CN109587154A - Digital identity verification method, device, computer equipment and storage medium - Google Patents
Digital identity verification method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109587154A CN109587154A CN201811535255.2A CN201811535255A CN109587154A CN 109587154 A CN109587154 A CN 109587154A CN 201811535255 A CN201811535255 A CN 201811535255A CN 109587154 A CN109587154 A CN 109587154A
- Authority
- CN
- China
- Prior art keywords
- identity
- enterprise
- target number
- digital
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
This application involves a kind of digital identity verification method, device, computer equipment and storage mediums.The described method includes: obtaining target number identity by block chain network, in target number identity include the digital identity of personal identification mark and identifies the digital identity of corresponding enterprise identity mark with personal identification, by block chain network to terminal transmission to the checking request of target number identity, the verification result that terminal is returned according to checking request is obtained, verification result is the number confirmation result to target number identity to checking request.Due to being stored with the digital identity of personal identification mark in block chain network and identifying the digital identity of corresponding enterprise identity mark with personal identification, utilize the decentralization of block chain network, the feature of distributed management, target number identity is verified by block chain network, the public credibility of digital identity verifying can be improved.
Description
Technical field
This application involves field of computer technology, set more particularly to a kind of digital identity verification method, device, computer
Standby and storage medium.
Background technique
With the development of computer technology, the data in computer become increasingly complex, in order to guarantee Computer Data
There are various data verification modes in safety.For example, can verify to digital identity, digital identity refers to will be true
Information compression is digital code, the public keys that can be inquired and identify by network, relevant device etc..Existing digital identity
Verifying, which can be, is established unified identity information library by authentication center, is mentioned by verification modes such as physics voucher or numerical ciphers
For the service for checking credentials of digital identity.
However, current digital identity verification mode has that public credibility is low.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of digital identity verification method, device, computer and set
The public credibility of digital identity verifying can be improved in standby and storage medium.
A kind of digital identity verification method, which comprises
Target number identity is obtained by block chain network, includes what personal identification identified in the target number identity
Digital identity and the digital identity that corresponding enterprise identity mark is identified with the personal identification;
By the block chain network to terminal transmission to the checking request of the target number identity;
The verification result that terminal is returned according to the checking request is obtained, the verification result is the target number identity
To the number confirmation result of the checking request.
The registration process of the digital identity of the personal identification mark includes: in one of the embodiments,
It obtains the personal identification and identifies corresponding personally identifiable information;
When the personally identifiable information is verified, the personal identification is generated according to the personally identifiable information and is identified
Digital identity;
The digital identity that the personal identification is identified is written in the block chain network.
The registration process of the digital identity of the enterprise identity mark includes: in one of the embodiments,
It obtains the enterprise identity and identifies corresponding enterprise identity information;
When the enterprise identity Information Authentication passes through, the enterprise identity is generated according to the enterprise identity information and is identified
Digital identity;
The digital identity that the enterprise identity is identified is written in the block chain network.
In one of the embodiments, the method also includes:
Obtain the personally identifiable information and the enterprise identity information;
Target identity information is generated according to the personally identifiable information and the enterprise identity information;
When the target identity information is verified, target number identity is generated according to the target identity information;
The target number identity is written in the block chain network.
In one of the embodiments, the method also includes:
The instruction of checking of the digital identity identified to enterprise identity is obtained, and checks the user identity in instruction described in extraction
Mark;
When the User Identity checked in instruction is target user's identity, pass through the block chain network
Obtain the digital identity of the enterprise identity mark.
In one of the embodiments, the method also includes:
Obtain the corresponding grade of the target number identity;
The high corresponding part permission of target number identity of adjacent rank middle grade is obtained, and passes through the block chain network
By the part authority distribution target number identity low to grade.
In one of the embodiments, the method also includes:
It include by the part authority distribution by the block chain network log data, in the daily record data
To the assigning process of the low target number identity of grade.
A kind of digital identity verifying device, described device include:
Digital identity obtains module, for obtaining target number identity, the target number identity by block chain network
In include the digital identity of personal identification mark and identify the number of corresponding enterprise identity mark with the personal identification
Identity;
Checking request sending module, for being sent to terminal to the target number identity by the block chain network
Checking request;
Verification result obtains module, the verification result returned for obtaining terminal according to the checking request, the verifying
It as a result is the target number identity to the number confirmation result of the checking request.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
Device performs the steps of when executing the computer program
Target number identity is obtained by block chain network, includes what personal identification identified in the target number identity
Digital identity and the digital identity that corresponding enterprise identity mark is identified with the personal identification;
By the block chain network to terminal transmission to the checking request of the target number identity;
The verification result that terminal is returned according to the checking request is obtained, the verification result is the target number identity
To the number confirmation result of the checking request.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
It is performed the steps of when row
Target number identity is obtained by block chain network, includes what personal identification identified in the target number identity
Digital identity and the digital identity that corresponding enterprise identity mark is identified with the personal identification;
By the block chain network to terminal transmission to the checking request of the target number identity;
The verification result that terminal is returned according to the checking request is obtained, the verification result is the target number identity
To the number confirmation result of the checking request.
Above-mentioned digital identity verification method, device, computer equipment and storage medium obtain target by block chain network
Digital identity, include in target number identity personal identification mark digital identity and enterprise corresponding with personal identification mark
The digital identity of industry identity sends the checking request to target number identity to terminal by block chain network, obtains eventually
The verification result returned according to checking request is held, verification result is number confirmation result of the target number identity to checking request.
Due to being stored with the digital identity and enterprise identity corresponding with personal identification mark of personal identification mark in block chain network
The digital identity of mark, using the decentralization of block chain network, the feature of distributed management, by block chain network to target
Digital identity is verified, and the public credibility of digital identity verifying can be improved.
Detailed description of the invention
Fig. 1 is the applied environment figure of digital identity verification method in one embodiment;
Fig. 2 is the flow diagram of digital identity verification method in one embodiment;
Fig. 3 is the relational graph in one embodiment between enterprise and user;
Fig. 4 is the structural block diagram that digital identity verifies device in one embodiment;
Fig. 5 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Digital identity verification method provided by the embodiments of the present application, can be applied in application environment as shown in Figure 1.Such as
Shown in Fig. 1, which includes computer equipment, specifically, computer equipment may include terminal 110 and server 120.
Wherein, terminal 110 is communicated with server 120 by network by network.Server 120 can be obtained by block chain network
Take target number identity, wherein include the digital identity and and personal identification of personal identification mark in target number identity
Identify the digital identity of corresponding enterprise identity mark.Server 120 can be sent to terminal 110 to mesh by block chain network
Mark the checking request of digital identity.It, can be with after terminal 110 receives the checking request to target number identity of server transmission
Verification information is shown in touch display screen according to checking request.Terminal 110 can detecte the corresponding user of target number identity
The trigger action generated by the touch operation to touch display screen, and verification result is generated according to trigger action.Terminal 110 can
To transmit verification result to server 120.Terminal 110 is sent in the verification result of server 120 and can wrap containing to a
The verification result of the digital identity of people's identity also includes the verification result to the digital identity of enterprise identity mark.Its
In, terminal 110 can include but is not limited to be various personal computers, laptop, smart phone, tablet computer and portable
Formula wearable device, server 120 can be with the server clusters of the either multiple server compositions of independent server come real
It is existing.
In one embodiment, as shown in Fig. 2, providing a kind of digital identity verification method, it is applied to Fig. 1 in this way
In computer equipment for be illustrated, comprising the following steps:
Step 202, target number identity is obtained by block chain network, includes personal identification mark in target number identity
The digital identity of knowledge and the digital identity that corresponding enterprise identity mark is identified with personal identification.
Block chain network is the carrier and organizational form for running block chain technology.Block chain technology BT (Blockchain
It Technology) is distributed, decentralization a public account book.Block chain technology be using block linked data structure come
Verifying knows together algorithm with storing data, using distributed node to generate and more new data, guarantee number in the way of cryptography
It is programmed according to the safety of transmission and access, using the intelligent contract being made of automatized script code and one kind of operation data is complete
New distributed basis framework and calculation.Block chain technology has many characteristics, such as decentralization, open and clear, can allow each
User participates among the record of database.Block catenary system can be by data Layer, network layer, common recognition layer, excitation layer, contract
Layer and application layer composition.
Digital identity refers to, and real information is concentrated as digital code, can pass through the inquiry such as network, relevant device and know
Other public keys.The digital identity of personal identification mark can be used for distinguishing different users, the number of personal identification mark
Identity can be digital code corresponding with personal identification mark;It should be understood that the digital identity of enterprise identity mark can be with
For distinguishing different enterprises, the digital identity of enterprise identity mark can be digital code corresponding with enterprise identity mark.
The digital identity that corresponding enterprise identity mark is identified with personal identification can be where personal identification identifies corresponding user
The digital identity of the corresponding enterprise identity mark of enterprise.For example, when the enterprise where party A-subscriber is B enterprise, with personal identification mark
The digital identity for knowing corresponding enterprise identity mark is the digital identity of B enterprise;When the enterprise where party A-subscriber is that B enterprise and C are looked forward to
It is that the digital identity of B enterprise and C are looked forward to the digital identity that personal identification identifies corresponding enterprise identity mark when Ye Liangge enterprise
The digital identity of industry.Wherein, the digital identity that corresponding enterprise identity mark is identified with personal identification, can be personal identification mark
The digital identity for knowing corresponding enterprise identity mark can also be the corresponding multiple enterprise identity marks of personal identification mark
Digital identity.
Target number identity can be include personal identification mark digital identity enterprise corresponding with personal identification mark
The combination of the digital identity of industry identity.It is understood that target number identity can be string number code.For example,
Target number identity can be B123001, wherein " B " indicates that enterprise is B, and " 123 " indicate that department is 123, and " 001 " indicates to use
Family number, target number identity B123001 indicate the digital identity for 001 user that department is 123 in B enterprise.Computer equipment
Target number identity can be obtained by block chain network, wherein target number identity can be user's input.
Step 204, the checking request to target number identity is sent to terminal by block chain network.
Checking request can be used for verifying target number identity.Computer equipment is getting target number identity
Afterwards, it can be generated the checking request to target number identity, computer equipment can be sent pair by block chain network to terminal
The checking request of target number identity.Wherein, checking request can be password authentification request, fingerprint authentication request, face verification
Request etc., it is not limited here.
Step 206, the verification result that returns according to checking request of terminal is obtained, verification result is target number identity to testing
The number confirmation result of card request.
Wherein, verification result, which can be divided into, is proved to be successful and authentication failed.Due to including in target number identity
The digital identity of digital identity and the enterprise identity mark of people's identity, therefore, to the verification result of target number identity
In can wrap verification result containing the digital identity identified to personal identification and the digital identity to enterprise identity mark
Verification result.For example, including the number of the digital identity of party A-subscriber and the B company where party A-subscriber in target number identity
Identity, can wrap the authenticity verification containing the digital identity to party A-subscriber in verification result as a result, also include party A-subscriber whether
Belong to the verification result of B company.
After terminal receives checking request, checking request can be shown by touch display screen.Number of targets body
The corresponding user of part can carry out trigger action according to checking request in touch display screen, and terminal can be raw according to trigger action
At verification result.The verification result of generation can be sent to computer equipment by terminal.
In the present embodiment, computer equipment obtains target number identity by block chain network, in target number identity
Digital identity comprising personal identification mark and the digital identity that corresponding enterprise identity mark is identified with personal identification, pass through
Block chain network sends the checking request to target number identity to terminal, obtains the verifying knot that terminal is returned according to checking request
Fruit, verification result are number confirmation result of the target number identity to checking request.Due to being stored with individual in block chain network
The digital identity of identity and the digital identity that corresponding enterprise identity mark is identified with personal identification, utilize block link network
The decentralization of network, distributed management feature, target number identity is verified by block chain network, number can be improved
The public credibility of word authentication.
In one embodiment, a kind of digital identity verification method provided can also include the number of personal identification mark
The registration process of identity, specifically includes: obtaining personal identification and identifies corresponding personally identifiable information;When personally identifiable information is verified
By when, according to personally identifiable information generate personal identification mark digital identity;The digital identity that personal identification identifies is write
Enter in block chain network.
Personally identifiable information may include that personal identification identifies corresponding personal identification information, public key and digital body
Part address.Wherein, digital identity address can be the unique identifier of digital identity, for distinguishing different digital identities, number
Word ID address can be the cryptographic Hash of public key.
User can input personal identification information by terminal, and terminal can be believed according to the personal identification of input
Breath, which generates a pair of of public key and private key, terminal, can also generate the cryptographic Hash of public key, and terminal can be using the cryptographic Hash of public key as number
Word ID address.Terminal can be sent out personal identification information, public key and digital identity address as personally identifiable information
Give computer equipment, that is, personal identification corresponding with the personal identification mark letter that the available terminal of computer equipment is sent
Breath.
The available personally identifiable information of terminal, personally identifiable information that terminal can will acquire show in display screen,
Authentication center can verify the personally identifiable information in display screen.Wherein, authentication center can be public security bureau etc. and have
Authenticate the mechanism of qualification.Authentication center can verify personally identifiable information by identity card, biological information etc..Terminal can
Computer equipment is sent to obtain authentication center to the verification result of personally identifiable information, and by verification result.
After computer equipment receives verification result, verification result can be parsed, when personally identifiable information is verified
By when, computer equipment can according to personally identifiable information generate personal identification mark digital identity.
In the digital identity write-in block chain network that computer equipment can identify the personal identification of generation.Specifically,
The digital identity that computer equipment can be identified according to the personal identification of generation generates new block, when new block passes through block link network
After the verifying of network, computer equipment can will be written in block chain network by the new block of verifying.
In the present embodiment, computer equipment works as personal identification by obtaining the corresponding personally identifiable information of personal identification
When Information Authentication passes through, the digital identity of personal identification mark is generated according to personally identifiable information, the number that personal identification is identified
Body part is written in block chain network.When personally identifiable information is verified, computer equipment is raw according to personally identifiable information
At the digital identity that personal identification identifies, the digital identity for generating personal identification mark can be made more convenient, reduce generation
The cost of the digital identity of personal identification mark.
In one embodiment, a kind of digital identity verification method provided can also include the number of enterprise identity mark
The registration process of identity, specifically includes: obtaining enterprise identity and identifies corresponding enterprise identity information;When enterprise identity Information Authentication
By when, according to enterprise identity information generate enterprise identity mark digital identity;The digital identity that enterprise identity identifies is write
Enter in block chain network.
Enterprise identity information may include that personal identification identifies the information such as corresponding private key.Private can be generated in computer equipment
The cryptographic Hash of key, computer equipment can be using the cryptographic Hash of private key as mathematic for business ID address.Enterprise identity information may be used also
To include mathematic for business ID address.Computer equipment obtains enterprise identity and identifies corresponding enterprise identity information.
The available enterprise identity of terminal identifies corresponding enterprise identity information, the enterprise identity letter that terminal can will acquire
Breath shows that in display screen, authentication center can be according to the Institution Code of enterprise, registration information, certificate information etc. in display screen
Enterprise identity information verified.Wherein, authentication center can be the mechanism that public security bureau etc. has certification qualification.Terminal can be with
Authentication center is obtained to the verification result of enterprise customer's identity information, and verification result is sent to computer equipment.
Computer equipment can parse the verification result received, when enterprise identity Information Authentication passes through, calculate
Machine equipment can generate the digital identity of enterprise identity mark according to enterprise identity information.
The digital identity that computer equipment can be identified according to enterprise identity generates new block, when new block passes through block chain
After the verifying of network, block chain network can be written in the new block of the digital identity identified containing enterprise identity by computer equipment
In.
In the present embodiment, computer equipment identifies corresponding enterprise identity information by obtaining enterprise identity, works as enterprise
When identity information is verified, the digital identity of enterprise identity mark is generated according to enterprise identity information, enterprise identity is identified
Digital identity write-in block chain network in.When enterprise identity Information Authentication passes through, computer equipment is believed according to enterprise identity
Breath generates the digital identity of enterprise identity mark, and the digital identity for generating enterprise identity mark can be made more convenient, reduced
Generate the cost of the digital identity of enterprise identity mark.
In one embodiment, a kind of digital identity verification method provided can also include being obtained by block chain network
The process of target number identity, specifically includes: obtaining personally identifiable information and enterprise identity information;According to personally identifiable information
Target identity information is generated with enterprise identity information;When target identity information is verified, generated according to target identity information
Target number identity is written in block chain network target number identity.
The corresponding user of personally identifiable information can be established between personally identifiable information and enterprise identity information by terminal
Corresponding relationship;The target user that enterprise identity information corresponds to enterprise can also establish personally identifiable information and enterprise by terminal
Corresponding relationship between identity information.Wherein, the target user of enterprise can be the manager in enterprise.For example, where party A-subscriber
Enterprise be B enterprise and C enterprise, party A-subscriber can be established by terminal party A-subscriber personally identifiable information and B enterprise identity believe
Corresponding relationship between breath, party A-subscriber can also establish pair between the personally identifiable information of party A-subscriber and the identity information of C enterprise
It should be related to;Target user D in B enterprise can be established between personally identifiable information and the identity information of B enterprise by terminal
Corresponding relationship;Target user E in C enterprise can be established between personally identifiable information and the identity information of C enterprise by terminal
Corresponding relationship.
Corresponding relationship between the available personally identifiable information of terminal and enterprise identity information, what terminal can will acquire
Corresponding relationship is sent to computer equipment.The available personally identifiable information of computer equipment, enterprise identity information and individual
Corresponding relationship between identity information and enterprise identity information, wherein computer equipment can be incited somebody to action according to the corresponding relationship of acquisition
The enterprise identity information of acquisition is corresponding with personally identifiable information.For example, the personally identifiable information that computer equipment obtains is that A is used
The identity information at family, the enterprise identity information that computer equipment is got are the identity information of the B enterprise where party A-subscriber;When A is used
When enterprise where family is B enterprise and C enterprise, the enterprise identity information corresponding with party A-subscriber that computer equipment is got is B enterprise
The identity information of industry and the identity information of C enterprise.
Computer equipment can generate target identity information according to personally identifiable information and enterprise identity information, wherein mesh
It can wrap in mark identity information containing personally identifiable information and enterprise identity information.For example, the individual that computer equipment is got
Identity information is the identity information of party A-subscriber, and the enterprise where party A-subscriber is B enterprise and C enterprise, the enterprise that computer equipment is got
Industry identity information is the identity information of B enterprise and the identity information of C enterprise, is wrapped in the target identity information that computer equipment generates
The identity information of identity information containing party A-subscriber, the identity information of B enterprise and C enterprise.
The target identity information of generation can be sent to terminal by computer equipment, and user can be by terminal to target body
Part information is verified.For example, including the identity information and C of the identity information of party A-subscriber, B enterprise in target identity information
The identity information of enterprise, the enterprise where indicating party A-subscriber is B enterprise and C enterprise, and party A-subscriber can carry out target identity information
It verifies, the target user D in B enterprise can also verify target identity information, and the target user E in C enterprise can also
To be verified to target identity information.The available verification result to target identity information of terminal, and verification result is sent out
Give computer equipment.
Computer equipment can parse verification result, when target identity information is verified, computer equipment
Target number identity can be generated according to target identity information, and target number identity is written in block chain network.
In the present embodiment, computer equipment is by obtaining personally identifiable information and enterprise identity information, according to individual
Identity information and enterprise identity information generate target identity information, when target identity information is verified, according to target identities
Information generates target number identity, and target number identity is written in block chain network.When target identity information is verified,
Computer equipment just generates target number identity according to target identity information, and block chain network is written in target number identity
In, it ensure that the legitimacy and safety of the target number identity of generation.
In one embodiment, as shown in figure 3, relational graph of the Fig. 3 between enterprise and user.By taking Fig. 3 as an example, A enterprise
It include A1 department and A2 department, B enterprise includes B1 department, and C enterprise includes C1 department and C2 department, includes in A1 department
There are party A-subscriber and party B-subscriber, include C user in A2 department, include party B-subscriber in B1 department, includes party A-subscriber, C2 in C1 department
It include C user in department.From the figure 3, it may be seen that party A-subscriber is for the C1 department in the A1 department and C enterprise in A enterprise, BYong Hu
The B1 department in A1 department and B enterprise in A enterprise, C2 department of the C user in the A2 department and C enterprise in A enterprise.User
It is as shown in table 1 with the target number identity of enterprise and generation:
Table 1
A enterprise | B enterprise | C enterprise | |
Party A-subscriber | Target number identity a1 | Target number identity a2 | |
Party B-subscriber | Target number identity b1 | Target number identity b2 | |
C user | Target number identity c1 | Target number identity c2 |
Computer equipment can be according to the enterprise identity information of the A enterprise where the personally identifiable information of party A-subscriber, party A-subscriber
Target identity information is generated, and after target identity information is verified, target number identity is generated according to target identity information
a1;Computer equipment can generate mesh according to the enterprise identity information of the C enterprise where the personally identifiable information of party A-subscriber, party A-subscriber
Identity information is marked, and after target identity information is verified, target number identity a2 is generated according to target identity information.It can be with
Understand, computer equipment can according to the enterprise identity information of the A enterprise where the personally identifiable information of party B-subscriber, party B-subscriber with
And the enterprise identity information of the B enterprise where party B-subscriber generates target identity information respectively, and passes through verifying in target identity information
Generate target number identity b1 and target number identity b2 respectively afterwards.Computer equipment can be believed according to the personal identification of C user
The enterprise identity information of A enterprise and the enterprise identity information of the C enterprise where C user where breath, C user generate mesh respectively
Identity information is marked, and generates target number identity c1 and target number identity c2 respectively after target identity information is by verifying.
In one embodiment, a kind of digital identity verification method provided can also include the number for obtaining enterprise's mark
The process of identity, specifically includes: obtaining the instruction of checking of the digital identity identified to enterprise identity, and extracts and check in instruction
User Identity;When the User Identity checked in instruction is target user's identity, obtained by block chain network
The digital identity for taking enterprise identity to identify.
User can check that terminal, which can be generated, checks finger by the digital identity that terminal identifies enterprise identity
It enables, checks the User Identity that can wrap the user containing the digital identity for checking enterprise identity mark in instruction.Terminal can
Will check that instruction is sent to computer equipment.That is, the available digital identity to enterprise identity mark of computer equipment
Check instruction.Computer equipment can extract the User Identity checked in instruction, and computer equipment can be by the use of extraction
Family identity and target user's identity are compared, when the User Identity checked in instruction is target user's identity
When mark, computer equipment can obtain the digital identity of enterprise identity mark by block chain network.Wherein, target user's body
Part mark can be the mark of representative or administrator that enterprise identity identifies in corresponding enterprise.Computer equipment can incite somebody to action
The digital identity of the enterprise identity mark got is sent to terminal.
In the present embodiment, computer equipment passes through the instruction of checking for obtaining the digital identity identified to enterprise identity, and
The User Identity checked in instruction is extracted, when the User Identity checked in instruction is target user's identity,
The digital identity of enterprise identity mark is obtained by block chain network.Only when the corresponding user of target user's identity wants
When checking the digital identity of enterprise's mark, computer equipment just passes through the digital body that block chain network obtains enterprise identity mark
Part, it ensure that the safety of the digital identity of enterprise identity mark.
In one embodiment, a kind of digital identity verification method provided can also include the process of distribution permission, tool
Body includes: to obtain the corresponding grade of target number identity;Obtain the high corresponding portion of target number identity of adjacent rank middle grade
Fraction limit, and target number identity by block chain network that part authority distribution is low to grade.
Each target number identity in computer equipment has corresponding grade, and higher grade, in target number identity
Corresponding permission is higher.For example, the grade of target number identity can be level-one, second level, three-level etc., wherein three-level number of targets
The corresponding permission of body part is higher than the corresponding permission of Secondary objective digital identity, and the corresponding permission of Secondary objective digital identity is wanted
Permission corresponding higher than primary target digital identity.
Computer equipment can obtain the corresponding grade of target number identity respectively, specifically, computer equipment can obtain
The corresponding part permission of the target number identity for taking adjacent rank middle grade high.For example, the number of targets that computer equipment is got
The corresponding grade of body part a1 is level-one, and the corresponding grade of target number identity a2 is second level, and target number identity b1 is corresponding
Grade is three-level, and the available grade of computer equipment is the corresponding part permission of target number identity b1 of three-level.Computer
Equipment can be low to grade by part authority distribution that block chain network will acquire target number identity.For example, calculating
The part authority distribution of target number identity b1 can be given target number identity a2 by machine equipment, and computer equipment can be by target
The part authority distribution of digital identity b1 gives target number identity a1;Computer equipment can also be by the portion of target number identity a2
Fraction limit distributes to target number identity a1.
In the present embodiment, computer equipment is obtained in adjacent rank by obtaining the corresponding grade of target number identity
The corresponding part permission of the high target number identity of grade, and mesh by block chain network that part authority distribution is low to grade
Mark digital identity.Computer equipment is by block chain network by the part authority distribution of the high target number identity of grade to grade
Low target number identity, can make the distribution of permission more convenient.
In one embodiment, a kind of digital identity verification method provided can also include the mistake of log data
Journey specifically includes: including that part authority distribution is low to grade in daily record data by block chain network log data
Target number identity assigning process.
Computer equipment can pass through block chain network log data.It wherein, include computer in daily record data
Equipment is by part authority distribution to the assigning process of the low target number identity of grade.
In the present embodiment, computer equipment by block chain network log data, in daily record data include by
Assigning process of the part authority distribution to the low target number identity of grade.When user checks authority distribution by computer equipment
When information, it can be checked according to the daily record data recorded by block chain network, can simplify and check authority distribution information
Process.
It should be understood that although each step in the flow chart of Fig. 2 is successively shown according to the instruction of arrow, this
A little steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these steps
It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 2
Step may include that perhaps these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps
It completes, but can execute at different times, the execution sequence in these sub-steps or stage, which is also not necessarily, successively to be carried out,
But it can be executed in turn or alternately at least part of the sub-step or stage of other steps or other steps.
In one embodiment, as shown in figure 4, providing a kind of digital identity verifying device 400, comprising: digital identity
It obtains module 410, checking request sending module 420 and verification result and obtains module 430, in which:
Digital identity obtains module 410, for obtaining target number identity by block chain network, in target number identity
Include the digital identity of personal identification mark and identifies the digital identity of corresponding enterprise identity mark with personal identification.
Checking request sending module 420, for sending the verifying to target number identity to terminal by block chain network
Request.
Verification result obtains module 430, the verification result returned for obtaining terminal according to checking request, and verification result is
Number confirmation result of the target number identity to checking request.
In the present embodiment, computer equipment obtains target number identity by block chain network, in target number identity
Include the digital identity of personal identification mark and identify the digital identity of corresponding enterprise identity mark with personal identification, leads to
Checking request of the block chain network to terminal transmission to target number identity is crossed, the verifying that terminal is returned according to checking request is obtained
As a result, verification result is number confirmation result of the target number identity to checking request.It is a due to being stored in block chain network
The digital identity of people's identity and the digital identity that corresponding enterprise identity mark is identified with personal identification, utilize block chain
The decentralization of network, distributed management feature, target number identity is verified by block chain network, can be improved
The public credibility of digital identity verifying.
In one embodiment, a kind of digital identity verifying device provided can also include the number of personal identification mark
Identity registration module identifies corresponding personally identifiable information for obtaining personal identification, when personally identifiable information is verified,
Block chain is written in the digital identity of personal identification mark by the digital identity that personal identification mark is generated according to personally identifiable information
In network.
In one embodiment, a kind of digital identity verifying device provided can also include the number of enterprise identity mark
Identity registration module identifies corresponding enterprise identity information for obtaining enterprise identity, when enterprise identity Information Authentication passes through,
Block chain is written in the digital identity of enterprise identity mark by the digital identity that enterprise identity mark is generated according to enterprise identity information
In network.
In one embodiment, digital identity obtains module 410 and is also used to obtain personally identifiable information and enterprise identity
Information generates target identity information according to personally identifiable information and enterprise identity information, when target identity information is verified,
Target number identity is generated according to target identity information.
In one embodiment, digital identity obtains module 410 and is also used to obtain the digital identity identified to enterprise identity
Check instruction, and the User Identity checked in instruction is extracted, when the User Identity checked in instruction is that target is used
When the identity of family, the digital identity of enterprise identity mark is obtained by block chain network.
In one embodiment, a kind of digital identity verifying device provided can also include authority distribution module, be used for
The corresponding grade of target number identity is obtained, the high corresponding part permission of target number identity of adjacent rank middle grade is obtained,
And target number identity by block chain network that part authority distribution is low to grade.
In one embodiment, authority distribution module is also used to through block chain network log data, daily record data
In include assigning process by part authority distribution to the low target number identity of grade.
Specific about digital identity verifying device limits the limit that may refer to above for digital identity verification method
Fixed, details are not described herein.Modules in above-mentioned digital identity verifying device can fully or partially through software, hardware and its
Combination is to realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with
It is stored in the memory in computer equipment in a software form, in order to which processor calls the above modules of execution corresponding
Operation.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 5.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment is used to store the digital identity and enterprise identity corresponding with personal identification mark of personal identification mark
The digital identity of mark.The network interface of the computer equipment is used to communicate with external terminal by network connection.The calculating
To realize a kind of digital identity verification method when machine program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 5, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory
Computer program, the processor perform the steps of when executing computer program
Target number identity is obtained by block chain network, includes the number of personal identification mark in target number identity
Identity and the digital identity that corresponding enterprise identity mark is identified with personal identification;
By block chain network to terminal transmission to the checking request of target number identity;
The verification result that terminal is returned according to checking request is obtained, verification result is target number identity to checking request
Number confirmation result.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains personal identification mark
Corresponding personally identifiable information;When personally identifiable information is verified, personal identification mark is generated according to personally identifiable information
Digital identity;It will be in the digital identity write-in block chain network of personal identification mark.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains enterprise identity mark
Corresponding enterprise identity information;When enterprise identity Information Authentication passes through, enterprise identity mark is generated according to enterprise identity information
Digital identity;It will be in the digital identity write-in block chain network of enterprise identity mark.
In one embodiment, acquisition personally identifiable information is also performed the steps of when processor executes computer program
And enterprise identity information;Target identity information is generated according to personally identifiable information and enterprise identity information;When target identities are believed
When breath is verified, target number identity is generated according to target identity information;Target number identity is written in block chain network.
In one embodiment, acquisition is also performed the steps of when processor executes computer program to enterprise identity mark
The digital identity of knowledge checks instruction, and extracts the User Identity checked in instruction;When the user identity checked in instruction
When being identified as target user's identity, the digital identity of enterprise identity mark is obtained by block chain network.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains target number identity
Corresponding grade;The high corresponding part permission of target number identity of adjacent rank middle grade is obtained, and passes through block chain network
By the part authority distribution target number identity low to grade.
In one embodiment, it also performs the steps of when processor executes computer program and is remembered by block chain network
Daily record data is recorded, includes the assigning process by part authority distribution to the low target number identity of grade in daily record data.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor
Target number identity is obtained by block chain network, includes the number of personal identification mark in target number identity
Identity and the digital identity that corresponding enterprise identity mark is identified with personal identification;
By block chain network to terminal transmission to the checking request of target number identity;
The verification result that terminal is returned according to checking request is obtained, verification result is target number identity to checking request
Number confirmation result.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains personal identification mark
Know corresponding personally identifiable information;When personally identifiable information is verified, personal identification mark is generated according to personally identifiable information
The digital identity of knowledge;It will be in the digital identity write-in block chain network of personal identification mark.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains enterprise identity mark
Know corresponding enterprise identity information;When enterprise identity Information Authentication passes through, enterprise identity mark is generated according to enterprise identity information
The digital identity of knowledge;It will be in the digital identity write-in block chain network of enterprise identity mark.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains personal identification letter
Breath and enterprise identity information;Target identity information is generated according to personally identifiable information and enterprise identity information;Work as target identities
When Information Authentication passes through, target number identity is generated according to target identity information;Block chain network is written into target number identity
In.
In one embodiment, acquisition is also performed the steps of when computer program is executed by processor to enterprise identity
The digital identity of mark checks instruction, and extracts the User Identity checked in instruction;When the user's body checked in instruction
When part is identified as target user's identity, pass through the digital identity that block chain network obtains enterprise identity mark.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains number of targets body
The corresponding grade of part;The high corresponding part permission of target number identity of adjacent rank middle grade is obtained, and passes through block link network
The network target number identity that part authority distribution is low to grade.
In one embodiment, it also performs the steps of when computer program is executed by processor through block chain network
Log data includes the assigning process by part authority distribution to the low target number identity of grade in daily record data.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of digital identity verification method, which comprises
Target number identity is obtained by block chain network, includes the number of personal identification mark in the target number identity
Identity and the digital identity that corresponding enterprise identity mark is identified with the personal identification;
By the block chain network to terminal transmission to the checking request of the target number identity;
The verification result that terminal is returned according to the checking request is obtained, the verification result is the target number identity to institute
State the number confirmation result of checking request.
2. the method according to claim 1, wherein the registration process of the digital identity of personal identification mark
Include:
It obtains the personal identification and identifies corresponding personally identifiable information;
When the personally identifiable information is verified, the number of the personal identification mark is generated according to the personally identifiable information
Body part;
The digital identity that the personal identification is identified is written in the block chain network.
3. according to the method described in claim 2, it is characterized in that, the registration process of the digital identity of enterprise identity mark
Include:
It obtains the enterprise identity and identifies corresponding enterprise identity information;
When the enterprise identity Information Authentication passes through, the number of the enterprise identity mark is generated according to the enterprise identity information
Body part;
The digital identity that the enterprise identity is identified is written in the block chain network.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
Obtain the personally identifiable information and the enterprise identity information;
Target identity information is generated according to the personally identifiable information and the enterprise identity information;
When the target identity information is verified, target number identity is generated according to the target identity information;
The target number identity is written in the block chain network.
5. according to the method described in claim 3, it is characterized in that, the method also includes:
The instruction of checking of the digital identity identified to enterprise identity is obtained, and checks the user identity mark in instruction described in extraction
Know;
When the User Identity checked in instruction is target user's identity, obtained by the block chain network
The digital identity of the enterprise identity mark.
6. the method according to claim 1, wherein the method also includes:
Obtain the corresponding grade of the target number identity;
Obtain the high corresponding part permission of target number identity of adjacent rank middle grade, and by the block chain network by institute
State the part authority distribution target number identity low to grade.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
Include by the block chain network log data, in the daily record data by the part authority distribution to etc.
The assigning process of the low target number identity of grade.
8. a kind of digital identity verifies device, which is characterized in that described device includes:
Digital identity obtains module, for obtaining target number identity by block chain network, wraps in the target number identity
Digital identity containing personal identification mark and the digital identity that corresponding enterprise identity mark is identified with the personal identification;
Checking request sending module, for sending the verifying to the target number identity to terminal by the block chain network
Request;
Verification result obtains module, the verification result returned for obtaining terminal according to the checking request, the verification result
It is the target number identity to the number confirmation result of the checking request.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811535255.2A CN109587154B (en) | 2018-12-14 | 2018-12-14 | Digital identity verification method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811535255.2A CN109587154B (en) | 2018-12-14 | 2018-12-14 | Digital identity verification method, device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109587154A true CN109587154A (en) | 2019-04-05 |
CN109587154B CN109587154B (en) | 2021-10-15 |
Family
ID=65928598
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811535255.2A Active CN109587154B (en) | 2018-12-14 | 2018-12-14 | Digital identity verification method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109587154B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110661779A (en) * | 2019-08-15 | 2020-01-07 | 中国平安财产保险股份有限公司 | Block chain network-based electronic certificate management method, system, device and medium |
CN110868467A (en) * | 2019-11-12 | 2020-03-06 | 广州大白互联网科技有限公司 | Network certificate synchronization method, system and storage medium based on network certificate platform |
CN110941860A (en) * | 2019-12-10 | 2020-03-31 | 博雅正链(北京)科技有限公司 | Block chain and biological feature based electronic contract associable analysis verification method |
CN111985399A (en) * | 2020-08-20 | 2020-11-24 | 重庆中科云从科技有限公司 | Area monitoring method, system, machine readable medium and equipment based on biological feature recognition |
CN113271211A (en) * | 2021-05-18 | 2021-08-17 | 网易(杭州)网络有限公司 | Digital identity verification system, method, electronic device and storage medium |
CN113761493A (en) * | 2021-08-26 | 2021-12-07 | 浙商银行股份有限公司 | Method and system for controlling calling authority and calling party identity of intelligent contract interface of block chain platform |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357612A (en) * | 2016-08-25 | 2017-01-25 | 江苏通付盾科技有限公司 | Method and device for review of authentication records based on public block chains |
CN106529946A (en) * | 2016-11-01 | 2017-03-22 | 北京金股链科技有限公司 | Method for realizing user identity digitalization based on block chain |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107453870A (en) * | 2017-09-12 | 2017-12-08 | 京信通信系统(中国)有限公司 | Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain |
CN107508680A (en) * | 2017-07-26 | 2017-12-22 | 阿里巴巴集团控股有限公司 | Digital certificate management method, device and electronic equipment |
CN108064440A (en) * | 2017-05-25 | 2018-05-22 | 深圳前海达闼云端智能科技有限公司 | FIDO authentication method, device and system based on block chain |
CN108111543A (en) * | 2018-02-06 | 2018-06-01 | 上海千加信息科技有限公司 | A kind of digital identity identifying system on block chain |
WO2018124857A1 (en) * | 2017-01-02 | 2018-07-05 | 주식회사 코인플러그 | Blockchain database-based method and terminal for authenticating user non-face-to-face by utilizing mobile id, and server utilizing method and terminal |
US20180293557A1 (en) * | 2017-04-05 | 2018-10-11 | Samsung Sds Co., Ltd. | Method of charging electronic currency automatically based on blockchain and system thereof |
CN108684041A (en) * | 2018-05-31 | 2018-10-19 | 上海邑游网络科技有限公司 | The system and method for login authentication |
CN108768933A (en) * | 2018-04-11 | 2018-11-06 | 深圳技术大学(筹) | Digital identification authentication system can be independently supervised on a kind of block platform chain |
-
2018
- 2018-12-14 CN CN201811535255.2A patent/CN109587154B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357612A (en) * | 2016-08-25 | 2017-01-25 | 江苏通付盾科技有限公司 | Method and device for review of authentication records based on public block chains |
CN106529946A (en) * | 2016-11-01 | 2017-03-22 | 北京金股链科技有限公司 | Method for realizing user identity digitalization based on block chain |
WO2018124857A1 (en) * | 2017-01-02 | 2018-07-05 | 주식회사 코인플러그 | Blockchain database-based method and terminal for authenticating user non-face-to-face by utilizing mobile id, and server utilizing method and terminal |
US20180293557A1 (en) * | 2017-04-05 | 2018-10-11 | Samsung Sds Co., Ltd. | Method of charging electronic currency automatically based on blockchain and system thereof |
CN108064440A (en) * | 2017-05-25 | 2018-05-22 | 深圳前海达闼云端智能科技有限公司 | FIDO authentication method, device and system based on block chain |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107508680A (en) * | 2017-07-26 | 2017-12-22 | 阿里巴巴集团控股有限公司 | Digital certificate management method, device and electronic equipment |
CN107453870A (en) * | 2017-09-12 | 2017-12-08 | 京信通信系统(中国)有限公司 | Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain |
CN108111543A (en) * | 2018-02-06 | 2018-06-01 | 上海千加信息科技有限公司 | A kind of digital identity identifying system on block chain |
CN108768933A (en) * | 2018-04-11 | 2018-11-06 | 深圳技术大学(筹) | Digital identification authentication system can be independently supervised on a kind of block platform chain |
CN108684041A (en) * | 2018-05-31 | 2018-10-19 | 上海邑游网络科技有限公司 | The system and method for login authentication |
Non-Patent Citations (2)
Title |
---|
彭永勇,张晓韬: "《基于区块链应用模式的可信身份认证关键技术研究》", 《网络安全技术与应用》 * |
陈涛,马敏,徐晓林: "《区块链在智慧城市信息共享与使用中的应用研究》", 《电子政务》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110661779A (en) * | 2019-08-15 | 2020-01-07 | 中国平安财产保险股份有限公司 | Block chain network-based electronic certificate management method, system, device and medium |
CN110661779B (en) * | 2019-08-15 | 2023-03-21 | 中国平安财产保险股份有限公司 | Block chain network-based electronic certificate management method, system, device and medium |
CN110868467A (en) * | 2019-11-12 | 2020-03-06 | 广州大白互联网科技有限公司 | Network certificate synchronization method, system and storage medium based on network certificate platform |
CN110941860A (en) * | 2019-12-10 | 2020-03-31 | 博雅正链(北京)科技有限公司 | Block chain and biological feature based electronic contract associable analysis verification method |
CN111985399A (en) * | 2020-08-20 | 2020-11-24 | 重庆中科云从科技有限公司 | Area monitoring method, system, machine readable medium and equipment based on biological feature recognition |
CN113271211A (en) * | 2021-05-18 | 2021-08-17 | 网易(杭州)网络有限公司 | Digital identity verification system, method, electronic device and storage medium |
CN113761493A (en) * | 2021-08-26 | 2021-12-07 | 浙商银行股份有限公司 | Method and system for controlling calling authority and calling party identity of intelligent contract interface of block chain platform |
CN113761493B (en) * | 2021-08-26 | 2024-04-05 | 浙商银行股份有限公司 | Intelligent contract interface calling authority and caller identity control method and system for blockchain platform |
Also Published As
Publication number | Publication date |
---|---|
CN109587154B (en) | 2021-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110599137B (en) | Electronic bill data processing method and device and computer equipment | |
CN109587154A (en) | Digital identity verification method, device, computer equipment and storage medium | |
CN110581860B (en) | Identity authentication method, device, storage medium and equipment based on block chain | |
CN110365670B (en) | Blacklist sharing method and device, computer equipment and storage medium | |
CN109492983B (en) | Electronic seal signing method, device, equipment and medium based on block chain intelligent contract | |
CN109325342B (en) | Identity information management method, device, computer equipment and storage medium | |
CN108776936A (en) | Settlement of insurance claim method, apparatus, computer equipment and storage medium | |
CN110633963B (en) | Electronic bill processing method, electronic bill processing device, computer readable storage medium and computer readable storage device | |
CN108306876A (en) | Client identity verification method, device, computer equipment and storage medium | |
CN110378755B (en) | Electronic invoice generation method and device, computer equipment and storage medium | |
US20080263645A1 (en) | Privacy identifier remediation | |
CN109359485A (en) | Invoice data shared system and method based on block chain | |
CN110175467A (en) | Signature file store method, device and computer equipment based on block chain | |
CN110489393A (en) | Promise breaking information query method, device, computer equipment and storage medium | |
CN110942382B (en) | Electronic contract generation method and device, computer equipment and storage medium | |
CN110223159A (en) | Credit data query method, apparatus, computer equipment and storage medium | |
CN110442654A (en) | Promise breaking information query method, device, computer equipment and storage medium | |
CN112149077B (en) | Supply chain billing method, system and computer equipment based on block chain technology | |
CN109347813A (en) | Internet of things equipment login method, system, computer equipment and storage medium | |
CN110135175A (en) | Information processing, acquisition methods, device, equipment and medium based on block chain | |
CN109741016A (en) | Electron contract method, apparatus, computer equipment and storage medium | |
CN110223075B (en) | Identity authentication method and device, computer equipment and storage medium | |
CN110445757A (en) | Personnel information encryption method, device, computer equipment and storage medium | |
CN110098925A (en) | Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system | |
CN109902922A (en) | Distribution method, device, computer equipment and the storage medium of audit task |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |