CN109347865A - A kind of user data authentication based on block chain technology deposits the method and system of card - Google Patents
A kind of user data authentication based on block chain technology deposits the method and system of card Download PDFInfo
- Publication number
- CN109347865A CN109347865A CN201811412768.4A CN201811412768A CN109347865A CN 109347865 A CN109347865 A CN 109347865A CN 201811412768 A CN201811412768 A CN 201811412768A CN 109347865 A CN109347865 A CN 109347865A
- Authority
- CN
- China
- Prior art keywords
- information
- data
- party
- terminal
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Abstract
The present invention relates to a kind of, and the user data authentication based on block chain technology deposits the method and system of card, the method is applied to the client connecting with server end and third party's terminal, and the client includes client node, the client node is added in block chain, and by the block chain to Web Publishing;The server end includes server-side node, and the server-side node is added in block chain, and by the block chain to Web Publishing;Third party's terminal includes third party's terminal node, and third party's terminal node is added in block chain, and by the block chain to Web Publishing.How the present invention is allowing the user safely, with closing rule to use individual privacy data in the prior art for solving, the legitimate rights and interests without influencing third party's terminal, and the technical issues of how to supervise and store these data.
Description
Technical field
The present invention relates to the safe mutual trust fields of citizen's information opening, and in particular to a kind of authentication based on block chain technology is deposited
The method and system of card.
Background technique
With the development of the times, the personal data that government affairs system is related to are more and more full and accurate, and each social framework (visitor
Family end) it is also further strong to the personal data demand of government affairs system (server end) generation.Government affairs system discloses a
People's private data may damage third party's terminal legitimate rights and interests after open, therefore, should obtain the agreement of third party's terminal.But
In a conventional manner, user uses my private data involved in government information in client authorization, if authorization message
It is stored in the localisation database of client, and is sent to server end by way of interface, and this database is also
It is by the client maintenance, then can have very big conjunction rule risk.Therefore, how to allow the individual privacy of government affairs system
Data are open to the society, how to allow user safely, with closing rule can use these data, the legal power without influencing third party's terminal
Benefit has become a pendulum problem preceding in terms of supervision layer and data storage.
Summary of the invention
In view of the problems of the existing technology, the embodiment of the invention provides a kind of user data based on block chain technology
Authentication deposits the method and system of card, how to allow the user safely, with closing rule to use individual privacy in the prior art for solving
Data, the legitimate rights and interests without influencing third party's terminal, and the technical issues of how to supervise and store these data;Passing through will
Authorized user message can not be distorted by decentralization, can be traced, and store shared use using the block chain technology of safety
Family authorization message is finally reached the purpose of the safe mutual trust of citizen's information opening.
The technical scheme to solve the above technical problems is that
In a first aspect, this application provides a kind of, the user data based on block chain technology authenticates the method for depositing card, described
Method is applied to the client connecting with server end and third party's terminal, and the client includes client node, described
Client node is added in block chain, and by the block chain to Web Publishing, comprising the following steps:
The authorization message for sending the authorization message of user data to server end and being processed using third party's terminal, and
Authorized user message is deposited into card to block chain;
First data request information is encoded, generates the first authentication information, and by the first area authentication information Cun Zhengdao
On block chain;
The first data request information is sent to server end;
Receive the second feedback data information of third party's terminal;
It verifies whether the second feedback data information is tampered according to the 4th authentication information, if being not tampered with, completes user
Data authentication deposits card.
Second aspect provides a kind of method that the user data authentication based on block chain technology deposits card, the method application
In the server end connecting with client and third party's terminal, the server end includes server-side node, the server
End node is added in block chain, and by the block chain to Web Publishing, comprising the following steps:
Receive the first data request information of client;
According to the first data request information, the second requesting data information is generated, and issues the second request to third party's terminal
Data information;
Receive the third requesting data information of third party's terminal sending, and third number of request is verified according to third authentication information
It is believed that whether breath is tampered, if being not tampered with, whether user is verified to client and third party's authorization terminal, if authorization,
Encapsulate user authorization data;
It is fed back according to third requesting data information, the first feedback data information is generated, by the first feedback data information
It is encoded, generates the second authentication information, and the second authentication information is deposited into card to block chain;
The first feedback data information is sent to third party's terminal.
The third aspect provides a kind of method that the user data authentication based on block chain technology deposits card, the method application
In the third party's terminal connecting with client and server end, third party's terminal includes third party's terminal node, and described
Tripartite's terminal node is added in block chain, and by the block chain to Web Publishing, comprising the following steps:
Receive the second data request information that server end is sent;
It verifies whether the second data request information is tampered according to the first authentication information, if being not tampered with, verifies user
Whether to client authorization;
If authorization receives the second requesting data information of server end transmission, according to the second requesting data information, generate
Third requesting data information encodes third requesting data information, generates third authentication information, and by third authentication information
Card is deposited to block chain;
The first feedback data information of server end is received, it is no according to first the second authentication information of feedback data Information Authentication
It is tampered;
If being not tampered with, the first feedback data information is processed, obtains the second feedback data information, it is anti-by second
Feedback data information is encoded, and generates the 4th authentication information, and the 4th authentication information is deposited card to block chain;
The second feedback data information is sent to client.
Fourth aspect provides a kind of client, and based on method described in above-mentioned first aspect, the client is separately connected
Server end and third party's terminal, and the client includes client node, the client node is added in block chain,
And by the block chain to Web Publishing comprising:
Authorization module, for sending the authorization message of user data to server end and being processed using third party's terminal
Authorization message, and authorized user message is deposited into card on block chain;
First authentication information module generates the first authentication information, and will for encoding the first data request information
First authentication information deposits card to block chain;
Sending module, for sending the first data request information to server end;
Receiving module, for receiving the second feedback data information of third party's terminal;
Authentication module, for verifying whether the second feedback data information is tampered according to the 4th authentication information, if not usurped
Change, then completes user data authentication and deposit card.
5th aspect, provides a kind of server end, based on method described in above-mentioned second aspect, the server end difference
Connection client is connected with third party's terminal, and the server end includes server-side node, and the server-side node is added
Into block chain, and by the block chain to Web Publishing comprising:
Receiving module, for receiving the first data request information of client;
First sending module, for according to the first data request information, generating the second requesting data information, and to third party
Terminal issues the second requesting data information;
Authentication module, for receiving the third requesting data information of third party's terminal sending, and according to third authentication information
Whether verifying third requesting data information is tampered, if being not tampered with, whether verifies user to client and third party's terminal
Authorization, if authorization, encapsulates user authorization data;
Second authentication information module, for being fed back according to third requesting data information, generate the first feedback coefficient it is believed that
Breath, the first feedback data information is encoded, and generates the second authentication information, and the second authentication information is deposited card to block chain
On;
Second sending module, for sending the first feedback data information to third party's terminal.
6th aspect, provides a kind of third party's terminal, based on method described in the above-mentioned third aspect, third party's terminal
It is separately connected client and server end, third party's terminal includes third party's terminal node, third party's terminal node
It is added in block chain, and by the block chain to Web Publishing comprising:
Receiving module, for receiving the second data request information of server end transmission;
First authentication module, for verifying whether the second data request information is tampered according to the first authentication information, if not
It is tampered, then whether verifies user to client authorization;
Third authentication information module, if receiving the second requesting data information of server end transmission for authorizing, according to
Second requesting data information generates third requesting data information, third requesting data information is encoded, and generates third authentication
Information, and third authentication information is deposited into card to block chain;
Second authentication module is verified for receiving the first feedback data information of server end according to the second authentication information
Whether the first feedback data information is tampered;
4th authentication information module, if being processed to the first feedback data information for being not tampered with, obtaining second
Feedback data information encodes the second feedback data information, generates the 4th authentication information, and the 4th authentication information is deposited card
Onto block chain;
Sending module, for sending the second feedback data information to client.
7th aspect provides a kind of system that the user data authentication based on block chain technology deposits card, including fourth aspect
Client, the 5th aspect server end and the 6th aspect third party's terminal;
The client the following steps are included:
The authorization message for sending the authorization message of user data to server end and being processed using third party's terminal, and
Authorized user message is deposited into card to block chain;
First data request information is encoded, generates the first authentication information, and by the first area authentication information Cun Zhengdao
On block chain;
The first data request information is sent to server end;
Receive the second feedback data information of third party's terminal;
It verifies whether the second feedback data information is tampered according to the 4th authentication information, if being not tampered with, completes user
Data authentication deposits card;
The server end the following steps are included:
Receive the first data request information of client;
According to the first data request information, the second requesting data information is generated, and issues the second request to third party's terminal
Data information;
Receive the third requesting data information of third party's terminal sending, and third number of request is verified according to third authentication information
It is believed that whether breath is tampered, if being not tampered with, whether user is verified to client and third party's authorization terminal, if authorization,
Encapsulate user authorization data;
It is fed back according to third requesting data information, the first feedback data information is generated, by the first feedback data information
It is encoded, generates the second authentication information, and the second authentication information is deposited into card to block chain;
The first feedback data information is sent to third party's terminal;
Third party's terminal the following steps are included:
Receive the second data request information that server end is sent;
It verifies whether the second data request information is tampered according to the first authentication information, if being not tampered with, verifies user
Whether to client authorization;
If authorization receives the second requesting data information of server end transmission, according to the second requesting data information, generate
Third requesting data information encodes third requesting data information, generates third authentication information, and by third authentication information
Card is deposited to block chain;
The the first feedback data information for receiving server end, verifying the first feedback data information according to the second authentication information is
It is no to be tampered;
If being not tampered with, the first feedback data information is processed, obtains the second feedback data information, it is anti-by second
Feedback data information is encoded, and generates the 4th authentication information, and the 4th authentication information is deposited card to block chain;
The second feedback data information is sent to client.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
The embodiment of the invention provides a kind of, and the user data authentication based on block chain technology deposits the method and system of card, by
In block chain technology itself have decentralization, data transparency, can not distort, collective maintenance the features such as, pass through the alliance of selection
Block chain constructs block chain authentication that is traceable, anti-tamper, can supervising and guarantee privacy and deposits card system, which includes
Client, third party's terminal and server end, not only can the act of authorization to user, third party's terminal and server end authentication
Behavior is recorded entirely and can not be distorted, while monitoring party being allowed to supervise all records, it is ensured that data authentication process is closed
It is legal to advise.
Detailed description of the invention
Fig. 1 is the method flow diagram that data authentication of the present invention deposits card;
Fig. 2 is the schematic diagram of client of the present invention;
Fig. 3 is the schematic diagram of server end of the present invention;
Fig. 4 is the schematic diagram of third party's terminal of the present invention.
Specific embodiment
The principle and features of the present invention will be described below with reference to the accompanying drawings, and the given examples are served only to explain the present invention, and
It is non-to be used to limit the scope of the invention.
As shown in Figure 1, the present embodiment provides a kind of, the user data based on block chain technology authenticates the method for depositing card, described
Method is applied to the client connecting with server end and third party's terminal, and the client includes client node, described
Client node is added in block chain, and by the block chain to Web Publishing;The server end includes server end segment
Point, the server-side node are added in block chain, and by the block chain to Web Publishing;Third party's terminal includes
Third party's terminal node, third party's terminal node are added in block chain, and the block chain is wrapped to Web Publishing
Include following steps:
The authorization that client is sent the authorization message of user data and processed using third party's terminal
Information, and authorized user message is deposited into card to block chain;Authorization data includes transaction id, client coding, third party's terminal
Coding, authorization data catalogue, authorization data catalogue fingerprint;
Client encodes the first data request information, generates the first authentication information, and the first authentication information is deposited
It demonstrate,proves on block chain, the first solicited message includes the information such as ID card No., title number, license plate number, the first authentication information
Including transaction id, client coding, the first solicited message data fingerprint, timestamp etc.;
Client sends the first data request information;
Server end receives the first data request information of client;
Server end verifies whether the first data request information is tampered according to the first authentication information, if being not tampered with,
Into in next step;
Server end verifies whether user enters in next step client authorization if authorization;
Server end generates the second data request information according to the first data request information, and issues to third party's terminal
Second requesting data information;
Third party's terminal receives the second requesting data information that server end is sent;
Third party's terminal verifies whether the second requesting data information is tampered according to the first authentication information, if being not tampered with,
Then enter in next step;
Whether third party's terminal authentication user enters in next step client authorization if authorization;
Third party's terminal generates third requesting data information according to the second requesting data information, by third number of request it is believed that
Breath is encoded, and generates third authentication information, and third authentication information is deposited card to block chain;Third solicited message includes body
The information such as part card number, title number, license plate number, service-number, third authentication information include transaction id, third party's terminal volume
Code, third solicited message data fingerprint, timestamp etc.;
Server end receives the third requesting data information of third party's terminal sending, and according to third authentication information verifying the
Whether three requesting data informations are tampered, if being not tampered with, enter in next step;
Whether server end verifies user to client and third party's authorization terminal, if authorization, encapsulates user and authorizes number
According to;It is fed back according to third requesting data information, generates the first feedback data information, the first feedback data information includes authorization
User authorization data in data directory;First feedback data information is encoded, generates the second authentication information, and by second
Authentication information deposits card to block chain;
Second authentication information includes transaction id, server end coding, the first feedback data information data fingerprint, timestamp
Deng;
Server end sends the first feedback data information to third party's terminal;
First feedback data information of third party's terminal reception server end;
Third party's terminal verifies whether the first feedback data information is tampered according to the second authentication information, if being not tampered with,
Then enter in next step;
Third party's terminal processes the first feedback data information, obtains the second feedback data information, by the second feedback
Data information is encoded, and generates the 4th authentication information, and the 4th authentication information is deposited and is demonstrate,proved onto block chain, the second feedback data
Information includes the result data after third party's terminal is processed according to user authorization data, and the 4th authentication information includes transaction id, the
Tripartite's terminal coding, the second feedback data information data fingerprint, timestamp etc.;
Third party's terminal sends the second feedback data information to client;
Second feedback data information of client reception third party's terminal;
Client verifies whether the second feedback data information is tampered according to the 4th authentication information, complete if being not tampered with
Card is deposited at user data authentication, transaction is completed.
Based on the above method, the present embodiment provides a kind of, and the user data based on block chain technology authenticates the system for depositing card,
The system comprises client, server end and third party's terminals, wherein as shown in Fig. 2, client includes:
Authorization module, for sending the authorization message of user data to server end and being processed using third party's terminal
Authorization message, and authorized user message is deposited into card on block chain;
First authentication information module generates the first authentication information, and will for encoding the first data request information
First authentication information deposits card to block chain;
Sending module, for sending the first data request information to server end;
Receiving module, for receiving the second feedback data information of third party's terminal;
Authentication module, for verifying whether the second feedback data information is tampered according to the 4th authentication information, if not usurped
Change, then completes user data authentication and deposit card.
As shown in figure 3, server end includes:
Receiving module, for receiving the first data request information of client;
First sending module, for according to the first data request information, generating the second requesting data information, and to third party
Terminal issues the second requesting data information;
Authentication module, for receiving the third requesting data information of third party's terminal sending, and according to third authentication information
Whether verifying third requesting data information is tampered, if being not tampered with, whether verifies user to client and third party's terminal
Authorization, if authorization, encapsulates user authorization data;
Second authentication information module, for being fed back according to third requesting data information, generate the first feedback coefficient it is believed that
Breath, the first feedback data information is encoded, and generates the second authentication information, and the second authentication information is deposited card to block chain
On;
Second sending module is also used to send the first feedback data information to third party's terminal.
As shown in figure 4, third party's terminal includes:
Receiving module, for receiving the second data request information of server end transmission;
First authentication module, for verifying whether the second data request information is tampered according to the first authentication information, if not
It is tampered, then whether verifies user to client authorization;
Third authentication information module, if receiving the second requesting data information of server end transmission for authorizing, according to
Second requesting data information generates third requesting data information, third requesting data information is encoded, and generates third authentication
Information, and third authentication information is deposited into card to block chain;
Second authentication module is verified for receiving the first feedback data information of server end according to the second authentication information
Whether the first feedback data information is tampered;
4th authentication information module, if being processed to the first feedback data information for being not tampered with, obtaining second
Feedback data information encodes the second feedback data information, generates the 4th authentication information, and the 4th authentication information is deposited card
Onto block chain;
Sending module, for sending the second feedback data information to client.
The client the following steps are included:
The authorization message for sending the authorization message of user data to server end and being processed using third party's terminal, and
Authorized user message is deposited into card to block chain;
First data request information is encoded, generates the first authentication information, and by the first area authentication information Cun Zhengdao
On block chain;
The first data request information is sent to server end;
Receive the second feedback data information of third party's terminal;
It verifies whether the second feedback data information is tampered according to the 4th authentication information, if being not tampered with, completes user
Data authentication deposits card;
The server end the following steps are included:
Receive the first data request information of client;
According to the first data request information, the second requesting data information is generated, and issues the second request to third party's terminal
Data information;
Receive the third requesting data information of third party's terminal sending, and third number of request is verified according to third authentication information
It is believed that whether breath is tampered, if being not tampered with, whether user is verified to client and third party's authorization terminal, if authorization,
Encapsulate user authorization data;
It is fed back according to third requesting data information, the first feedback data information is generated, by the first feedback data information
It is encoded, generates the second authentication information, and the second authentication information is deposited into card to block chain;
The first feedback data information is sent to third party's terminal;
Third party's terminal the following steps are included:
Receive the second data request information that server end is sent;
It verifies whether the second data request information is tampered according to the first authentication information, if being not tampered with, verifies user
Whether to client authorization;
If authorization receives the second requesting data information of server end transmission, according to the second requesting data information, generate
Third requesting data information encodes third requesting data information, generates third authentication information, and by third authentication information
Card is deposited to block chain;
It is no to verify the first feedback data information according to the second authentication information for the first feedback data information for receiving server end
It is tampered;
If being not tampered with, the first feedback data information is processed, obtains the second feedback data information, it is anti-by second
Feedback data information is encoded, and generates the 4th authentication information, and the 4th authentication information is deposited card to block chain;
The second feedback data information is sent to client.
In the present embodiment, the client, server end and third party's terminal can be movable equipment, such as can
Think smart phone, Flat electronic equipment, portable computer, personal digital assistant (PDA), mobile unit, POS machine or intelligence
Energy wearable device etc..Alternatively, the client, server end and third party's terminal can also be desk device, such as can be with
For television set, server, industrial personal computer (industrial control computer), personal computer (PC machine), all-in-one machine or intelligent self-service terminal
(kiosk) etc..The client, server end and third party's terminal can have configuration data, visitor described in the configuration number
Family end can have configuration data, and the configuration data can be to run on the client, server end and third party's end
The application program at end provides running environment or service condition.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (10)
1. a kind of user data based on block chain technology authenticates the method for depositing card, which is characterized in that the method be applied to
The client that server end is connected with third party's terminal, and the client includes client node, the client node adds
Enter into block chain, and by the block chain to Web Publishing, comprising the following steps:
The authorization message for sending the authorization message of user data to server end and being processed using third party's terminal, and will use
Family authorization message deposits card to block chain;
First data request information is encoded, generates the first authentication information, and the first authentication information is deposited into card to block chain
On;
The first data request information is sent to server end;
Receive the second feedback data information of third party's terminal;
It verifies whether the second feedback data information is tampered according to the 4th authentication information, if being not tampered with, completes user data
Authentication deposits card.
2. the method that the data authentication according to claim 1 based on block chain technology deposits card, which is characterized in that described to award
Flexible strategy are according to including transaction id, client coding, third party's terminal coding, authorization data catalogue, authorization data catalogue fingerprint;It is described
First solicited message includes the information such as ID card No., title number, license plate number;First authentication information includes transaction
Id, client coding, the first solicited message data fingerprint and timestamp.
3. a kind of user data based on block chain technology authenticates the method for depositing card, which is characterized in that the method be applied to
The server end that client is connected with third party's terminal, the server end include server-side node, the server end segment
Point is added in block chain, and by the block chain to Web Publishing, comprising the following steps:
Receive the first data request information of client;
According to the first data request information, the second requesting data information is generated, and issues the second request data to third party's terminal
Information;
Receive third party's terminal sending third requesting data information, and according to third authentication information verify third number of request it is believed that
Whether breath is tampered, if being not tampered with, verifies user whether to client and third party's authorization terminal, if authorization, encapsulates
User authorization data;
It is fed back according to third requesting data information, generates the first feedback data information, the first feedback data information is carried out
Coding generates the second authentication information, and the second authentication information is deposited card to block chain;
The first feedback data information is sent to third party's terminal.
4. the method that the data authentication according to claim 3 based on block chain technology deposits card, which is characterized in that described
One feedback data information includes the user authorization data in authorization data catalogue
Second authentication information includes transaction id, server end coding, the first feedback data information data fingerprint and timestamp.
5. a kind of user data based on block chain technology authenticates the method for depositing card, which is characterized in that the method be applied to
Third party's terminal of client and server end connection, third party's terminal includes third party's terminal node, the third party
Terminal node is added in block chain, and by the block chain to Web Publishing, comprising the following steps:
Receive the second data request information that server end is sent;
It verifies whether the first authentication information is tampered according to the second data request information, if being not tampered with, whether verifies user
To client authorization;
If authorization receives the second requesting data information of server end transmission, according to the second requesting data information, third is generated
Requesting data information encodes third requesting data information, generates third authentication information, and third authentication information is deposited card
Onto block chain;
Receive server end the first feedback data information, according to the second authentication information verify the first feedback data information whether by
It distorts;
If being not tampered with, the first feedback data information is processed, obtains the second feedback data information, by the second feedback coefficient
It is believed that breath is encoded, the 4th authentication information is generated, and the 4th authentication information is deposited into card to block chain;
The second feedback data information is sent to client.
6. the method that the data authentication according to claim 5 based on block chain technology deposits card, which is characterized in that described
Three solicited messages include ID card No., title number, license plate number and service number information;The third authentication information includes
Transaction id, third party's terminal coding, third solicited message data fingerprint and timestamp.
7. a kind of client, which is characterized in that be based on method described in claim 1, the client is separately connected server
End and third party's terminal, and the client includes client node, and the client node is added in block chain, and by institute
Block chain is stated to Web Publishing comprising:
Authorization module, for sending the authorization message of user data to server end and being awarded using what third party's terminal was processed
Information is weighed, and authorized user message is deposited into card to block chain;
First authentication information module generates the first authentication information for encoding the first data request information, and by first
Authentication information deposits card to block chain;
Sending module, for sending the first data request information to server end;
Receiving module, for receiving the second feedback data information of third party's terminal;
Authentication module, for verifying whether the second feedback data information is tampered according to the 4th authentication information, if being not tampered with,
It completes user data authentication and deposits card.
8. a kind of server end, which is characterized in that be based on method as claimed in claim 3, the server end is separately connected visitor
Family end is connected with third party's terminal, and the server end includes server-side node, and the server-side node is added to block
In chain, and by the block chain to Web Publishing comprising:
Receiving module, for receiving the first data request information of client;
First sending module, for according to the first data request information, generating the second requesting data information, and to third party's terminal
Issue the second requesting data information;
Authentication module is verified for receiving the third requesting data information of third party's terminal sending, and according to third authentication information
Whether third requesting data information is tampered, if being not tampered with, whether verifies user to client and third party's authorization terminal,
If authorization, encapsulates user authorization data;
Second authentication information module, for being fed back according to third requesting data information, the first feedback data information of generation will
First feedback data information is encoded, and generates the second authentication information, and the second authentication information is deposited card to block chain;
Second sending module, for sending the first feedback data information to third party's terminal.
9. a kind of third party's terminal, based on the method described in claim 5, third party's terminal is separately connected client kimonos
Business device end, third party's terminal includes third party's terminal node, and third party's terminal node is added in block chain, and will
The block chain is to Web Publishing comprising:
Receiving module, for receiving the second data request information of server end transmission;
First authentication module, for verifying whether the second data request information is tampered according to the first authentication information, if not usurped
Change, then whether verifies user to client authorization;
Third authentication information module, if the second requesting data information of server end transmission is received, according to second for authorizing
Requesting data information generates third requesting data information, third requesting data information is encoded, and generates third authentication letter
Breath, and third authentication information is deposited into card to block chain;
Second authentication module, for receiving the first feedback data information of server end, according to the first feedback data Information Authentication
Second authentication information is no to be tampered;
4th authentication information module, if being processed to the first feedback data information for being not tampered with, obtaining the second feedback
Data information encodes the second feedback data information, generates the 4th authentication information, and by the 4th area authentication information Cun Zhengdao
On block chain;
Sending module, for sending the second feedback data information to client.
10. a kind of user data based on block chain technology authenticates the system for depositing card, which is characterized in that including claim 7
Third party's terminal of client, the server end of claim 8 and claim 9;
The client the following steps are included:
The authorization message for sending the authorization message of user data to server end and being processed using third party's terminal, and will use
Family authorization message deposits card to block chain;
First data request information is encoded, generates the first authentication information, and the first authentication information is deposited into card to block chain
On;
The first data request information is sent to server end;
Receive the second feedback data information of third party's terminal;
It verifies whether the second feedback data information is tampered according to the 4th authentication information, if being not tampered with, completes user data
Authentication deposits card;
The server end the following steps are included:
Receive the first data request information of client;
According to the first data request information, the second requesting data information is generated, and issues the second request data to third party's terminal
Information;
Receive third party's terminal sending third requesting data information, and according to third authentication information verify third number of request it is believed that
Whether breath is tampered, if being not tampered with, verifies user whether to client and third party's authorization terminal, if authorization, encapsulates
User authorization data;
It is fed back according to third requesting data information, generates the first feedback data information, the first feedback data information is carried out
Coding generates the second authentication information, and the second authentication information is deposited card to block chain;
The first feedback data information is sent to third party's terminal;
Third party's terminal the following steps are included:
Receive the second data request information that server end is sent;
It verifies whether the second data request information is tampered according to the first authentication information, if being not tampered with, whether verifies user
To client authorization;
If authorization receives the second requesting data information of server end transmission, according to the second requesting data information, third is generated
Requesting data information encodes third requesting data information, generates third authentication information, and third authentication information is deposited card
Onto block chain;
Receive server end the first feedback data information, according to the second authentication information verify the first feedback data information whether by
It distorts;
If being not tampered with, the first feedback data information is processed, obtains the second feedback data information, by the second feedback coefficient
It is believed that breath is encoded, the 4th authentication information is generated, and the 4th authentication information is deposited into card to block chain;
The second feedback data information is sent to client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811412768.4A CN109347865B (en) | 2018-11-23 | 2018-11-23 | User data authentication and evidence storage method and system based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811412768.4A CN109347865B (en) | 2018-11-23 | 2018-11-23 | User data authentication and evidence storage method and system based on block chain technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109347865A true CN109347865A (en) | 2019-02-15 |
CN109347865B CN109347865B (en) | 2021-10-01 |
Family
ID=65317707
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811412768.4A Active CN109347865B (en) | 2018-11-23 | 2018-11-23 | User data authentication and evidence storage method and system based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109347865B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111355710A (en) * | 2020-02-19 | 2020-06-30 | 腾讯科技(深圳)有限公司 | Data request method and device of network service |
CN111447238A (en) * | 2020-04-13 | 2020-07-24 | 夏彬彬 | Data sharing system based on block chain |
CN111461687A (en) * | 2020-03-23 | 2020-07-28 | 韩海韵 | Application system of block chain service platform based on terminal equipment and implementation method thereof |
CN112131309A (en) * | 2020-08-28 | 2020-12-25 | 赣州圣享区块链技术有限公司 | Data evidence storing method and system based on block chain technology |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150379510A1 (en) * | 2012-07-10 | 2015-12-31 | Stanley Benjamin Smith | Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain. |
CN106997525A (en) * | 2017-04-10 | 2017-08-01 | 山大地纬软件股份有限公司 | Digital license system based on block chain technology |
CN107659610A (en) * | 2017-08-02 | 2018-02-02 | 北京瑞卓喜投科技发展有限公司 | Copyright protection methods, devices and systems based on block chain technology |
CN108549825A (en) * | 2018-03-14 | 2018-09-18 | 中链科技有限公司 | A kind of file deposits card, verification and the means of proof and device |
US10091180B1 (en) * | 2012-03-20 | 2018-10-02 | United Services Automobile Association (Usaa) | Behavioral profiling method and system to authenticate a user |
CN108665946A (en) * | 2018-05-08 | 2018-10-16 | 阿里巴巴集团控股有限公司 | A kind of access method and device of business datum |
-
2018
- 2018-11-23 CN CN201811412768.4A patent/CN109347865B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10091180B1 (en) * | 2012-03-20 | 2018-10-02 | United Services Automobile Association (Usaa) | Behavioral profiling method and system to authenticate a user |
US20150379510A1 (en) * | 2012-07-10 | 2015-12-31 | Stanley Benjamin Smith | Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain. |
CN106997525A (en) * | 2017-04-10 | 2017-08-01 | 山大地纬软件股份有限公司 | Digital license system based on block chain technology |
CN107659610A (en) * | 2017-08-02 | 2018-02-02 | 北京瑞卓喜投科技发展有限公司 | Copyright protection methods, devices and systems based on block chain technology |
CN108549825A (en) * | 2018-03-14 | 2018-09-18 | 中链科技有限公司 | A kind of file deposits card, verification and the means of proof and device |
CN108665946A (en) * | 2018-05-08 | 2018-10-16 | 阿里巴巴集团控股有限公司 | A kind of access method and device of business datum |
Non-Patent Citations (2)
Title |
---|
享宇金服: "【案例】享宇金服:区块链授权存证体系", 《HTTPS://CLOUD.TENCENT.COM/DEVELOPER/ARTICLE/1107590》 * |
李超,戴炳荣等: "基于区块链的数字版权保护与交易系统", 《现代计算机(专业版)》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111355710A (en) * | 2020-02-19 | 2020-06-30 | 腾讯科技(深圳)有限公司 | Data request method and device of network service |
CN111461687A (en) * | 2020-03-23 | 2020-07-28 | 韩海韵 | Application system of block chain service platform based on terminal equipment and implementation method thereof |
CN111461687B (en) * | 2020-03-23 | 2023-07-07 | 韩海韵 | Application system of block chain service platform based on terminal equipment and implementation method thereof |
CN111447238A (en) * | 2020-04-13 | 2020-07-24 | 夏彬彬 | Data sharing system based on block chain |
CN112131309A (en) * | 2020-08-28 | 2020-12-25 | 赣州圣享区块链技术有限公司 | Data evidence storing method and system based on block chain technology |
Also Published As
Publication number | Publication date |
---|---|
CN109347865B (en) | 2021-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ma et al. | The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance | |
CN111970129B (en) | Data processing method and device based on block chain and readable storage medium | |
CN108881290B (en) | Block chain based digital certificate use method, system and storage medium | |
EP2695354B1 (en) | Method and system for authenticating entities by means of terminals | |
CN109347865A (en) | A kind of user data authentication based on block chain technology deposits the method and system of card | |
CN110060037B (en) | Distributed digital identity system based on block chain | |
TW202021307A (en) | Cross-block chain interaction method and system, computer device, and storage medium | |
CN110689433A (en) | Resource management information service system, method and device based on alliance chain | |
CN104994064B (en) | A kind of authorization and authentication method and system based on client plug-in | |
CN110414270B (en) | Personal data protection system and method based on block chain | |
CN112613956B (en) | Bidding processing method and device | |
CA3050222A1 (en) | System, methods, and devices for data storage and processing with identity management | |
CN109903123A (en) | A kind of house lease method and system | |
CN114579943A (en) | Employee digital identity management system and method based on block chain | |
CN113704210A (en) | Data sharing method and electronic equipment | |
CN104079413A (en) | Enhancement type one-time dynamic password authentication method and system | |
CN113486122A (en) | Data sharing method and electronic equipment | |
CN113609224A (en) | Crowdsourcing operation method and system for realizing privacy protection based on block chain | |
CN110458730A (en) | A kind of personal electric signing system and method based on block chain | |
CN117151736A (en) | Anti-electricity fraud management early warning method and system | |
CN109508553A (en) | A kind of pair of user data carries out the method and system that authentication deposits card | |
CN102238186A (en) | High-value control method | |
CN103577975A (en) | Remote office system based on mobile communication network and control method of the remote office system | |
CN112927080A (en) | Block chain technology-based multi-party information sharing method for power industry | |
WO2021137753A1 (en) | Electronic authentication system and process using the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 610000 No. 5 Xiaojiahe Zheng street, Chengdu high tech Zone, Sichuan Applicant after: Sichuan Xingzheng Information Technology Co.,Ltd. Address before: 610000 No. 5 Xiaojiahe Zheng street, Chengdu high tech Zone, Sichuan Applicant before: CHENGDU XINGZHENG ELECTRONIC GOVERNMENT AFFAIRS OPERATION SERVICES Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |