CN109587154A - Digital identity verification method, device, computer equipment and storage medium - Google Patents

Digital identity verification method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109587154A
CN109587154A CN201811535255.2A CN201811535255A CN109587154A CN 109587154 A CN109587154 A CN 109587154A CN 201811535255 A CN201811535255 A CN 201811535255A CN 109587154 A CN109587154 A CN 109587154A
Authority
CN
China
Prior art keywords
identity
enterprise
target number
digital
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811535255.2A
Other languages
Chinese (zh)
Other versions
CN109587154B (en
Inventor
何晟
梁勇
曾凯柔
曾晶
邓理平
陈桓
张良杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingdee Software China Co Ltd
Original Assignee
Kingdee Software China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kingdee Software China Co Ltd filed Critical Kingdee Software China Co Ltd
Priority to CN201811535255.2A priority Critical patent/CN109587154B/en
Publication of CN109587154A publication Critical patent/CN109587154A/en
Application granted granted Critical
Publication of CN109587154B publication Critical patent/CN109587154B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This application involves a kind of digital identity verification method, device, computer equipment and storage mediums.The described method includes: obtaining target number identity by block chain network, in target number identity include the digital identity of personal identification mark and identifies the digital identity of corresponding enterprise identity mark with personal identification, by block chain network to terminal transmission to the checking request of target number identity, the verification result that terminal is returned according to checking request is obtained, verification result is the number confirmation result to target number identity to checking request.Due to being stored with the digital identity of personal identification mark in block chain network and identifying the digital identity of corresponding enterprise identity mark with personal identification, utilize the decentralization of block chain network, the feature of distributed management, target number identity is verified by block chain network, the public credibility of digital identity verifying can be improved.

Description

Digital identity verification method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, set more particularly to a kind of digital identity verification method, device, computer Standby and storage medium.
Background technique
With the development of computer technology, the data in computer become increasingly complex, in order to guarantee Computer Data There are various data verification modes in safety.For example, can verify to digital identity, digital identity refers to will be true Information compression is digital code, the public keys that can be inquired and identify by network, relevant device etc..Existing digital identity Verifying, which can be, is established unified identity information library by authentication center, is mentioned by verification modes such as physics voucher or numerical ciphers For the service for checking credentials of digital identity.
However, current digital identity verification mode has that public credibility is low.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of digital identity verification method, device, computer and set The public credibility of digital identity verifying can be improved in standby and storage medium.
A kind of digital identity verification method, which comprises
Target number identity is obtained by block chain network, includes what personal identification identified in the target number identity Digital identity and the digital identity that corresponding enterprise identity mark is identified with the personal identification;
By the block chain network to terminal transmission to the checking request of the target number identity;
The verification result that terminal is returned according to the checking request is obtained, the verification result is the target number identity To the number confirmation result of the checking request.
The registration process of the digital identity of the personal identification mark includes: in one of the embodiments,
It obtains the personal identification and identifies corresponding personally identifiable information;
When the personally identifiable information is verified, the personal identification is generated according to the personally identifiable information and is identified Digital identity;
The digital identity that the personal identification is identified is written in the block chain network.
The registration process of the digital identity of the enterprise identity mark includes: in one of the embodiments,
It obtains the enterprise identity and identifies corresponding enterprise identity information;
When the enterprise identity Information Authentication passes through, the enterprise identity is generated according to the enterprise identity information and is identified Digital identity;
The digital identity that the enterprise identity is identified is written in the block chain network.
In one of the embodiments, the method also includes:
Obtain the personally identifiable information and the enterprise identity information;
Target identity information is generated according to the personally identifiable information and the enterprise identity information;
When the target identity information is verified, target number identity is generated according to the target identity information;
The target number identity is written in the block chain network.
In one of the embodiments, the method also includes:
The instruction of checking of the digital identity identified to enterprise identity is obtained, and checks the user identity in instruction described in extraction Mark;
When the User Identity checked in instruction is target user's identity, pass through the block chain network Obtain the digital identity of the enterprise identity mark.
In one of the embodiments, the method also includes:
Obtain the corresponding grade of the target number identity;
The high corresponding part permission of target number identity of adjacent rank middle grade is obtained, and passes through the block chain network By the part authority distribution target number identity low to grade.
In one of the embodiments, the method also includes:
It include by the part authority distribution by the block chain network log data, in the daily record data To the assigning process of the low target number identity of grade.
A kind of digital identity verifying device, described device include:
Digital identity obtains module, for obtaining target number identity, the target number identity by block chain network In include the digital identity of personal identification mark and identify the number of corresponding enterprise identity mark with the personal identification Identity;
Checking request sending module, for being sent to terminal to the target number identity by the block chain network Checking request;
Verification result obtains module, the verification result returned for obtaining terminal according to the checking request, the verifying It as a result is the target number identity to the number confirmation result of the checking request.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device performs the steps of when executing the computer program
Target number identity is obtained by block chain network, includes what personal identification identified in the target number identity Digital identity and the digital identity that corresponding enterprise identity mark is identified with the personal identification;
By the block chain network to terminal transmission to the checking request of the target number identity;
The verification result that terminal is returned according to the checking request is obtained, the verification result is the target number identity To the number confirmation result of the checking request.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor It is performed the steps of when row
Target number identity is obtained by block chain network, includes what personal identification identified in the target number identity Digital identity and the digital identity that corresponding enterprise identity mark is identified with the personal identification;
By the block chain network to terminal transmission to the checking request of the target number identity;
The verification result that terminal is returned according to the checking request is obtained, the verification result is the target number identity To the number confirmation result of the checking request.
Above-mentioned digital identity verification method, device, computer equipment and storage medium obtain target by block chain network Digital identity, include in target number identity personal identification mark digital identity and enterprise corresponding with personal identification mark The digital identity of industry identity sends the checking request to target number identity to terminal by block chain network, obtains eventually The verification result returned according to checking request is held, verification result is number confirmation result of the target number identity to checking request. Due to being stored with the digital identity and enterprise identity corresponding with personal identification mark of personal identification mark in block chain network The digital identity of mark, using the decentralization of block chain network, the feature of distributed management, by block chain network to target Digital identity is verified, and the public credibility of digital identity verifying can be improved.
Detailed description of the invention
Fig. 1 is the applied environment figure of digital identity verification method in one embodiment;
Fig. 2 is the flow diagram of digital identity verification method in one embodiment;
Fig. 3 is the relational graph in one embodiment between enterprise and user;
Fig. 4 is the structural block diagram that digital identity verifies device in one embodiment;
Fig. 5 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Digital identity verification method provided by the embodiments of the present application, can be applied in application environment as shown in Figure 1.Such as Shown in Fig. 1, which includes computer equipment, specifically, computer equipment may include terminal 110 and server 120. Wherein, terminal 110 is communicated with server 120 by network by network.Server 120 can be obtained by block chain network Take target number identity, wherein include the digital identity and and personal identification of personal identification mark in target number identity Identify the digital identity of corresponding enterprise identity mark.Server 120 can be sent to terminal 110 to mesh by block chain network Mark the checking request of digital identity.It, can be with after terminal 110 receives the checking request to target number identity of server transmission Verification information is shown in touch display screen according to checking request.Terminal 110 can detecte the corresponding user of target number identity The trigger action generated by the touch operation to touch display screen, and verification result is generated according to trigger action.Terminal 110 can To transmit verification result to server 120.Terminal 110 is sent in the verification result of server 120 and can wrap containing to a The verification result of the digital identity of people's identity also includes the verification result to the digital identity of enterprise identity mark.Its In, terminal 110 can include but is not limited to be various personal computers, laptop, smart phone, tablet computer and portable Formula wearable device, server 120 can be with the server clusters of the either multiple server compositions of independent server come real It is existing.
In one embodiment, as shown in Fig. 2, providing a kind of digital identity verification method, it is applied to Fig. 1 in this way In computer equipment for be illustrated, comprising the following steps:
Step 202, target number identity is obtained by block chain network, includes personal identification mark in target number identity The digital identity of knowledge and the digital identity that corresponding enterprise identity mark is identified with personal identification.
Block chain network is the carrier and organizational form for running block chain technology.Block chain technology BT (Blockchain It Technology) is distributed, decentralization a public account book.Block chain technology be using block linked data structure come Verifying knows together algorithm with storing data, using distributed node to generate and more new data, guarantee number in the way of cryptography It is programmed according to the safety of transmission and access, using the intelligent contract being made of automatized script code and one kind of operation data is complete New distributed basis framework and calculation.Block chain technology has many characteristics, such as decentralization, open and clear, can allow each User participates among the record of database.Block catenary system can be by data Layer, network layer, common recognition layer, excitation layer, contract Layer and application layer composition.
Digital identity refers to, and real information is concentrated as digital code, can pass through the inquiry such as network, relevant device and know Other public keys.The digital identity of personal identification mark can be used for distinguishing different users, the number of personal identification mark Identity can be digital code corresponding with personal identification mark;It should be understood that the digital identity of enterprise identity mark can be with For distinguishing different enterprises, the digital identity of enterprise identity mark can be digital code corresponding with enterprise identity mark. The digital identity that corresponding enterprise identity mark is identified with personal identification can be where personal identification identifies corresponding user The digital identity of the corresponding enterprise identity mark of enterprise.For example, when the enterprise where party A-subscriber is B enterprise, with personal identification mark The digital identity for knowing corresponding enterprise identity mark is the digital identity of B enterprise;When the enterprise where party A-subscriber is that B enterprise and C are looked forward to It is that the digital identity of B enterprise and C are looked forward to the digital identity that personal identification identifies corresponding enterprise identity mark when Ye Liangge enterprise The digital identity of industry.Wherein, the digital identity that corresponding enterprise identity mark is identified with personal identification, can be personal identification mark The digital identity for knowing corresponding enterprise identity mark can also be the corresponding multiple enterprise identity marks of personal identification mark Digital identity.
Target number identity can be include personal identification mark digital identity enterprise corresponding with personal identification mark The combination of the digital identity of industry identity.It is understood that target number identity can be string number code.For example, Target number identity can be B123001, wherein " B " indicates that enterprise is B, and " 123 " indicate that department is 123, and " 001 " indicates to use Family number, target number identity B123001 indicate the digital identity for 001 user that department is 123 in B enterprise.Computer equipment Target number identity can be obtained by block chain network, wherein target number identity can be user's input.
Step 204, the checking request to target number identity is sent to terminal by block chain network.
Checking request can be used for verifying target number identity.Computer equipment is getting target number identity Afterwards, it can be generated the checking request to target number identity, computer equipment can be sent pair by block chain network to terminal The checking request of target number identity.Wherein, checking request can be password authentification request, fingerprint authentication request, face verification Request etc., it is not limited here.
Step 206, the verification result that returns according to checking request of terminal is obtained, verification result is target number identity to testing The number confirmation result of card request.
Wherein, verification result, which can be divided into, is proved to be successful and authentication failed.Due to including in target number identity The digital identity of digital identity and the enterprise identity mark of people's identity, therefore, to the verification result of target number identity In can wrap verification result containing the digital identity identified to personal identification and the digital identity to enterprise identity mark Verification result.For example, including the number of the digital identity of party A-subscriber and the B company where party A-subscriber in target number identity Identity, can wrap the authenticity verification containing the digital identity to party A-subscriber in verification result as a result, also include party A-subscriber whether Belong to the verification result of B company.
After terminal receives checking request, checking request can be shown by touch display screen.Number of targets body The corresponding user of part can carry out trigger action according to checking request in touch display screen, and terminal can be raw according to trigger action At verification result.The verification result of generation can be sent to computer equipment by terminal.
In the present embodiment, computer equipment obtains target number identity by block chain network, in target number identity Digital identity comprising personal identification mark and the digital identity that corresponding enterprise identity mark is identified with personal identification, pass through Block chain network sends the checking request to target number identity to terminal, obtains the verifying knot that terminal is returned according to checking request Fruit, verification result are number confirmation result of the target number identity to checking request.Due to being stored with individual in block chain network The digital identity of identity and the digital identity that corresponding enterprise identity mark is identified with personal identification, utilize block link network The decentralization of network, distributed management feature, target number identity is verified by block chain network, number can be improved The public credibility of word authentication.
In one embodiment, a kind of digital identity verification method provided can also include the number of personal identification mark The registration process of identity, specifically includes: obtaining personal identification and identifies corresponding personally identifiable information;When personally identifiable information is verified By when, according to personally identifiable information generate personal identification mark digital identity;The digital identity that personal identification identifies is write Enter in block chain network.
Personally identifiable information may include that personal identification identifies corresponding personal identification information, public key and digital body Part address.Wherein, digital identity address can be the unique identifier of digital identity, for distinguishing different digital identities, number Word ID address can be the cryptographic Hash of public key.
User can input personal identification information by terminal, and terminal can be believed according to the personal identification of input Breath, which generates a pair of of public key and private key, terminal, can also generate the cryptographic Hash of public key, and terminal can be using the cryptographic Hash of public key as number Word ID address.Terminal can be sent out personal identification information, public key and digital identity address as personally identifiable information Give computer equipment, that is, personal identification corresponding with the personal identification mark letter that the available terminal of computer equipment is sent Breath.
The available personally identifiable information of terminal, personally identifiable information that terminal can will acquire show in display screen, Authentication center can verify the personally identifiable information in display screen.Wherein, authentication center can be public security bureau etc. and have Authenticate the mechanism of qualification.Authentication center can verify personally identifiable information by identity card, biological information etc..Terminal can Computer equipment is sent to obtain authentication center to the verification result of personally identifiable information, and by verification result.
After computer equipment receives verification result, verification result can be parsed, when personally identifiable information is verified By when, computer equipment can according to personally identifiable information generate personal identification mark digital identity.
In the digital identity write-in block chain network that computer equipment can identify the personal identification of generation.Specifically, The digital identity that computer equipment can be identified according to the personal identification of generation generates new block, when new block passes through block link network After the verifying of network, computer equipment can will be written in block chain network by the new block of verifying.
In the present embodiment, computer equipment works as personal identification by obtaining the corresponding personally identifiable information of personal identification When Information Authentication passes through, the digital identity of personal identification mark is generated according to personally identifiable information, the number that personal identification is identified Body part is written in block chain network.When personally identifiable information is verified, computer equipment is raw according to personally identifiable information At the digital identity that personal identification identifies, the digital identity for generating personal identification mark can be made more convenient, reduce generation The cost of the digital identity of personal identification mark.
In one embodiment, a kind of digital identity verification method provided can also include the number of enterprise identity mark The registration process of identity, specifically includes: obtaining enterprise identity and identifies corresponding enterprise identity information;When enterprise identity Information Authentication By when, according to enterprise identity information generate enterprise identity mark digital identity;The digital identity that enterprise identity identifies is write Enter in block chain network.
Enterprise identity information may include that personal identification identifies the information such as corresponding private key.Private can be generated in computer equipment The cryptographic Hash of key, computer equipment can be using the cryptographic Hash of private key as mathematic for business ID address.Enterprise identity information may be used also To include mathematic for business ID address.Computer equipment obtains enterprise identity and identifies corresponding enterprise identity information.
The available enterprise identity of terminal identifies corresponding enterprise identity information, the enterprise identity letter that terminal can will acquire Breath shows that in display screen, authentication center can be according to the Institution Code of enterprise, registration information, certificate information etc. in display screen Enterprise identity information verified.Wherein, authentication center can be the mechanism that public security bureau etc. has certification qualification.Terminal can be with Authentication center is obtained to the verification result of enterprise customer's identity information, and verification result is sent to computer equipment.
Computer equipment can parse the verification result received, when enterprise identity Information Authentication passes through, calculate Machine equipment can generate the digital identity of enterprise identity mark according to enterprise identity information.
The digital identity that computer equipment can be identified according to enterprise identity generates new block, when new block passes through block chain After the verifying of network, block chain network can be written in the new block of the digital identity identified containing enterprise identity by computer equipment In.
In the present embodiment, computer equipment identifies corresponding enterprise identity information by obtaining enterprise identity, works as enterprise When identity information is verified, the digital identity of enterprise identity mark is generated according to enterprise identity information, enterprise identity is identified Digital identity write-in block chain network in.When enterprise identity Information Authentication passes through, computer equipment is believed according to enterprise identity Breath generates the digital identity of enterprise identity mark, and the digital identity for generating enterprise identity mark can be made more convenient, reduced Generate the cost of the digital identity of enterprise identity mark.
In one embodiment, a kind of digital identity verification method provided can also include being obtained by block chain network The process of target number identity, specifically includes: obtaining personally identifiable information and enterprise identity information;According to personally identifiable information Target identity information is generated with enterprise identity information;When target identity information is verified, generated according to target identity information Target number identity is written in block chain network target number identity.
The corresponding user of personally identifiable information can be established between personally identifiable information and enterprise identity information by terminal Corresponding relationship;The target user that enterprise identity information corresponds to enterprise can also establish personally identifiable information and enterprise by terminal Corresponding relationship between identity information.Wherein, the target user of enterprise can be the manager in enterprise.For example, where party A-subscriber Enterprise be B enterprise and C enterprise, party A-subscriber can be established by terminal party A-subscriber personally identifiable information and B enterprise identity believe Corresponding relationship between breath, party A-subscriber can also establish pair between the personally identifiable information of party A-subscriber and the identity information of C enterprise It should be related to;Target user D in B enterprise can be established between personally identifiable information and the identity information of B enterprise by terminal Corresponding relationship;Target user E in C enterprise can be established between personally identifiable information and the identity information of C enterprise by terminal Corresponding relationship.
Corresponding relationship between the available personally identifiable information of terminal and enterprise identity information, what terminal can will acquire Corresponding relationship is sent to computer equipment.The available personally identifiable information of computer equipment, enterprise identity information and individual Corresponding relationship between identity information and enterprise identity information, wherein computer equipment can be incited somebody to action according to the corresponding relationship of acquisition The enterprise identity information of acquisition is corresponding with personally identifiable information.For example, the personally identifiable information that computer equipment obtains is that A is used The identity information at family, the enterprise identity information that computer equipment is got are the identity information of the B enterprise where party A-subscriber;When A is used When enterprise where family is B enterprise and C enterprise, the enterprise identity information corresponding with party A-subscriber that computer equipment is got is B enterprise The identity information of industry and the identity information of C enterprise.
Computer equipment can generate target identity information according to personally identifiable information and enterprise identity information, wherein mesh It can wrap in mark identity information containing personally identifiable information and enterprise identity information.For example, the individual that computer equipment is got Identity information is the identity information of party A-subscriber, and the enterprise where party A-subscriber is B enterprise and C enterprise, the enterprise that computer equipment is got Industry identity information is the identity information of B enterprise and the identity information of C enterprise, is wrapped in the target identity information that computer equipment generates The identity information of identity information containing party A-subscriber, the identity information of B enterprise and C enterprise.
The target identity information of generation can be sent to terminal by computer equipment, and user can be by terminal to target body Part information is verified.For example, including the identity information and C of the identity information of party A-subscriber, B enterprise in target identity information The identity information of enterprise, the enterprise where indicating party A-subscriber is B enterprise and C enterprise, and party A-subscriber can carry out target identity information It verifies, the target user D in B enterprise can also verify target identity information, and the target user E in C enterprise can also To be verified to target identity information.The available verification result to target identity information of terminal, and verification result is sent out Give computer equipment.
Computer equipment can parse verification result, when target identity information is verified, computer equipment Target number identity can be generated according to target identity information, and target number identity is written in block chain network.
In the present embodiment, computer equipment is by obtaining personally identifiable information and enterprise identity information, according to individual Identity information and enterprise identity information generate target identity information, when target identity information is verified, according to target identities Information generates target number identity, and target number identity is written in block chain network.When target identity information is verified, Computer equipment just generates target number identity according to target identity information, and block chain network is written in target number identity In, it ensure that the legitimacy and safety of the target number identity of generation.
In one embodiment, as shown in figure 3, relational graph of the Fig. 3 between enterprise and user.By taking Fig. 3 as an example, A enterprise It include A1 department and A2 department, B enterprise includes B1 department, and C enterprise includes C1 department and C2 department, includes in A1 department There are party A-subscriber and party B-subscriber, include C user in A2 department, include party B-subscriber in B1 department, includes party A-subscriber, C2 in C1 department It include C user in department.From the figure 3, it may be seen that party A-subscriber is for the C1 department in the A1 department and C enterprise in A enterprise, BYong Hu The B1 department in A1 department and B enterprise in A enterprise, C2 department of the C user in the A2 department and C enterprise in A enterprise.User It is as shown in table 1 with the target number identity of enterprise and generation:
Table 1
A enterprise B enterprise C enterprise
Party A-subscriber Target number identity a1 Target number identity a2
Party B-subscriber Target number identity b1 Target number identity b2
C user Target number identity c1 Target number identity c2
Computer equipment can be according to the enterprise identity information of the A enterprise where the personally identifiable information of party A-subscriber, party A-subscriber Target identity information is generated, and after target identity information is verified, target number identity is generated according to target identity information a1;Computer equipment can generate mesh according to the enterprise identity information of the C enterprise where the personally identifiable information of party A-subscriber, party A-subscriber Identity information is marked, and after target identity information is verified, target number identity a2 is generated according to target identity information.It can be with Understand, computer equipment can according to the enterprise identity information of the A enterprise where the personally identifiable information of party B-subscriber, party B-subscriber with And the enterprise identity information of the B enterprise where party B-subscriber generates target identity information respectively, and passes through verifying in target identity information Generate target number identity b1 and target number identity b2 respectively afterwards.Computer equipment can be believed according to the personal identification of C user The enterprise identity information of A enterprise and the enterprise identity information of the C enterprise where C user where breath, C user generate mesh respectively Identity information is marked, and generates target number identity c1 and target number identity c2 respectively after target identity information is by verifying.
In one embodiment, a kind of digital identity verification method provided can also include the number for obtaining enterprise's mark The process of identity, specifically includes: obtaining the instruction of checking of the digital identity identified to enterprise identity, and extracts and check in instruction User Identity;When the User Identity checked in instruction is target user's identity, obtained by block chain network The digital identity for taking enterprise identity to identify.
User can check that terminal, which can be generated, checks finger by the digital identity that terminal identifies enterprise identity It enables, checks the User Identity that can wrap the user containing the digital identity for checking enterprise identity mark in instruction.Terminal can Will check that instruction is sent to computer equipment.That is, the available digital identity to enterprise identity mark of computer equipment Check instruction.Computer equipment can extract the User Identity checked in instruction, and computer equipment can be by the use of extraction Family identity and target user's identity are compared, when the User Identity checked in instruction is target user's identity When mark, computer equipment can obtain the digital identity of enterprise identity mark by block chain network.Wherein, target user's body Part mark can be the mark of representative or administrator that enterprise identity identifies in corresponding enterprise.Computer equipment can incite somebody to action The digital identity of the enterprise identity mark got is sent to terminal.
In the present embodiment, computer equipment passes through the instruction of checking for obtaining the digital identity identified to enterprise identity, and The User Identity checked in instruction is extracted, when the User Identity checked in instruction is target user's identity, The digital identity of enterprise identity mark is obtained by block chain network.Only when the corresponding user of target user's identity wants When checking the digital identity of enterprise's mark, computer equipment just passes through the digital body that block chain network obtains enterprise identity mark Part, it ensure that the safety of the digital identity of enterprise identity mark.
In one embodiment, a kind of digital identity verification method provided can also include the process of distribution permission, tool Body includes: to obtain the corresponding grade of target number identity;Obtain the high corresponding portion of target number identity of adjacent rank middle grade Fraction limit, and target number identity by block chain network that part authority distribution is low to grade.
Each target number identity in computer equipment has corresponding grade, and higher grade, in target number identity Corresponding permission is higher.For example, the grade of target number identity can be level-one, second level, three-level etc., wherein three-level number of targets The corresponding permission of body part is higher than the corresponding permission of Secondary objective digital identity, and the corresponding permission of Secondary objective digital identity is wanted Permission corresponding higher than primary target digital identity.
Computer equipment can obtain the corresponding grade of target number identity respectively, specifically, computer equipment can obtain The corresponding part permission of the target number identity for taking adjacent rank middle grade high.For example, the number of targets that computer equipment is got The corresponding grade of body part a1 is level-one, and the corresponding grade of target number identity a2 is second level, and target number identity b1 is corresponding Grade is three-level, and the available grade of computer equipment is the corresponding part permission of target number identity b1 of three-level.Computer Equipment can be low to grade by part authority distribution that block chain network will acquire target number identity.For example, calculating The part authority distribution of target number identity b1 can be given target number identity a2 by machine equipment, and computer equipment can be by target The part authority distribution of digital identity b1 gives target number identity a1;Computer equipment can also be by the portion of target number identity a2 Fraction limit distributes to target number identity a1.
In the present embodiment, computer equipment is obtained in adjacent rank by obtaining the corresponding grade of target number identity The corresponding part permission of the high target number identity of grade, and mesh by block chain network that part authority distribution is low to grade Mark digital identity.Computer equipment is by block chain network by the part authority distribution of the high target number identity of grade to grade Low target number identity, can make the distribution of permission more convenient.
In one embodiment, a kind of digital identity verification method provided can also include the mistake of log data Journey specifically includes: including that part authority distribution is low to grade in daily record data by block chain network log data Target number identity assigning process.
Computer equipment can pass through block chain network log data.It wherein, include computer in daily record data Equipment is by part authority distribution to the assigning process of the low target number identity of grade.
In the present embodiment, computer equipment by block chain network log data, in daily record data include by Assigning process of the part authority distribution to the low target number identity of grade.When user checks authority distribution by computer equipment When information, it can be checked according to the daily record data recorded by block chain network, can simplify and check authority distribution information Process.
It should be understood that although each step in the flow chart of Fig. 2 is successively shown according to the instruction of arrow, this A little steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these steps It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 2 Step may include that perhaps these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps It completes, but can execute at different times, the execution sequence in these sub-steps or stage, which is also not necessarily, successively to be carried out, But it can be executed in turn or alternately at least part of the sub-step or stage of other steps or other steps.
In one embodiment, as shown in figure 4, providing a kind of digital identity verifying device 400, comprising: digital identity It obtains module 410, checking request sending module 420 and verification result and obtains module 430, in which:
Digital identity obtains module 410, for obtaining target number identity by block chain network, in target number identity Include the digital identity of personal identification mark and identifies the digital identity of corresponding enterprise identity mark with personal identification.
Checking request sending module 420, for sending the verifying to target number identity to terminal by block chain network Request.
Verification result obtains module 430, the verification result returned for obtaining terminal according to checking request, and verification result is Number confirmation result of the target number identity to checking request.
In the present embodiment, computer equipment obtains target number identity by block chain network, in target number identity Include the digital identity of personal identification mark and identify the digital identity of corresponding enterprise identity mark with personal identification, leads to Checking request of the block chain network to terminal transmission to target number identity is crossed, the verifying that terminal is returned according to checking request is obtained As a result, verification result is number confirmation result of the target number identity to checking request.It is a due to being stored in block chain network The digital identity of people's identity and the digital identity that corresponding enterprise identity mark is identified with personal identification, utilize block chain The decentralization of network, distributed management feature, target number identity is verified by block chain network, can be improved The public credibility of digital identity verifying.
In one embodiment, a kind of digital identity verifying device provided can also include the number of personal identification mark Identity registration module identifies corresponding personally identifiable information for obtaining personal identification, when personally identifiable information is verified, Block chain is written in the digital identity of personal identification mark by the digital identity that personal identification mark is generated according to personally identifiable information In network.
In one embodiment, a kind of digital identity verifying device provided can also include the number of enterprise identity mark Identity registration module identifies corresponding enterprise identity information for obtaining enterprise identity, when enterprise identity Information Authentication passes through, Block chain is written in the digital identity of enterprise identity mark by the digital identity that enterprise identity mark is generated according to enterprise identity information In network.
In one embodiment, digital identity obtains module 410 and is also used to obtain personally identifiable information and enterprise identity Information generates target identity information according to personally identifiable information and enterprise identity information, when target identity information is verified, Target number identity is generated according to target identity information.
In one embodiment, digital identity obtains module 410 and is also used to obtain the digital identity identified to enterprise identity Check instruction, and the User Identity checked in instruction is extracted, when the User Identity checked in instruction is that target is used When the identity of family, the digital identity of enterprise identity mark is obtained by block chain network.
In one embodiment, a kind of digital identity verifying device provided can also include authority distribution module, be used for The corresponding grade of target number identity is obtained, the high corresponding part permission of target number identity of adjacent rank middle grade is obtained, And target number identity by block chain network that part authority distribution is low to grade.
In one embodiment, authority distribution module is also used to through block chain network log data, daily record data In include assigning process by part authority distribution to the low target number identity of grade.
Specific about digital identity verifying device limits the limit that may refer to above for digital identity verification method Fixed, details are not described herein.Modules in above-mentioned digital identity verifying device can fully or partially through software, hardware and its Combination is to realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with It is stored in the memory in computer equipment in a software form, in order to which processor calls the above modules of execution corresponding Operation.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 5.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is used to store the digital identity and enterprise identity corresponding with personal identification mark of personal identification mark The digital identity of mark.The network interface of the computer equipment is used to communicate with external terminal by network connection.The calculating To realize a kind of digital identity verification method when machine program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 5, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory Computer program, the processor perform the steps of when executing computer program
Target number identity is obtained by block chain network, includes the number of personal identification mark in target number identity Identity and the digital identity that corresponding enterprise identity mark is identified with personal identification;
By block chain network to terminal transmission to the checking request of target number identity;
The verification result that terminal is returned according to checking request is obtained, verification result is target number identity to checking request Number confirmation result.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains personal identification mark Corresponding personally identifiable information;When personally identifiable information is verified, personal identification mark is generated according to personally identifiable information Digital identity;It will be in the digital identity write-in block chain network of personal identification mark.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains enterprise identity mark Corresponding enterprise identity information;When enterprise identity Information Authentication passes through, enterprise identity mark is generated according to enterprise identity information Digital identity;It will be in the digital identity write-in block chain network of enterprise identity mark.
In one embodiment, acquisition personally identifiable information is also performed the steps of when processor executes computer program And enterprise identity information;Target identity information is generated according to personally identifiable information and enterprise identity information;When target identities are believed When breath is verified, target number identity is generated according to target identity information;Target number identity is written in block chain network.
In one embodiment, acquisition is also performed the steps of when processor executes computer program to enterprise identity mark The digital identity of knowledge checks instruction, and extracts the User Identity checked in instruction;When the user identity checked in instruction When being identified as target user's identity, the digital identity of enterprise identity mark is obtained by block chain network.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains target number identity Corresponding grade;The high corresponding part permission of target number identity of adjacent rank middle grade is obtained, and passes through block chain network By the part authority distribution target number identity low to grade.
In one embodiment, it also performs the steps of when processor executes computer program and is remembered by block chain network Daily record data is recorded, includes the assigning process by part authority distribution to the low target number identity of grade in daily record data.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
Target number identity is obtained by block chain network, includes the number of personal identification mark in target number identity Identity and the digital identity that corresponding enterprise identity mark is identified with personal identification;
By block chain network to terminal transmission to the checking request of target number identity;
The verification result that terminal is returned according to checking request is obtained, verification result is target number identity to checking request Number confirmation result.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains personal identification mark Know corresponding personally identifiable information;When personally identifiable information is verified, personal identification mark is generated according to personally identifiable information The digital identity of knowledge;It will be in the digital identity write-in block chain network of personal identification mark.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains enterprise identity mark Know corresponding enterprise identity information;When enterprise identity Information Authentication passes through, enterprise identity mark is generated according to enterprise identity information The digital identity of knowledge;It will be in the digital identity write-in block chain network of enterprise identity mark.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains personal identification letter Breath and enterprise identity information;Target identity information is generated according to personally identifiable information and enterprise identity information;Work as target identities When Information Authentication passes through, target number identity is generated according to target identity information;Block chain network is written into target number identity In.
In one embodiment, acquisition is also performed the steps of when computer program is executed by processor to enterprise identity The digital identity of mark checks instruction, and extracts the User Identity checked in instruction;When the user's body checked in instruction When part is identified as target user's identity, pass through the digital identity that block chain network obtains enterprise identity mark.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains number of targets body The corresponding grade of part;The high corresponding part permission of target number identity of adjacent rank middle grade is obtained, and passes through block link network The network target number identity that part authority distribution is low to grade.
In one embodiment, it also performs the steps of when computer program is executed by processor through block chain network Log data includes the assigning process by part authority distribution to the low target number identity of grade in daily record data.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of digital identity verification method, which comprises
Target number identity is obtained by block chain network, includes the number of personal identification mark in the target number identity Identity and the digital identity that corresponding enterprise identity mark is identified with the personal identification;
By the block chain network to terminal transmission to the checking request of the target number identity;
The verification result that terminal is returned according to the checking request is obtained, the verification result is the target number identity to institute State the number confirmation result of checking request.
2. the method according to claim 1, wherein the registration process of the digital identity of personal identification mark Include:
It obtains the personal identification and identifies corresponding personally identifiable information;
When the personally identifiable information is verified, the number of the personal identification mark is generated according to the personally identifiable information Body part;
The digital identity that the personal identification is identified is written in the block chain network.
3. according to the method described in claim 2, it is characterized in that, the registration process of the digital identity of enterprise identity mark Include:
It obtains the enterprise identity and identifies corresponding enterprise identity information;
When the enterprise identity Information Authentication passes through, the number of the enterprise identity mark is generated according to the enterprise identity information Body part;
The digital identity that the enterprise identity is identified is written in the block chain network.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
Obtain the personally identifiable information and the enterprise identity information;
Target identity information is generated according to the personally identifiable information and the enterprise identity information;
When the target identity information is verified, target number identity is generated according to the target identity information;
The target number identity is written in the block chain network.
5. according to the method described in claim 3, it is characterized in that, the method also includes:
The instruction of checking of the digital identity identified to enterprise identity is obtained, and checks the user identity mark in instruction described in extraction Know;
When the User Identity checked in instruction is target user's identity, obtained by the block chain network The digital identity of the enterprise identity mark.
6. the method according to claim 1, wherein the method also includes:
Obtain the corresponding grade of the target number identity;
Obtain the high corresponding part permission of target number identity of adjacent rank middle grade, and by the block chain network by institute State the part authority distribution target number identity low to grade.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
Include by the block chain network log data, in the daily record data by the part authority distribution to etc. The assigning process of the low target number identity of grade.
8. a kind of digital identity verifies device, which is characterized in that described device includes:
Digital identity obtains module, for obtaining target number identity by block chain network, wraps in the target number identity Digital identity containing personal identification mark and the digital identity that corresponding enterprise identity mark is identified with the personal identification;
Checking request sending module, for sending the verifying to the target number identity to terminal by the block chain network Request;
Verification result obtains module, the verification result returned for obtaining terminal according to the checking request, the verification result It is the target number identity to the number confirmation result of the checking request.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201811535255.2A 2018-12-14 2018-12-14 Digital identity verification method, device, computer equipment and storage medium Active CN109587154B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811535255.2A CN109587154B (en) 2018-12-14 2018-12-14 Digital identity verification method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811535255.2A CN109587154B (en) 2018-12-14 2018-12-14 Digital identity verification method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109587154A true CN109587154A (en) 2019-04-05
CN109587154B CN109587154B (en) 2021-10-15

Family

ID=65928598

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811535255.2A Active CN109587154B (en) 2018-12-14 2018-12-14 Digital identity verification method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109587154B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110661779A (en) * 2019-08-15 2020-01-07 中国平安财产保险股份有限公司 Block chain network-based electronic certificate management method, system, device and medium
CN110868467A (en) * 2019-11-12 2020-03-06 广州大白互联网科技有限公司 Network certificate synchronization method, system and storage medium based on network certificate platform
CN110941860A (en) * 2019-12-10 2020-03-31 博雅正链(北京)科技有限公司 Block chain and biological feature based electronic contract associable analysis verification method
CN111985399A (en) * 2020-08-20 2020-11-24 重庆中科云从科技有限公司 Area monitoring method, system, machine readable medium and equipment based on biological feature recognition
CN113271211A (en) * 2021-05-18 2021-08-17 网易(杭州)网络有限公司 Digital identity verification system, method, electronic device and storage medium
CN113761493A (en) * 2021-08-26 2021-12-07 浙商银行股份有限公司 Method and system for controlling calling authority and calling party identity of intelligent contract interface of block chain platform

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357612A (en) * 2016-08-25 2017-01-25 江苏通付盾科技有限公司 Method and device for review of authentication records based on public block chains
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain
CN107508680A (en) * 2017-07-26 2017-12-22 阿里巴巴集团控股有限公司 Digital certificate management method, device and electronic equipment
CN108064440A (en) * 2017-05-25 2018-05-22 深圳前海达闼云端智能科技有限公司 FIDO authentication method, device and system based on block chain
CN108111543A (en) * 2018-02-06 2018-06-01 上海千加信息科技有限公司 A kind of digital identity identifying system on block chain
WO2018124857A1 (en) * 2017-01-02 2018-07-05 주식회사 코인플러그 Blockchain database-based method and terminal for authenticating user non-face-to-face by utilizing mobile id, and server utilizing method and terminal
US20180293557A1 (en) * 2017-04-05 2018-10-11 Samsung Sds Co., Ltd. Method of charging electronic currency automatically based on blockchain and system thereof
CN108684041A (en) * 2018-05-31 2018-10-19 上海邑游网络科技有限公司 The system and method for login authentication
CN108768933A (en) * 2018-04-11 2018-11-06 深圳技术大学(筹) Digital identification authentication system can be independently supervised on a kind of block platform chain

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357612A (en) * 2016-08-25 2017-01-25 江苏通付盾科技有限公司 Method and device for review of authentication records based on public block chains
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
WO2018124857A1 (en) * 2017-01-02 2018-07-05 주식회사 코인플러그 Blockchain database-based method and terminal for authenticating user non-face-to-face by utilizing mobile id, and server utilizing method and terminal
US20180293557A1 (en) * 2017-04-05 2018-10-11 Samsung Sds Co., Ltd. Method of charging electronic currency automatically based on blockchain and system thereof
CN108064440A (en) * 2017-05-25 2018-05-22 深圳前海达闼云端智能科技有限公司 FIDO authentication method, device and system based on block chain
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107508680A (en) * 2017-07-26 2017-12-22 阿里巴巴集团控股有限公司 Digital certificate management method, device and electronic equipment
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain
CN108111543A (en) * 2018-02-06 2018-06-01 上海千加信息科技有限公司 A kind of digital identity identifying system on block chain
CN108768933A (en) * 2018-04-11 2018-11-06 深圳技术大学(筹) Digital identification authentication system can be independently supervised on a kind of block platform chain
CN108684041A (en) * 2018-05-31 2018-10-19 上海邑游网络科技有限公司 The system and method for login authentication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
彭永勇,张晓韬: "《基于区块链应用模式的可信身份认证关键技术研究》", 《网络安全技术与应用》 *
陈涛,马敏,徐晓林: "《区块链在智慧城市信息共享与使用中的应用研究》", 《电子政务》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110661779A (en) * 2019-08-15 2020-01-07 中国平安财产保险股份有限公司 Block chain network-based electronic certificate management method, system, device and medium
CN110661779B (en) * 2019-08-15 2023-03-21 中国平安财产保险股份有限公司 Block chain network-based electronic certificate management method, system, device and medium
CN110868467A (en) * 2019-11-12 2020-03-06 广州大白互联网科技有限公司 Network certificate synchronization method, system and storage medium based on network certificate platform
CN110941860A (en) * 2019-12-10 2020-03-31 博雅正链(北京)科技有限公司 Block chain and biological feature based electronic contract associable analysis verification method
CN111985399A (en) * 2020-08-20 2020-11-24 重庆中科云从科技有限公司 Area monitoring method, system, machine readable medium and equipment based on biological feature recognition
CN113271211A (en) * 2021-05-18 2021-08-17 网易(杭州)网络有限公司 Digital identity verification system, method, electronic device and storage medium
CN113761493A (en) * 2021-08-26 2021-12-07 浙商银行股份有限公司 Method and system for controlling calling authority and calling party identity of intelligent contract interface of block chain platform
CN113761493B (en) * 2021-08-26 2024-04-05 浙商银行股份有限公司 Intelligent contract interface calling authority and caller identity control method and system for blockchain platform

Also Published As

Publication number Publication date
CN109587154B (en) 2021-10-15

Similar Documents

Publication Publication Date Title
CN110599137B (en) Electronic bill data processing method and device and computer equipment
CN109587154A (en) Digital identity verification method, device, computer equipment and storage medium
CN110581860B (en) Identity authentication method, device, storage medium and equipment based on block chain
CN110365670B (en) Blacklist sharing method and device, computer equipment and storage medium
CN109492983B (en) Electronic seal signing method, device, equipment and medium based on block chain intelligent contract
CN109325342B (en) Identity information management method, device, computer equipment and storage medium
CN108776936A (en) Settlement of insurance claim method, apparatus, computer equipment and storage medium
CN110633963B (en) Electronic bill processing method, electronic bill processing device, computer readable storage medium and computer readable storage device
CN108306876A (en) Client identity verification method, device, computer equipment and storage medium
CN110378755B (en) Electronic invoice generation method and device, computer equipment and storage medium
US20080263645A1 (en) Privacy identifier remediation
CN109359485A (en) Invoice data shared system and method based on block chain
CN110175467A (en) Signature file store method, device and computer equipment based on block chain
CN110489393A (en) Promise breaking information query method, device, computer equipment and storage medium
CN110942382B (en) Electronic contract generation method and device, computer equipment and storage medium
CN110223159A (en) Credit data query method, apparatus, computer equipment and storage medium
CN110442654A (en) Promise breaking information query method, device, computer equipment and storage medium
CN112149077B (en) Supply chain billing method, system and computer equipment based on block chain technology
CN109347813A (en) Internet of things equipment login method, system, computer equipment and storage medium
CN110135175A (en) Information processing, acquisition methods, device, equipment and medium based on block chain
CN109741016A (en) Electron contract method, apparatus, computer equipment and storage medium
CN110223075B (en) Identity authentication method and device, computer equipment and storage medium
CN110445757A (en) Personnel information encryption method, device, computer equipment and storage medium
CN110098925A (en) Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system
CN109902922A (en) Distribution method, device, computer equipment and the storage medium of audit task

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant