CN109560938A - Based on the block catenary system for referring to human body biological characteristics identification technology - Google Patents
Based on the block catenary system for referring to human body biological characteristics identification technology Download PDFInfo
- Publication number
- CN109560938A CN109560938A CN201910064426.6A CN201910064426A CN109560938A CN 109560938 A CN109560938 A CN 109560938A CN 201910064426 A CN201910064426 A CN 201910064426A CN 109560938 A CN109560938 A CN 109560938A
- Authority
- CN
- China
- Prior art keywords
- layer
- catenary system
- module
- block
- block catenary
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The invention belongs to block catenary system fields, it is based especially on the block catenary system for referring to human body biological characteristics identification technology, including 6 logical layers, 6 logical layers are respectively data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer, data Layer is mainly responsible for the storage of data, it is the core of block chain, network layer is mainly responsible for the different nodes progress secure network communication in block chain, it is the backbone of block catenary system, layer of knowing together is to the affairs in block catenary system, transaction carries out a kind of mechanism that verifying is reached common understanding, it is the soul of block catenary system, excitation layer is the incentive mechanism for actively putting into computing resource to node each in block chain and participating in block catenary system affairs, contract layer is with all types of scripts, the intelligent contract constructed based on algorithm, it is the business logic of block catenary system.The present invention makes full use of biological identification technology to carry out the various uses such as authentication, encryption, verification, signature in each logical layer, it can be under the premise of guaranteeing the safety of block chain data, communication, its requirement to power is calculated is reduced, the consumption of hardware resource investment and the energy that block chain needs is saved.
Description
Technical field
The present invention relates to block catenary system fields, more particularly to based on the block linkwork for referring to human body biological characteristics identification technology
System.
Background technique
Block chain technology is very active in recent years, and block catenary system is made of multiple logical layers, the layered approach handle of mainstream
Block chain is divided into data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer, by improving agreement and architecture design,
Safety, believable storage and trade network have been constructed in the application and exploitation of block chain technology.In the practical realization of each level all
It is related to the safety issue of data storage or communication, guarantees that one of the key factor of block chain technical security performance is number
Encryption technology, and the Encryption Algorithm as digital-scrambling techniques core is once cracked with code key, the data safety of block chain
It will be challenged, storage and trade network can also be destroyed.
In the application of existing block chain, the safety of data and communication mainly uses random number to generate as secret key seed
Secret key, such as the operating system random number generated, the random number generated using high precision clock etc., or use mnemonic word conduct
The method of key seed.Then block chain key is generated using Encryption Algorithm.Block chain key generated is mostly a string
The combination of very long, absolutely not regular number, letter or other symbols, user are difficult to remember;Equally, as key kind
The random number or mnemonic word of son are also difficult to remember.Therefore, the difficulty of keeping block chain key and key seed is higher.It is most of to use
Family selection takes care of block chain key or key seed by way of storage, however keeping is carried out by way of storage then
There can be stolen risk, once it is stolen, it will cause the digital asset of user to suffer a loss.
In the application of other each levels, also because the solution of complicated hash algorithm and the application of Encryption Algorithm, lead
Caused block catenary system to calculate power superelevation requirement, need to put into a large amount of hardware computing resource, and will cause electric power energy,
The huge consumption of manual maintenance resource etc..
Summary of the invention
Technical problems based on background technology, the invention proposes based on the area for referring to human body biological characteristics identification technology
Block catenary system.
Block catenary system proposed by the present invention based on finger human body biological characteristics identification technology, including 6 logical layers, 6
The logical layer is respectively that data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer, the data Layer are mainly responsible for
The storage of data, is the core of block chain, and the network layer is mainly responsible for the different nodes in block chain, and to carry out secure network logical
News, are the backbone of block catenary system, and the common recognition layer is to carry out verifying to the affairs in block catenary system, transaction to reach common understanding
A kind of mechanism, is the soul of block catenary system, and the excitation layer is that computing resource participation is actively put into node each in block chain
The incentive mechanism of block catenary system affairs, the contract layer are the intelligent contracts constructed based on all types of scripts, algorithm,
It is the business logic of block catenary system, the application layer is application of the block catenary system in a certain specific commercial field, Mei Gesuo
Stating logical layer makes full use of biological identification technology to carry out.
Preferably, the data Layer includes data block module, chain structure module, timestamp module, hash function mould
Block, Merkel tree module and asymmetric encryption module, the network layer include P2P network module, transmission mechanism module and verifying
Mechanism module, the common recognition layer include PoW mechanism module, PoS mechanism module and DpoS mechanism module, and the excitation layer includes hair
Row mechanism module and distribution mechanism module, the contract layer include intelligent contract module, algorithm mechanism module and scripted code mould
Block, the application layer include programmable currency module, programmable financial module and participant's module.
Preferably, in each logical layer of the block catenary system, the data block of data Layer, hash function, it is asymmetric plus
It is close, the authentication mechanism of network layer, the DPoS mechanism for layer of knowing together, the issuing mechanism of excitation layer, the intelligent contract of contract layer, Yi Jiying
With modules such as the programmable currency of layer, programmable finance, human body biological characteristics identification technology may be introduced into.
Preferably, the biological identification technology includes finger vena, palm vein, fingerprint, palmmprint, face, iris harmony
The identification technologies such as line.
Preferably, the data block module exists all in the form of encryption data, and every data have signature and
Verification.
Preferably, it in the authentication mechanism module, between each node in block chain, when carrying out network communication, needs
Safe communication channel is established in such a way that secret key is negotiated, secret key needs to confirm the identity of other side when negotiating.
Preferably, described in the main PoW mechanism module of common recognition layer and using the combination of DPoS mechanism module.
Preferably, the issuing mechanism module is got rid of traditional by the way of digging mine, is known together based on DPoS above-mentioned
Mechanism generates block, including the corresponding digital cash of distribution by the representative that is elected, and using biological characteristic to being issued
Currency sign.
Preferably, including intelligent contract, it is even multi-party that generally there are the both sides of transaction, and raw among contract and nonsystematic
At, but the actual participation at necessarily useful family.Therefore in the intelligent contract of this block catenary system, each side of contract must be used
The biological characteristic of acquisition is signed (in the specified time after signing contract) in real time, and intelligent contract can just start after the completion of signature
Execute the corresponding script of intelligent contract or program.
Preferably, participant's module includes the node owner and ordinary user of block chain, using bio-identification pair
The identity of these users is verified.
The beneficial effects of the present invention are:
The present invention is divided into block catenary system multiple modules of 6 logical layers, and using human body biological characteristics and
The natural correlation of personal part and uniqueness, the randomness of human body biological characteristics, human body biological characteristics identification technology application
In the realization of each logical layer of block chain, building more safely and conveniently block catenary system, guarantee block chain data,
Under the premise of the safety of communication, its requirement to power is calculated is reduced, saves hardware resource investment and the energy that block chain needs
Consumption.
Detailed description of the invention
Fig. 1 is structural schematic diagram of the embodiment of the present invention.
Specific embodiment
Combined with specific embodiments below the present invention is made further to explain.
As shown in Figure 1, the invention proposes based on the block catenary system for referring to human body biological characteristics identification technology, including 6
Logical layer, 6 logical layers are respectively data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer, the data
Layer is mainly responsible for the storage of data, is the core of block chain, and the network layer is mainly responsible for the different nodes progress in block chain
Secure network communication, is the backbone of block catenary system, and the common recognition layer is verified to the affairs in block catenary system, transaction
A kind of mechanism reached common understanding, is the soul of block catenary system, and the excitation layer is actively to put into meter to node each in block chain
The incentive mechanism that resource participates in block catenary system affairs is calculated, the contract layer is constructed based on all types of scripts, algorithm
Intelligent contract, be the business logic of block catenary system, the application layer is block catenary system in a certain specific commercial field
Using each logical layer makes full use of biological identification technology to carry out.
The data Layer include data block module, chain structure module, timestamp module, hash function module,
Merkel tree module and asymmetric encryption module, the network layer include P2P network module, transmission mechanism module and authentication mechanism
Module, the common recognition layer includes PoW mechanism module, PoS mechanism module and DpoS mechanism module, and the excitation layer includes issuing machine
Molding block and distribution mechanism module, the contract layer include intelligent contract module, algorithm mechanism module and script code modules, institute
Stating application layer includes programmable currency module, programmable financial module and participant's module.
The biological identification technology includes the identification such as finger vena, palm vein, fingerprint, palmmprint, face, iris and vocal print
Technology, everyone biological characteristic is different, and the every finger interior vein blood vessel of the same person, the feature of fingerprint are all not
The same, then everyone left eye and right eye feature are different for iris, therefore biological characteristic feature with uniqueness.Because making a living
Object feature and people have natural correlation, can use biological characteristic naturally to identify the identity of people.
Biological characteristic, in different times, environment, angle be when extract, and can all have several difference.It is different
People, different finger, different eyes biological characteristic, diversity factor is generally higher than 60%;The same person, identical finger, same eye,
Different time, environment, angle extraction feature, diversity factor is generally less than 20%;Identification is being carried out using biological characteristic
When be exactly that this diversity factor is utilized.
It about the diversity factor of biological characteristic, can also be replaced with the concept of similarity, smaller this phase of meaning of diversity factor
It is bigger like spending, on the contrary diversity factor means that more greatly similarity is smaller.Diversity factor A%, when being described with the concept of similarity,
Similarity is (100-A) %.
It may be said that biological characteristic is a kind of a kind of special data for having had both uniqueness Yu randomness double grading, in block
Both characteristics of biological characteristic are utilized in catenary system.In practical applications, for every kind of biological identification technology, two can be set
The threshold value D (Different) and S (Same) of a diversity factor, diversity factor, which is more than or equal to D, indicates not to be the same biological characteristic, poor
It is the same biological characteristic that different degree, which is less than or equal to S expression,.
Application of the biological characteristic in hash function: common hash function needs a random number as input, as before
Giving an account of the content biological characteristic to continue has the characteristics that randomness, can be used as the seed for generating random number or even biological characteristic is straight
It connects and is used as random number.
When the secret key of the asymmetric encryption module generates, random number or some other data is needed to be used as input,
Using the randomness of biological characteristic, using biology sign as the input for generating asymmetric secret key, it can be ensured that each user's is close
Spoon does not repeat;And because the inherent feature that biological characteristic belongs to user's body will not lose, can be very good to carry out secret key school
It tests and prevents from forgeing and lose.
The data block module exists all in the form of encryption data, and every data has signature and verification, because
There is natural correlation for the identity of biological characteristic and user, biological characteristic is used for the encryption of data block, allows and encrypt number
According to safer;Biological characteristic is used for simultaneously the signature of block data, allows user to the operation of block data or to block counts
According to ownership have non repudiation.
In the authentication mechanism module, between each node in block chain, when carrying out network communication, need by close
The mode that spoon is negotiated establishes safe communication channel, and secret key needs to confirm the identity of other side when negotiating, traditional
Two side's Key Exchange Protocol of Diffic-Hellmen/algorithm, can suffer from internuncial attack, and secret key exchanges process wherein
The middle verifying that biological characteristic is added, has the characteristics that uniqueness and randomness using biological characteristic, can effectively prevent centre
People's attack.And in the authentication system of third party KDC trusty (Key Distribution Center), Ke Yi
It is verified when application reply secret key using biological characteristic, prevents user's secret key from being pretended to be by others to KDC application when losing and return
Secret key is talked about, to improve safety.
Preferably, described in the main PoW mechanism module of common recognition layer and using the combination of DPoS mechanism module, PoW (Proof
Of work) the huge computing resource consumption of mechanism needs, DpoS (Delegated Proof of Stake) is in computing resource
More there is advantage in terms of consumption and efficiency.
PoW mechanism, on the one hand generate block when rely on be workload (computing resource) a large amount of investment efficiency it is lower, and
And because all user nodes will participate in common recognition decision, efficiency is relatively low, its advantage is that realizing real decentralization.
DPoS knows together, and with the board of directors to vote some similar for mechanism.In a decentralization system, by policy-making power
All shareholders are distributed to, and when shareholder vote is more than 51%, then it is assumed that the decision is passed through, and the decision is irreversible.?
There is a key player to be called representative in the mechanism, representative is the node for generating block, it is desirable to first have to payment one as representative
Fixed ensuring funds come guarantee represent credibility.And user then possesses the right to elect a deputy.Each user can be with vote by ballot
One credible representative, obtains the right that the most preceding n representatives of ticket then has production block in the whole network, this n representative is held
Some polls are equivalent to the number of share of stock that the node is held.This n representative will be produced block, the block of generation in turn on schedule
By the number of share of stock be more than 51% and think that block generates and successfully represent the formality that will trade from block of one block of every generation
Income is obtained in expense.And these incomes also will be to represent the reward mechanism for maintaining to participate in online.In DPoS common recognition mechanism, representative
Reliability seems increasingly important, and when shareholder chooses and represents, shareholder can see the error rate for representing out block, so that shareholder can be with
Correctly selection represents.On the other hand, representing out block is temporally to generate in turn, therefore wrong generation one is represented when one
When block, as long as mustn't go to 51% approval, generated then the block will be represented in next period by others.It can be with
It is more efficient with PoW common recognition mechanism to say that DPoS common recognition mechanism is compared.DPoS common recognition mechanism is truly to get rid of to dig being total to for mine
Knowledge mechanism, so that entire block catenary system be allowed to be greatly lowered the consumption of computing resource with waste.
The division of labor of PoW and DPoS mechanism is, DPoS mechanism is used to need the application of efficiency, and PoW mechanism application
In the application for needing higher reliability.
And in this layer, mainly bio-identification is applied in DPoS mechanism, the purposes there are three bio-identifications in DPoS,
First, can be used for user carries out verifying authentication to user identity when electing a deputy;Second, can be when representing generation block
As the signature represented to generated block;Third, can be when other representatives vote to generated block to ballot generation
The identity of table is verified.
In DPoS mechanism, the biological characteristic of all node users must periodically update, to guarantee its credit rating or card
Its bright participation, specified time do not have more news, and the weight possessed in the ballot of block catenary system can reduce, until returning
Zero.
The issuing mechanism module gets rid of traditional by the way of digging mine, is known together mechanism based on DPoS above-mentioned, by
The representative elected generates block, including the corresponding digital cash of distribution, and using biological characteristic to the currency issued
It signs.
Including intelligent contract, it is even multi-party that generally there are the both sides of transaction, and generates among contract and nonsystematic, but
The actual participation at necessarily useful family.Therefore in the intelligent contract of this block catenary system, each side of contract must be using (label in real time
In specified time after ordering contract) biological characteristic of acquisition signs, and intelligent contract can just start to execute intelligence after the completion of signature
It can the corresponding script of contract or program.
Participant's module includes the node owner and ordinary user of block chain, using bio-identification to these users
Identity verified, reduce ordinary user's wallet in traditional block chain application and lose, the risk that password is forgotten;In addition, can
To be signed with biological characteristic to generated transaction contract etc., node distorting to data is prevented.
The present invention is divided into block catenary system multiple modules of 6 logical layers, and using human body biological characteristics and
The natural correlation of personal part and uniqueness, the randomness of human body biological characteristics, human body biological characteristics identification technology application
In the realization of each logical layer of block chain, building more safely and conveniently block catenary system, guarantee block chain data,
Under the premise of the safety of communication, its requirement to power is calculated is reduced, saves hardware resource investment and the energy that block chain needs
Consumption.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (11)
1. based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that including 6 logical layers, described in 6
Logical layer is respectively that data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer, the data Layer are mainly responsible for data
Storage, be the core of block chain, the network layer is mainly responsible for the different nodes in block chain and carries out secure network communication, is
The backbone of block catenary system, the common recognition layer are to carry out one kind that verifying is reached common understanding to the affairs in block catenary system, transaction
Mechanism, is the soul of block catenary system, and the excitation layer is actively to put into computing resource to node each in block chain to participate in block
The incentive mechanism of catenary system affairs, the contract layer are the intelligent contracts constructed based on all types of scripts, algorithm, are areas
The business logic of block catenary system, the application layer are application of the block catenary system in a certain specific commercial field, each described to patrol
Collecting layer makes full use of biological identification technology to carry out the various uses such as authentication, encryption, verification, signature.
2. according to claim 1 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute
State data Layer include data block module, chain structure module, timestamp module, hash function module, Merkel tree module and
Asymmetric encryption module, the network layer include P2P network module, transmission mechanism module and authentication mechanism module, the common recognition
Layer includes PoW mechanism module, PoS mechanism module and DpoS mechanism module, and the excitation layer includes issuing mechanism module and distribution
Mechanism module, the contract layer include that intelligent contract module, algorithm mechanism module and script code modules, the application layer include
Programmable currency module, programmable financial module and participant's module.
3. according to claim 1 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that number
According to the data block of layer, hash function, asymmetric encryption, the authentication mechanism of network layer, the DPoS mechanism for layer of knowing together, excitation layer
The modules such as the programmable currency of issuing mechanism, the intelligent contract of contract layer and application layer, programmable finance, may be introduced into
Human body biological characteristics identification technology.
4. according to claim 1 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute
Stating biological identification technology includes the identification technologies such as finger vena, palm vein, fingerprint, palmmprint, face, iris and vocal print.
5. according to claim 2 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute
When stating the secret key generation of asymmetric encryption module, need random number or some other data as input.
6. according to claim 2 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute
It states data block module to exist all in the form of encryption data, and every data has signature and verification.
7. according to claim 2 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute
It states in authentication mechanism module, between each node in block chain, when carrying out network communication, needs the side negotiated by secret key
Formula establishes the communication channel of safety, and secret key needs to confirm the identity of other side when negotiating.
8. according to claim 2 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute
It states in the main PoW mechanism module of common recognition layer and using the combination of DPoS mechanism module.
9. according to claim 7 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute
It states issuing mechanism module and gets rid of traditional by the way of digging mine, known together mechanism based on DPoS above-mentioned, by being elected
Representative generate block, including the corresponding digital cash of distribution, and signed using biological characteristic to the currency issued.
10. according to claim 1 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that
Including intelligent contract, it is even multi-party that generally there are the both sides of transaction, and generates among contract and nonsystematic, but necessarily useful
The actual participation at family.Therefore in the intelligent contract of this block catenary system, each side of contract must be using real-time (after signing contract
Specified time in) biological characteristic of acquisition signs, intelligent contract can just start to execute intelligent contract pair after the completion of signature
The script or program answered.
11. according to claim 2 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that
Participant's module includes the node owner and ordinary user of block chain, using bio-identification to the identity of these users into
Row verifying.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910064426.6A CN109560938A (en) | 2019-01-23 | 2019-01-23 | Based on the block catenary system for referring to human body biological characteristics identification technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910064426.6A CN109560938A (en) | 2019-01-23 | 2019-01-23 | Based on the block catenary system for referring to human body biological characteristics identification technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109560938A true CN109560938A (en) | 2019-04-02 |
Family
ID=65873693
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910064426.6A Withdrawn CN109560938A (en) | 2019-01-23 | 2019-01-23 | Based on the block catenary system for referring to human body biological characteristics identification technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109560938A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111027087A (en) * | 2019-12-16 | 2020-04-17 | 智慧谷(厦门)物联科技有限公司 | Enterprise information management system and method for encrypting mnemonics by applying block chain |
CN111047329A (en) * | 2019-12-27 | 2020-04-21 | 浙江工商大学 | Industrial chain big data sharing and circulating system based on block chain |
CN111325583A (en) * | 2020-03-20 | 2020-06-23 | 贵阳块数据城市建设有限公司 | Design method for recording life cycle of electronic ticket based on block chain technology |
CN111447066A (en) * | 2020-02-19 | 2020-07-24 | 江苏荣泽信息科技股份有限公司 | Thing networking platform based on block chain |
CN111951108A (en) * | 2020-08-10 | 2020-11-17 | 神话科技传媒(深圳)有限公司上海分公司 | Chain structure design method with intelligent contract block chain with complete picture |
CN112016911A (en) * | 2020-08-20 | 2020-12-01 | 王红根 | Information management method based on block chain digital currency finance and digital service platform |
CN112911018A (en) * | 2021-03-10 | 2021-06-04 | 杭州宇链科技有限公司 | Block chain-based network community credit investigation management method |
WO2022100291A1 (en) * | 2020-11-11 | 2022-05-19 | 山西特信环宇信息技术有限公司 | Hierarchical architecture of pyramid blockchain |
CN114925403A (en) * | 2022-05-18 | 2022-08-19 | 易观科技股份有限公司 | Block chain mixed consensus data processing method and system |
CN115225529A (en) * | 2022-06-13 | 2022-10-21 | 广州大学 | High-simulation platform supporting multi-class block chain system |
TWI828001B (en) * | 2021-11-11 | 2024-01-01 | 翁仲和 | System for using multiple security levels to verify customer identity and transaction services and method thereof |
-
2019
- 2019-01-23 CN CN201910064426.6A patent/CN109560938A/en not_active Withdrawn
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111027087A (en) * | 2019-12-16 | 2020-04-17 | 智慧谷(厦门)物联科技有限公司 | Enterprise information management system and method for encrypting mnemonics by applying block chain |
CN111027087B (en) * | 2019-12-16 | 2022-06-21 | 智慧谷(厦门)物联科技有限公司 | Enterprise information management system and method for encrypting mnemonics by applying block chain |
CN111047329A (en) * | 2019-12-27 | 2020-04-21 | 浙江工商大学 | Industrial chain big data sharing and circulating system based on block chain |
CN111447066A (en) * | 2020-02-19 | 2020-07-24 | 江苏荣泽信息科技股份有限公司 | Thing networking platform based on block chain |
CN111325583B (en) * | 2020-03-20 | 2023-05-02 | 贵阳块数据城市建设有限公司 | Design method for recording life cycle of electronic ticket based on blockchain technology |
CN111325583A (en) * | 2020-03-20 | 2020-06-23 | 贵阳块数据城市建设有限公司 | Design method for recording life cycle of electronic ticket based on block chain technology |
CN111951108A (en) * | 2020-08-10 | 2020-11-17 | 神话科技传媒(深圳)有限公司上海分公司 | Chain structure design method with intelligent contract block chain with complete picture |
CN112016911A (en) * | 2020-08-20 | 2020-12-01 | 王红根 | Information management method based on block chain digital currency finance and digital service platform |
WO2022100291A1 (en) * | 2020-11-11 | 2022-05-19 | 山西特信环宇信息技术有限公司 | Hierarchical architecture of pyramid blockchain |
CN112911018A (en) * | 2021-03-10 | 2021-06-04 | 杭州宇链科技有限公司 | Block chain-based network community credit investigation management method |
TWI828001B (en) * | 2021-11-11 | 2024-01-01 | 翁仲和 | System for using multiple security levels to verify customer identity and transaction services and method thereof |
CN114925403A (en) * | 2022-05-18 | 2022-08-19 | 易观科技股份有限公司 | Block chain mixed consensus data processing method and system |
CN115225529A (en) * | 2022-06-13 | 2022-10-21 | 广州大学 | High-simulation platform supporting multi-class block chain system |
CN115225529B (en) * | 2022-06-13 | 2024-03-01 | 广州大学 | High simulation platform supporting multi-category blockchain system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109560938A (en) | Based on the block catenary system for referring to human body biological characteristics identification technology | |
CN109710823A (en) | Archive management method, file administration network and electronic equipment based on block chain | |
Gao et al. | A proof of stake sharding protocol for scalable blockchains | |
CN102004872B (en) | Fingerprint encryption-based identity authentication system and implementation method thereof | |
Xu et al. | When quantum information technologies meet blockchain in web 3.0 | |
Rane et al. | Systematic erudition of bitcoin price prediction using machine learning techniques | |
CN114362987B (en) | Distributed voting system and method based on block chain and intelligent contract | |
CN109447807A (en) | The weak center's trust data management system and method for the total score double-strand of digital bank | |
CN103312509A (en) | Display method and display device of dynamic token and dynamic password | |
Sarma et al. | Internet banking: Risk analysis and applicability of biometric technology for authentication | |
Pathak et al. | Blockchain based e-voting system | |
Yano et al. | Creation of blockchain and a new ecosystem | |
Bilal et al. | Blockchain technology: Opportunities & challenges | |
CN111583005A (en) | Tax-related credit management method based on block chain | |
Abraham | Building trust: Lessons from canada’s approach to digital identity | |
Tomov | Challenges of blockchain technologies in the future | |
Avunduk et al. | Selection of the Graphics Card to be used in Ethereum Mining with Linear BWM-TOPSIS | |
CN112990928A (en) | Monitorable anonymous legal digital currency issuing and circulating method | |
CN109191095A (en) | It is a kind of can quick localization of internal attacker electronic cash distribution method and system | |
Huynh et al. | Eunicert: ethereum based digital certificate verification system | |
Mahmudi | The Evolution of FinTech and its Effects on Financial Decision Making: A Systematic Literature Review | |
Yang et al. | Impact of Bitcoin's Distributed Structure on the Construction of the Central Bank's Digital Currency System | |
Kovalenko et al. | Efficient funds allocation system based on fuzzy logic and smart contracts | |
Alaka et al. | Blockchain Technology and Organizational Performance in the Banking Industry | |
BALUSAMY | DONE BY: V. BALUSAMY, R. BALAVIGNESH, M. BHAVADHARANI, M. DHANUSRI |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190402 |