client;
Server end verifies whether the first data request information is tampered according to the first authentication information, if being not tampered with, Into in next step;
Server end verifies whether user enters in next step client authorization if authorization;
Server end generates the second data request information according to the first data request information, and issues to third party's terminal Second requesting data information;
Third party's terminal receives the second requesting data information that server end is sent;
Third party's terminal verifies whether the second requesting data information is tampered according to the first authentication information, if being not tampered with, Then enter in next step;
Whether third party's terminal authentication user enters in next step client authorization if authorization;
Third party's terminal generates third requesting data information according to the second requesting data information, by third number of request it is believed that Breath is encoded, and generates third authentication information, and third authentication information is deposited card to block chain;Third solicited message includes body The information such as part card number, title number, license plate number, service-number, third authentication information include transaction id, third party's terminal volume Code, third solicited message data fingerprint, timestamp etc.;
Server end receives the third requesting data information of third party's terminal sending, and according to third authentication information verifying the Whether three requesting data informations are tampered, if being not tampered with, enter in next step;
Whether server end verifies user to client and third party's authorization terminal, if authorization, encapsulates user and authorizes number According to;It is fed back according to third requesting data information, generates the first feedback data information, the first feedback data information includes authorization User authorization data in data directory;First feedback data information is encoded, generates the second authentication information, and by second Authentication information deposits card to block chain;
Second authentication information includes transaction id, server end coding, the first feedback data information data fingerprint, timestamp Deng;
Server end sends the first feedback data information to third party's terminal;
First feedback data information of third party's terminal reception server end;
Third party's terminal verifies whether the first feedback data information is tampered according to the second authentication information, if being not tampered with, Then enter in next step;
Third party's terminal processes the first feedback data information, obtains the second feedback data information, by the second feedback Data information is encoded, and generates the 4th authentication information, and the 4th authentication information is deposited and is demonstrate,proved onto block chain, the second feedback data Information includes the result data after third party's terminal is processed according to user authorization data, and the 4th authentication information includes transaction id, the Tripartite's terminal coding, the second feedback data information data fingerprint, timestamp etc.;
Third party's terminal sends the second feedback data information to client;
Second feedback data information of client reception third party's terminal;
Client verifies whether the second feedback data information is tampered according to the 4th authentication information, complete if being not tampered with Card is deposited at user data authentication, transaction is completed.
Based on the above method, the present embodiment provides a kind of, and the user data based on block chain technology authenticates the system for depositing card, The system comprises client, server end and third party's terminals, wherein as shown in Fig. 2, client includes:
Authorization module, for sending the authorization message of user data to server end and being processed using third party's terminal Authorization message, and authorized user message is deposited into card on block chain;
First authentication information module generates the first authentication information, and will for encoding the first data request information First authentication information deposits card to block chain;
Sending module, for sending the first data request information to server end;
Receiving module, for receiving the second feedback data information of third party's terminal;
Authentication module, for verifying whether the second feedback data information is tampered according to the 4th authentication information, if not usurped Change, then completes user data authentication and deposit card.
As shown in figure 3, server end includes:
Receiving module, for receiving the first data request information of client;
First sending module, for according to the first data request information, generating the second requesting data information, and to third party Terminal issues the second requesting data information;
Authentication module, for receiving the third requesting data information of third party's terminal sending, and according to third authentication information Whether verifying third requesting data information is tampered, if being not tampered with, whether verifies user to client and third party's terminal Authorization, if authorization, encapsulates user authorization data;
Second authentication information module, for being fed back according to third requesting data information, generate the first feedback coefficient it is believed that Breath, the first feedback data information is encoded, and generates the second authentication information, and the second authentication information is deposited card to block chain On;
Second sending module is also used to send the first feedback data information to third party's terminal.
As shown in figure 4, third party's terminal includes:
Receiving module, for receiving the second data request information of server end transmission;
First authentication module, for verifying whether the second data request information is tampered according to the first authentication information, if not It is tampered, then whether verifies user to client authorization;
Third authentication information module, if receiving the second requesting data information of server end transmission for authorizing, according to Second requesting data information generates third requesting data information, third requesting data information is encoded, and generates third authentication Information, and third authentication information is deposited into card to block chain;
Second authentication module is verified for receiving the first feedback data information of server end according to the second authentication information Whether the first feedback data information is tampered;
4th authentication information module, if being processed to the first feedback data information for being not tampered with, obtaining second Feedback data information encodes the second feedback data information, generates the 4th authentication information, and the 4th authentication information is deposited card Onto block chain;
Sending module, for sending the second feedback data information to client.
The client the following steps are included:
The authorization message for sending the authorization message of user data to server end and being processed using third party's terminal, and Authorized user message is deposited into card to block chain;
First data request information is encoded, generates the first authentication information, and by the first area authentication information Cun Zhengdao On block chain;
The first data request information is sent to server end;
Receive the second feedback data information of third party's terminal;
It verifies whether the second feedback data information is tampered according to the 4th authentication information, if being not tampered with, completes user Data authentication deposits card;
The server end the following steps are included:
Receive the first data request information of client;
According to the first data request information, the second requesting data information is generated, and issues the second request to third party's terminal Data information;
Receive the third requesting data information of third party's terminal sending, and third number of request is verified according to third authentication information It is believed that whether breath is tampered, if being not tampered with, whether user is verified to client and third party's authorization terminal, if authorization, Encapsulate user authorization data;
It is fed back according to third requesting data information, the first feedback data information is generated, by the first feedback data information It is encoded, generates the second authentication information, and the second authentication information is deposited into card to block chain;
The first feedback data information is sent to third party's terminal;
Third party's terminal the following steps are included:
Receive the second data request information that server end is sent;
It verifies whether the second data request information is tampered according to the first authentication information, if being not tampered with, verifies user Whether to client authorization;
If authorization receives the second requesting data information of server end transmission, according to the second requesting data information, generate Third requesting data information encodes third requesting data information, generates third authentication information, and by third authentication information Card is deposited to block chain;
It is no to verify the first feedback data information according to the second authentication information for the first feedback data information for receiving server end It is tampered;
If being not tampered with, the first feedback data information is processed, obtains the second feedback data information, it is anti-by second Feedback data information is encoded, and generates the 4th authentication information, and the 4th authentication information is deposited card to block chain;
The second feedback data information is sent to client.
In the present embodiment, the client, server end and third party's terminal can be movable equipment, such as can Think smart phone, Flat electronic equipment, portable computer, personal digital assistant (PDA), mobile unit, POS machine or intelligence Energy wearable device etc..Alternatively, the client, server end and third party's terminal can also be desk device, such as can be with For television set, server, industrial personal computer (industrial control computer), personal computer (PC machine), all-in-one machine or intelligent self-service terminal (kiosk) etc..The client, server end and third party's terminal can have configuration data, visitor described in the configuration number Family end can have configuration data, and the configuration data can be to run on the client, server end and third party's end The application program at end provides running environment or service condition.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. a kind of user data based on block chain technology authenticates the method for depositing card, which is characterized in that the method be applied to The client that server end is connected with third party's terminal, and the client includes client node, the client node adds Enter into block chain, and by the block chain to Web Publishing, comprising the following steps:
The authorization message for sending the authorization message of user data to server end and being processed using third party's terminal, and will use Family authorization message deposits card to block chain;
First data request information is encoded, generates the first authentication information, and the first authentication information is deposited into card to block chain On;
The first data request information is sent to server end;
Receive the second feedback data information of third party's terminal;
It verifies whether the second feedback data information is tampered according to the 4th authentication information, if being not tampered with, completes user data Authentication deposits card.
2. the method that the data authentication according to claim 1 based on block chain technology deposits card, which is characterized in that described to award Flexible strategy are according to including transaction id, client coding, third party's terminal coding, authorization data catalogue, authorization data catalogue fingerprint;It is described First solicited message includes the information such as ID card No., title number, license plate number;First authentication information includes transaction Id, client coding, the first solicited message data fingerprint and timestamp.
3. a kind of user data based on block chain technology authenticates the method for depositing card, which is characterized in that the method be applied to The server end that client is connected with third party's terminal, the server end include server-side node, the server end segment Point is added in block chain, and by the block chain to Web Publishing, comprising the following steps:
Receive the first data request information of client;
According to the first data request information, the second requesting data information is generated, and issues the second request data to third party's terminal Information;
Receive third party's terminal sending third requesting data information, and according to third authentication information verify third number of request it is believed that Whether breath is tampered, if being not tampered with, verifies user whether to client and third party's authorization terminal, if authorization, encapsulates User authorization data;
It is fed back according to third requesting data information, generates the first feedback data information, the first feedback data information is carried out Coding generates the second authentication information, and the second authentication information is deposited card to block chain;
The first feedback data information is sent to third party's terminal.
4. the method that the data authentication according to claim 3 based on block chain technology deposits card, which is characterized in that described One feedback data information includes the user authorization data in authorization data catalogue
Second authentication information includes transaction id, server end coding, the first feedback data information data fingerprint and timestamp.
5. a kind of user data based on block chain technology authenticates the method for depositing card, which is characterized in that the method be applied to Third party's terminal of client and server end connection, third party's terminal includes third party's terminal node, the third party Terminal node is added in block chain, and by the block chain to Web Publishing, comprising the following steps:
Receive the second data request information that server end is sent;
It verifies whether the first authentication information is tampered according to the second data request information, if being not tampered with, whether verifies user To client authorization;
If authorization receives the second requesting data information of server end transmission, according to the second requesting data information, third is generated Requesting data information encodes third requesting data information, generates third authentication information, and third authentication information is deposited card Onto block chain;
Receive server end the first feedback data information, according to the second authentication information verify the first feedback data information whether by It distorts;
If being not tampered with, the first feedback data information is processed, obtains the second feedback data information, by the second feedback coefficient It is believed that breath is encoded, the 4th authentication information is generated, and the 4th authentication information is deposited into card to block chain;
The second feedback data information is sent to client.
6. the method that the data authentication according to claim 5 based on block chain technology deposits card, which is characterized in that described Three solicited messages include ID card No., title number, license plate number and service number information;The third authentication information includes Transaction id, third party's terminal coding, third solicited message data fingerprint and timestamp.
7. a kind of client, which is characterized in that be based on method described in claim 1, the client is separately connected server End and third party's terminal, and the client includes client node, and the client node is added in block chain, and by institute Block chain is stated to Web Publishing comprising:
Authorization module, for sending the authorization message of user data to server end and being awarded using what third party's terminal was processed Information is weighed, and authorized user message is deposited into card to block chain;
First authentication information module generates the first authentication information for encoding the first data request information, and by first Authentication information deposits card to block chain;
Sending module, for sending the first data request information to server end;
Receiving module, for receiving the second feedback data information of third party's terminal;
Authentication module, for verifying whether the second feedback data information is tampered according to the 4th authentication information, if being not tampered with, It completes user data authentication and deposits card.
8. a kind of server end, which is characterized in that be based on method as claimed in claim 3, the server end is separately connected visitor Family end is connected with third party's terminal, and the server end includes server-side node, and the server-side node is added to block In chain, and by the block chain to Web Publishing comprising:
Receiving module, for receiving the first data request information of client;
First sending module, for according to the first data request information, generating the second requesting data information, and to third party's terminal Issue the second requesting data information;
Authentication module is verified for receiving the third requesting data information of third party's terminal sending, and according to third authentication information Whether third requesting data information is tampered, if being not tampered with, whether verifies user to client and third party's authorization terminal, If authorization, encapsulates user authorization data;
Second authentication information module, for being fed back according to third requesting data information, the first feedback data information of generation will First feedback data information is encoded, and generates the second authentication information, and the second authentication information is deposited card to block chain;
Second sending module, for sending the first feedback data information to third party's terminal.
9. a kind of third party's terminal, based on the method described in claim 5, third party's terminal is separately connected client kimonos Business device end, third party's terminal includes third party's terminal node, and third party's terminal node is added in block chain, and will The block chain is to Web Publishing comprising:
Receiving module, for receiving the second data request information of server end transmission;
First authentication module, for verifying whether the second data request information is tampered according to the first authentication information, if not usurped Change, then whether verifies user to client authorization;
Third authentication information module, if the second requesting data information of server end transmission is received, according to second for authorizing Requesting data information generates third requesting data information, third requesting data information is encoded, and generates third authentication letter Breath, and third authentication information is deposited into card to block chain;
Second authentication module, for receiving the first feedback data information of server end, according to the first feedback data Information Authentication Second authentication information is no to be tampered;
4th authentication information module, if being processed to the first feedback data information for being not tampered with, obtaining the second feedback Data information encodes the second feedback data information, generates the 4th authentication information, and by the 4th area authentication information Cun Zhengdao On block chain;
Sending module, for sending the second feedback data information to client.
10. a kind of user data based on block chain technology authenticates the system for depositing card, which is characterized in that including claim 7 Third party's terminal of client, the server end of claim 8 and claim 9;
The client the following steps are included:
The authorization message for sending the authorization message of user data to server end and being processed using third party's terminal, and will use Family authorization message deposits card to block chain;
First data request information is encoded, generates the first authentication information, and the first authentication information is deposited into card to block chain On;
The first data request information is sent to server end;
Receive the second feedback data information of third party's terminal;
It verifies whether the second feedback data information is tampered according to the 4th authentication information, if being not tampered with, completes user data Authentication deposits card;
The server end the following steps are included:
Receive the first data request information of client;
According to the first data request information, the second requesting data information is generated, and issues the second request data to third party's terminal Information;
Receive third party's terminal sending third requesting data information, and according to third authentication information verify third number of request it is believed that Whether breath is tampered, if being not tampered with, verifies user whether to client and third party's authorization terminal, if authorization, encapsulates User authorization data;
It is fed back according to third requesting data information, generates the first feedback data information, the first feedback data information is carried out Coding generates the second authentication information, and the second authentication information is deposited card to block chain;
The first feedback data information is sent to third party's terminal;
Third party's terminal the following steps are included:
Receive the second data request information that server end is sent;
It verifies whether the second data request information is tampered according to the first authentication information, if being not tampered with, whether verifies user To client authorization;
If authorization receives the second requesting data information of server end transmission, according to the second requesting data information, third is generated Requesting data information encodes third requesting data information, generates third authentication information, and third authentication information is deposited card Onto block chain;
Receive server end the first feedback data information, according to the second authentication information verify the first feedback data information whether by It distorts;
If being not tampered with, the first feedback data information is processed, obtains the second feedback data information, by the second feedback coefficient It is believed that breath is encoded, the 4th authentication information is generated, and the 4th authentication information is deposited into card to block chain;
The second feedback data information is sent to client.
CN201811412768.4A 2018-11-23 2018-11-23 User data authentication and evidence storage method and system based on block chain technology Active CN109347865B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811412768.4A CN109347865B (en) 2018-11-23 2018-11-23 User data authentication and evidence storage method and system based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811412768.4A CN109347865B (en) 2018-11-23 2018-11-23 User data authentication and evidence storage method and system based on block chain technology

Publications (2)

Publication Number Publication Date
CN109347865A true CN109347865A (en) 2019-02-15
CN109347865B CN109347865B (en) 2021-10-01

Family

ID=65317707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811412768.4A Active CN109347865B (en) 2018-11-23 2018-11-23 User data authentication and evidence storage method and system based on block chain technology

Country Status (1)

Country Link
CN (1) CN109347865B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111355710A (en) * 2020-02-19 2020-06-30 腾讯科技(深圳)有限公司 Data request method and device of network service
CN111447238A (en) * 2020-04-13 2020-07-24 夏彬彬 Data sharing system based on block chain
CN111461687A (en) * 2020-03-23 2020-07-28 韩海韵 Application system of block chain service platform based on terminal equipment and implementation method thereof
CN112131309A (en) * 2020-08-28 2020-12-25 赣州圣享区块链技术有限公司 Data evidence storing method and system based on block chain technology

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150379510A1 (en) * 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.
CN106997525A (en) * 2017-04-10 2017-08-01 山大地纬软件股份有限公司 Digital license system based on block chain technology
CN107659610A (en) * 2017-08-02 2018-02-02 北京瑞卓喜投科技发展有限公司 Copyright protection methods, devices and systems based on block chain technology
CN108549825A (en) * 2018-03-14 2018-09-18 中链科技有限公司 A kind of file deposits card, verification and the means of proof and device
US10091180B1 (en) * 2012-03-20 2018-10-02 United Services Automobile Association (Usaa) Behavioral profiling method and system to authenticate a user
CN108665946A (en) * 2018-05-08 2018-10-16 阿里巴巴集团控股有限公司 A kind of access method and device of business datum

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10091180B1 (en) * 2012-03-20 2018-10-02 United Services Automobile Association (Usaa) Behavioral profiling method and system to authenticate a user
US20150379510A1 (en) * 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.
CN106997525A (en) * 2017-04-10 2017-08-01 山大地纬软件股份有限公司 Digital license system based on block chain technology
CN107659610A (en) * 2017-08-02 2018-02-02 北京瑞卓喜投科技发展有限公司 Copyright protection methods, devices and systems based on block chain technology
CN108549825A (en) * 2018-03-14 2018-09-18 中链科技有限公司 A kind of file deposits card, verification and the means of proof and device
CN108665946A (en) * 2018-05-08 2018-10-16 阿里巴巴集团控股有限公司 A kind of access method and device of business datum

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
享宇金服: "【案例】享宇金服:区块链授权存证体系", 《HTTPS://CLOUD.TENCENT.COM/DEVELOPER/ARTICLE/1107590》 *
李超,戴炳荣等: "基于区块链的数字版权保护与交易系统", 《现代计算机(专业版)》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111355710A (en) * 2020-02-19 2020-06-30 腾讯科技(深圳)有限公司 Data request method and device of network service
CN111461687A (en) * 2020-03-23 2020-07-28 韩海韵 Application system of block chain service platform based on terminal equipment and implementation method thereof
CN111461687B (en) * 2020-03-23 2023-07-07 韩海韵 Application system of block chain service platform based on terminal equipment and implementation method thereof
CN111447238A (en) * 2020-04-13 2020-07-24 夏彬彬 Data sharing system based on block chain
CN112131309A (en) * 2020-08-28 2020-12-25 赣州圣享区块链技术有限公司 Data evidence storing method and system based on block chain technology

Also Published As

Publication number Publication date
CN109347865B (en) 2021-10-01

Similar Documents

Publication Publication Date Title
Ma et al. The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance
CN111970129B (en) Data processing method and device based on block chain and readable storage medium
CN108881290B (en) Block chain based digital certificate use method, system and storage medium
EP2695354B1 (en) Method and system for authenticating entities by means of terminals
CN109347865A (en) A kind of user data authentication based on block chain technology deposits the method and system of card
CN110060037B (en) Distributed digital identity system based on block chain
TW202021307A (en) Cross-block chain interaction method and system, computer device, and storage medium
CN110689433A (en) Resource management information service system, method and device based on alliance chain
CN104994064B (en) A kind of authorization and authentication method and system based on client plug-in
CN110414270B (en) Personal data protection system and method based on block chain
CN112613956B (en) Bidding processing method and device
CA3050222A1 (en) System, methods, and devices for data storage and processing with identity management
CN109903123A (en) A kind of house lease method and system
CN114579943A (en) Employee digital identity management system and method based on block chain
CN113704210A (en) Data sharing method and electronic equipment
CN104079413A (en) Enhancement type one-time dynamic password authentication method and system
CN113486122A (en) Data sharing method and electronic equipment
CN113609224A (en) Crowdsourcing operation method and system for realizing privacy protection based on block chain
CN110458730A (en) A kind of personal electric signing system and method based on block chain
CN117151736A (en) Anti-electricity fraud management early warning method and system
CN109508553A (en) A kind of pair of user data carries out the method and system that authentication deposits card
CN102238186A (en) High-value control method
CN103577975A (en) Remote office system based on mobile communication network and control method of the remote office system
CN112927080A (en) Block chain technology-based multi-party information sharing method for power industry
WO2021137753A1 (en) Electronic authentication system and process using the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 610000 No. 5 Xiaojiahe Zheng street, Chengdu high tech Zone, Sichuan

Applicant after: Sichuan Xingzheng Information Technology Co.,Ltd.

Address before: 610000 No. 5 Xiaojiahe Zheng street, Chengdu high tech Zone, Sichuan

Applicant before: CHENGDU XINGZHENG ELECTRONIC GOVERNMENT AFFAIRS OPERATION SERVICES Co.,Ltd.

GR01 Patent grant
GR01 Patent grant