CN109522698A - User authen method and terminal device based on block chain - Google Patents
User authen method and terminal device based on block chain Download PDFInfo
- Publication number
- CN109522698A CN109522698A CN201811182177.2A CN201811182177A CN109522698A CN 109522698 A CN109522698 A CN 109522698A CN 201811182177 A CN201811182177 A CN 201811182177A CN 109522698 A CN109522698 A CN 109522698A
- Authority
- CN
- China
- Prior art keywords
- user
- identity information
- cryptographic hash
- information
- chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000005516 engineering process Methods 0.000 claims abstract description 15
- 238000004590 computer program Methods 0.000 claims description 14
- 238000012795 verification Methods 0.000 claims description 13
- 238000012550 audit Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 6
- 238000004883 computer application Methods 0.000 abstract description 2
- 238000004422 calculation algorithm Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 11
- 238000013459 approach Methods 0.000 description 4
- 230000003542 behavioural effect Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 210000000887 face Anatomy 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000000750 progressive effect Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 102000002322 Egg Proteins Human genes 0.000 description 1
- 108010000912 Egg Proteins Proteins 0.000 description 1
- 238000009825 accumulation Methods 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000005021 gait Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 210000004681 ovum Anatomy 0.000 description 1
- 230000001766 physiological effect Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
- 230000007474 system interaction Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The present invention is suitable for computer application technology, provide a kind of user authen method based on block chain, terminal device and computer readable storage medium, it include: that user certificate is generated by the identity information previously according to user, and unique corresponding public private key pair is generated using rivest, shamir, adelman, Hash operation is carried out to user certificate by private key and obtains data of endorsing, user is obtained in the data of endorsing for logging in the chain equipment in block catenary system, and solution label are carried out to the data of endorsing by the corresponding public key of chain equipment and obtain cryptographic Hash, the cryptographic Hash that solution label obtain is compared with preset cryptographic Hash, whether the identity information for verifying the user is correct, it ensure that the privacy of the identity information of user, also improve the safety of equipment.
Description
Technical field
The invention belongs to computer application technology more particularly to a kind of user authen methods based on block chain, end
End equipment and computer readable storage medium.
Background technique
As science and technology is constantly progressive, the mode of intelligence transmission is also constantly upgrading, and the transfer mode of value also synchronizes to obtain
Development.From telegram, phone, then internet is arrived, people enter the information age comprehensively.Internet realizes entire communication network
The efficient transmitting of information, but lack the inherent mechanism of effective protection information security, people can not also transmit point-to-pointly
With seised information, copy, the cost propagated or even distort an information are almost nil on network.A little traditional industries because
This is by great impact, although national governments continue to increase network information copyright protection dynamics, is still difficult to from technology layer
On the problem of preventing information security and data safety.
Landing approach in the prior art is commonly username and password and logs in, and this landing approach faces many potential
Risk, such as: password is stolen, password is kidnapped, password multimachine device uses the safety problems such as easily detected, weak password is easily attacked.
Summary of the invention
In view of this, the embodiment of the invention provides it is a kind of by the user authen method of block chain, terminal device and based on
Calculation machine readable storage medium storing program for executing, the safety to solve the problems, such as login mode in the prior art are lower.
The first aspect of the embodiment of the present invention provides a kind of user authen method based on block chain, comprising:
Obtain the data of endorsing that user generates when logging in the chain equipment in block catenary system;The data of endorsing are by adopting
The cryptographic Hash of the identity information of the user is encrypted to obtain with the chain equipment corresponding private key;
The cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The cryptographic Hash prestored is based on the chain and sets
Standby corresponding preset identity information obtains;
Solution label are carried out using endorse data of the public key to the acquisition, the identity information for obtaining the user is corresponding
Cryptographic Hash, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user;
If the corresponding cryptographic Hash verification of the identity information of the user passes through, authorizes the user to log in the chain and set
It is standby.
The second aspect of the embodiment of the present invention provides a kind of terminal device, including memory, processor and is stored in
In the memory and the computer program that can run on the processor, when the processor executes the computer program
It performs the steps of
Obtain the data of endorsing that user generates when logging in the chain equipment in block catenary system;The data of endorsing are by adopting
The cryptographic Hash of the identity information of the user is encrypted to obtain with the chain equipment corresponding private key;
The cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The cryptographic Hash prestored is based on the chain and sets
Standby corresponding preset identity information obtains;
Solution label are carried out using endorse data of the public key to the acquisition, the identity information for obtaining the user is corresponding
Cryptographic Hash, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user;
If the corresponding cryptographic Hash verification of the identity information of the user passes through, authorizes the user to log in the chain and set
It is standby.
The third aspect of the embodiment of the present invention provides a kind of terminal device, comprising:
First acquisition unit, the data of endorsing generated for obtaining user when logging in the chain equipment in block catenary system;
The data of endorsing encrypt the cryptographic Hash of the identity information of the user by using the corresponding private key of the chain equipment
It obtains;
Second acquisition unit, the cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;It is described to prestore
Cryptographic Hash is obtained based on the corresponding preset identity information of the chain equipment;
Data processing unit obtains the use for carrying out solution label to the data of endorsing of the acquisition using the public key
The corresponding cryptographic Hash of the identity information at family, and the cryptographic Hash prestored described in use verifies the corresponding Kazakhstan of identity information of the user
Uncommon value;
Information checking unit, if the corresponding cryptographic Hash verification of identity information for the user passes through, described in authorization
User logs in the chain equipment.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer storage medium
It is stored with computer program, the computer program includes program instruction, and described program instruction makes institute when being executed by a processor
State the method that processor executes above-mentioned first aspect.
Existing beneficial effect is the embodiment of the present invention compared with prior art:
The embodiment of the present invention generates user certificate by the identity information previously according to user, and is calculated using asymmetric encryption
Method generates unique corresponding public private key pair, carries out Hash operation to user certificate by private key and obtains data of endorsing, obtains user
The data of endorsing are carried out in the data of endorsing for logging in the chain equipment in block catenary system, and by the corresponding public key of chain equipment
Solution label obtain cryptographic Hash, and the cryptographic Hash that solution label obtain is compared with preset cryptographic Hash, verifies the identity information of the user
It is whether correct, it ensure that the privacy of the identity information of user, also improve the safety of equipment.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is the flow chart for the user authen method based on block chain that the embodiment of the present invention one provides;
Fig. 2 is the flow chart of the user authen method provided by Embodiment 2 of the present invention based on block chain;
Fig. 3 is the schematic diagram for the terminal device that the embodiment of the present invention three provides;
Fig. 4 is the schematic diagram for the terminal device that the embodiment of the present invention four provides.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed
Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific
The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
It is the flow chart for the user authen method based on block chain that the embodiment of the present invention one provides referring to Fig. 1, Fig. 1.This
The executing subject of user authen method based on block chain in embodiment is terminal.Terminal includes but is not limited to smart phone, puts down
The mobile terminals such as plate computer, wearable device can also be desktop computer etc..User authentication based on block chain as shown in the figure
Method may comprise steps of:
S101: the data of endorsing that user inputs when logging in the chain equipment in block catenary system are obtained;The data of endorsing
The cryptographic Hash of the identity information of the user is encrypted to obtain by using the chain equipment corresponding private key.
As science and technology is constantly progressive, the mode of intelligence transmission is also constantly upgrading, and the transfer mode of value also synchronizes to obtain
Development.From telegram, phone, then internet is arrived, people enter the information age comprehensively.Internet realizes entire communication network
The efficient transmitting of information, but lack the inherent mechanism of effective protection information security, people can not also transmit point-to-pointly
With seised information, copy, the cost propagated or even distort an information are almost nil on network.A little traditional industries because
This is by great impact, although national governments continue to increase network information copyright protection dynamics, is still difficult to from technology layer
On the problem of preventing information security and data safety.Landing approach in the prior art is commonly username and password and logs in, this
Kind landing approach faces many potential risks, such as: password is stolen, password is kidnapped, password multimachine device uses and is easily detected, is weak
Password such as is easily attacked at the safety problems.
In the present embodiment, user has just known the data of endorsing of oneself before Login chain equipment.Data of endorsing are
According to the identity information of user, carries out Hash operation and asymmetric encryption obtains.Wherein, the identity information of user can be user
The information such as ID number, ID card No. or biological characteristic are inputted, can be one such, is also possible to much information synthesis and exists
Together.Further, the identity information of the user in the present embodiment can be divided into living things feature recognition and behavioural characteristic identification two
Kind.Biological characteristic can include but is not limited to fingerprint recognition, iris, palm line, face etc.;Behavioural characteristic may include but unlimited
Identification in terms of speech recognition, signature and keyboard hammer action.
When obtaining endorsing data, the identity information of user is first obtained, according to the identity information of user and preset certificate
Format obtains user certificate, generates the cryptographic Hash of the user certificate, and by the private key of the user to the cryptographic Hash of user certificate
It is encrypted, obtains data of endorsing, which is that user oneself is exclusive, not known to other people.
By carrying out Hash operation with the exclusive identity information of user in advance, unique cryptographic Hash of user information is obtained, is used
The user information of the user information of active user and other users is distinguished in expression.Hash operation is the data random length
It is compressed into the string of regular length.Hash function in the present embodiment can use (the Secure Hash of secure hash algorithm 1
Algorithm 1, SHA-1) or Message Digest Algorithm 5 (Message Digest AlgorithmMD5, MD5) etc.,
It can also be using other Hash operation methods herein without limitation.
After obtaining cryptographic Hash by Hash operation, which is added by the corresponding private key of chain equipment
It is close.Wherein the corresponding private key of chain equipment is the private key of the prespecified user of the chain equipment, and the mode of encryption can be symmetrical add
Close mode is also possible to the mode of asymmetric encryption, herein without limitation.Symmetric encipherment algorithm is used in encryption and decryption
Be the same code key;And rivest, shamir, adelman needs two keys to be encrypted and decrypted, the two code keys are private keys
And private key.Public key and private key are a pair, if encrypted with public key to data, could only be decrypted with corresponding private key;Such as
Fruit encrypts data with private key, then could only be decrypted with corresponding public key.Because encryption and decryption use two
A different key.For asymmetric encryption compared with symmetric cryptography, safety is more preferable: the communicating pair of symmetric cryptography uses identical
Code key, if the code key of a side is revealed, entire communication will be cracked.And asymmetric encryption uses a pair of of code key,
One is used to encrypt, and one is used to decrypt, and public key be it is disclosed, code key is that oneself is saved, and is not needed as symmetric cryptography
First to synchronize code key before a communication like that.Rivest, shamir, adelman can be Elgamal, knapsack algorithm, elliptic curve cryptography
Algorithm etc., herein without limitation.
It should be noted that in the present embodiment, chain equipment can correspond to a user, can also correspond to and multiple use
Family uses.When being used by multiple users there are chain equipment, by identifying that the user information of the user determines its corresponding public key,
It is verified with the identity information to the user.
S102: the cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The cryptographic Hash prestored is based on institute
The corresponding preset identity information of chain equipment is stated to obtain.
In the present embodiment, each chain equipment has its corresponding user, user by input oneself endorse data into
Row certification and login.Therefore, each chain equipment in the present embodiment has its corresponding public key, for recognizing user information
Card.Wherein, which can be stored in chain equipment, can be stored in the database of server, herein without limitation.
The identity information of user can be the certificate information of user, biological information of user etc..
It when calculating the cryptographic Hash of the chain equipment, is breathed out by the identity information based on the corresponding threshold value of chain equipment
What uncommon operation obtained.In the present embodiment, each chain equipment has its corresponding using user, the identity information of the user i.e. with
The chain equipment is corresponding, therefore, carries out Hash operation to the identity information of the user and obtains cryptographic Hash, and by the cryptographic Hash store to
In corresponding chain equipment, attempted to log on to this by the cryptographic Hash that this is prestored when thering is user to log in the chain equipment
The user identity of the user of chain equipment is verified.
S103: solution label are carried out to the data of endorsing of the acquisition using the public key, obtain the identity information of the user
Corresponding cryptographic Hash, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user.
Getting data of endorsing, corresponding public key of chain equipment that user generates when logging in the chain equipment in block chain
And after the cryptographic Hash that prestores of the chain equipment, solution label is carried out to data of endorsing by the public key, obtain the body of the login user
The corresponding cryptographic Hash of part information.Specifically, adding when data of endorsing carry out solution label according in the cryptographic Hash to identity information
Encryption method when close, is decrypted by public key, obtains the corresponding cryptographic Hash of identity information of the user.
In practical applications, the signature of party A-subscriber only has the public key of party A-subscriber that could solve label, and such chain equipment just can confirm that this
A identity information is strictly what party A-subscriber sent.Therefore, in the present embodiment, by the way that the cryptographic Hash and preset Kazakhstan that label obtain will be solved
Uncommon value compares, and whether the identity information for verifying the user is correct.
S104: it if the corresponding cryptographic Hash verification of the identity information of the user passes through, authorizes described in user's login
Chain equipment.
After the corresponding cryptographic Hash of identity information using the cryptographic Hash prestored verification user, if the Hash that solution label obtain
Value is identical as preset cryptographic Hash, then illustrates that the user information currently logged in is correct, which is corresponding with the chain equipment
Correct user then authorizes the user to log in the chain equipment.
If the cryptographic Hash that solution label obtain is different from preset cryptographic Hash, illustrate that the user information currently logged in is wrong, it can
It can be that user endorses the input error of information, the notice that re-enter information can be sent to chain equipment in this case;If working as
The user information of preceding login is wrong, then may be that there are malicious users to log in the chain equipment, in such case then to chain equipment
Warning message is sent, prevents user from making the operation for damaging equipment or whole system.
Above scheme, the data of endorsing generated by obtaining user when logging in the chain equipment in block catenary system;It obtains
The cryptographic Hash chain equipment corresponding public key and prestored;It is corresponding preset that the cryptographic Hash prestored is based on the chain equipment
Identity information obtain;Solution label are carried out using endorse data of the public key to the acquisition, obtain the identity letter of the user
Corresponding cryptographic Hash is ceased, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user;If institute
The corresponding cryptographic Hash verification of identity information for stating user passes through, then the user is authorized to log in the chain equipment.It is used by obtaining
Family log in block catenary system in chain equipment data of endorsing, and by the corresponding public key of chain equipment to this endorse data into
Row solution label obtain cryptographic Hash, and the cryptographic Hash that solution label obtain is compared with preset cryptographic Hash, verify the identity letter of the user
Whether breath is correct, ensure that user login information is not stolen or distorts, also improves the safety of equipment.
Referring to fig. 2, Fig. 2 is the flow chart of the user authen method provided by Embodiment 2 of the present invention based on block chain.This
The executing subject of user authen method based on block chain in embodiment is terminal.Terminal includes but is not limited to smart phone, puts down
The mobile terminals such as plate computer, wearable device can also be desktop computer etc..User authentication based on block chain as shown in the figure
Method may comprise steps of:
S201: the identity information of registration user is obtained, and user certificate is generated according to the identity information of the registration user.
Before user logs in the various chain equipment of block catenary system, need first to obtain some information of user, to this
The user information inputted when user logs in is verified.In the present embodiment, the user information of user can be first obtained,
And registered, to realize that the user information of user is filed.
Specifically, the step S201 in the present embodiment can specifically include step S2011~S2012:
S2011: the identity information of user is obtained;The identity information include but is not limited to one of following information or
At least two combination: user account, identification card number or biological characteristic.
The identity information of user can include but is not limited in the present embodiment: user account, identification card number or biology are special
Sign.Wherein biological characteristic can include but is not limited to the intrinsic physiological characteristic or behavioural characteristic of human body, for example, fingerprint, iris,
Face phase, gait, keystroke habit etc..It should be noted that the subscriber identity information obtained in the present embodiment may include the above letter
Breath one of, in order to guarantee the comprehensive of user information and can not tamper, at least two be also possible in information above
The combination of information.
In practical applications, biological identification technology carries out a kind of technology of authentication using human body biological characteristics.More
A bit, biometrics identification technology is exactly to pass through computer and optics, acoustics, biosensor and biostatistics principle etc. to body
High-tech means is intimately associated, and the identification of personal identification is carried out using the intrinsic physiological property of human body and behavioural characteristic.Biology
Identifying system is sampled to biological characteristic, is extracted its unique feature and is converted to digital code, and further by this
Feature templates made of a little code combinations.When people carry out authentication with identifying system interaction, identifying system obtains its feature
And with data can in feature templates be compared, to determine whether to match, thus determine accept or reject the people.Biological characteristic
The biological characteristic of including but not limited to bio-identification has hand shape, fingerprint, the shape of face, iris, retina, pulse, auricle etc., and behavior is special
Sign has signature, sound, keystroke dynamics etc..Wherein, individual iris structure is unique, does not have heredity, even making same ovum
Twins' iris is also different, and from after childhood, just no longer changes substantially, so that it is highly suitable to be applied for biological knowledge
Not.There is statistics to show up to the present, the error rate of iris recognition is minimum in various living things feature recognitions.
2012: the identity information is audited, if audit passes through, is based on block chain distribution account book technology, it will
The identity information inputs in preset certification hierarchy, obtains the user certificate.
After getting the identity information of user, which is audited.The content wherein audited include but
Be not limited to: whether the format of the identity information meets preset data format, whether the data integrity of the identity information reaches
Whether the data newness degree in preset integrity demands, the identity information meets preset data generation time interval.
Illustratively, when obtaining identity information of the ID Card Image as user, need to audit the effective of the identity card
Whether the date is qualified;When obtaining the finger print information of user, it is whether complete etc. to need to audit accessed finger print information.
Further, step S201 can also include:
The identity information of user is obtained, and verifies the identity information whether within preset term of validity;
If the identity information generates user certificate within the term of validity, according to the identity information;
If the identity information obtains the new identity information of user not within the term of validity, and according to described
New identity information generates new user certificate, and the user certificate before replacement.
Specifically, in practical applications, if some identity information is used for a long time, then being easy to distort, Bu Nengbao
The safety of identity information is demonstrate,proved, therefore, a term of validity is set in the present embodiment, if the time that the identity information uses reaches
It when the term of validity, then needs to obtain new identity information to replace old identity information, guarantees the safety and private of identity information
Close property.
After the identity information got is qualified, according to preset certification hierarchy, which is inputted into the certificate
In structure, user certificate is obtained.
Illustratively, user certificate can be obtained according to the identity information of the predefined structure typing of X.509 certificate.
It X.509 is the digital certificate standard formulated by International Telecommunication Union.In X.509 system, e-business certification authorized organization
The certificate that (Certificate Authority, CA) is signed and issued according to management X.500, be bundled with one it is unique screen name, can be with
Comprising multiple fields and value, alias can also be supported.One trusted root certificate of tissue can be distributed in need use and be
The employee of system is on hand.Major browsers can install a part of root certificate in advance, these root certificates are all trusted certificate verifications
Mechanism CA, in this way their certificates for issuing, browser can directly trust.Although user can delete or disable these roots
Certificate, but in fact, user seldom does so.In newest Microsoft platform, or even the root disposed in advance can be removed in user
After certificate, when user visits again these deleted root certificate websites, these root certificates can be restored to trust automatically
In list.
S202: unique key pair is generated using rivest, shamir, adelman;The key pair includes public key and private key, described
Private key and the public key uniquely correspond to.
The software or hardware module of realization asymmetric cryptographic functions generally all have the generation and protective capability of private key.?
In the case where having the encryption safes hardware such as smart card, the generation and protection of private key can be inside these hardware.Private key and safety
When hardware binding, user is readily appreciated that and implements the management requirement to these security credences in kind for having private key.Do not having
When external secure hardware, encryption software packet utilizes the resource of local computing platform, generates key pair and protection private key.This file
Form stores private key, will receive the threat of the malicious code on computer, requirement of the safety to user is relatively high.
Symmetric encipherment algorithm itself does not constrain the value of key, although we can avoid intentionally it is some too regular close
Key value.Different from symmetric key, rivest, shamir, adelman cannot use any Bit String as key.Used in asymmetric encryption
Key is the especially big number for meeting algorithm principle requirement.For example, the key of RSA Algorithm is from two big prime numbers.It is asymmetric
Private key does not have key to exchange and distribute, and asymmetric privacy keys should only generate in the safely controllable environment of expected private key holder.
Since without shared with any other people, asymmetric privacy keys are easier to manage.In this way, we can establish the non-right of a safety
Claim encryption system, in this system, the only owner of private key can be decrypted and sign operation to expected content.
Illustratively, RSA (Ron Rivest, Adi Shamir, Leonard Adleman) algorithm is to obtain earliest extensively
The rivest, shamir, adelman used, difficulty of the RSA Algorithm based on the product for decomposing Big prime.Newer rivest, shamir, adelman
It is ECC, ECC is based on dispersed accumulation.It can be consumed with less computing resource reaches and the comparable safety of RSA.This
In embodiment, unique public private key pair is generated by rivest, shamir, adelman, wherein private key and public key uniquely correspond to, and private key is used
It signs in the identity information to user, public key is for carrying out solution label to signed data.
S203: Hash operation is carried out to the user certificate by the private key and obtains data of endorsing.
Hash operation can be mapped to the input of random length the output of regular length, i.e. hashed value.In the present embodiment
In order to realize the digital signature to long file, hash function operation first is carried out to message, then the cryptographic Hash of message is signed
Name rather than sign to origination message.Hash function has the characteristics that one-way, anti-collision.
Digital signature, signer handle message, generate the number of segment word string that others can not forge, this number of segment word string
It is simultaneously also the valid certificates that message authenticity is sent to the signer of message.Utilize digital signature technology, it can be ensured that
The authentication of the integrality, sender of message transmission prevents the denial in transaction from occurring.System is logged in the equipment of the present embodiment
It, can be by the way of asymmetric encryption in system.Private key for user in equipment login system, for possessing for the current chain equipment
Person, owner must use private key to sign to transaction message, to prove that the publisher of message is all of corresponding chain device address
Person.If user cannot give information signature without private key.Public key is used to generate the chain device address of user.
Illustratively, the public key of user is the random number for generating 65 bytes by elliptic curve by private key, using
Hash operation generates main information of the eap-message digest of 20 byte lengths as chain device address, then believes in front plus version number
Breath adds the address check code of 4 bytes at end, and address check code is obtained by carrying out Hash operation twice to abstract result
It arrives, takes preceding four generations of cryptographic Hash, finally version information, main information and address check are piled up and turned at one piece by character
Character string easy to identify is changed to as chain device address.Private key is mostly important in block catenary system, once losing, that is, represents this
The property of corresponding public key address is also lost together.By utilizing digital signature, block chain equipment login system ensure that message
Integrality and non repudiation are that user can be in the secure log system.
S204: the data of endorsing that user generates when logging in the chain equipment in block catenary system are obtained;The data of endorsing
The cryptographic Hash of the identity information of the user is encrypted to obtain by using the chain equipment corresponding private key.
The implementation of S101 is identical in S204 embodiment corresponding with Fig. 1 in the present embodiment, specifically refers to
The associated description of S101 in the corresponding embodiment of Fig. 1, details are not described herein.
S205: the cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The cryptographic Hash prestored is based on institute
The corresponding preset identity information of chain equipment is stated to obtain.
The implementation of S102 is identical in S205 embodiment corresponding with Fig. 1 in the present embodiment, specifically refers to
The associated description of S102 in the corresponding embodiment of Fig. 1, details are not described herein.
S206: solution label are carried out to the data of endorsing of the acquisition using the public key, obtain the identity information of the user
Corresponding cryptographic Hash, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user.
The implementation of S103 is identical in S206 embodiment corresponding with Fig. 1 in the present embodiment, specifically refers to
The associated description of S103 in the corresponding embodiment of Fig. 1, details are not described herein.
S207: it if the corresponding cryptographic Hash verification of the identity information of the user passes through, authorizes described in user's login
Chain equipment.
The implementation of S104 is identical in S207 embodiment corresponding with Fig. 1 in the present embodiment, specifically refers to
The associated description of S104 in the corresponding embodiment of Fig. 1, details are not described herein.
Further, after step S207, can also include:
Receive the chain equipment transmission logins successfully information;The user logined successfully in information including the user
Information;
User right information corresponding with the user information is searched from preset rights database according to user information;
The user right information is sent to chain equipment all in preset device systems;The user right information
The operating right of the user is set for the chain equipment.
Specifically, there are many chain equipment, these equipment have respectively in the preset network system based on block chain
From corresponding user, and each user has the permission of oneself.Each chain equipment in system is all in accordance with its corresponding user
Permission operation, meanwhile, all chain equipment can also get the working method and operational data of other chain equipment.But still
So inevitably there are some chain equipment can cross the operation permission of itself.In this case, server reception chain is set
After what preparation was sent logins successfully information, according to the user information logined successfully in information, looked into from preset rights database
User right corresponding with the user information is looked for, and the user right is sent to the chain equipment, by controlling the chain equipment
Operation permission.
Further, user right can also be sent to all chain equipment, with chain equipment all in notice system
The authority information of the chain equipment makes other chain equipment that can exercise supervision to the operation of the chain equipment, in this way, can guarantee be
Each chain equipment in system can normal, safety operation.
Above scheme generates user certificate by the identity information previously according to user, and uses rivest, shamir, adelman
Unique corresponding public private key pair is generated, Hash operation is carried out to user certificate by private key and obtains data of endorsing, user is obtained and exists
The data of endorsing of the chain equipment in block catenary system are logged in, and the data of endorsing are solved by the corresponding public key of chain equipment
Label obtain cryptographic Hash, the cryptographic Hash that solution label obtain are compared with preset cryptographic Hash, the identity information for verifying the user is
It is no correct, it ensure that the privacy of the identity information of user, also improve the safety of equipment.
It is a kind of schematic diagram for terminal device that the embodiment of the present invention three provides referring to Fig. 3, Fig. 3.What terminal device included
Each unit is used to execute each step in the corresponding embodiment of FIG. 1 to FIG. 2.Referring specifically to the corresponding implementation of FIG. 1 to FIG. 2
Associated description in example.For ease of description, only the parts related to this embodiment are shown.The terminal device of the present embodiment
300 include:
First acquisition unit 301, the number of endorsing generated for obtaining user when logging in the chain equipment in block catenary system
According to;The data of endorsing add the cryptographic Hash of the identity information of the user by using the corresponding private key of the chain equipment
It is close to obtain;
Second acquisition unit 302, the cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;It is described to prestore
Cryptographic Hash obtained based on the corresponding preset identity information of the chain equipment;
Data processing unit 303 obtains described for carrying out solution label to the data of endorsing of the acquisition using the public key
The corresponding cryptographic Hash of the identity information of user, and the cryptographic Hash that prestores described in using verify the user identity information it is corresponding
Cryptographic Hash;
Information checking unit 304 authorizes institute if the corresponding cryptographic Hash verification of identity information for the user passes through
It states user and logs in the chain equipment.
Further, the terminal device can also include:
First generation unit, for obtaining the identity information of registration user, and according to the identity information of the registration user
Generate user certificate;
Key generating unit, for generating unique key pair using rivest, shamir, adelman;The key pair includes public affairs
Key and private key, the private key and the public key uniquely correspond to;
Hash operation unit obtains data of endorsing for carrying out Hash operation to the user certificate by the private key.
Further, first generation unit may include:
Third acquiring unit, for obtaining the identity information of user;The identity information includes but is not limited to following information
One of or at least two combination: user account, identification card number or biological characteristic;
Second generation unit, it is distributed based on block chain if audit passes through for being audited to the identity information
The identity information is inputted in preset certification hierarchy, obtains the user certificate by account book technology.
Further, first generation unit may include:
Information detecting unit for obtaining the identity information of user, and detects whether the identity information has preset
It imitates within the time limit;
Third generation unit, if for the identity information within the term of validity, according to the identity information
Generate user certificate;
Data updating unit, if reacquiring the use not within the term of validity for the identity information
The identity information at family, and new user certificate is generated according to new identity information, and described in the new user certificate replacement
User certificate.
Further, the terminal device can also include:
4th acquiring unit logins successfully information for receive that the chain equipment sends;It is described to login successfully in information
User information including the user;
Permission determination unit, for being searched from preset rights database according to user information and the user information pair
The user right information answered;
Permission transmission unit is set for the user right information to be sent to chain all in preset device systems
It is standby;The operating right of the user is arranged for the chain equipment for the user right information.
Above scheme generates user certificate by the identity information previously according to user, and uses rivest, shamir, adelman
Unique corresponding public private key pair is generated, Hash operation is carried out to user certificate by private key and obtains data of endorsing, user is obtained and exists
The data of endorsing of the chain equipment in block catenary system are logged in, and the data of endorsing are solved by the corresponding public key of chain equipment
Label obtain cryptographic Hash, the cryptographic Hash that solution label obtain are compared with preset cryptographic Hash, the identity information for verifying the user is
It is no correct, it ensure that the privacy of the identity information of user, also improve the safety of equipment.
Fig. 4 is the schematic diagram for the terminal device that the embodiment of the present invention four provides.As shown in figure 4, the terminal of the embodiment is set
Standby 4 include: processor 40, memory 41 and are stored in the meter that can be run in the memory 41 and on the processor 40
Calculation machine program 42.The processor 40 realizes the above-mentioned user authen method based on block chain when executing the computer program 42
Step in embodiment, such as step 101 shown in FIG. 1 is to 104.Alternatively, the processor 40 executes the computer program
The function of each module/unit in above-mentioned each Installation practice, such as the function of unit 301 to 304 shown in Fig. 3 are realized when 42.
Illustratively, the computer program 42 can be divided into one or more module/units, it is one or
Multiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the present invention.Described one
A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for
Implementation procedure of the computer program 42 in the terminal device 4 is described.
The terminal device 4 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set
It is standby.The terminal device may include, but be not limited only to, processor 40, memory 41.It will be understood by those skilled in the art that Fig. 4
The only example of terminal device 4 does not constitute the restriction to terminal device 4, may include than illustrating more or fewer portions
Part perhaps combines certain components or different components, such as the terminal device can also include input-output equipment, net
Network access device, bus etc..
Alleged processor 40 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 41 can be the internal storage unit of the terminal device 4, such as the hard disk or interior of terminal device 4
It deposits.The memory 41 is also possible to the External memory equipment of the terminal device 4, such as be equipped on the terminal device 4
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge
Deposit card (Flash Card, FC) etc..Further, the memory 41 can also have been deposited both the inside including the terminal device 4
Storage unit also includes External memory equipment.The memory 41 is for storing the computer program and terminal device institute
Other programs and data needed.The memory 41 can be also used for temporarily storing the number that has exported or will export
According to.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list
Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation
All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of user authen method based on block chain characterized by comprising
Obtain the data of endorsing that user generates when logging in the chain equipment in block catenary system;The data of endorsing are by using institute
It states chain equipment corresponding private key the cryptographic Hash of the identity information of the user is encrypted to obtain;
The cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The cryptographic Hash prestored is based on the chain equipment pair
The preset identity information answered obtains;
Solution label are carried out using endorse data of the public key to the acquisition, obtain the corresponding Hash of identity information of the user
Value, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user;
If the corresponding cryptographic Hash verification of the identity information of the user passes through, the user is authorized to log in the chain equipment.
2. the user authen method as described in claim 1 based on block chain, which is characterized in that described to obtain the chain equipment
Before corresponding public key and the cryptographic Hash prestored, further includes:
The identity information of registration user is obtained, and user certificate is generated according to the identity information of the registration user;
Unique key pair is generated using rivest, shamir, adelman;The key pair includes public key and private key, the private key and institute
Public key is stated uniquely to correspond to;
Hash operation is carried out to the user certificate by the private key and obtains the cryptographic Hash prestored.
3. the user authen method as claimed in claim 2 based on block chain, which is characterized in that described to obtain registration user's
Identity information, and user certificate is generated according to the identity information of the registration user, comprising:
Obtain the identity information of user;The identity information includes but is not limited to one of following information or at least two
In conjunction with: user account, identification card number or biological characteristic;
The identity information is audited, if audit passes through, block chain distribution account book technology is based on, the identity is believed
Breath inputs in preset certification hierarchy, obtains the user certificate.
4. the user authen method as claimed in claim 2 or claim 3 based on block chain, which is characterized in that the acquisition registration is used
The identity information at family, and user certificate is generated according to the identity information of the registration user, comprising:
The identity information of user is obtained, and detects the identity information whether within preset term of validity;
If the identity information generates user certificate within the term of validity, according to the identity information;
If the identity information reacquires the identity information of the user, and according to new not within the term of validity
Identity information generate new user certificate, and replace the user certificate with the new user certificate.
5. the user authen method as described in any one of claims 1-3 based on block chain, which is characterized in that if described
The corresponding cryptographic Hash verification of the identity information of user passes through, then after authorizing the user to log in the chain equipment, further includes:
Receive the chain equipment transmission logins successfully information;The user logined successfully in information including the user believes
Breath;
User right information corresponding with the user information is searched from preset rights database according to user information;
The user right information is sent to chain equipment all in preset device systems;The user right information is used for
The operating right of the user is arranged in the chain equipment.
6. a kind of terminal device, which is characterized in that including memory and processor, being stored in the memory can be described
The computer program run on processor, which is characterized in that when the processor executes the computer program, realize following step
It is rapid:
Obtain the data of endorsing that user generates when logging in the chain equipment in block catenary system;The data of endorsing are by using institute
It states chain equipment corresponding private key the cryptographic Hash of the identity information of the user is encrypted to obtain;
The cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The cryptographic Hash prestored is based on the chain equipment pair
The preset identity information answered obtains;
Solution label are carried out using endorse data of the public key to the acquisition, obtain the corresponding Hash of identity information of the user
Value, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user;
If the corresponding cryptographic Hash verification of the identity information of the user passes through, the user is authorized to log in the chain equipment.
7. terminal device as claimed in claim 6, which is characterized in that the chain for obtaining user in login block catenary system
Before the data of endorsing generated when equipment, further includes:
The identity information of registration user is obtained, and user certificate is generated according to the identity information of the registration user;
Unique key pair is generated using rivest, shamir, adelman;The key pair includes public key and private key, the private key and institute
Public key is stated uniquely to correspond to;
Hash operation is carried out to the user certificate by the private key and obtains data of endorsing.
8. terminal device as claimed in claim 7, which is characterized in that the identity information for obtaining registration user, and according to
The identity information of the registration user generates user certificate, comprising:
Obtain the identity information of user;The identity information includes but is not limited to one of following information or at least two
In conjunction with: user account, identification card number or biological characteristic;
The identity information is audited, if audit passes through, block chain distribution account book technology is based on, the identity is believed
Breath inputs in preset certification hierarchy, obtains the user certificate.
9. a kind of terminal device characterized by comprising
First acquisition unit, the data of endorsing generated for obtaining user when logging in the chain equipment in block catenary system;It is described
Data of endorsing are encrypted to obtain by using the corresponding private key of the chain equipment to the cryptographic Hash of the identity information of the user;
Second acquisition unit, the cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The Hash prestored
Value is obtained based on the corresponding preset identity information of the chain equipment;
Data processing unit obtains the user's for carrying out solution label to the data of endorsing of the acquisition using the public key
The corresponding cryptographic Hash of identity information, and the cryptographic Hash prestored described in use verifies the corresponding Hash of identity information of the user
Value;
Information checking unit authorizes the user if the corresponding cryptographic Hash verification of identity information for the user passes through
Log in the chain equipment.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In when the computer program is executed by processor the step of any one of such as claim 1 to 5 of realization the method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811182177.2A CN109522698A (en) | 2018-10-11 | 2018-10-11 | User authen method and terminal device based on block chain |
PCT/CN2018/124343 WO2020073513A1 (en) | 2018-10-11 | 2018-12-27 | Blockchain-based user authentication method and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811182177.2A CN109522698A (en) | 2018-10-11 | 2018-10-11 | User authen method and terminal device based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109522698A true CN109522698A (en) | 2019-03-26 |
Family
ID=65770875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811182177.2A Pending CN109522698A (en) | 2018-10-11 | 2018-10-11 | User authen method and terminal device based on block chain |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109522698A (en) |
WO (1) | WO2020073513A1 (en) |
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109995537A (en) * | 2019-05-22 | 2019-07-09 | 杭州云象网络技术有限公司 | A method of it is encrypted based on Lorentz-logic mapping algorithm block chain |
CN110602455A (en) * | 2019-09-10 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Video storage system, video processing method, device, equipment and storage medium |
CN110781140A (en) * | 2019-09-06 | 2020-02-11 | 平安科技(深圳)有限公司 | Method and device for data signature in block chain, computer equipment and storage medium |
CN110943976A (en) * | 2019-11-08 | 2020-03-31 | 中国电子科技网络信息安全有限公司 | Password-based user signature private key management method |
CN110990484A (en) * | 2019-11-27 | 2020-04-10 | 深圳前海环融联易信息科技服务有限公司 | Block chain based information storage method and system, computer equipment and storage medium |
CN111031475A (en) * | 2019-12-19 | 2020-04-17 | 达闼科技成都有限公司 | Method for collecting terminal position information, terminal, position collecting terminal and storage medium |
CN111027099A (en) * | 2019-12-09 | 2020-04-17 | 北京海益同展信息科技有限公司 | Identity verification method, device, system and computer readable storage medium |
CN111131269A (en) * | 2019-12-27 | 2020-05-08 | 中国银行股份有限公司 | User information verification method and device based on block chain |
CN111132155A (en) * | 2019-12-30 | 2020-05-08 | 江苏全链通信息科技有限公司 | 5G secure communication method, equipment and storage medium |
CN111193743A (en) * | 2019-12-31 | 2020-05-22 | 浪潮电子信息产业股份有限公司 | Identity authentication method, system and related device of storage system |
CN111241594A (en) * | 2020-01-06 | 2020-06-05 | 平安科技(深圳)有限公司 | Method and device for signing transaction information, computer equipment and storage medium |
CN111241492A (en) * | 2019-12-27 | 2020-06-05 | 武汉烽火信息集成技术有限公司 | Product multi-tenant secure credit granting method, system and electronic equipment |
CN111291398A (en) * | 2020-03-04 | 2020-06-16 | 恒安嘉新(北京)科技股份公司 | Block chain-based authentication method and device, computer equipment and storage medium |
CN111416809A (en) * | 2020-03-13 | 2020-07-14 | 国网河北省电力有限公司信息通信分公司 | Continuous authentication method and device based on keystroke recognition |
CN111475845A (en) * | 2020-04-13 | 2020-07-31 | 中国工商银行股份有限公司 | Unstructured data identity authorization access system and method |
CN111859348A (en) * | 2020-07-31 | 2020-10-30 | 上海微位网络科技有限公司 | Identity authentication method and device based on user identification module and block chain technology |
CN111949953A (en) * | 2020-06-23 | 2020-11-17 | 卓尔智联(武汉)研究院有限公司 | Identity authentication method, system and device based on block chain and computer equipment |
CN112035814A (en) * | 2020-07-21 | 2020-12-04 | 杜晓楠 | Method and computer readable medium for generating distributed identities based on iris recognition in blockchains |
CN112446701A (en) * | 2019-09-03 | 2021-03-05 | 上海唯链信息科技有限公司 | Identity authentication method, equipment and storage device based on block chain |
CN112597117A (en) * | 2020-12-26 | 2021-04-02 | 讯飞智元信息科技有限公司 | File sharing method, related device and file sharing system |
CN112866241A (en) * | 2021-01-15 | 2021-05-28 | 迅鳐成都科技有限公司 | Block chain-based digital identity updating method, equipment and storage medium |
CN113067704A (en) * | 2021-03-29 | 2021-07-02 | 安徽慧可科技有限公司 | Data right determining method, system and equipment based on block chain |
CN113420273A (en) * | 2021-06-28 | 2021-09-21 | 国网山东省电力公司电力科学研究院 | Multi-feature acquisition identity verification method and system based on Internet of things |
CN113452504A (en) * | 2020-03-24 | 2021-09-28 | 山东爱城市网信息技术有限公司 | Data decryption method and device |
CN113656785A (en) * | 2021-07-30 | 2021-11-16 | 中金金融认证中心有限公司 | Method for identity authentication and authentication service of bank user and related product |
CN114021157A (en) * | 2021-07-13 | 2022-02-08 | 中国联合网络通信集团有限公司 | Identity information management method, system, device and medium based on identification analysis |
CN114499859A (en) * | 2022-03-22 | 2022-05-13 | 深圳壹账通智能科技有限公司 | Password verification method, device, equipment and storage medium |
WO2022179115A1 (en) * | 2021-02-25 | 2022-09-01 | 深圳壹账通智能科技有限公司 | User authentication method and apparatus, server and storage medium |
WO2022189865A1 (en) * | 2021-03-08 | 2022-09-15 | Alipay Labs (singapore) Pte. Ltd. | Methods and devices for verifying data integrity |
CN115118516A (en) * | 2022-07-18 | 2022-09-27 | 浪潮卓数大数据产业发展有限公司 | Method, system and medium for integrated resource management |
CN115150109A (en) * | 2021-03-29 | 2022-10-04 | 中移(上海)信息通信科技有限公司 | Authentication method, device and related equipment |
CN115459920A (en) * | 2022-08-25 | 2022-12-09 | 浪潮云信息技术股份公司 | Certificateless alliance chain identity authentication method and system based on intelligent contract |
CN116933232A (en) * | 2023-08-23 | 2023-10-24 | 上海合芯数字科技有限公司 | BMC-based server password security management method and device |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110941668B (en) * | 2019-11-08 | 2022-09-16 | 中国电子科技网络信息安全有限公司 | Block chain-based unified identity management and authentication method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107257336A (en) * | 2017-06-15 | 2017-10-17 | 北京汇通金财信息科技有限公司 | A kind of user authen method and system |
CN107493273A (en) * | 2017-08-02 | 2017-12-19 | 深圳市易成自动驾驶技术有限公司 | Identity identifying method, system and computer-readable recording medium |
CN108599954A (en) * | 2018-03-16 | 2018-09-28 | 西安电子科技大学 | Auth method based on distributed account book |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106022035A (en) * | 2016-05-03 | 2016-10-12 | 识益生物科技(北京)有限公司 | Method and system for electronic signature |
KR101818601B1 (en) * | 2016-09-12 | 2018-01-16 | 주식회사 코인플러그 | Method for providing identity verification using card base on near field communication, card, verification terminal, verification support server and identity verification server using the same |
EP3454238B1 (en) * | 2016-12-23 | 2022-02-09 | CloudMinds (Shanghai) Robotics Co., Ltd. | Registration and authorization method, device and system |
CN108566395A (en) * | 2018-04-20 | 2018-09-21 | 济南浪潮高新科技投资发展有限公司 | A kind of document transmission method, apparatus and system based on block chain |
-
2018
- 2018-10-11 CN CN201811182177.2A patent/CN109522698A/en active Pending
- 2018-12-27 WO PCT/CN2018/124343 patent/WO2020073513A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN107257336A (en) * | 2017-06-15 | 2017-10-17 | 北京汇通金财信息科技有限公司 | A kind of user authen method and system |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107493273A (en) * | 2017-08-02 | 2017-12-19 | 深圳市易成自动驾驶技术有限公司 | Identity identifying method, system and computer-readable recording medium |
CN108599954A (en) * | 2018-03-16 | 2018-09-28 | 西安电子科技大学 | Auth method based on distributed account book |
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109995537A (en) * | 2019-05-22 | 2019-07-09 | 杭州云象网络技术有限公司 | A method of it is encrypted based on Lorentz-logic mapping algorithm block chain |
CN112446701B (en) * | 2019-09-03 | 2024-04-05 | 上海唯链信息科技有限公司 | Identity authentication method, equipment and storage device based on blockchain |
CN112446701A (en) * | 2019-09-03 | 2021-03-05 | 上海唯链信息科技有限公司 | Identity authentication method, equipment and storage device based on block chain |
CN110781140A (en) * | 2019-09-06 | 2020-02-11 | 平安科技(深圳)有限公司 | Method and device for data signature in block chain, computer equipment and storage medium |
CN110781140B (en) * | 2019-09-06 | 2023-08-18 | 平安科技(深圳)有限公司 | Method, device, computer equipment and storage medium for signing data in blockchain |
CN110602455A (en) * | 2019-09-10 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Video storage system, video processing method, device, equipment and storage medium |
CN110602455B (en) * | 2019-09-10 | 2021-06-18 | 腾讯科技(深圳)有限公司 | Video storage system, video processing method, device, equipment and storage medium |
CN110943976A (en) * | 2019-11-08 | 2020-03-31 | 中国电子科技网络信息安全有限公司 | Password-based user signature private key management method |
CN110943976B (en) * | 2019-11-08 | 2022-01-18 | 中国电子科技网络信息安全有限公司 | Password-based user signature private key management method |
CN110990484A (en) * | 2019-11-27 | 2020-04-10 | 深圳前海环融联易信息科技服务有限公司 | Block chain based information storage method and system, computer equipment and storage medium |
CN110990484B (en) * | 2019-11-27 | 2023-10-24 | 深圳前海环融联易信息科技服务有限公司 | Information storage method, system, computer equipment and storage medium based on block chain |
CN111027099A (en) * | 2019-12-09 | 2020-04-17 | 北京海益同展信息科技有限公司 | Identity verification method, device, system and computer readable storage medium |
CN111027099B (en) * | 2019-12-09 | 2022-04-26 | 京东科技信息技术有限公司 | Identity verification method, device, system and computer readable storage medium |
CN111031475A (en) * | 2019-12-19 | 2020-04-17 | 达闼科技成都有限公司 | Method for collecting terminal position information, terminal, position collecting terminal and storage medium |
CN111241492A (en) * | 2019-12-27 | 2020-06-05 | 武汉烽火信息集成技术有限公司 | Product multi-tenant secure credit granting method, system and electronic equipment |
CN111131269A (en) * | 2019-12-27 | 2020-05-08 | 中国银行股份有限公司 | User information verification method and device based on block chain |
CN111132155B (en) * | 2019-12-30 | 2023-11-17 | 江苏全链通信息科技有限公司 | 5G secure communication method, device and storage medium |
CN111132155A (en) * | 2019-12-30 | 2020-05-08 | 江苏全链通信息科技有限公司 | 5G secure communication method, equipment and storage medium |
CN111193743A (en) * | 2019-12-31 | 2020-05-22 | 浪潮电子信息产业股份有限公司 | Identity authentication method, system and related device of storage system |
CN111241594A (en) * | 2020-01-06 | 2020-06-05 | 平安科技(深圳)有限公司 | Method and device for signing transaction information, computer equipment and storage medium |
CN111241594B (en) * | 2020-01-06 | 2023-10-13 | 平安科技(深圳)有限公司 | Method, device, computer equipment and storage medium for signing transaction information |
CN111291398A (en) * | 2020-03-04 | 2020-06-16 | 恒安嘉新(北京)科技股份公司 | Block chain-based authentication method and device, computer equipment and storage medium |
CN111291398B (en) * | 2020-03-04 | 2022-09-20 | 恒安嘉新(北京)科技股份公司 | Block chain-based authentication method and device, computer equipment and storage medium |
CN111416809A (en) * | 2020-03-13 | 2020-07-14 | 国网河北省电力有限公司信息通信分公司 | Continuous authentication method and device based on keystroke recognition |
CN113452504A (en) * | 2020-03-24 | 2021-09-28 | 山东爱城市网信息技术有限公司 | Data decryption method and device |
CN113452504B (en) * | 2020-03-24 | 2023-02-21 | 浪潮卓数大数据产业发展有限公司 | Data decryption method and device |
CN111475845A (en) * | 2020-04-13 | 2020-07-31 | 中国工商银行股份有限公司 | Unstructured data identity authorization access system and method |
CN111475845B (en) * | 2020-04-13 | 2023-09-22 | 中国工商银行股份有限公司 | Unstructured data identity authorized access system and method |
CN111949953A (en) * | 2020-06-23 | 2020-11-17 | 卓尔智联(武汉)研究院有限公司 | Identity authentication method, system and device based on block chain and computer equipment |
CN112035814B (en) * | 2020-07-21 | 2023-10-24 | 杜晓楠 | Method and computer readable medium for generating distributed identities based on iris recognition in blockchain |
CN112035814A (en) * | 2020-07-21 | 2020-12-04 | 杜晓楠 | Method and computer readable medium for generating distributed identities based on iris recognition in blockchains |
CN111859348B (en) * | 2020-07-31 | 2022-07-19 | 上海微位网络科技有限公司 | Identity authentication method and device based on user identification module and block chain technology |
CN111859348A (en) * | 2020-07-31 | 2020-10-30 | 上海微位网络科技有限公司 | Identity authentication method and device based on user identification module and block chain technology |
CN112597117A (en) * | 2020-12-26 | 2021-04-02 | 讯飞智元信息科技有限公司 | File sharing method, related device and file sharing system |
CN112866241A (en) * | 2021-01-15 | 2021-05-28 | 迅鳐成都科技有限公司 | Block chain-based digital identity updating method, equipment and storage medium |
WO2022179115A1 (en) * | 2021-02-25 | 2022-09-01 | 深圳壹账通智能科技有限公司 | User authentication method and apparatus, server and storage medium |
WO2022189865A1 (en) * | 2021-03-08 | 2022-09-15 | Alipay Labs (singapore) Pte. Ltd. | Methods and devices for verifying data integrity |
CN113067704A (en) * | 2021-03-29 | 2021-07-02 | 安徽慧可科技有限公司 | Data right determining method, system and equipment based on block chain |
CN115150109A (en) * | 2021-03-29 | 2022-10-04 | 中移(上海)信息通信科技有限公司 | Authentication method, device and related equipment |
CN113067704B (en) * | 2021-03-29 | 2022-08-30 | 安徽慧可科技有限公司 | Data right determining method, system and equipment based on block chain |
CN113420273A (en) * | 2021-06-28 | 2021-09-21 | 国网山东省电力公司电力科学研究院 | Multi-feature acquisition identity verification method and system based on Internet of things |
CN114021157A (en) * | 2021-07-13 | 2022-02-08 | 中国联合网络通信集团有限公司 | Identity information management method, system, device and medium based on identification analysis |
CN113656785A (en) * | 2021-07-30 | 2021-11-16 | 中金金融认证中心有限公司 | Method for identity authentication and authentication service of bank user and related product |
CN113656785B (en) * | 2021-07-30 | 2024-07-02 | 中金金融认证中心有限公司 | Method for carrying out identity authentication and authentication service on bank user and related products |
CN114499859A (en) * | 2022-03-22 | 2022-05-13 | 深圳壹账通智能科技有限公司 | Password verification method, device, equipment and storage medium |
CN115118516A (en) * | 2022-07-18 | 2022-09-27 | 浪潮卓数大数据产业发展有限公司 | Method, system and medium for integrated resource management |
CN115459920A (en) * | 2022-08-25 | 2022-12-09 | 浪潮云信息技术股份公司 | Certificateless alliance chain identity authentication method and system based on intelligent contract |
CN116933232A (en) * | 2023-08-23 | 2023-10-24 | 上海合芯数字科技有限公司 | BMC-based server password security management method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2020073513A1 (en) | 2020-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109522698A (en) | User authen method and terminal device based on block chain | |
CN109687963B (en) | Anti-quantum computing alliance chain transaction method and system based on public key pool | |
Nagaraju et al. | Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway | |
Kou | Payment technologies for E-commerce | |
CN109583219A (en) | A kind of data signature, encryption and preservation method, apparatus and equipment | |
Samir et al. | DT-SSIM: A decentralized trustworthy self-sovereign identity management framework | |
JP6906521B2 (en) | Biometric Protocol Standard Systems and Methods | |
CN108989346A (en) | The effective identity trustship agility of third party based on account concealment authenticates access module | |
CN101527634B (en) | System and method for binding account information with certificates | |
CN109660345A (en) | Anti- quantum calculation block chain method of commerce and system based on unsymmetrical key pool server | |
CN109981287A (en) | A kind of code signature method and its storage medium | |
CN101739622A (en) | Trusted payment computer system | |
CN114357492A (en) | Medical data privacy fusion method and device based on block chain | |
CN110493005B (en) | Anti-quantum computing public key pool updating method and system based on alliance chain | |
CN113239401A (en) | Big data analysis system and method based on power Internet of things and computer storage medium | |
CN114514550A (en) | Partitioning requests into blockchains | |
Aravind et al. | Combined Digital Signature with SHA Hashing Technique-based Secure System: An Application of Blockchain using IoT | |
CN114417389A (en) | Method for storing user asset limit through addition homomorphic encryption in block chain | |
Reddy et al. | Block Chain for Financial Application using IOT | |
Maheshwari et al. | Secure authentication using biometric templates in Kerberos | |
Kavitha et al. | A security hybrid mechanism using fuzzy with adaptive ElGamal approach in cloud | |
Puckett et al. | Confidential Computing in the Post-Quantum Era | |
Goodrich et al. | Notarized federated ID management and authentication | |
Kumar et al. | Validation Lamina for Maintaining Confidentiality within the Hadoop | |
Dinesh Babu | Cloud Data security enhancements through the biometric and encryption system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |