CN109493058A - A kind of personal identification method and relevant device based on block chain - Google Patents

A kind of personal identification method and relevant device based on block chain Download PDF

Info

Publication number
CN109493058A
CN109493058A CN201811533089.2A CN201811533089A CN109493058A CN 109493058 A CN109493058 A CN 109493058A CN 201811533089 A CN201811533089 A CN 201811533089A CN 109493058 A CN109493058 A CN 109493058A
Authority
CN
China
Prior art keywords
information
user
identification
block chain
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811533089.2A
Other languages
Chinese (zh)
Inventor
闵锰锰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN201811533089.2A priority Critical patent/CN109493058A/en
Publication of CN109493058A publication Critical patent/CN109493058A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

This application discloses a kind of personal identification method and relevant device based on block chain, the described method includes: obtaining userspersonal information, user's electronic identity is generated according to the userspersonal information, and is stored in block chain after the userspersonal information is encrypted by key;When user's electronic identity is identified equipment identification, the personal information for identifying equipment and obtaining the corresponding userspersonal information of user's electronic identity and being stored on block chain;When the corresponding userspersonal information of user's electronic identity of acquisition matches with the personal information stored on block chain, identification record information is generated, and be stored in block chain after the identification record information is encrypted by key.The application is by, in block chain, generating electronic identity according to personal information, and according to identification record information update electronic identity, thus avoid electronic identity from being tampered and cause user's property loss for personal information storage.

Description

A kind of personal identification method and relevant device based on block chain
Technical field
This application involves information security field, in particular to a kind of personal identification method and correlation based on block chain is set It is standby.
Background technique
As science and technology constantly develops, people's lives are more and more convenient, and intelligent and electronization is future direction, such as Stored value card, electronic ID card etc..By Web bank and mobile-phone payment, people can not have to band wallet again and go out, and pass through Scanning payment two dimensional code can easily realize on-line payment, can not have to band identity card again by electronic ID card people and go out, By the electronic ID card on scanning user mobile phone, user identity can be easily obtained, identity is authenticated.But wallet and The above-mentioned article such as identity card is related to the privacy and safety of user, if electronic, by criminal may distort and It forges, brings loss to the property of user, although the unique of user's electronic identity may be implemented by two dimensional code at present, not It is evitable to be forged by people.And memory space of the block chain as a safety, the characteristic that has encryption and can not distort, therefore It can be by cooperating the prior art to solve the above problems using the characteristic.
Summary of the invention
The purpose of the application be to provide in view of the deficiencies of the prior art a kind of personal identification method based on block chain and Relevant device generates electronic identity according to personal information, and will identify every time by the way that personal information is stored encrypted in block chain Record information is stored encrypted in block chain, according to identification record information update electronic identity, thus avoids electronic identity due to quilt It distorts or forges and cause user's property loss.
In order to achieve the above objectives, the technical solution of the application provides a kind of personal identification method and correlation based on block chain Equipment.
This application discloses a kind of personal identification methods based on block chain, comprising the following steps:
Userspersonal information is obtained, user's electronic identity is generated according to the userspersonal information, and the user is a People's information is stored in block chain after encrypting by key;
When user's electronic identity is identified equipment identification, the identification equipment obtains user's electronic identity pair The userspersonal information answered and the personal information being stored on block chain;
As the corresponding userspersonal information of user's electronic identity and the individual being stored on block chain of acquisition When information matches, identification record information is generated, and be stored in block chain after the identification record information is encrypted by key.
Preferably, described when user's electronic identity is identified equipment identification, the identification equipment obtains the use Personal information family electronic identity corresponding userspersonal information and be stored on block chain, comprising:
When user's electronic identity is identified equipment identification, the identification equipment sends userspersonal information to user Request;
After the user receives userspersonal information request, the userspersonal information is sent to the identification Equipment.
Preferably, described when user's electronic identity is identified equipment identification, the identification equipment obtains the use Personal information family electronic identity corresponding userspersonal information and be stored on block chain, comprising:
After the identification equipment receives user's electronic identity corresponding userspersonal information, the identification equipment to Block chain sends userspersonal information's request;
After the block chain receives userspersonal information request, the userspersonal information is inquired, and will inquiry To the userspersonal information be sent to the identification equipment.
Preferably, described when user's electronic identity is identified equipment identification, the identification equipment obtains the use Personal information family electronic identity corresponding userspersonal information and be stored on block chain, comprising:
When user's electronic identity is identified equipment identification, identification equipment generation public key and private key, and to Family sends the public key and cipher key request information;
After the user receives the public key and cipher key request information, by the key by being sent out after the public key encryption Give the identification equipment;
After the identification equipment receives the key after public key encryption, added to described through public key by the private key Key after close is decrypted.
Preferably, it is described after the identification equipment receives the key after public key encryption, pass through the private key pair After the key after public key encryption is decrypted, comprising:
After the identification equipment is to the key successful decryption after public key encryption, individual subscriber is sent to block chain Information request;
After the block chain receives userspersonal information request, the userspersonal information of encryption is sent to The identification equipment;
After the identification equipment receives the userspersonal information of the encryption, pass through the use of encryption described in the key pair Family personal information is decrypted.
Preferably, described when the corresponding userspersonal information of user's electronic identity obtained is stored in block with described When personal information on chain matches, identification record information is generated, and store after the identification record information is encrypted by key After block chain, comprising:
According to user's electronic identity described in the identification record information update;
When user's electronic identity, which is identified equipment, to be again identified that, the identification equipment sends individual subscriber to user Information and identification record information request.
Preferably, described when the corresponding userspersonal information of user's electronic identity obtained is stored in block with described When personal information on chain matches, identification record information is generated, and store after the identification record information is encrypted by key After block chain, comprising:
Identification success message is sent to user;
After the user receives the identification success message, according to user's electronics described in the identification record information update Identity.
Disclosed herein as well is a kind of identity recognition device based on block chain, described device includes:
Identity information acquisition module: being set as obtaining userspersonal information, generates user according to the userspersonal information Electronic identity, and block chain is stored in after the userspersonal information is encrypted by key;
Identity information identification module: it is set as when user's electronic identity is identified equipment identification, the identification is set The standby personal information for obtaining the corresponding userspersonal information of user's electronic identity and being stored on block chain;
Identity information update module: it is set as the corresponding userspersonal information of user's electronic identity and institute obtained It states and stores in the personal information matching on block chain, generate identification record information, and by the identification record information by close Block chain is stored in after key encryption.
Disclosed herein as well is a kind of computer equipment, including memory and processor, meter is stored in the memory Calculation machine readable instruction, when the computer-readable instruction is executed by the processor, so that processor execution is described above The step of method.
Disclosed herein as well is a kind of storage medium for being stored with computer-readable instruction, the computer-readable instruction quilt When one or more processors execute, so that the step of one or more processors execute method described above.
The beneficial effect of the application is: the application is by being stored encrypted in block chain for personal information, according to personal information Electronic identity is generated, and each identification record information is stored encrypted in block chain, according to identification record information update electronics body Part, thus avoid electronic identity from causing user's property loss due to being tampered or forging.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 2 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 3 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 4 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 5 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 6 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 7 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 8 is a kind of identity recognition device structural schematic diagram based on block chain of the embodiment of the present application.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and It is not used in restriction the application.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in the description of the present application Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.
A kind of personal identification method process based on block chain of the embodiment of the present application is as described in Figure 1, and the present embodiment includes Following steps:
Step s101 obtains userspersonal information, generates user's electronic identity according to the userspersonal information, and by institute It states after userspersonal information is encrypted by key and is stored in block chain;
Specifically, the userspersonal information is directed to the personal relevant information of user, individual's biology including user Information and personal characteristic information, the personal biological information includes the personal information of some static state, such as name, nationality, household register Location, identification card number etc., and the personal characteristic information includes some information of user's dynamic generation in daily life, for example disappears Take record, authentication record and access record etc..
Specifically, the personal information can be implemented by two dimensional code or bar code generating at electronic identity in the present invention In example, preferably two dimensional code;Wherein, during generating two dimensional code, it can generate one by way of encryption and prevent Pseudo- two dimensional code, subsequent in this way when identifying to two dimensional code identity, two dimensional code identification equipment also needs to have corresponding anti- Antiforge system just can be carried out identification, guarantee the safety of information transmission.
Specifically, each user can safeguard public key, private key and key on block chain, wherein key is used for storage Therefore data progress encryption and decryption on block chain in embodiments of the present invention, generates electronics body when passing through the personal information After part, it is stored on block chain after being encrypted by key pair personal information.Since key is in user hand, and block chain What upper current Encryption Algorithm can not substantially be cracked, therefore can guarantee the safety of data, only user oneself or The personnel of user's authorization are just accessible;The key of the user can be regularly replaced or update, and guarantee the peace of user data Entirely.
Step s102, when user's electronic identity is identified equipment identification, the identification equipment obtains the user Personal information electronic identity corresponding userspersonal information and be stored on block chain;
Specifically, user's electronic identity can be scanned equipment identification, such as the barcode scanning equipment of trade company, can also be tested Demonstrate,prove equipment identification, such as access control system.Such as when user wants to enter certain region, need to safety check Jing Guo access control system, that is, examine use The identity at family, at this moment user can show the electronic identity on the mobile terminals such as mobile phone or tablet computer, when body in access control system Part verifying equipment is verified the electronic identity of user, and user is allowed for access.
Specifically, when the identification equipment identifies the electronic identity of user, since usual user passes through mobile phone Etc. mobile devices show electronic identity, therefore the identification equipment can send public key to mobile devices such as the mobile phones of user, In the embodiment of the present invention, each equipment can safeguard a pair of of public key and private key after block chain is added, and wherein public key and private key are to match Pair, after the mobile devices such as the mobile phone of user receive public key, is encrypted according to key of the public key to user, then sent To the identification equipment, it is possible thereby to which key is avoided to obtain to unauthorized person.But it is also possible to during sending public key It is obtained by unauthorized person, therefore the enciphering and deciphering algorithm in the embodiment of the present invention is using asymmetric encryption, it can use public key Encryption, but public key decryptions cannot be used, it is necessary to it is decrypted using with the private key that public key matches, and private key is not sent, only In local preservation, it is ensured that by the safety of the data of public key encryption.
Specifically, the identification equipment can be to user when user's electronic identity is identified by the identification equipment Userspersonal information's request is sent, after the user receives userspersonal information request, can be set to the identification Preparation send the personal information of the user, i.e., available when the identification equipment identifies the electronic identity of user To the corresponding personal information of electronic identity of user, wherein userspersonal information includes personal biological information and the individual spy of user Reference breath.
Specifically, after the identification equipment receives user's electronic identity corresponding userspersonal information, the knowledge Other equipment can send userspersonal information's request to block chain, since the identification equipment has received the electronics of the user The corresponding personal information of identity, but in order to verify the true and false, it is also necessary to and the personal letter for the user being stored on block chain Breath is compared, it is therefore desirable to send userspersonal information's request message to block chain, is stored on block chain with obtaining Userspersonal information.
Specifically, when the identification equipment receive it is close after public key encryption transmitted by the mobile devices such as user mobile phone After key, the data for containing key are decrypted by private key, correct key is got after decryption, then passes through The userspersonal information that user described in the key pair is stored on block chain is decrypted;Since the data on block chain can be with It is set as open or privacy, i.e. the public can consult and can not consult, and the part that the public can consult is not required to any public visit It authorizes, does not also need key, and the part that can not be consulted is the part by user encryption, only just by the authorization of user It can be accessed;Wherein, the data that the public can consult and can not consult can not all distort, and difference is that the public can consult Be it is unclassified, the data that can not be consulted be secrecy.
Specifically, user is found according to the identification card number of the unique sequence numbers of user, such as user on block chain, It can be when block chain be added in user, as user generates electronic identity and by electronic identity personal information storage in block chain When, a global unique sequence numbers are distributed, the sequence number and identity card can be different, but need to guarantee uniqueness, just as IP address in internet is the same, and the sequence number consulting on block chain is ensured that in this way through the sequence number Find user.
Step s103, when the corresponding userspersonal information of user's electronic identity of acquisition is stored in block chain with described On personal information matching when, generate identification record information, and by the identification record information by key encryption after be stored in Block chain.
Specifically, when identification equipment gets the corresponding personal information of user's electronic identity by the equipment of user, and It, can be to above-mentioned two individual subscriber after the encryption userspersonal information being stored on block chain by key pair is decrypted Information is compared, since userspersonal information includes personal biological information and personal characteristic information, to individual subscriber life Object information and personal characteristic information will be compared.
Specifically, because what individual subscriber biological information included is static information, as name, home address, phone with And nationality etc., it can be obtained by the collection of information, safety is not high;And what individual subscriber characteristic information included is user's dynamic Information, such as access record, authentication record, such as certain year is in such a month, and on such a day, and user enters certain after somewhere is by authentication Region, this dynamically recording have randomness, and after carrying out encryption storage, unauthorized person be it is very unobtainable, have very High safety.
Specifically, if, authentication success, the mobile devices such as mobile phone of user can be according to this when after comparing Validation task, generate this identification record information, the validation task can be authentication tasks, such as customs, bank, The window-units such as airport carry out authentication when handling affairs, are also possible to access task, as user enter certain region when into Capable authentication, the identification record information include this electronic identity verifying time, place, scanning device number and The information such as the device type of user.
Specifically, after the personal biological information and personal characteristic information of user all matches, illustrating this after by comparing The authentication of user passes through, then can be stored on block chain after the identification record information encryption to this, this adds Close is also to be encrypted using identification record information described in key pair, and the identification record information includes that this electronic identity is tested Time of card, place, scanning device number and user the information such as device type, it is non-per saving a personal characteristic information more Method personnel are just more difficult to forge electronic identity, and the electronic identity verifying of user is safer.
Specifically, can send identification success message after the verifying identity of user passes through and be moved to mobile phone of user etc. Dynamic equipment can also send recognition failures message, or do not send message if verifying is unsuccessful.
Specifically, being decrypted to the encryption personal information being stored on block chain, and identification record information is encrypted After be stored in after block chain, the key that user sends need to be deleted, guarantee that user is stored in the personal letter on block chain Cease data safety.
Specifically, regenerating one two after the identification record information can merge with existing userspersonal information Tie up code or bar code electronic identity;In addition, the identification record information also may belong to personal characteristic information, therefore can also be with Information update is carried out to existing user's electronic identity, updated user's electronic identity includes this identification record information. When user electronic identity is identified by other identification equipment next time again, what the identification equipment obtained is exactly comprising last time identification The userspersonal information of record, and these information are difficult to be obtained or forged by unauthorized person.
Specifically, updating for user's electronic identity can be after receiving the identification success message that identification equipment is sent, i.e., After the verifying identity of user passes through, identification equipment can send identification success message to the equipment of user, when the equipment of user After receiving the identification success message, the electronic identity of user can be updated;The update of user's electronic identity can also To be carried out automatically after identification equipment identifies the electronic identity of user, i.e., when the equipment of user detects identified equipment When verifying electronic identity, it can store and identify the information such as device number, user device type, this verification time, place, and according to The update of these identification record information progress electronic identity.
In the present embodiment, by the way that userspersonal information is stored encrypted in block chain, is generated and used according to userspersonal information Family electronic identity, and each identification record information is stored encrypted in block chain, according to identification record information update electronic identity, Thus user's electronic identity is avoided to cause user's property loss due to being tampered or forging.
Fig. 2 is a kind of personal identification method flow diagram based on block chain of the embodiment of the present application, as shown, institute Step s102 is stated, when user's electronic identity is identified equipment identification, the identification equipment obtains user's electronics body Personal information part corresponding userspersonal information and be stored on block chain, comprising:
Step s201, when user's electronic identity is identified equipment identification, the identification equipment sends to user and uses Family personal information request;
Specifically, the identification equipment can be to user when user's electronic identity is identified by the identification equipment Userspersonal information's request is sent, to obtain the corresponding userspersonal information of user's electronic identity.
Step s202 sends the userspersonal information after user receives userspersonal information request To the identification equipment.
Specifically, can be sent to the identification equipment after user receives userspersonal information request The personal information of the user, i.e., it is available to arrive user when the identification equipment identifies the electronic identity of user The corresponding personal information of electronic identity, wherein userspersonal information include user personal biological information and personal characteristics letter Breath.
In the present embodiment, by sending personal information request to user, it is corresponding that user's electronic identity can be obtained Personal information, to identify that equipment carries out authentication.
Fig. 3 is a kind of personal identification method flow diagram based on block chain of the embodiment of the present application, as shown, institute Step s102 is stated, when user's electronic identity is identified equipment identification, the identification equipment obtains user's electronics body Personal information part corresponding userspersonal information and be stored on block chain, comprising:
Step s301, it is described after the identification equipment receives user's electronic identity corresponding userspersonal information Identify that equipment sends userspersonal information's request to block chain;
Specifically, after the identification equipment receives user's electronic identity corresponding userspersonal information, the knowledge Other equipment can send userspersonal information's request to block chain, since the identification equipment has received the electronics of the user The corresponding personal information of identity, but in order to verify the true and false, it is also necessary to and the personal letter for the user being stored on block chain Breath is compared, it is therefore desirable to send userspersonal information's request message to block chain, is stored on block chain with obtaining Userspersonal information.
Step s302 inquires the userspersonal information after block chain receives userspersonal information request, And the userspersonal information inquired is sent to the identification equipment.
Specifically, after the block chain receives userspersonal information request, it can be on block chain according to user Unique sequence numbers, such as the identification card number of user finds user, can also be when block chain be added in user, such as user It generates electronic identity and by electronic identity personal information storage when block chain, distributes a global unique sequence numbers, it should Sequence number and identity card can be different, but need to guarantee uniqueness, and just as the IP address in internet, the sequence number is in area Consulting on block chain ensures that find user by the sequence number in this way.
Specifically, after finding the userspersonal information on the block chain, the user that can will inquire Personal information is sent to the identification equipment.
In the present embodiment, by sending userspersonal information's request to block chain, the userspersonal information is obtained, it can be with Achieve the purpose that userspersonal information's verifying corresponding with user's electronic identity.
Fig. 4 is a kind of personal identification method flow diagram based on block chain of the embodiment of the present application, as shown, institute Step s102 is stated, when user's electronic identity is identified equipment identification, the identification equipment obtains user's electronics body Personal information part corresponding userspersonal information and be stored on block chain, comprising:
Step s401, when user's electronic identity is identified equipment identification, the identification equipment generates public key and private Key, and the public key and cipher key request information are sent to user;
Specifically, when the identification equipment identifies the electronic identity of user, since usual user passes through mobile phone Etc. mobile devices show electronic identity, therefore the identification equipment can send public key to mobile devices such as the mobile phones of user, In the embodiment of the present invention, each equipment can safeguard a pair of of public key and private key after block chain is added, and wherein public key and private key are to match Pair.
Specifically, cipher key request information can also be sent while the identification equipment sends public key, to request user Key is sent, the key is for decrypting the userspersonal information being stored on block chain.
The key is passed through the public affairs after user receives the public key and cipher key request information by step s402 The identification equipment is sent to after key encryption;
Specifically, after the mobile devices such as the mobile phone of user receive public key and cipher key request information, it can be according to public key The key of user is encrypted, the identification equipment is then sent to, it is possible thereby to which key is avoided to obtain to unauthorized person.But It is to be also possible to be obtained by unauthorized person during sending public key, therefore the enciphering and deciphering algorithm in the embodiment of the present invention uses Be asymmetric encryption, it can use public key encryption, but cannot use public key decryptions, it is necessary to using and the private key that matches of public key into Row decryption, and private key is not sent, only in local preservation, it is ensured that by the safety of the data of public key encryption.
Step s403, after the identification equipment receives the key after public key encryption, by the private key to institute The key after public key encryption is stated to be decrypted.
Specifically, when the identification equipment receive it is close after public key encryption transmitted by the mobile devices such as user mobile phone After key, the data for containing key are decrypted by private key, correct key is got after decryption, then passes through The userspersonal information that user described in the key pair is stored on block chain is decrypted;Since the data on block chain can be with It is set as open or privacy, i.e. the public can consult and can not consult, and the part that the public can consult is not required to any public visit It authorizes, does not also need key, and the part that can not be consulted is the part by user encryption, only just by the authorization of user It can be accessed;Wherein, the data that the public can consult and can not consult can not all distort, and difference is that the public can consult Be it is unclassified, the data that can not be consulted be secrecy.
In the present embodiment, key is obtained by asymmetric encryption, key can be safely and effectively obtained, be deposited with this to decrypt Store up the userspersonal information on block chain.
Fig. 5 is a kind of personal identification method flow diagram based on block chain of the embodiment of the present application, as shown, institute Step s403 is stated, after the identification equipment receives the key after public key encryption, by the private key to described through public affairs After the encrypted key of key is decrypted, comprising:
Step s501 is sent out after the identification equipment is to the key successful decryption after public key encryption to block chain Userspersonal information is sent to request;
Specifically, when the identification equipment decrypts the key after public key encryption by the private key, and decrypt After success, userspersonal information's request can be sent to block chain, userspersonal information's request to block chain for requesting The userspersonal information being stored on block chain described in transmission, the key is for decrypting the individual subscriber being stored on block chain Information.
Step s502, after the block chain receives userspersonal information request, by the individual subscriber of encryption Information is sent to the identification equipment;
Specifically, when the block chain receive the userspersonal information request after, can be inquired on block chain described in The personal information of user, after inquiring the personal information of the user, since the personal information of the user is by encryption , therefore the userspersonal information of the encryption can be sent to the identification equipment, guarantee the userspersonal information not It is stolen and distorts.
Step s503 passes through the key pair institute after identification equipment receives the userspersonal information of the encryption The userspersonal information for stating encryption is decrypted.
Specifically, after the identification equipment receives the userspersonal information of the encryption, it can be according to the key pair The userspersonal information of the encryption is decrypted.
In the present embodiment, by requesting the userspersonal information not decrypted to block chain, and the user not decrypted is being received Local decryption is carried out after personal information, guarantees the transmission safety of userspersonal information.
Fig. 6 is a kind of personal identification method flow diagram based on block chain of the embodiment of the present application, as shown, institute Step s103 is stated, as the corresponding userspersonal information of user's electronic identity and being stored on block chain of acquisition When people's information matches, identification record information is generated, and be stored in block chain after the identification record information is encrypted by key Later, comprising:
Step s601, according to user's electronic identity described in the identification record information update;
Specifically, regenerating one two after the identification record information can merge with existing userspersonal information Tie up code or bar code electronic identity;In addition, the identification record information also may belong to personal characteristic information, therefore can also be with Information update is carried out to existing user's electronic identity, updated user's electronic identity includes this identification record information. When user electronic identity is identified by other identification equipment next time again, what the identification equipment obtained is exactly comprising last time identification The userspersonal information of record, and these information are difficult to be obtained or forged by unauthorized person.
Step s602, when user's electronic identity, which is identified equipment, to be again identified that, the identification equipment is sent out to user Send userspersonal information and identification record information request.
Specifically, the identification equipment can be to user when user's electronic identity is identified equipment and again identifies that Userspersonal information and identification record information request are sent, since user's electronic identity has been updated, comprising old Userspersonal information and identification record information, therefore can be asked respectively by userspersonal information and identification record information request Ask userspersonal information and identification record information.
In the present embodiment, by requesting userspersonal information and identification record information to user, the peace of verifying can be improved Quan Xing prevents lawless people spurious information bring from losing.
Fig. 7 is a kind of personal identification method flow diagram based on block chain of the embodiment of the present application, as shown, institute Step s103 is stated, as the corresponding userspersonal information of user's electronic identity and being stored on block chain of acquisition When people's information matches, identification record information is generated, and be stored in block chain after the identification record information is encrypted by key Later, comprising:
Step s701 sends identification success message to user;
Specifically, can send identification success message after the verifying identity of user passes through and be moved to mobile phone of user etc. Dynamic equipment can also send recognition failures message, or do not send message if verifying is unsuccessful.
Step s702, after the user receives the identification success message, according to the identification record information update institute State user's electronic identity.
Specifically, updating for user's electronic identity can be after receiving the identification success message that identification equipment is sent, i.e., After the verifying identity of user passes through, identification equipment can send identification success message to the equipment of user, when the equipment of user After receiving the identification success message, the electronic identity of user can be updated;The update of user's electronic identity can also To be carried out automatically after identification equipment identifies the electronic identity of user, i.e., when the equipment of user detects identified equipment When verifying electronic identity, it can store and identify the information such as device number, user device type, this verification time, place, and according to The update of these identification record information progress electronic identity.
It, can be to avoid by updating the electronic identity of the user after in subscriber authentication in the present embodiment User's electronic identity is updated in the case where authentication failure, is improved efficiency.
A kind of identity recognition device structure based on block chain of the embodiment of the present application is as shown in Figure 8, comprising:
Identity information acquisition module 801, identity information identification module 802 and identity information update module 803;Wherein, Identity information acquisition module 801 is connected with identity information identification module 802, and identity information identification module 802 and identity information are more New module 803 is connected;Identity information acquisition module 801 is set as obtaining userspersonal information, according to the userspersonal information User's electronic identity is generated, and is stored in block chain after the userspersonal information is encrypted by key;Identity information identification Module 802 is set as when user's electronic identity is identified equipment identification, and the identification equipment obtains user's electronics Personal information identity corresponding userspersonal information and be stored on block chain;Identity information update module 803 is set as working as The corresponding userspersonal information of user's electronic identity obtained stores with described when the personal information on block chain matches, Identification record information is generated, and is stored in block chain after the identification record information is encrypted by key.
The embodiment of the present application also discloses a kind of computer equipment, the computer equipment include memory, processor and It is stored in the computer-readable instruction that can be run on the memory and on the processor, the computer-readable instruction quilt The processor makes the processor execute the step in personal identification method described in the various embodiments described above when executing.
The embodiment of the present application also discloses a kind of storage medium for being stored with computer-readable instruction, described computer-readable When instruction is executed by one or more processors, so that one or more processors execute identification described in above-described embodiment Step in method.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, which can be stored in a computer-readable storage and be situated between In matter, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, storage medium above-mentioned can be The non-volatile memory mediums such as magnetic disk, CD, read-only memory (Read-Only Memory, ROM) or random storage note Recall body (Random Access Memory, RAM) etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously The limitation to the application the scope of the patents therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the concept of this application, various modifications and improvements can be made, these belong to the guarantor of the application Protect range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of personal identification method based on block chain, which comprises the following steps:
Userspersonal information is obtained, user's electronic identity is generated according to the userspersonal information, and the individual subscriber is believed Breath is stored in block chain after encrypting by key;
When user's electronic identity is identified equipment identification, it is corresponding that the identification equipment obtains user's electronic identity Userspersonal information and the personal information being stored on block chain;
The corresponding userspersonal information of user's electronic identity and the personal information being stored on block chain when acquisition When matching, identification record information is generated, and be stored in block chain after the identification record information is encrypted by key.
2. the personal identification method as described in claim 1 based on block chain, which is characterized in that described to work as user's electronics When identity is identified equipment identification, the identification equipment obtains the corresponding userspersonal information of user's electronic identity and storage Personal information on block chain, comprising:
When user's electronic identity is identified equipment identification, the identification equipment sends userspersonal information to user and asks It asks;
After the user receives userspersonal information request, the userspersonal information is sent to the identification and is set It is standby.
3. the personal identification method as described in claim 1 based on block chain, which is characterized in that described to work as user's electronics When identity is identified equipment identification, the identification equipment obtains the corresponding userspersonal information of user's electronic identity and storage Personal information on block chain, comprising:
After the identification equipment receives user's electronic identity corresponding userspersonal information, the identification equipment is to block Chain sends userspersonal information's request;
It after the block chain receives userspersonal information request, inquires the userspersonal information, and will inquire The userspersonal information is sent to the identification equipment.
4. the personal identification method as described in claim 1 based on block chain, which is characterized in that described to work as user's electronics When identity is identified equipment identification, the identification equipment obtains the corresponding userspersonal information of user's electronic identity and storage Personal information on block chain, comprising:
When user's electronic identity is identified equipment identification, the identification equipment generates public key and private key, and sends out to user Send the public key and cipher key request information;
After the user receives the public key and cipher key request information, by the key by being sent to after the public key encryption The identification equipment;
After the identification equipment receives the key after public key encryption, by the private key to described after public key encryption Key be decrypted.
5. the personal identification method as claimed in claim 4 based on block chain, which is characterized in that described to work as the identification equipment After receiving the key after public key encryption, it is decrypted to the key after public key encryption by the private key Afterwards, comprising:
After the identification equipment is to the key successful decryption after public key encryption, userspersonal information is sent to block chain Request;
After the block chain receives userspersonal information request, the userspersonal information of encryption is sent to described Identify equipment;
After the identification equipment receives the userspersonal information of the encryption, pass through the user of encryption described in the key pair People's information is decrypted.
6. the personal identification method as described in claim 1 based on block chain, which is characterized in that described when the use obtained Electronic identity corresponding userspersonal information in family stores with described when the personal information on block chain matches, and generates identification record Information, and be stored in after block chain after the identification record information is encrypted by key, comprising:
According to user's electronic identity described in the identification record information update;
When user's electronic identity, which is identified equipment, to be again identified that, the identification equipment sends userspersonal information to user And identification record information request.
7. the personal identification method as described in claim 1 based on block chain, which is characterized in that described when the use obtained Electronic identity corresponding userspersonal information in family stores with described when the personal information on block chain matches, and generates identification record Information, and be stored in after block chain after the identification record information is encrypted by key, comprising:
Identification success message is sent to user;
After the user receives the identification success message, according to user's electronics body described in the identification record information update Part.
8. a kind of identity recognition device based on block chain, which is characterized in that described device includes:
Identity information acquisition module: being set as obtaining userspersonal information, generates user's electronics according to the userspersonal information Identity, and block chain is stored in after the userspersonal information is encrypted by key;
Identity information identification module: it is set as when user's electronic identity is identified equipment identification, the identification equipment obtains The personal information for taking the corresponding userspersonal information of user's electronic identity and being stored on block chain;
Identity information update module: it is set as depositing as the corresponding userspersonal information of user's electronic identity obtained with described It stores up in the personal information matching on block chain, generates identification record information, and the identification record information is added by key Block chain is stored in after close.
9. a kind of computer equipment, including memory and processor, it is stored with computer-readable instruction in the memory, it is described When computer-readable instruction is executed by the processor, so that the processor executes such as any one of claims 1 to 7 right It is required that the step of the method.
10. a kind of storage medium for being stored with computer-readable instruction, the computer-readable instruction is handled by one or more When device executes, so that one or more processors execute the step such as any one of claims 1 to 7 claim the method Suddenly.
CN201811533089.2A 2018-12-14 2018-12-14 A kind of personal identification method and relevant device based on block chain Pending CN109493058A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811533089.2A CN109493058A (en) 2018-12-14 2018-12-14 A kind of personal identification method and relevant device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811533089.2A CN109493058A (en) 2018-12-14 2018-12-14 A kind of personal identification method and relevant device based on block chain

Publications (1)

Publication Number Publication Date
CN109493058A true CN109493058A (en) 2019-03-19

Family

ID=65710291

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811533089.2A Pending CN109493058A (en) 2018-12-14 2018-12-14 A kind of personal identification method and relevant device based on block chain

Country Status (1)

Country Link
CN (1) CN109493058A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109862041A (en) * 2019-03-27 2019-06-07 深圳市网心科技有限公司 A kind of digital identification authentication method, unit, system and storage medium
CN110336832A (en) * 2019-07-24 2019-10-15 深圳传音控股股份有限公司 A kind of information encryption and decryption method, device, terminal and storage medium
CN111143474A (en) * 2019-12-31 2020-05-12 浙江工业大学 One-key mobile phone number binding changing method based on block chain technology
CN111371808A (en) * 2020-03-26 2020-07-03 国金公用通链(海南)信息科技有限公司 Universal block chain identity recognition technology
CN111914231A (en) * 2020-07-23 2020-11-10 中国联合网络通信集团有限公司 Block chain-based identity authentication method, system, equipment and storage medium
CN112287393A (en) * 2020-11-24 2021-01-29 国网新疆电力有限公司信息通信公司 Credible identity authentication method and device based on Internet of things and block chain
CN112308060A (en) * 2020-11-20 2021-02-02 上海技术交易所有限公司 Identity certificate generation and identification method, system, computer equipment and storage medium
CN112328997A (en) * 2020-11-26 2021-02-05 安徽继远软件有限公司 Credible identity recognition method and system based on block chain
CN112615891A (en) * 2019-09-18 2021-04-06 华为技术有限公司 Pairing method and device
CN112801253A (en) * 2021-01-14 2021-05-14 山大地纬软件股份有限公司 Multi-scene one-code communication control method and platform based on block chain
JP2022525211A (en) * 2019-03-20 2022-05-11 キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー Use of non-contact cards to securely share personal data stored on the blockchain

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200427284A (en) * 2003-05-23 2004-12-01 Hsiang-Tsung Kung Personal authentication device and system and method thereof
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CA2931469A1 (en) * 2016-03-27 2017-09-27 Sal Khan Portable verifiable credentials and methods thereof
CN107257340A (en) * 2017-06-19 2017-10-17 阿里巴巴集团控股有限公司 A kind of authentication method, authentication data processing method and equipment based on block chain
WO2017215504A1 (en) * 2016-06-12 2017-12-21 杨鹏 Identity recognition and social information recording method and system based on biological information
US20170366348A1 (en) * 2016-06-17 2017-12-21 Capital One Services, Llc Blockchain systems and methods for user authentication
CN107786547A (en) * 2017-09-30 2018-03-09 厦门快商通信息技术有限公司 A kind of auth method based on block chain, device and computer-readable recording medium
WO2018046009A1 (en) * 2016-09-12 2018-03-15 上海鼎利信息科技有限公司 Block chain identity system
CN108512660A (en) * 2018-03-28 2018-09-07 湖南东方华龙信息科技有限公司 The verification method of virtual card
CN108564353A (en) * 2018-04-27 2018-09-21 数字乾元科技有限公司 Payment system based on block chain and method
CN108769057A (en) * 2018-06-15 2018-11-06 北京奇虎科技有限公司 Personal identification method based on block chain and device

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200427284A (en) * 2003-05-23 2004-12-01 Hsiang-Tsung Kung Personal authentication device and system and method thereof
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CA2931469A1 (en) * 2016-03-27 2017-09-27 Sal Khan Portable verifiable credentials and methods thereof
WO2017215504A1 (en) * 2016-06-12 2017-12-21 杨鹏 Identity recognition and social information recording method and system based on biological information
US20170366348A1 (en) * 2016-06-17 2017-12-21 Capital One Services, Llc Blockchain systems and methods for user authentication
WO2018046009A1 (en) * 2016-09-12 2018-03-15 上海鼎利信息科技有限公司 Block chain identity system
CN107257340A (en) * 2017-06-19 2017-10-17 阿里巴巴集团控股有限公司 A kind of authentication method, authentication data processing method and equipment based on block chain
CN107786547A (en) * 2017-09-30 2018-03-09 厦门快商通信息技术有限公司 A kind of auth method based on block chain, device and computer-readable recording medium
CN108512660A (en) * 2018-03-28 2018-09-07 湖南东方华龙信息科技有限公司 The verification method of virtual card
CN108564353A (en) * 2018-04-27 2018-09-21 数字乾元科技有限公司 Payment system based on block chain and method
CN108769057A (en) * 2018-06-15 2018-11-06 北京奇虎科技有限公司 Personal identification method based on block chain and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
宋宪荣;张猛;: "网络可信身份认证技术问题研究", 网络空间安全, no. 03 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2022525211A (en) * 2019-03-20 2022-05-11 キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー Use of non-contact cards to securely share personal data stored on the blockchain
JP7230235B2 (en) 2019-03-20 2023-02-28 キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー Using Contactless Cards to Securely Share Personal Data Stored on Blockchain
CN109862041A (en) * 2019-03-27 2019-06-07 深圳市网心科技有限公司 A kind of digital identification authentication method, unit, system and storage medium
CN109862041B (en) * 2019-03-27 2021-06-15 深圳市网心科技有限公司 Digital identity authentication method, equipment, device, system and storage medium
CN110336832A (en) * 2019-07-24 2019-10-15 深圳传音控股股份有限公司 A kind of information encryption and decryption method, device, terminal and storage medium
CN110336832B (en) * 2019-07-24 2023-11-03 深圳传音控股股份有限公司 Information encryption and decryption methods, devices and terminals
CN112615891A (en) * 2019-09-18 2021-04-06 华为技术有限公司 Pairing method and device
CN111143474A (en) * 2019-12-31 2020-05-12 浙江工业大学 One-key mobile phone number binding changing method based on block chain technology
CN111143474B (en) * 2019-12-31 2022-07-19 浙江工业大学 One-key binding changing method for mobile phone number based on block chain technology
CN111371808A (en) * 2020-03-26 2020-07-03 国金公用通链(海南)信息科技有限公司 Universal block chain identity recognition technology
CN111914231A (en) * 2020-07-23 2020-11-10 中国联合网络通信集团有限公司 Block chain-based identity authentication method, system, equipment and storage medium
CN112308060A (en) * 2020-11-20 2021-02-02 上海技术交易所有限公司 Identity certificate generation and identification method, system, computer equipment and storage medium
CN112287393A (en) * 2020-11-24 2021-01-29 国网新疆电力有限公司信息通信公司 Credible identity authentication method and device based on Internet of things and block chain
CN112328997A (en) * 2020-11-26 2021-02-05 安徽继远软件有限公司 Credible identity recognition method and system based on block chain
CN112801253A (en) * 2021-01-14 2021-05-14 山大地纬软件股份有限公司 Multi-scene one-code communication control method and platform based on block chain

Similar Documents

Publication Publication Date Title
CN109493058A (en) A kind of personal identification method and relevant device based on block chain
EP3556069B1 (en) System and method for securely processing an electronic identity
US11824991B2 (en) Securing transactions with a blockchain network
JP4866863B2 (en) Security code generation method and user device
EP2731040A1 (en) Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
CN109325342A (en) Identity information management method, apparatus, computer equipment and storage medium
CN102123143B (en) Method for storing data in network safely
CN101529791A (en) A method and apparatus to provide authentication and privacy with low complexity devices
JP2009510644A (en) Method and configuration for secure authentication
CN101401341A (en) Secure data parser method and system
JPWO2003069489A1 (en) Identification method
US20120290851A1 (en) Method and computer program for securely storing data
US20140258718A1 (en) Method and system for secure transmission of biometric data
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
CN106992851A (en) TrustZone-based database file password encryption and decryption method and device and terminal equipment
WO2022206453A1 (en) Method and apparatus for providing cross-chain private data
CN109492424A (en) Data assets management method, data assets managing device and computer-readable medium
US20230259899A1 (en) Method, participant unit, transaction register and payment system for managing transaction data sets
Hamed et al. Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption.
CN102752112A (en) Authority control method and device based on signed message 1 (SM1)/SM2 algorithm
CN106789963A (en) Asymmetric whitepack cipher encrypting method and device and equipment
Kuppuswamy et al. Preventing and securing data from cyber crime using new authentication method based on block cipher scheme
CN107733936A (en) A kind of encryption method of mobile data
Thompson et al. Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies
KR20030097550A (en) Authorization Key Escrow Service System and Method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination