CN109560938A - Based on the block catenary system for referring to human body biological characteristics identification technology - Google Patents

Based on the block catenary system for referring to human body biological characteristics identification technology Download PDF

Info

Publication number
CN109560938A
CN109560938A CN201910064426.6A CN201910064426A CN109560938A CN 109560938 A CN109560938 A CN 109560938A CN 201910064426 A CN201910064426 A CN 201910064426A CN 109560938 A CN109560938 A CN 109560938A
Authority
CN
China
Prior art keywords
layer
catenary system
module
block
block catenary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910064426.6A
Other languages
Chinese (zh)
Inventor
陈建昌
郑权
尹嘉
李立龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Micro Shield Polytron Technologies Inc
Original Assignee
Guangzhou Micro Shield Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Micro Shield Polytron Technologies Inc filed Critical Guangzhou Micro Shield Polytron Technologies Inc
Priority to CN201910064426.6A priority Critical patent/CN109560938A/en
Publication of CN109560938A publication Critical patent/CN109560938A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention belongs to block catenary system fields, it is based especially on the block catenary system for referring to human body biological characteristics identification technology, including 6 logical layers, 6 logical layers are respectively data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer, data Layer is mainly responsible for the storage of data, it is the core of block chain, network layer is mainly responsible for the different nodes progress secure network communication in block chain, it is the backbone of block catenary system, layer of knowing together is to the affairs in block catenary system, transaction carries out a kind of mechanism that verifying is reached common understanding, it is the soul of block catenary system, excitation layer is the incentive mechanism for actively putting into computing resource to node each in block chain and participating in block catenary system affairs, contract layer is with all types of scripts, the intelligent contract constructed based on algorithm, it is the business logic of block catenary system.The present invention makes full use of biological identification technology to carry out the various uses such as authentication, encryption, verification, signature in each logical layer, it can be under the premise of guaranteeing the safety of block chain data, communication, its requirement to power is calculated is reduced, the consumption of hardware resource investment and the energy that block chain needs is saved.

Description

Based on the block catenary system for referring to human body biological characteristics identification technology
Technical field
The present invention relates to block catenary system fields, more particularly to based on the block linkwork for referring to human body biological characteristics identification technology System.
Background technique
Block chain technology is very active in recent years, and block catenary system is made of multiple logical layers, the layered approach handle of mainstream Block chain is divided into data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer, by improving agreement and architecture design, Safety, believable storage and trade network have been constructed in the application and exploitation of block chain technology.In the practical realization of each level all It is related to the safety issue of data storage or communication, guarantees that one of the key factor of block chain technical security performance is number Encryption technology, and the Encryption Algorithm as digital-scrambling techniques core is once cracked with code key, the data safety of block chain It will be challenged, storage and trade network can also be destroyed.
In the application of existing block chain, the safety of data and communication mainly uses random number to generate as secret key seed Secret key, such as the operating system random number generated, the random number generated using high precision clock etc., or use mnemonic word conduct The method of key seed.Then block chain key is generated using Encryption Algorithm.Block chain key generated is mostly a string The combination of very long, absolutely not regular number, letter or other symbols, user are difficult to remember;Equally, as key kind The random number or mnemonic word of son are also difficult to remember.Therefore, the difficulty of keeping block chain key and key seed is higher.It is most of to use Family selection takes care of block chain key or key seed by way of storage, however keeping is carried out by way of storage then There can be stolen risk, once it is stolen, it will cause the digital asset of user to suffer a loss.
In the application of other each levels, also because the solution of complicated hash algorithm and the application of Encryption Algorithm, lead Caused block catenary system to calculate power superelevation requirement, need to put into a large amount of hardware computing resource, and will cause electric power energy, The huge consumption of manual maintenance resource etc..
Summary of the invention
Technical problems based on background technology, the invention proposes based on the area for referring to human body biological characteristics identification technology Block catenary system.
Block catenary system proposed by the present invention based on finger human body biological characteristics identification technology, including 6 logical layers, 6 The logical layer is respectively that data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer, the data Layer are mainly responsible for The storage of data, is the core of block chain, and the network layer is mainly responsible for the different nodes in block chain, and to carry out secure network logical News, are the backbone of block catenary system, and the common recognition layer is to carry out verifying to the affairs in block catenary system, transaction to reach common understanding A kind of mechanism, is the soul of block catenary system, and the excitation layer is that computing resource participation is actively put into node each in block chain The incentive mechanism of block catenary system affairs, the contract layer are the intelligent contracts constructed based on all types of scripts, algorithm, It is the business logic of block catenary system, the application layer is application of the block catenary system in a certain specific commercial field, Mei Gesuo Stating logical layer makes full use of biological identification technology to carry out.
Preferably, the data Layer includes data block module, chain structure module, timestamp module, hash function mould Block, Merkel tree module and asymmetric encryption module, the network layer include P2P network module, transmission mechanism module and verifying Mechanism module, the common recognition layer include PoW mechanism module, PoS mechanism module and DpoS mechanism module, and the excitation layer includes hair Row mechanism module and distribution mechanism module, the contract layer include intelligent contract module, algorithm mechanism module and scripted code mould Block, the application layer include programmable currency module, programmable financial module and participant's module.
Preferably, in each logical layer of the block catenary system, the data block of data Layer, hash function, it is asymmetric plus It is close, the authentication mechanism of network layer, the DPoS mechanism for layer of knowing together, the issuing mechanism of excitation layer, the intelligent contract of contract layer, Yi Jiying With modules such as the programmable currency of layer, programmable finance, human body biological characteristics identification technology may be introduced into.
Preferably, the biological identification technology includes finger vena, palm vein, fingerprint, palmmprint, face, iris harmony The identification technologies such as line.
Preferably, the data block module exists all in the form of encryption data, and every data have signature and Verification.
Preferably, it in the authentication mechanism module, between each node in block chain, when carrying out network communication, needs Safe communication channel is established in such a way that secret key is negotiated, secret key needs to confirm the identity of other side when negotiating.
Preferably, described in the main PoW mechanism module of common recognition layer and using the combination of DPoS mechanism module.
Preferably, the issuing mechanism module is got rid of traditional by the way of digging mine, is known together based on DPoS above-mentioned Mechanism generates block, including the corresponding digital cash of distribution by the representative that is elected, and using biological characteristic to being issued Currency sign.
Preferably, including intelligent contract, it is even multi-party that generally there are the both sides of transaction, and raw among contract and nonsystematic At, but the actual participation at necessarily useful family.Therefore in the intelligent contract of this block catenary system, each side of contract must be used The biological characteristic of acquisition is signed (in the specified time after signing contract) in real time, and intelligent contract can just start after the completion of signature Execute the corresponding script of intelligent contract or program.
Preferably, participant's module includes the node owner and ordinary user of block chain, using bio-identification pair The identity of these users is verified.
The beneficial effects of the present invention are:
The present invention is divided into block catenary system multiple modules of 6 logical layers, and using human body biological characteristics and The natural correlation of personal part and uniqueness, the randomness of human body biological characteristics, human body biological characteristics identification technology application In the realization of each logical layer of block chain, building more safely and conveniently block catenary system, guarantee block chain data, Under the premise of the safety of communication, its requirement to power is calculated is reduced, saves hardware resource investment and the energy that block chain needs Consumption.
Detailed description of the invention
Fig. 1 is structural schematic diagram of the embodiment of the present invention.
Specific embodiment
Combined with specific embodiments below the present invention is made further to explain.
As shown in Figure 1, the invention proposes based on the block catenary system for referring to human body biological characteristics identification technology, including 6 Logical layer, 6 logical layers are respectively data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer, the data Layer is mainly responsible for the storage of data, is the core of block chain, and the network layer is mainly responsible for the different nodes progress in block chain Secure network communication, is the backbone of block catenary system, and the common recognition layer is verified to the affairs in block catenary system, transaction A kind of mechanism reached common understanding, is the soul of block catenary system, and the excitation layer is actively to put into meter to node each in block chain The incentive mechanism that resource participates in block catenary system affairs is calculated, the contract layer is constructed based on all types of scripts, algorithm Intelligent contract, be the business logic of block catenary system, the application layer is block catenary system in a certain specific commercial field Using each logical layer makes full use of biological identification technology to carry out.
The data Layer include data block module, chain structure module, timestamp module, hash function module, Merkel tree module and asymmetric encryption module, the network layer include P2P network module, transmission mechanism module and authentication mechanism Module, the common recognition layer includes PoW mechanism module, PoS mechanism module and DpoS mechanism module, and the excitation layer includes issuing machine Molding block and distribution mechanism module, the contract layer include intelligent contract module, algorithm mechanism module and script code modules, institute Stating application layer includes programmable currency module, programmable financial module and participant's module.
The biological identification technology includes the identification such as finger vena, palm vein, fingerprint, palmmprint, face, iris and vocal print Technology, everyone biological characteristic is different, and the every finger interior vein blood vessel of the same person, the feature of fingerprint are all not The same, then everyone left eye and right eye feature are different for iris, therefore biological characteristic feature with uniqueness.Because making a living Object feature and people have natural correlation, can use biological characteristic naturally to identify the identity of people.
Biological characteristic, in different times, environment, angle be when extract, and can all have several difference.It is different People, different finger, different eyes biological characteristic, diversity factor is generally higher than 60%;The same person, identical finger, same eye, Different time, environment, angle extraction feature, diversity factor is generally less than 20%;Identification is being carried out using biological characteristic When be exactly that this diversity factor is utilized.
It about the diversity factor of biological characteristic, can also be replaced with the concept of similarity, smaller this phase of meaning of diversity factor It is bigger like spending, on the contrary diversity factor means that more greatly similarity is smaller.Diversity factor A%, when being described with the concept of similarity, Similarity is (100-A) %.
It may be said that biological characteristic is a kind of a kind of special data for having had both uniqueness Yu randomness double grading, in block Both characteristics of biological characteristic are utilized in catenary system.In practical applications, for every kind of biological identification technology, two can be set The threshold value D (Different) and S (Same) of a diversity factor, diversity factor, which is more than or equal to D, indicates not to be the same biological characteristic, poor It is the same biological characteristic that different degree, which is less than or equal to S expression,.
Application of the biological characteristic in hash function: common hash function needs a random number as input, as before Giving an account of the content biological characteristic to continue has the characteristics that randomness, can be used as the seed for generating random number or even biological characteristic is straight It connects and is used as random number.
When the secret key of the asymmetric encryption module generates, random number or some other data is needed to be used as input, Using the randomness of biological characteristic, using biology sign as the input for generating asymmetric secret key, it can be ensured that each user's is close Spoon does not repeat;And because the inherent feature that biological characteristic belongs to user's body will not lose, can be very good to carry out secret key school It tests and prevents from forgeing and lose.
The data block module exists all in the form of encryption data, and every data has signature and verification, because There is natural correlation for the identity of biological characteristic and user, biological characteristic is used for the encryption of data block, allows and encrypt number According to safer;Biological characteristic is used for simultaneously the signature of block data, allows user to the operation of block data or to block counts According to ownership have non repudiation.
In the authentication mechanism module, between each node in block chain, when carrying out network communication, need by close The mode that spoon is negotiated establishes safe communication channel, and secret key needs to confirm the identity of other side when negotiating, traditional Two side's Key Exchange Protocol of Diffic-Hellmen/algorithm, can suffer from internuncial attack, and secret key exchanges process wherein The middle verifying that biological characteristic is added, has the characteristics that uniqueness and randomness using biological characteristic, can effectively prevent centre People's attack.And in the authentication system of third party KDC trusty (Key Distribution Center), Ke Yi It is verified when application reply secret key using biological characteristic, prevents user's secret key from being pretended to be by others to KDC application when losing and return Secret key is talked about, to improve safety.
Preferably, described in the main PoW mechanism module of common recognition layer and using the combination of DPoS mechanism module, PoW (Proof Of work) the huge computing resource consumption of mechanism needs, DpoS (Delegated Proof of Stake) is in computing resource More there is advantage in terms of consumption and efficiency.
PoW mechanism, on the one hand generate block when rely on be workload (computing resource) a large amount of investment efficiency it is lower, and And because all user nodes will participate in common recognition decision, efficiency is relatively low, its advantage is that realizing real decentralization.
DPoS knows together, and with the board of directors to vote some similar for mechanism.In a decentralization system, by policy-making power All shareholders are distributed to, and when shareholder vote is more than 51%, then it is assumed that the decision is passed through, and the decision is irreversible.? There is a key player to be called representative in the mechanism, representative is the node for generating block, it is desirable to first have to payment one as representative Fixed ensuring funds come guarantee represent credibility.And user then possesses the right to elect a deputy.Each user can be with vote by ballot One credible representative, obtains the right that the most preceding n representatives of ticket then has production block in the whole network, this n representative is held Some polls are equivalent to the number of share of stock that the node is held.This n representative will be produced block, the block of generation in turn on schedule By the number of share of stock be more than 51% and think that block generates and successfully represent the formality that will trade from block of one block of every generation Income is obtained in expense.And these incomes also will be to represent the reward mechanism for maintaining to participate in online.In DPoS common recognition mechanism, representative Reliability seems increasingly important, and when shareholder chooses and represents, shareholder can see the error rate for representing out block, so that shareholder can be with Correctly selection represents.On the other hand, representing out block is temporally to generate in turn, therefore wrong generation one is represented when one When block, as long as mustn't go to 51% approval, generated then the block will be represented in next period by others.It can be with It is more efficient with PoW common recognition mechanism to say that DPoS common recognition mechanism is compared.DPoS common recognition mechanism is truly to get rid of to dig being total to for mine Knowledge mechanism, so that entire block catenary system be allowed to be greatly lowered the consumption of computing resource with waste.
The division of labor of PoW and DPoS mechanism is, DPoS mechanism is used to need the application of efficiency, and PoW mechanism application In the application for needing higher reliability.
And in this layer, mainly bio-identification is applied in DPoS mechanism, the purposes there are three bio-identifications in DPoS, First, can be used for user carries out verifying authentication to user identity when electing a deputy;Second, can be when representing generation block As the signature represented to generated block;Third, can be when other representatives vote to generated block to ballot generation The identity of table is verified.
In DPoS mechanism, the biological characteristic of all node users must periodically update, to guarantee its credit rating or card Its bright participation, specified time do not have more news, and the weight possessed in the ballot of block catenary system can reduce, until returning Zero.
The issuing mechanism module gets rid of traditional by the way of digging mine, is known together mechanism based on DPoS above-mentioned, by The representative elected generates block, including the corresponding digital cash of distribution, and using biological characteristic to the currency issued It signs.
Including intelligent contract, it is even multi-party that generally there are the both sides of transaction, and generates among contract and nonsystematic, but The actual participation at necessarily useful family.Therefore in the intelligent contract of this block catenary system, each side of contract must be using (label in real time In specified time after ordering contract) biological characteristic of acquisition signs, and intelligent contract can just start to execute intelligence after the completion of signature It can the corresponding script of contract or program.
Participant's module includes the node owner and ordinary user of block chain, using bio-identification to these users Identity verified, reduce ordinary user's wallet in traditional block chain application and lose, the risk that password is forgotten;In addition, can To be signed with biological characteristic to generated transaction contract etc., node distorting to data is prevented.
The present invention is divided into block catenary system multiple modules of 6 logical layers, and using human body biological characteristics and The natural correlation of personal part and uniqueness, the randomness of human body biological characteristics, human body biological characteristics identification technology application In the realization of each logical layer of block chain, building more safely and conveniently block catenary system, guarantee block chain data, Under the premise of the safety of communication, its requirement to power is calculated is reduced, saves hardware resource investment and the energy that block chain needs Consumption.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (11)

1. based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that including 6 logical layers, described in 6 Logical layer is respectively that data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer, the data Layer are mainly responsible for data Storage, be the core of block chain, the network layer is mainly responsible for the different nodes in block chain and carries out secure network communication, is The backbone of block catenary system, the common recognition layer are to carry out one kind that verifying is reached common understanding to the affairs in block catenary system, transaction Mechanism, is the soul of block catenary system, and the excitation layer is actively to put into computing resource to node each in block chain to participate in block The incentive mechanism of catenary system affairs, the contract layer are the intelligent contracts constructed based on all types of scripts, algorithm, are areas The business logic of block catenary system, the application layer are application of the block catenary system in a certain specific commercial field, each described to patrol Collecting layer makes full use of biological identification technology to carry out the various uses such as authentication, encryption, verification, signature.
2. according to claim 1 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute State data Layer include data block module, chain structure module, timestamp module, hash function module, Merkel tree module and Asymmetric encryption module, the network layer include P2P network module, transmission mechanism module and authentication mechanism module, the common recognition Layer includes PoW mechanism module, PoS mechanism module and DpoS mechanism module, and the excitation layer includes issuing mechanism module and distribution Mechanism module, the contract layer include that intelligent contract module, algorithm mechanism module and script code modules, the application layer include Programmable currency module, programmable financial module and participant's module.
3. according to claim 1 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that number According to the data block of layer, hash function, asymmetric encryption, the authentication mechanism of network layer, the DPoS mechanism for layer of knowing together, excitation layer The modules such as the programmable currency of issuing mechanism, the intelligent contract of contract layer and application layer, programmable finance, may be introduced into Human body biological characteristics identification technology.
4. according to claim 1 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute Stating biological identification technology includes the identification technologies such as finger vena, palm vein, fingerprint, palmmprint, face, iris and vocal print.
5. according to claim 2 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute When stating the secret key generation of asymmetric encryption module, need random number or some other data as input.
6. according to claim 2 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute It states data block module to exist all in the form of encryption data, and every data has signature and verification.
7. according to claim 2 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute It states in authentication mechanism module, between each node in block chain, when carrying out network communication, needs the side negotiated by secret key Formula establishes the communication channel of safety, and secret key needs to confirm the identity of other side when negotiating.
8. according to claim 2 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute It states in the main PoW mechanism module of common recognition layer and using the combination of DPoS mechanism module.
9. according to claim 7 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that institute It states issuing mechanism module and gets rid of traditional by the way of digging mine, known together mechanism based on DPoS above-mentioned, by being elected Representative generate block, including the corresponding digital cash of distribution, and signed using biological characteristic to the currency issued.
10. according to claim 1 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that Including intelligent contract, it is even multi-party that generally there are the both sides of transaction, and generates among contract and nonsystematic, but necessarily useful The actual participation at family.Therefore in the intelligent contract of this block catenary system, each side of contract must be using real-time (after signing contract Specified time in) biological characteristic of acquisition signs, intelligent contract can just start to execute intelligent contract pair after the completion of signature The script or program answered.
11. according to claim 2 based on the block catenary system for referring to human body biological characteristics identification technology, which is characterized in that Participant's module includes the node owner and ordinary user of block chain, using bio-identification to the identity of these users into Row verifying.
CN201910064426.6A 2019-01-23 2019-01-23 Based on the block catenary system for referring to human body biological characteristics identification technology Withdrawn CN109560938A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910064426.6A CN109560938A (en) 2019-01-23 2019-01-23 Based on the block catenary system for referring to human body biological characteristics identification technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910064426.6A CN109560938A (en) 2019-01-23 2019-01-23 Based on the block catenary system for referring to human body biological characteristics identification technology

Publications (1)

Publication Number Publication Date
CN109560938A true CN109560938A (en) 2019-04-02

Family

ID=65873693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910064426.6A Withdrawn CN109560938A (en) 2019-01-23 2019-01-23 Based on the block catenary system for referring to human body biological characteristics identification technology

Country Status (1)

Country Link
CN (1) CN109560938A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111027087A (en) * 2019-12-16 2020-04-17 智慧谷(厦门)物联科技有限公司 Enterprise information management system and method for encrypting mnemonics by applying block chain
CN111047329A (en) * 2019-12-27 2020-04-21 浙江工商大学 Industrial chain big data sharing and circulating system based on block chain
CN111325583A (en) * 2020-03-20 2020-06-23 贵阳块数据城市建设有限公司 Design method for recording life cycle of electronic ticket based on block chain technology
CN111447066A (en) * 2020-02-19 2020-07-24 江苏荣泽信息科技股份有限公司 Thing networking platform based on block chain
CN111951108A (en) * 2020-08-10 2020-11-17 神话科技传媒(深圳)有限公司上海分公司 Chain structure design method with intelligent contract block chain with complete picture
CN112016911A (en) * 2020-08-20 2020-12-01 王红根 Information management method based on block chain digital currency finance and digital service platform
CN112911018A (en) * 2021-03-10 2021-06-04 杭州宇链科技有限公司 Block chain-based network community credit investigation management method
WO2022100291A1 (en) * 2020-11-11 2022-05-19 山西特信环宇信息技术有限公司 Hierarchical architecture of pyramid blockchain
CN114925403A (en) * 2022-05-18 2022-08-19 易观科技股份有限公司 Block chain mixed consensus data processing method and system
CN115225529A (en) * 2022-06-13 2022-10-21 广州大学 High-simulation platform supporting multi-class block chain system
TWI828001B (en) * 2021-11-11 2024-01-01 翁仲和 System for using multiple security levels to verify customer identity and transaction services and method thereof

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111027087A (en) * 2019-12-16 2020-04-17 智慧谷(厦门)物联科技有限公司 Enterprise information management system and method for encrypting mnemonics by applying block chain
CN111027087B (en) * 2019-12-16 2022-06-21 智慧谷(厦门)物联科技有限公司 Enterprise information management system and method for encrypting mnemonics by applying block chain
CN111047329A (en) * 2019-12-27 2020-04-21 浙江工商大学 Industrial chain big data sharing and circulating system based on block chain
CN111447066A (en) * 2020-02-19 2020-07-24 江苏荣泽信息科技股份有限公司 Thing networking platform based on block chain
CN111325583B (en) * 2020-03-20 2023-05-02 贵阳块数据城市建设有限公司 Design method for recording life cycle of electronic ticket based on blockchain technology
CN111325583A (en) * 2020-03-20 2020-06-23 贵阳块数据城市建设有限公司 Design method for recording life cycle of electronic ticket based on block chain technology
CN111951108A (en) * 2020-08-10 2020-11-17 神话科技传媒(深圳)有限公司上海分公司 Chain structure design method with intelligent contract block chain with complete picture
CN112016911A (en) * 2020-08-20 2020-12-01 王红根 Information management method based on block chain digital currency finance and digital service platform
WO2022100291A1 (en) * 2020-11-11 2022-05-19 山西特信环宇信息技术有限公司 Hierarchical architecture of pyramid blockchain
CN112911018A (en) * 2021-03-10 2021-06-04 杭州宇链科技有限公司 Block chain-based network community credit investigation management method
TWI828001B (en) * 2021-11-11 2024-01-01 翁仲和 System for using multiple security levels to verify customer identity and transaction services and method thereof
CN114925403A (en) * 2022-05-18 2022-08-19 易观科技股份有限公司 Block chain mixed consensus data processing method and system
CN115225529A (en) * 2022-06-13 2022-10-21 广州大学 High-simulation platform supporting multi-class block chain system
CN115225529B (en) * 2022-06-13 2024-03-01 广州大学 High simulation platform supporting multi-category blockchain system

Similar Documents

Publication Publication Date Title
CN109560938A (en) Based on the block catenary system for referring to human body biological characteristics identification technology
CN109710823A (en) Archive management method, file administration network and electronic equipment based on block chain
Gao et al. A proof of stake sharding protocol for scalable blockchains
CN102004872B (en) Fingerprint encryption-based identity authentication system and implementation method thereof
Xu et al. When quantum information technologies meet blockchain in web 3.0
Rane et al. Systematic erudition of bitcoin price prediction using machine learning techniques
CN114362987B (en) Distributed voting system and method based on block chain and intelligent contract
CN109447807A (en) The weak center's trust data management system and method for the total score double-strand of digital bank
CN103312509A (en) Display method and display device of dynamic token and dynamic password
Sarma et al. Internet banking: Risk analysis and applicability of biometric technology for authentication
Pathak et al. Blockchain based e-voting system
Yano et al. Creation of blockchain and a new ecosystem
Bilal et al. Blockchain technology: Opportunities & challenges
CN111583005A (en) Tax-related credit management method based on block chain
Abraham Building trust: Lessons from canada’s approach to digital identity
Tomov Challenges of blockchain technologies in the future
Avunduk et al. Selection of the Graphics Card to be used in Ethereum Mining with Linear BWM-TOPSIS
CN112990928A (en) Monitorable anonymous legal digital currency issuing and circulating method
CN109191095A (en) It is a kind of can quick localization of internal attacker electronic cash distribution method and system
Huynh et al. Eunicert: ethereum based digital certificate verification system
Mahmudi The Evolution of FinTech and its Effects on Financial Decision Making: A Systematic Literature Review
Yang et al. Impact of Bitcoin's Distributed Structure on the Construction of the Central Bank's Digital Currency System
Kovalenko et al. Efficient funds allocation system based on fuzzy logic and smart contracts
Alaka et al. Blockchain Technology and Organizational Performance in the Banking Industry
BALUSAMY DONE BY: V. BALUSAMY, R. BALAVIGNESH, M. BHAVADHARANI, M. DHANUSRI

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190402