CN109639632A - User information management method, electronic equipment and storage medium based on block chain - Google Patents

User information management method, electronic equipment and storage medium based on block chain Download PDF

Info

Publication number
CN109639632A
CN109639632A CN201811298890.3A CN201811298890A CN109639632A CN 109639632 A CN109639632 A CN 109639632A CN 201811298890 A CN201811298890 A CN 201811298890A CN 109639632 A CN109639632 A CN 109639632A
Authority
CN
China
Prior art keywords
user
block chain
print
information
registration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811298890.3A
Other languages
Chinese (zh)
Other versions
CN109639632B (en
Inventor
程晗蕾
向智宇
鲁静
陈利浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuanguang Software Co Ltd
Original Assignee
Yuanguang Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuanguang Software Co Ltd filed Critical Yuanguang Software Co Ltd
Priority to CN201811298890.3A priority Critical patent/CN109639632B/en
Publication of CN109639632A publication Critical patent/CN109639632A/en
Application granted granted Critical
Publication of CN109639632B publication Critical patent/CN109639632B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Biomedical Technology (AREA)
  • Economics (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Development Economics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

This application discloses a kind of user information management method based on block chain, electronic equipment and storage mediums.The user information management method includes the registration biological characteristic that user node obtains user's typing, carries out Hash calculation to the registration biological characteristic and obtains registering digital finger-print accordingly;Obtain the enrollment status information of user's typing;The registration digital finger-print and the enrollment status information are associated, and it is stored in block chain network, so that the accounting nodes of block chain network keep accounts to the registration digital finger-print and the enrollment status information, the user is completed to the identity registration of the block chain network.The digital finger-print of user is associated with cochain with identity information by the above method, it can guarantee that the privacy of user is more not easy to be leaked, and authentication more accurately can be carried out to user when user's later use block chain network carries out relationship trading, reduce the situation of authentication mistake.

Description

User information management method, electronic equipment and storage medium based on block chain
Technical field
This application involves block chain technical field, more particularly to a kind of user information management method based on block chain, Electronic equipment and storage medium.
Background technique
Block chain technology is the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm New application technology set.From the point of view of data Angle, block chain is sequentially in time by data block in such a way that sequence is connected A kind of linked data structure being combined into, the data structure guarantee that it can not distort and can not forge by cryptography mode. From the technical point of view, block chain technology incorporates a variety of different technologies, by constructing block chain network, so that in network Each node allows to obtain a complete data block copy, and is calculated based on common recognition mechanism and competition to maintain based on area The update of the data block of block chain.The end to end network constituted is linked up by multinode as a result, and realizes going for data storage and management It centralization and goes to trust.
In block chain network, all operation rules and data information disclose all nodes, therefore, often One record is visible to all nodes.Meanwhile block chain technology has splendid safety, individually even more than node to data The modification in library can not influence the database of other nodes, unless the node that can be controlled in whole network more than more than half passes through Modification is likely to the data that modification block chain is recorded, and the probability that such case occurs is very small.
Currently, block chain technology management to the identity information of user, such as physics license, biological characteristic etc..Existing In technology, the identity information of these users is still stored in central database, when carrying out conscientious to the identity information of user every time, Need to access central database to obtain corresponding identity information.Therefore, user client can not independently carry out authentication, drop The low high efficiency and convenience of authentication, and central database exists leaking data to be occurred by invasion or is tampered Safety issue.
Summary of the invention
The application is mainly solving the technical problems that provide a kind of user information management method based on block chain, electronics is set Standby and storage medium, the user information management method can be improved the safety of subscriber identity information.
To solve the above-mentioned problems, the application first aspect provides a kind of subscriber information management side based on block chain Method, the user information management method include:
User node obtains the registration biological characteristic of user's typing, carries out Hash calculation to the registration biological characteristic and obtains Corresponding registration digital finger-print;
Obtain the enrollment status information of user's typing;
The registration digital finger-print and the enrollment status information are associated, and are stored in block chain network, with So that the accounting nodes of block chain network is kept accounts the registration digital finger-print and the enrollment status information, completes the use Identity registration of the family to the block chain network.
To solve the above-mentioned problems, the application second aspect provides a kind of electronic equipment, which includes storage Device and processor, wherein
The memory is stored with the computer instruction that the processor executes;
The processor is for running the computer instruction, to execute above-mentioned user information management method.
To solve the above-mentioned problems, the application third aspect provides a kind of storage medium, which is stored with meter The instruction of calculation machine, the computer instruction can be run by processor, to execute above-mentioned user information management method.
In above scheme, when utilizing user's registration by the user information management method of block chain based on the biological characteristic of typing Calculation obtains corresponding digital finger-print, and digital finger-print is associated with cochain with identity information, it is ensured that the privacy of user be more not easy by Leakage, and identity more accurately can be carried out to user when user's later use block chain network carries out relationship trading and recognized Card reduces the situation of authentication mistake.
Detailed description of the invention
Fig. 1 is the architecture schematic diagram of the application block platform chain;
Fig. 2 is the architecture schematic diagram of file administration network of the application based on block chain technology;
Fig. 3 is the structural schematic diagram of the block of the block chain used in the examples of the application one;
Fig. 4 is the structural schematic diagram of one embodiment of the application file administration network;
Fig. 5 is the flow diagram of the application archive management method first embodiment;
Fig. 6 is the flow diagram of the application archive management method second embodiment;
Fig. 7 is the flow diagram of the application archive management method 3rd embodiment;
Fig. 8 is the structural schematic diagram of the corresponding file administration network of archive management method shown in Fig. 7;
Fig. 9 is the flow diagram of the application archive management method fourth embodiment;
Figure 10 is the flow diagram of the application user information management method first embodiment;
Figure 11 is the flow diagram of the application user information management method second embodiment;
Figure 12 is the flow diagram of mono- embodiment of step S53 in Figure 11;
Figure 13 is the flow diagram of another embodiment of step S53 in Figure 11;
Figure 14 is the flow diagram of the application user information management method 3rd embodiment;
Figure 15 is the structural schematic diagram of one embodiment of the application electronic equipment;
Figure 16 is the structural schematic diagram of one embodiment of the application storage medium.
Specific embodiment
With reference to the accompanying drawings of the specification, the scheme of the embodiment of the present application is described in detail.
In being described below, for illustration and not for limitation, propose such as specific system structure, interface, technology it The detail of class, so as to provide a thorough understanding of the present application.
The terms " system " and " network " are often used interchangeably herein.The terms "and/or", only It is a kind of incidence relation for describing affiliated partner, indicates may exist three kinds of relationships, for example, A and/or B, can indicates: individually There are A, exist simultaneously A and B, these three situations of individualism B.In addition, character "/" herein, typicallys represent forward-backward correlation pair As if a kind of relationship of "or".
Block chain technology is the novel distributed data organizer of one kind risen with the digital encryptions such as bit coin currency Method and operation mode.Its biggest characteristic is that: decentralization, this enables data to realize distributed collective's maintenance, be greatly improved Data operation, management, maintenance efficiency;It is based on a set of common recognition mechanism between common recognition node, safeguards entire area jointly by competing to calculate Block chain, any node failure, remaining node remain to work normally.The block chain for carrying asymmetric encryption techniques simultaneously has Gao An Quan Xing, trackability can effectively prevent leaking data or illegally distort.The application proposes to realize archives using block chain technology File management, such as files storage, lend, give back, wherein the files can for accounting file file, transaction Any types such as agreement, the application are illustrated by taking accounting file file as an example.
The application block chain network for ease of understanding, the block chain technology first used to the application are illustrated.? In one concrete application, electronic equipment run the block chain technology with become the block chain network node, the block platform chain Architecture is as shown in Figure 1, include data Layer, network layer, common recognition layer, contract layer, service layer and the application layer of block chain.
Wherein, data Layer is used for packaging bottom layer data block and the technologies such as relevant data encryption and timestamp.Also, File data calculate (as twice) at least once using irreversible encryption algorithm (such as SHA256 algorithm), is generated unique Block chain ID, i.e. Hash (Hash) value.Specifically, which can be the privately owned chain of block, to guarantee that the block chain is not complete Complete open, the member's node only registered just may have access to.Network layer encapsulates the P2P networking mode of block chain network system, disappears The elements such as propagation protocol and data authentication mechanism are ceased, each node status equity is made and are interconnected with flat topological structure and phase Mutually, possess distribution, the characteristics such as autonomy, opening can free in and out.Each node can participate in block in block chain network The verification of data and accounting procedure can just charge to block chain only after block data passes through the whole network major part node verification.Block This decentralization design of chain guarantees that file data can not be distorted, can not be forged.Common recognition layer, participates in the common recognition machine of block chain network System.Contract layer is packaged with the contract code that electric power is clear, settles accounts and executes respective quadrature automatically when the condition in contract code is triggered Can provide easily, while by treaty content corresponding electricity transaction price, market settlement etc..Service layer, for for different The personalized BaaS service of application scenarios customization, disposes the intelligent contract code of different market settlements on block chain underlying platform It is called for all kinds of situations.Application layer by block chain technical application in the various relevant treatments of files management, such as user Registration, user identity management, files lending and give back, data access control etc..
Block chain network is collected with a kind of mode of decentralization, is packaged and the related of safeguard protection files is marked Know, the lending information of files, give back the information data relevant to files such as information, and these information datas are anchored Onto block chain.Specifically, block chain can be realized using the network of block alliance chain or the privately owned chain of block chain.Block chain Node constantly converts the responsibility undertaken in network system, and never only one node is controlling whole network system, I.e. will not only one accounting nodes keep accounts.Each node is a part in network system.The node of block chain The timing such as role of transformation in each minute, any a part of network system can be permanently controlled without node.
The present embodiment can by the architecture of block platform chain shown in FIG. 1 be applied to the application propose based on block chain File administration network, the user node in the file administration network is deployed with the architecture of block platform chain shown in FIG. 1, The architecture of the file administration network can be as shown in Figure 2.
Further, in one embodiment, the block encapsulation of block chain can be as shown in Figure 3.The block of the block chain includes area Build 31 (Header) and block body 32 (Body).The block body 32 is stored with the relevant data letter of at least one pair of files Breath carries out the cryptographic Hash (Hash) that setting Hash operation obtains.The block head 31 can be packaged with current version number 311, previous area Block address 312, the target cryptographic Hash 313 of current block, the solution random number of current block PoW (proof of work) common recognition process 314, the information such as Merkle root 315 (Merkle-root) and timestamp 316.Wherein, current version number 311, for indicating The relevant release note of software and agreement;The previous block address 312, alternatively referred to as previous block cryptographic Hash, just by the value Each block can just be joined end to end and constitute block chain;The solution random number 314 is that record decrypts the block correlation mathematical problem The value of answer;The Merkle root 315 is calculated by data cryptographic Hash all in block body 32, and checking file data are used for With the presence or absence of in the block;The timestamp 316 is used to record the time of the block 30 generation.It is understood that the block Structure can be adjusted according to the difference of the block chain technology of use, such as Pow is not used to know together mechanism, then there is no above-mentioned Solution random number.
In a concrete application, which can be made of block layered (Block).Root is mesh It records block (Directory Block).These blocks constitute a miniature chain, store compressed reference on chain (reference).In order to avoid data scale is excessive, the reference in catalogue block (Directory Block) is recording areas The cryptographic Hash of block (Entry Block).
Catalogue block corresponds to the first layer of this system, is the area for recording the record block integrality (hash value) and proving Block.Catalogue block be all record blocks as defined in Servers-all be grouped together construction and generate.Therefore, each Server is owned by all record blocks, all catalogue blocks and all records (Entry).
The second layering for recording block (Entry Block) this corresponding system, is record Entry integrality (hash value) The block of proof.It may require that record block in the application for finding record, it can be from a digital fingerprint search to all possible phases The storage of the files of pass such as lends, gives back at the record.Record block includes the cryptographic Hash of electronical record.Electronical record Cryptographic Hash demonstrates the presence of data simultaneously and finds the key of record in distributed hash table (DHT) network.
Record block (Entry Block) contains whole Entry related with a chain ID.If some Entry is If being associated with some record block (Entry Block), then it is considered that this Entry and being not present.Such design It can allow application program easily falsfication, easily identify which Entry is true and reliable.
Referring to Fig. 4, Fig. 4 is the structural representation of file administration network one embodiment of the application based on block chain technology Figure.As shown in figure 4, the file administration network 41 in the present embodiment is block chain network, it wherein at least include 411 He of user node Accounting nodes 412.
In one embodiment, all user nodes 411 can all correspond to the staff of file administration, at other In embodiment, certain customers' node 411 is also can correspond to general borrow user and/or give back user.Wherein, Yong Hujie The electronic record file that the files for scanning papery are formed can be uploaded to block chain network and stored by point;In addition, may be used also The archives mark formed with the content to scanning files is uploaded to block chain network and stores, can also by scanning with Files corresponding archives mark to the storage states of files, lend information and/or give back the information datas such as information into Row retrieval is checked.It further, can will be relevant when files the transaction events such as lend, give back by user node generation Transaction Information is uploaded to block chain network and is stored.
In the present embodiment, the corresponding node of relevant to files department is as accounting nodes 412, and the present embodiment is with shelves Case file is is illustrated for accounting file file, correspondingly, meeting relevant to the generation of accounting files and supervision etc. Meter department, Finance Department, auditing department, archives management department, legal department etc. can be used as accounting nodes 412 and be added to block In chain network.Accounting nodes 412 can carry out the book keeping operation of block chain network, and each accounting nodes 412 are with competition accounting capabilities Node, the relationship trading number transaction such as store, lend, giving back relevant to files that user node 411 is occurred According to being stored, each accounting nodes 412 save the transaction data relevant to files of the generation of user node 411, real The distributed storage for the transaction data relevant to files that existing each user node 411 generates.
Block chain network may also include management node 413, carry out identity note for user node 411 and accounting nodes 412 Volume manages the various businesses function such as identity information and real-name authentication, the processing contract template of user node 411 and accounting nodes 412 Energy.
Above-mentioned user node 411, accounting nodes 412 and management node 413 are specifically as follows any electronic equipment, such as take Business device, mobile phone, computer, tablet computer etc., in an embodiment, which is block chain server, management node 413 be the application server with traffic handing capacity, and can be used as the deposit system based on block chain network.It is understood that It is that above-mentioned user node 411, accounting nodes 412 and management node 413 can communicate, user node 411 and pipe in the present embodiment It manages node 413 and is used as block chain node, for example, the light weight accounting nodes of block chain, but in other embodiments, user node 411 and management node 413 be not limited to block chain node, i.e. user node 411 and management node 413 at least partly may not Participate in block chain.In addition, the differentiation of above-mentioned node is determined according to by the identity information of the Node registers.Therefore above-mentioned section The corresponding main body of point such as manages the staff of files, Accounting Department, Finance Department, auditing department, regulatory agency, all Need in advance on block platform chain complete registration (in an application, the block chain be the privately owned chain of block or block alliance chain, therefore Identity registration is completed on block platform chain in advance), and corresponding public key and private key are obtained, after determining that its identity is credible, allow Carry out following file administration business.
In one embodiment, which is used to carry out Identity Management to user node 411 and accounting nodes 413 And authentication.Wherein, which enters in block chain network for new node user's registration, and archives text is occurring When part relationship trading, corresponding intelligent contract is matched according to relevant identity information.Specifically such as, new node is sent to management node Account Registration request, wherein account registration request includes that the account name of request registration (is provided in user after succeeding in registration to log in The block chain network) and the new node the provable user such as identity information, such as identification card number, passport No., enterprise number The information of identity.Wherein, account registration request can also only include the identity information of user node.Management node is by Account Registration Identity information in request is compared with the identity information in default identity database;If default identity database there is no The identity information matched, then authenticate and do not pass through, and returns to the registration failure message comprising failure cause;If default identity data inventory In matched identity information, then certification passes through, and sends the message that succeeds in registration.Further, management node can also be by Account Registration Identity information in request saves to setting and manages database, to be managed collectively the user identity for participating in the block chain.New node After receiving the message that succeeds in registration, the related algorithm in self-operating block chain technology or other sections by block chain network Point generates block chain address, the block chain address of the account as registration for it;And the phase in self-operating block chain technology It closes algorithm such as setting Hash operation and generates the public key and private key of one group of public key and private key as the account of registration.Then, new node By the public key broadcasts in the block chain network, so that the account that other nodes in network receive and save the user's registration is public Key.Also, its private key and block chain address are stored in local or the private key and also can be transmitted in the credible of setting by the new node The node appointed is stored, to back up.At this point, Account Registration is completed.
The block chain network of the present embodiment is by taking alliance's chain network or privately owned chain network as an example, i.e., block chain network is added in node When need to carry out identity information registration, the member's node for the identity information only registered could visit the block chain network It asks.
Referring to Fig. 5, Fig. 5 is the flow diagram of the application archive management method first embodiment.As shown in figure 5, this The archive management method of embodiment may include following steps:
In step s 11, user node obtains corresponding with files to be borrowed the be stored in block chain network One archives mark.
User node obtains the first archives corresponding with files to be borrowed of filing and storage from block chain network Mark, it is to be understood that the first archives are identified as to pass through this when borrowing files and carrying out filing storage and scan in it Hold the archives mark generated, i.e., it is understood that the first archives mark corresponds to when borrowing files and carrying out filing storage Content.Further, the first archives mark can be first corresponding to content when borrowing files and carrying out filing storage Archives two dimensional code.
In the present embodiment, by taking the corresponding staff for file administration of user node as an example.When borrowing user to archives The staff of management proposes the Requirement of files, is believed by the archives that user node typing needs to borrow files Breath, such as archives kind, file name, archives affiliated date, archives voucher number.User node is according to the archive information of typing The first archives corresponding with files to be borrowed mark of filing and storage is obtained from block chain network.
When borrowing files filing storage, the content of the files to be borrowed can be scanned, and then generate Store corresponding with the content of files to be borrowed the first archives mark when borrowing files, user node obtain this One archives mark, and sends it to block chain network so that the accounting nodes in block chain network to the first archives identify into Row book keeping operation.Further, files to be borrowed can be archives of paper quality file, be also possible to electronic record file, also can wrap The electronic record duplicate of the document for including archives of paper quality file and being formed by the archives of paper quality file.If files to be borrowed include When electronic record file, electronic record file can also be also uploaded to block chain network, so that the book keeping operation in block chain network Node keeps accounts to electronic record file, and electronic record file also is stored in block chain network.
In other embodiments, the staff for managing archives can scan files to be borrowed by scanning device First archives mark, files to be borrowed accordingly are searched, can check the files to be borrowed storage information, It borrows record, give back the information such as record, realize the retrospect to the life cycle of files.If files have the management phase Limit, when its manage time limit expire and it is destroyed or nullify when, still can by scan files to be borrowed the first archives identify It to its storage information, record is borrowed, gives back the information such as record and consults, carry out life cycle retrospect.
In step s 12, the second gear pattern identification that the content based on files to be borrowed generates is obtained.
Further, when borrowing Requirement of the user to the staff of file administration proposition files, pass through user Node typing needs to borrow the archive information of files, such as archives kind, file name, archives affiliated date, archives voucher Number etc..User node is according to the content that the archive information of typing can obtain corresponding files to be borrowed corresponding Two archives mark.
In the present embodiment, second gear pattern identification be it is current according to the archive information that user's offer is provided find wait borrow The archives mark that the content of files generates, i.e., it is understood that second gear pattern identification corresponds to the archives to be borrowed found The current content of file.Further, second gear pattern identification can be for corresponding to the current of the files to be borrowed found Content the second archives two dimensional code.
It waits borrowing when storing with filing it is understood that the execution content of step S11 and step S12 is respectively used to obtain The corresponding first archives mark of the content of files and the second archives mark corresponding with the currently content of files to be borrowed Know, between the two there is no the restriction of specific successively execution sequence, i.e., in other embodiments, step S12 can also first be held It goes, is executed after step S11, the application is not particularly limited.
In step s 13, the first archives mark and second gear pattern identification are compared, are judged according to comparison result wait borrow Read whether files are correct, and judges whether to receive and be verified information to borrow that user carries out authentication.
Further, the first archives mark and second gear pattern identification that will acquire are compared, and are judged according to comparison result Whether files to be borrowed are correct.Since the first archives mark and second gear pattern identification correspond respectively to files to be borrowed Current content and treating borrow content when files carry out filing storage;It follows that if the first archives mark and Second gear pattern identification is consistent, then illustrates that the current contents of files to be borrowed is deposited with treating to borrow files and carry out filing Content when storage is also consistent, can determine whether that files to be borrowed are correct in other words;If the first archives mark and second gear Pattern identification is inconsistent, then the files to be borrowed stored in files and the block chain network to be borrowed that explanation is found are not It unanimously, at this time may be to find files mistake to be borrowed, or files to be borrowed are from filing storage to this lookup In a period of there is modification, situations such as damage, partial content are lost, in other words, can determine whether that files to be borrowed are not just True, therefore cannot lend.
Further, the present embodiment is when borrowing user and borrowing files, also needs to carry out authentication to borrowing user, i.e., File administration user node also needs to determine whether the authentication for borrowing user passes through.I.e. file administration user node also needs to confirm Whether receive and be verified information to borrowing user and carry out authentication, corresponds to if file administration user node receives The information that is verified for borrowing user then illustrates to have carried out authentication to borrowing user, and authentication passes through;If shelves Case management user node, which does not receive to correspond to, borrows the information that is verified of user, then illustrates not carry out to borrowing user also Authentication, or to subscriber authentication exception is borrowed, user can not be borrowed to this at this time and lend files to be borrowed.
In step S14, record is borrowed according to the identity information for borrowing user and files to be borrowed generation, will be borrowed Record is sent to block chain network.
According to the comparison and judgement of step S13, when judging result is that files to be borrowed are correct, and receive and correspond to When being verified information of user is borrowed, i.e., explanation can borrow user's lending to this and be somebody's turn to do files to be borrowed.At this point, record is borrowed Read the identity information of user, the associated profiles information of files to be borrowed, borrow temporal information etc., it is generated according to these information It is corresponding with the files to be borrowed to borrow record, record will be borrowed and be sent to block chain network, the note in block chain network Account node borrows record to this and carries out common recognition book keeping operation, forms new block and is stored in block chain network.
In step S15, feedback borrows failure information.
According to the comparison and judgement of step S13, when judging result is that document to be borrowed is incorrect and/or do not receive correspondence In borrowing when being verified information of user, that is, can determine cannot lend files to be borrowed to user is borrowed, and feeds back and borrow Failure information is read, further, it is also possible to which the particular content of judging result further to be fed back to the staff of file administration.
When judging result be wait borrow files it is incorrect when, it may be possible to find files mistake to be borrowed, or There is situations such as modification, damage, partial content loss in files to be borrowed in a period of searching from filing storage to this, Also file to be borrowed can be prompted incorrect in the colleague that feedback borrows failure information.Testing for user is borrowed when not receiving to correspond to Card is when passing through information, illustrate also not carried out authentication to borrowing user, or abnormal to subscriber authentication is borrowed, feed back It can also prompt to carry out the unacceptable verification result of authentication to borrowing user when borrowing failure information, or inform not to borrowing use Family carries out authentication.
The present embodiment borrow user treat borrow files and borrow when, enable that user node utilizes and filing stores When files to be borrowed the corresponding first archives mark of content and corresponding with the currently content of files to be borrowed the Two archives mark is borrowed the contents of files and confirm to treat, and is lent when borrowing files with having ensured, should The consistency of the content of files to be borrowed, files especially to be borrowed are that preservation pipe is carried out in the form of paper document When reason, can guarantee the correctness of paper document, and can be treated by block chain network borrow the Borrow Situations of files into Row storage, treats the Borrow Situation for borrowing files, storage condition etc. by block chain network convenient for administrative staff and looks into It askes.Further, in the present embodiment, only when correct and when borrowing the authentication of user and passing through wait borrow files, just may be used To borrowing user's lending, archives text is avoided by treating to borrow files and borrow the dual verification process of identity of user There is situations such as mistake is borrowed in part.
Further, referring to Fig. 6, carried out on the basis of archive management method first embodiment shown in Fig. 5 into one Step extension.As shown in fig. 6, may also include the steps of: before step S11 shown in Fig. 5
In step s 16, user node obtains file borrowing request, corresponding wait borrow based on file borrowing request The storage address of files, and corresponding the is generated based on the content of the files to be borrowed found using storage address Two archives mark.
Borrow the file borrowing request that user proposes files to the staff of file administration, file borrowing request It can be also to borrow user and directly pass through the user node of appeal to propose, be also possible to propose by other electronic equipments of oneself 's.It wherein, may include the relevant archive information for needing the files to be borrowed borrowed in file borrowing request, such as archives class Not, file name, archives affiliated date, archives voucher number etc..In different concrete applications, files to be borrowed can be with paper The form of matter files carries out preservation and management;Can also in the form of electronic record file storage and management;Can also be with The form of archives of paper quality file carries out preservation and management, while forming electronic record duplicate of the document according to archives of paper quality file, will Electronic record duplicate of the document storage and management in the form of electronic record file.Wherein, it is stored in the form of electronic record file And management, electronic record file are storable in block chain network, also can store in the database except block chain network, In addition, other storage methods also can be used by its part there are in block chain network, another part be stored in block chain network it In outer database.
In the present embodiment, user node according to file borrowing request in include these archive informations can inquire wait borrow Read the storage address of files.And then files to be borrowed accordingly can be found by the storage address, it is real one It applies in mode, the corresponding electronic equipment of user node can have scanning function or the corresponding electronic equipment of user node that can connect Scanning device;As a result, the scanning function or and user node of user node can be utilized after finding wait borrow files The scanning device of connection, which is treated, to be borrowed files and is scanned, and then generates corresponding with the content of files to be borrowed the Two archives mark.It is understood that second gear pattern identification corresponds to the current content of the files to be borrowed found.
Further, referring to Fig. 7, Fig. 7 is the stream of the archive management method 3rd embodiment of the application file administration network Journey schematic diagram.As shown in fig. 7, the archive management method of the present embodiment may include following steps:
In the step s 21, user node obtains corresponding with files to be borrowed the be stored in block chain network One archives mark.
In step S22, the second gear pattern identification that the content based on files to be borrowed generates is obtained.
In step S23, the first archives mark and second gear pattern identification are compared, judged according to comparison result wait borrow Whether correct read files, and carry out authentication to user is borrowed.
Step in the present embodiment, in step S21 and step S22 and archive management method first embodiment shown in fig. 5 S11 is identical with step S12, and details are not described herein again.Further, that records in the step S23 of the present embodiment identifies the first archives It is compared with second gear pattern identification, judges whether files to be borrowed correctly judge content and Fig. 5 according to comparison result Shown in record in step S13 in archive management method first embodiment by the first archives mark and second gear pattern identification into Row compares, and judges that whether correct files to be borrowed content be identical according to comparison result, details are not described herein again.
Further, user node can also carry out authentication to user is borrowed in the present embodiment.Specifically, user node can The certification biological characteristic and identity information for borrowing user's typing are obtained, and obtains correspondence from block chain network according to identity information Registration biological characteristic, using certification biological characteristic and registration biological characteristic to borrow user carry out authentication.
In the present embodiment by user node also as to borrow user carry out authentication equipment end, at this point, borrowing use Family needs to lend when borrowing files, certainly by user node (the present embodiment is by taking file administration user node as an example) typing The certification biological characteristic and identity information for being used to carry out authentication of body, user node is according to the identity information in area as a result, Registration biological characteristic corresponding with the identity information, the certification biological characteristic that further will acquire and lookup are searched in block chain network To registration biological characteristic be compared, according to comparison result to borrow user carry out authentication.
In the present embodiment, the user including including the staff of file administration and borrowing user is both needed to carry out block in advance The registration of chain network.When user's registration, registration biological characteristic is used as by the biological characteristic of corresponding node device typing itself, The identity information of typing oneself simultaneously, user node is associated registration biological characteristic and identity information, and is uploaded to block Chain network;Accounting nodes in block chain network register biological characteristic and identity information carries out book keeping operation storage to being mutually related, Authentication is carried out to user when the events such as borrowing, give back in order to deuterogenesis.
Further, user node can carry out Hash calculation to registration biological characteristic using hash algorithm in the present embodiment, obtain To corresponding registration digital finger-print, it is to be understood that the registration digital finger-print is the fixed bit obtained by Hash calculation Several character strings.Further user node is associated as the registration to being calculated registration biological characteristic and identity information Digital finger-print is associated with identity information.
Further, based on above-mentioned user's registration and associated embodiment, in another embodiment, user node is obtained After taking the certification biological characteristic for borrowing user's typing, Hash calculation is carried out to certification biological characteristic using hash algorithm and obtains phase The certification digital finger-print answered;Further, user node is obtained from block chain network corresponding with identity information according to identity information Registration digital finger-print;Will certification digital finger-print and registration digital finger-print be compared, according to comparison result to borrow user into Row authentication.If authenticating, digital finger-print is consistent with registration digital finger-print, illustrates to the knot for borrowing user's progress authentication Fruit is to be verified;If certification digital finger-print and registration digital finger-print it is inconsistent, illustrate to borrow user progress authentication Result be verifying do not pass through.
In step s 24, record is borrowed according to the identity information for borrowing user and files to be borrowed generation, will borrowed Record is sent to block chain network, so that the accounting nodes in block chain network are kept accounts to record is borrowed.
In step s 25, feedback borrows failure information.
Step in the present embodiment, in step S24 and step S25 and archive management method first embodiment shown in fig. 5 S14 is identical with step S15, and details are not described herein again.
The flow diagram of archive management method 3rd embodiment according to figure 7, further referring to Fig. 8, to this The archive management method of embodiment is described further, and the present embodiment is with the work that user node 811 is corresponding to file administration Process description is carried out for the electronic equipment of personnel, and physical characteristics collecting equipment 812 is connected with user node 811 and scanning is set Standby 813, it is respectively used to be acquired biological characteristic, and be scanned files;Further, the present embodiment is to lend Files to be borrowed be papery files be illustrated.
The present embodiment, can by 813 pairs of scanning device when the accounting file file bound into book form to filing carries out storage storage Meter files are scanned, and form corresponding archives mark, and archives mark is above-mentioned the first archives mark, shelves Pattern identification can be archives two dimensional code;Archives are identified after generating by user node 811 and are uploaded to block link network by archives mark Network 814 keeps accounts to archives mark by the accounting nodes (being not drawn into figure) in block chain network 814, and is stored in block In chain network 814;Corresponding accounting file file is then stored in corresponding accounting file database.
In addition, occurring between accounting file file borrows, borrow user and/or file administration staff and its His node needs to carry out identity registration;When registration, biology that each user passes through the electronic equipment typing itself of corresponding node Feature is as registration biological characteristic, while the identity information of typing oneself, user node 811 can give birth to registration using hash algorithm Object feature carries out Hash calculation, obtains registering digital finger-print accordingly, and registration digital finger-print and identity information are associated, and It is uploaded to block chain network 814;Accounting nodes in block chain network 814 register digital finger-print and identity letter to being mutually related Breath carries out book keeping operation storage, carries out authentication to user when in order to the events such as borrow, give back, the identity letter stored at this time Breath is enrollment status information.
Further, after completing identity registration, user node 811 can also generate corresponding private key at random, and according to private key Public key is calculated, public key is uploaded to each node in block chain network 814, private key is stored in the user node.It needs Illustrate, the present embodiment is also to carry out accounting file file by user node 811 to borrow to borrow user, therefore can not needle Public key and private key are generated to user is borrowed, only the node with administration authority (such as staff of file administration) is generated public Key and private key.
Further, after borrowing user's completion identity registration, user node 811 can be believed based on the enrollment status for borrowing user Breath matching obtains corresponding intelligent contract, and the intelligence contract is deployed to each node in block chain network 814, so that area Block chain network 814 is based on intelligent contract and executes transaction related to user.
When borrowing user and needing to borrow accounting file file, provided to the staff of file administration need to borrow wait borrow The archive information for readding accounting file file (as above-mentioned files to be borrowed), such as archives kind, file name, archives institute Belong to date, archives voucher number etc.;In addition it is also necessary to which the identity information for borrowing user itself to be supplied to the work of file administration Personnel, the staff of file administration is by the above-mentioned archive information being provided and identity information typing user node 811, Yong Hujie Point 811 obtains above-mentioned archive information and identity information.It should be noted that the staff of file administration is inciting somebody to action in the present embodiment Before the above-mentioned archive information and identity information typing user node 811 that are provided, also need to be stepped on by user node 811 Record, at this point, the staff of file administration to the corresponding log-on message of 811 typing of user node (may include biological information, One of identity information, account information are a variety of), user node 811 obtains above-mentioned log-on message, utilizes the private being locally stored Key encrypts log-on message, and encrypted log-on message is transmitted to block chain network 814, in block chain network 814 Verifying node obtain corresponding public key, be decrypted using log-on message of the public key to encryption, stepped on according to what is obtained after decryption Record authentication and the register of the staff of information completion file administration.
Further, 811 one side of user node should be wait borrow from the storage of accounting file database lookup according to archive information The storage address of accounting file file, to find the accounting file file to be borrowed according to the storage address, by what is found Accounting file file to be borrowed is provided to scanning device 813, by scanning device 813 to the accounting file file to be borrowed found Content be scanned, formed correspond to find accounting file file to be borrowed archives mark, as above-mentioned second Archives mark, and second gear pattern identification is sent to user node 811.On the other hand, user node 811 is based on being believed according to archives Breath obtains corresponding first archives mark from block chain network 814, and the first archives mark and second gear pattern identification are carried out It compares, is verified according to correctness of the comparison result to the accounting file file to be borrowed found, is i.e. verifying is found Wait borrow the content of accounting file file and treat whether borrow content when accounting file file carries out filing storage consistent.Again On the one hand, it borrows user and passes through the certification biological characteristic of 812 typing of physical characteristics collecting equipment oneself, and biological characteristic will be authenticated It is sent to user node 811, Hash calculation is carried out by 811 pairs of certification biological characteristics of user node, obtains certification digital finger-print, into One step, user node 811 obtain corresponding registration number according to the identity information for borrowing user's offer from block chain network 814 Fingerprint, carrying out authentication to user using certification digital finger-print and registration digital finger-print, (in other embodiments, calculating is recognized Digital finger-print is demonstrate,proved, and comparing certification digital finger-print can also be by physical characteristics collecting equipment with the execution content for registering digital finger-print 812 execute).If user node 811 determines that the accounting file file to be borrowed found is correct, and borrows the authentication of user Pass through, it is determined that the accounting file file to be borrowed found can be lent to this and borrow user, and formed and borrow record accordingly, It record will be borrowed is uploaded to block chain network 814 and store.
Further, intelligent contract could dictate that the lending time limit of accounting file file and the penalty mechanism that do not give back that exceeds the time limit. After borrowing record and being uploaded to block chain network 814, that is, it can trigger corresponding intelligent contract, start the time lent to it progress Record can trigger intelligence contract from trend and borrow user's transmission when not giving back in the lending time limit for reaching accounting file file It gives back and reminds and/or execute automatically the penalty mechanism for exceeding the time limit not give back;For example, by including into the identity information for borrow user Telephone number or email address, to corresponding mobile phone or mailbox transmission give back prompting.Further, it can also be mentioned from having sent to give back Further record lends the time when awake, recognizes after a period of time and does not give back accounting file file, then is held automatically based on intelligent contract The corresponding penalty mechanism of row.
Authentication is had already been through when logging in due to the staff of file administration in the present embodiment, it can be with It does not need to carry out authentication to it by the biological characteristic of the staff of file administration again, but in other embodiments, Authentication can also be carried out to the staff of file administration in the way of digital finger-print using above-mentioned, such as need to lend Accounting file file to be borrowed there is situations such as higher secret grade, need to obtain specific people's annotation when could lend.This Outside, in other embodiments, block chain network can also be added by mobile phone, the apparatus such as computer of oneself by borrowing user, this When borrow user can also be by the way of above-mentioned login authentication.
Further, referring to Fig. 9, Fig. 9 is the flow diagram of the application archive management method fourth embodiment, this implementation Example for being lent after borrowing files in archive management method first embodiment shown in fig. 5, carry out what archives were given back Embodiment.As shown in figure 9, the archive management method of the present embodiment may include following steps:
In step S31, user node obtains the third gear pattern identification that the content based on files to be given back generates.
When giving back user's (i.e. corresponding under normal circumstances to borrow user with above-mentioned) and giving back files, to user node (the present embodiment is by taking file administration user node as an example) provides files to be given back, and is similar to step S11, user node at this time According to user's files to be given back of offer are given back, third archives mark corresponding with the content of files to be given back is obtained Know.
In another embodiment, user node can treat give back files content be scanned so that obtain with to Give back the corresponding third gear pattern identification of content of files.
In step s 32, the first archives mark corresponding with files to be given back being stored in block chain network is obtained Know.
In the present embodiment, files to be given back should correspond to the files to be borrowed of above-mentioned lending, store as a result, The corresponding first archives mark of files in block chain network and to be borrowed is corresponding with files to be given back Archives mark.Content step S12 as shown in Figure 5 is executed, according to user's files to be given back of offer are given back, phase can be obtained Such as archives kind, file name, archives affiliated date for answering, archives voucher number archive information, and then from block chain network It is middle to obtain corresponding first archives mark.
In step S33, the first archives mark and third gear pattern identification are compared, judged according to comparison result wait return Also whether files are correct, and judge whether to receive and be verified information to give back that user carries out authentication.
First archives mark and third gear pattern identification are compared user node, judge shelves to be given back according to comparison result Whether case file is correct.It is understood that if the first archives mark it is consistent with third gear pattern identification, illustrate at this time wait return Also files are the files to be borrowed lent before, that is, files to be given back are correct;If the first archives mark Know it is consistent with third gear pattern identification, then illustrate files to be given back at this time and the files to be borrowed lent before not Together, that is, files to be given back are incorrect, at this point, files to be given back may give back mistake, or the process in lending In there is situations such as partial content loss.
Further, the present embodiment is when giving back user and giving back files, also needs to carry out authentication to giving back user, i.e., User node also needs to determine whether the authentication for giving back user passes through.I.e. user node also needs to be confirmed whether to receive to giving back User carries out authentication and is verified information, if user node receive correspond to give back user be verified information, Then illustrate to have carried out authentication to giving back user, and authentication passes through;Return if user node does not receive to correspond to Also user is verified information, then illustrates also not carried out authentication to giving back user, or to giving back subscriber authentication It is abnormal, can not complete at this time this give back user treat give back file give back operation.
In step S34, record is given back according to the identity information for giving back user and files to be given back generation, will be given back Record is sent to block chain network.
According to the comparison and judgement of step S33, when judging result is that files to be given back are correct, and receive and correspond to When being verified information of user is given back, i.e., explanation can give back user to completion and give back operation to the files to be given back. At this point, record the associated profiles information of the identity information, files to be given back of giving back user, give back temporal information etc., according to These information generate that files to be given back are corresponding gives back record with this, will give back record and are sent to block chain network, block Accounting nodes in chain network give back record to this and carry out common recognition book keeping operation, form new block and are stored in block chain network.
In step s 35, feedback gives back failure information.
According to the comparison and judgement of step S33, when judging result is that document to be given back is incorrect and/or do not receive correspondence In giving back when being verified information of user, that is, can determine cannot complete to give back user treat give back files give back behaviour Make, and feed back and give back failure information, further, it is also possible to which the particular content of judging result further to be fed back to the work of file administration Make personnel.Particular content can be as shown in Figure 5 step S15 content, details are not described herein again.
Fig. 5 can be based on shown in Fig. 4 to the application archive management method first embodiment shown in Fig. 9 to fourth embodiment The file administration network based on block chain technology.
Further, the application also proposed the user information management method based on block chain technology, the user of the present embodiment Approaches to IM can be applied to the file administration network shown in Fig. 4 based on block chain technology.Referring to Fig. 10, Figure 10 is this Apply for the flow diagram of user information management method first embodiment, as shown in Figure 10, the present embodiment may include following process:
In step S41, user node obtains the registration biological characteristic of user's typing, carries out Hash to registration biological characteristic Corresponding registration digital finger-print is calculated.
Block chain network can be privately owned chain network or alliance's chain network in the present embodiment, and user needs in advance to block chain Network is registered, and could be approved by other nodes in block chain network after succeeding in registration to carry out phase by block chain network The transaction answered.In the present embodiment, when user's registration block chain network, typing its own biological characteristic it is special as registration biology Sign, user node obtains the registration biological characteristic, and obtains the character string of irreversible one group of regular length using Hash calculation, The character string can be used as registration digital finger-print corresponding with registration biological characteristic.
In step S42, the enrollment status information of user's typing is obtained.
When user's registration block chain network, as enrollment status information, user node obtains its own identity information of typing Take the enrollment status information.
In the present embodiment, registering biological characteristic can be the physiological characteristic of any one or a few user, such as fingerprint, rainbow Film, face at least one of refer to the physiological characteristics such as vein.Enrollment status information may include the physics of one or more of users Identity information, such as ID card information (ID card No., native place, identity card picture), job information (work unit's title, work Make part, position etc.), household register information, at least one of contact method (phone, mailbox, QQ, wechat etc.).
In step S43, registration digital finger-print is associated with enrollment status information, and be stored in block chain network In.
Further, the registration digital finger-print and enrollment status information that user node will acquire are associated, and are uploaded to The accounting nodes of block chain network, block chain network keep accounts to registration digital finger-print and enrollment status information, complete user To the identity registration of block chain network.
The user information management method of the application is no longer individual special using biology in user's registration block chain network Sign or identity information are registered, but the two is associated to register.In addition, the application is in user's registration block chain Cochain is the registration digital finger-print being calculated according to the registration biological characteristic of user when network, which is not It is reversible and unique, therefore the user information management method of the application can guarantee that the privacy of user is more not easy to be leaked, and Authentication more accurately can be carried out to user when user's later use block chain network carries out relationship trading, reduce identity The case where authentication error.
Further, Figure 11 is please referred to, Figure 11 is the flow diagram of the application user information management method second embodiment, The present embodiment be based on user information management method first embodiment shown in Fig. 10 to user complete user's registration after, to The embodiment of family progress authentication.As shown in figure 11, the present embodiment may include following process:
In step s 51, user node obtains the certification biological characteristic of user's typing, carries out Hash to certification biological characteristic Corresponding certification digital finger-print is calculated.
When user carries out relationship trading by block chain network, need to carry out authentication to user.To user into When row authentication, the certification biological characteristic of user's typing at this time in the application, it is to be understood that certification biological characteristic is corresponding In registration biological characteristic, typing registers biological characteristic to refer to when the two can correspond to identical physiological characteristic, i.e. user's registration Line and iris, then when carrying out authentication, the certification biological characteristic of typing should also be fingerprint and iris.User node is into one Step using hash algorithm to certification biological characteristic carry out Hash calculation, obtain with authenticate biological characteristic it is corresponding one group it is irreversible The character string of regular length, authentication authorization and accounting digital finger-print.
It is understood that is used when registration and certification is hash algorithm, therefore, if the certification of user's typing is raw For object feature with corresponding registration biometric matches, then the certification digital finger-print obtained should be consistent with registration digital finger-print.If The certification biological characteristic of user's typing and corresponding registration biological characteristic are distinct, then the certification digital finger-print obtained should be with It is inevitable different to register digital finger-print.
In step S52, the authenticating identity information of user's typing is obtained.
When user carries out authentication using block chain network, identity information of the typing for certification is believed as authenticating identity Breath, user node obtain the authenticating identity information.
In step S53, according to the registration digital finger-print of accounting nodes record and enrollment status information judgement certification number It whether there is incidence relation between fingerprint and authenticating identity information.
Further, user node is recorded according to the certification digital finger-print and authenticating identity information and accounting nodes that obtain at this time Registration digital finger-print and enrollment status information be associated the judgement of relationship, and then judge obtained certification digital finger-print and recognize It whether relevant demonstrate,proves identity information, and obtains corresponding judging result.
As shown in figure 12, in one embodiment, step S53 may include following steps:
In step S531a, according to the corresponding enrollment status information of authenticating identity information searching.
User node obtains the authenticating identity information of user's typing when to user's progress authentication, is believed according to authenticating identity Breath is found and the consistent note of authenticating identity information from multiple enrollment status information that the accounting nodes of block chain network record Volume identity information.For example, the authenticating identity information of user's typing at this time is identification card number 123456789, then according to the identification card number Search the enrollment status information that content is 123456789.
In step S532a, according to the corresponding certification digital finger-print of enrollment status acquisition of information.
It further, can be according to the enrollment status acquisition of information found certification digital finger-print associated there.It can be with Understand, enrollment status information and certification digital finger-print associated there correspond to for the user of same registration 's.
In step S533a, judges to register digital finger-print and whether certification digital finger-print is consistent, determined according to judging result It authenticates and whether there is incidence relation between digital finger-print and authenticating identity information.
Further, that is, can determine whether registration digital finger-print and the certification digital finger-print obtained at this time are consistent, and then determine It authenticates and whether there is incidence relation between digital finger-print and authenticating identity information.
If it is consistent with certification digital finger-print to register digital finger-print, and registering digital finger-print is recognizing based on active user's typing Card identity information is found, and can illustrate that authenticating identity information is identical as enrollment status information, and authenticates digital finger-print and note Volume digital finger-print is identical, and in other words, there are incidence relations between certification digital finger-print and authenticating identity information, at this time to user's body The result of part certification is step S54.If registering digital finger-print and certification digital finger-print being inconsistent, and registering digital finger-print is to be based on What the authenticating identity information searching of active user's typing arrived, it can illustrate that authenticating identity information is identical as enrollment status information, and It authenticates digital finger-print and registration digital finger-print is not identical, in other words, authenticate and be not present between digital finger-print and authenticating identity information Incidence relation is at this time step S55 to the result of user identity authentication.
As shown in figure 13, in another embodiment, step S53 may also include the steps of:
In step S531b, corresponding registration digital finger-print is searched according to certification digital finger-print.
In step S532b, corresponding enrollment status information is obtained according to registration digital finger-print.
In step S533b, judge whether authenticating identity information is consistent with enrollment status information, is determined according to judging result It authenticates and whether there is incidence relation between digital finger-print and authenticating identity information.
It is another embodiment of step S53 shown in Figure 13, present embodiment is similar with embodiment shown in Figure 12, The difference is that present embodiment is to search registration digital finger-print by certification digital finger-print, and then pass through registration numerical value fingerprint Associated enrollment status information is searched, by judging whether authenticating identity information and enrollment status information unanimously judge to authenticate It whether there is incidence relation between digital finger-print and authenticating identity information.
In step S54, determine that the result for carrying out authentication to user is to be verified according to judging result.
According to the judging result of step S53, if judging result is to exist between certification digital finger-print and authenticating identity information Incidence relation then illustrates that authenticating identity information, certification digital finger-print, enrollment status information, registration digital finger-print both correspond to together One user can determine that the result for carrying out authentication to user is to be verified.
In step S55, determine that the result for carrying out authentication to user is that verifying does not pass through according to judging result.
According to the judging result of step S53, if judging result is not deposit between certification digital finger-print and authenticating identity information In incidence relation, then illustrates the authenticating identity information of typing at this time and/or authenticate the corresponding user of digital finger-print and enrollment status Information and/or the corresponding user of registration digital finger-print are not same users, that is, can determine the result that authentication is carried out to user Do not pass through for verifying.
Further, Figure 14 is please referred to, Figure 14 is the flow diagram of the application user information management method 3rd embodiment, The present embodiment be based on user information management method first embodiment shown in Fig. 10 to user complete user's registration after into One step is implemented to extend.As shown in figure 14, the present embodiment may also include following process after step S43 shown in Fig. 10:
In step S44, user node generates public key and private key to user, and by public key broadcasts into block chain network, Private key is stored in user node.
After user completes the registration of block chain network, user node generates private key to the user at random, and passes through password Related algorithm is learned, corresponding public key is generated based on the private key.Other sections of public key broadcasts to block chain network, in block chain network Point can obtain the public key, and private key is stored in the user node that user is registered.
Public key and private key generting machanism based on the present embodiment, when user needs to carry out relationship trading using block chain network When, user adds log-on message using private key by being stored with the user node of private key, typing log-on message, user node It is close, and encrypted log-on message is uploaded to the verifying node stated in block chain network, verifying node obtains and the use in turn The corresponding public key in family is decrypted encrypted log-on message using public key and then obtains the log-on message, and then steps on to this Record information is verified, if being verified, illustrates that carrying out authentication to user passes through, if log-on message verifying does not pass through, Then explanation does not pass through user's progress authentication.
In the present embodiment, log-on message can for user include fingerprint, iris, face, refer in the physiological characteristics such as vein It is at least one including login biological characteristic, be also possible to include ID card information (ID card No., native place, identity card shine Piece etc.), job information (work unit's title, working portion, position etc.), household register information, contact method (phone, mailbox, QQ, Wechat etc.) at least one of including login identity information.
Wherein, user information management method first embodiment to 3rd embodiment shown in Figure 10 to Figure 14 can be applicable to figure 5 to archive management method first embodiment shown in Fig. 9 into fourth embodiment, for the work for borrowing user and file administration The user information for making personnel is managed, and specific application mode can be found in Fig. 5 to archive management method first shown in Fig. 9 Embodiment to fourth embodiment detailed description.
Further, Figure 15 is please referred to, Figure 15 is the structural schematic diagram of one embodiment of the application electronic equipment.Such as Figure 15 institute Show, the electronic equipment 150 of the present embodiment, which can be user node 411 or accounting nodes 412 shown in Fig. 4, to be Fig. 8 institute The user node 811 shown.Electronic equipment 150 can be specially computer corresponding with user node 411/811 or accounting nodes 412, The terminals such as mobile phone, tablet computer.The basis just like block platform chain shown in FIG. 1 is disposed in the electronic equipment 150 of the present embodiment Framework can be added in block chain network as the node in block chain network.
Further, the electronic equipment 150 of the present embodiment may include the processor 1501 by being located inside electronic equipment 150 With memory 1502, processor 1501 is connected with memory 1502 by bus.The memory 1502 is stored with processor 1501 Executable computer instruction, processor 1501 execute the computer instruction to realize above-mentioned Fig. 5 to files shown in Fig. 9 Shown in any one or more embodiments and/or Figure 10 to Figure 14 of the management method first embodiment into fourth embodiment Any one or more embodiments of the user information management method first embodiment into 3rd embodiment.
Further, Figure 16 is please referred to, Figure 16 is the structural schematic diagram of one embodiment of the application storage medium.Such as Figure 16 institute Show, the computer instruction 1601 that can be performed is stored in the storage medium 160 in the present embodiment, the computer instruction 1601 It is performed times that can be realized above-mentioned Fig. 5 to files management method first embodiment shown in Fig. 9 into fourth embodiment User information management method first embodiment shown in one or more embodiments and/or Figure 10 to Figure 14 to third of anticipating is implemented Any one or more embodiments in example.
In the present embodiment, which can be the memory module of intelligent terminal, flash memory device (such as movement Hard disk, USB flash disk etc.), network cloud disk, application memory platform or server etc. have the medium of store function.In addition, the storage medium It can also be the storage device or accounting nodes 412, management node of 411 counterpart terminal of user node shown in above-mentioned Fig. 4 413 corresponding servers;It again or is memory 1502 shown in Figure 15.
Above scheme can realize it is following the utility model has the advantages that
(1) the digital finger-print alignments for passing through the application, realize the credible verification and tracking to user identity, guarantee shelves User involved in the complete period of case restoring files is credible, once the events such as archives loss, damage occur, it can fast explicit responsibility Main body prevents borrower and denies afterwards.
(2) the digitized archives mark of archives of paper quality file is deposited with user identity unique features " biological characteristic " distribution It is stored on each node of block chain network, and is safeguarded jointly by the whole network node, prevent malicious attack, even if central database is ruined Bad, archive information will not be lost, and improve the safety and privacy of file administration.
(3) files borrow circulation information it is all open and clear between all participations nodes, formation complete information stream, Realize the real-time credible track record and effective audit to archives, it is ensured that main body understands in time and find to have access to problem, guarantees to use Family Borrowing System height closes rule.
(4) number that can will be previously stored in biological characteristic and archives mark and distributed security database using intelligent contract According to compared one by one, accounting file is borrowed, and the expire mode of the comptometers codes such as automatic disposition is stored in block chain On, automatic trigger executes, so that complex logic business structure, can eliminate information friction and mutual dynamic friction, cut operating costs, Keep entire file administration process more seamless, efficient.
(5) lending of files all needs to scan corresponding archives and identifies with giving back, and carries out credible comparison, it is ensured that line performs Case and chain perform pattern identification one-to-one correspondence, and pre- mistake proofing borrows, leaks the event of going back, meanwhile, technology for eliminating cracks risk, avoids two dimension Code duplication and fraud.
(6) by the personal information storage of asymmetric encryption on block chain, the private key of generation is archived in user terminal, together Application on one block chain is realized user biological feature " record is multi-purpose ", is answered by calling the interface to carry out identity authentic authentication For scenes such as financial managing and control system login, personnel attendances.
In above description, for illustration and not for limitation, propose such as specific system structure, interface, technology it The detail of class, so as to provide a thorough understanding of the present application.However, it will be clear to one skilled in the art that there is no these specific The application also may be implemented in the other embodiment of details.In other situations, omit to well-known device, circuit with And the detailed description of method, so as not to obscure the description of the present application with unnecessary details.

Claims (10)

1. a kind of user information management method based on block chain technology, which is characterized in that
User node obtains the registration biological characteristic of user's typing, carries out Hash calculation to the registration biological characteristic and obtains accordingly Registration digital finger-print;
Obtain the enrollment status information of user's typing;
The registration digital finger-print and the enrollment status information are associated, and are stored in block chain network, so that area The accounting nodes of block chain network keep accounts to the registration digital finger-print and the enrollment status information, complete the user couple The identity registration of the block chain network.
2. user information management method according to claim 1, which is characterized in that
The user information management method further include:
The user node obtains the certification biological characteristic of user's typing, carries out Hash calculation to the certification biological characteristic It obtains authenticating digital finger-print accordingly;
Obtain the authenticating identity information of user's typing;
According to the registration digital finger-print of accounting nodes record and enrollment status information judgement certification digital finger-print and recognize It demonstrate,proves and whether there is incidence relation between identity information;
Authentication is carried out to the user according to judging result.
3. user information management method according to claim 2, which is characterized in that
The registration digital finger-print and enrollment status information judgement certification digital finger-print according to accounting nodes record It whether there is incidence relation between authenticating identity information, comprising:
According to the corresponding enrollment status information of the authenticating identity information searching;
According to the corresponding certification digital finger-print of the enrollment status acquisition of information;
Judge whether the certification digital finger-print and the certification digital finger-print are consistent, determine the certification number according to judging result It whether there is incidence relation between word fingerprint and authenticating identity information.
4. user information management method according to claim 2, which is characterized in that
The registration digital finger-print and enrollment status information judgement certification digital finger-print according to accounting nodes record It whether there is incidence relation between authenticating identity information, comprising:
Corresponding registration digital finger-print is searched according to the certification digital finger-print;
The corresponding enrollment status information is obtained according to the registration digital finger-print;
Judge whether the authenticating identity information and the enrollment status information are consistent, the certification number is determined according to judging result It whether there is incidence relation between word fingerprint and authenticating identity information.
5. user information management method according to claim 1, which is characterized in that
The registration biological characteristic includes fingerprint, iris, face, at least one of refers to vein;
The enrollment status information includes at least one of ID card information, job information, household register information, contact method.
6. user information management method according to claim 1, which is characterized in that
After the completion user is to the identity registration of the block chain network, comprising:
The user node generates public key and private key to the user, and by the public key broadcasts into the block chain network, The private key is stored in the user node;
The user information management method further include:
The user node obtains the log-on message of user's typing, is added using the private key to the log-on message It is close, and encrypted log-on message is sent to the verifying node in the block chain network, so that the verifying node utilizes The public key is decrypted to obtain corresponding log-on message to the encrypted log-on message, and using the log-on message into Row user carries out authentication;
The log-on message includes at least one of logging in biological characteristic and logging in identity information.
7. user information management method according to claim 1, which is characterized in that
After the completion user is to the identity registration of the block chain network, comprising:
According to the corresponding intelligent contract of the enrollment status information matches;
The intelligent contract is deployed to each node in the block chain network, so that the block chain network is based on described Intelligent contract executes transaction relevant to the user.
8. the user information management method according to claim 2 or 6, which is characterized in that
The user information management method further include:
User node obtains the first archives corresponding with files the to be borrowed mark being stored in block chain network;
Obtain the second gear pattern identification that the content based on the files to be borrowed generates;
First archives mark and the second gear pattern identification are compared, the shelves to be borrowed are judged according to comparison result Whether case file is correct, and judges whether the authentication to the user passes through;
If the files to be borrowed are correct, and pass through to the authentication of the user, then according to the identity of the user Record is borrowed in information and the files generation to be borrowed, and the record of borrowing is sent to block chain network, so that described Accounting nodes in block chain network keep accounts to the record of borrowing.
9. a kind of electronic equipment, which is characterized in that including memory and processor, wherein
The memory is stored with the computer instruction that the processor executes;
The processor requires user information pipe described in 1 to 8 Arbitrary Term for running the computer instruction, with perform claim Reason method.
10. a kind of storage medium, which is characterized in that the storage medium is stored with computer instruction, the computer instruction energy It is enough to be run by processor, user information management method described in 1 to 8 Arbitrary Term is required with perform claim.
CN201811298890.3A 2018-11-02 2018-11-02 User information management method based on block chain, electronic equipment and storage medium Active CN109639632B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811298890.3A CN109639632B (en) 2018-11-02 2018-11-02 User information management method based on block chain, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811298890.3A CN109639632B (en) 2018-11-02 2018-11-02 User information management method based on block chain, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109639632A true CN109639632A (en) 2019-04-16
CN109639632B CN109639632B (en) 2021-06-22

Family

ID=66067178

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811298890.3A Active CN109639632B (en) 2018-11-02 2018-11-02 User information management method based on block chain, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109639632B (en)

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059503A (en) * 2019-04-24 2019-07-26 成都派沃特科技股份有限公司 The retrospective leakage-preventing method of social information
CN110263089A (en) * 2019-05-20 2019-09-20 阿里巴巴集团控股有限公司 The receipt storage method and node limited in conjunction with the condition of transaction and event type
CN110263088A (en) * 2019-05-20 2019-09-20 阿里巴巴集团控股有限公司 In conjunction with the conditional receipt storage method and node of code mark and event type
CN110287670A (en) * 2019-06-26 2019-09-27 北京芯安微电子技术有限公司 A kind of biological information and identity information correlating method, system and equipment
CN110417896A (en) * 2019-07-31 2019-11-05 中国工商银行股份有限公司 The system and method for block chain dynamic group net based on cloud
CN110633559A (en) * 2019-09-05 2019-12-31 南京中诚区块链研究院有限公司 Financial security evidence storage platform system and method based on block chain
CN110719264A (en) * 2019-09-18 2020-01-21 平安科技(深圳)有限公司 Information processing method and related device
CN110740120A (en) * 2019-09-06 2020-01-31 西安万像电子科技有限公司 Account information processing method and device
CN110851858A (en) * 2019-10-16 2020-02-28 上海源庐加佳信息科技有限公司 Hotel individual privacy data protection method based on zero-knowledge proof
CN110868300A (en) * 2019-05-17 2020-03-06 北京安妮全版权科技发展有限公司 Block chain evidence storage method and system
CN110889373A (en) * 2019-11-27 2020-03-17 中国农业银行股份有限公司 Block chain-based identity recognition method, information storage method and related device
CN110888938A (en) * 2019-09-02 2020-03-17 腾讯科技(深圳)有限公司 Student identity information processing method and device based on block chain network
CN110995670A (en) * 2019-11-20 2020-04-10 深圳市雄帝科技股份有限公司 Block chain-based digital identity information management method and system
CN111242759A (en) * 2019-12-25 2020-06-05 航天信息股份有限公司 Accounting electronic file processing method and system based on network
CN111526024A (en) * 2020-05-06 2020-08-11 国网安徽省电力有限公司信息通信分公司 Building construction monitoring implementation method based on block chain
CN111541671A (en) * 2020-04-16 2020-08-14 北京海益同展信息科技有限公司 Personnel information storage and verification method, system and storage medium
CN111553694A (en) * 2020-05-21 2020-08-18 陈议尊 Distributed storage block chain method and system
CN111754658A (en) * 2020-07-03 2020-10-09 中国工商银行股份有限公司 Training management method and device and electronic equipment
WO2020220412A1 (en) * 2019-04-29 2020-11-05 山东工商学院 Zero knowledge proof-based citizen privacy protection method and system, and storage medium
CN112153151A (en) * 2020-09-28 2020-12-29 刘华 Intelligent manufacturing workshop safety management method and system based on block chain
CN112149073A (en) * 2020-09-25 2020-12-29 山西特信环宇信息技术有限公司 Cone block chain management method and system
CN112287361A (en) * 2020-09-11 2021-01-29 杭州鸽子蛋网络科技有限责任公司 Data governance method, system, electronic device and storage medium
WO2021017427A1 (en) * 2019-08-01 2021-02-04 创新先进技术有限公司 Blockchain-based identity verification method, apparatus and device
WO2021022737A1 (en) * 2019-08-08 2021-02-11 南京中诚区块链研究院有限公司 Financial security depository receipt system and method based on blockchain
CN112651855A (en) * 2021-01-05 2021-04-13 福建中科星泰数据科技有限公司 Intelligent signing method and system based on alliance block chain
CN112822687A (en) * 2020-12-31 2021-05-18 山西特信环宇信息技术有限公司 Cone block chain mobile terminal authentication method
CN112883414A (en) * 2021-01-21 2021-06-01 贵州电网有限责任公司 IT asset management and renovation platform
CN112950376A (en) * 2021-03-05 2021-06-11 广东电网有限责任公司 Electric power industry digital identity card management method and system based on block chain technology
CN112989300A (en) * 2021-03-15 2021-06-18 京东数科海益信息科技有限公司 Digital identity information processing method and device and electronic equipment
CN113127902A (en) * 2021-04-23 2021-07-16 苏州若拙科技有限公司 File database encryption and evidence storage system based on block chain
CN113381992A (en) * 2021-06-07 2021-09-10 中国电子科技网络信息安全有限公司 License management method based on block chain
CN113468496A (en) * 2021-07-26 2021-10-01 永旗(北京)科技有限公司 Cipher information processing method based on block chain
CN114424495A (en) * 2019-07-24 2022-04-29 罗伯特·博世有限公司 Computer-implemented method of providing secure interaction between users in a network
CN114610777A (en) * 2022-03-06 2022-06-10 浙江数秦科技有限公司 Intelligent management system for civil archives based on block chain
CN114697043A (en) * 2022-03-14 2022-07-01 国网山东省电力公司信息通信公司 Identity authentication unified management platform based on block chain technology and authentication method thereof
CN114697044A (en) * 2022-03-29 2022-07-01 国网山东省电力公司信息通信公司 Identity authentication module integrated system based on block chain technology
CN114880645A (en) * 2022-06-07 2022-08-09 中关村科学城城市大脑股份有限公司 Identity verification method and device based on block chain
CN115439118A (en) * 2022-08-02 2022-12-06 上海网商电子商务有限公司 Digital certificate storage management method based on block chain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453271A (en) * 2016-09-21 2017-02-22 江苏通付盾科技有限公司 Identity registration method and system, identity authentication method and system
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN107547514A (en) * 2017-07-17 2018-01-05 招商银行股份有限公司 Identity identifying method, system and computer-readable recording medium
CN107888384A (en) * 2017-11-30 2018-04-06 中链科技有限公司 A kind of identity data management method, system and computer-readable recording medium
WO2018114585A1 (en) * 2016-12-22 2018-06-28 Itext Group Nv Improved blockchain-based method for registration and verification of a file
CN108418680A (en) * 2017-09-05 2018-08-17 矩阵元技术(深圳)有限公司 A kind of block chain key recovery method, medium based on Secure computing technique

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453271A (en) * 2016-09-21 2017-02-22 江苏通付盾科技有限公司 Identity registration method and system, identity authentication method and system
WO2018114585A1 (en) * 2016-12-22 2018-06-28 Itext Group Nv Improved blockchain-based method for registration and verification of a file
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN107547514A (en) * 2017-07-17 2018-01-05 招商银行股份有限公司 Identity identifying method, system and computer-readable recording medium
CN108418680A (en) * 2017-09-05 2018-08-17 矩阵元技术(深圳)有限公司 A kind of block chain key recovery method, medium based on Secure computing technique
CN107888384A (en) * 2017-11-30 2018-04-06 中链科技有限公司 A kind of identity data management method, system and computer-readable recording medium

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059503A (en) * 2019-04-24 2019-07-26 成都派沃特科技股份有限公司 The retrospective leakage-preventing method of social information
WO2020220412A1 (en) * 2019-04-29 2020-11-05 山东工商学院 Zero knowledge proof-based citizen privacy protection method and system, and storage medium
CN110868300B (en) * 2019-05-17 2023-08-11 北京安妮全版权科技发展有限公司 Block chain evidence-storing method and system
CN110868300A (en) * 2019-05-17 2020-03-06 北京安妮全版权科技发展有限公司 Block chain evidence storage method and system
CN110263088A (en) * 2019-05-20 2019-09-20 阿里巴巴集团控股有限公司 In conjunction with the conditional receipt storage method and node of code mark and event type
CN110263089A (en) * 2019-05-20 2019-09-20 阿里巴巴集团控股有限公司 The receipt storage method and node limited in conjunction with the condition of transaction and event type
CN110263089B (en) * 2019-05-20 2021-05-04 创新先进技术有限公司 Receipt storage method and node combining conditional restrictions of transaction and event types
CN110263088B (en) * 2019-05-20 2021-04-02 创新先进技术有限公司 Conditional receipt storage method and node combining code labeling and event type
CN110287670A (en) * 2019-06-26 2019-09-27 北京芯安微电子技术有限公司 A kind of biological information and identity information correlating method, system and equipment
CN114424495A (en) * 2019-07-24 2022-04-29 罗伯特·博世有限公司 Computer-implemented method of providing secure interaction between users in a network
CN110417896A (en) * 2019-07-31 2019-11-05 中国工商银行股份有限公司 The system and method for block chain dynamic group net based on cloud
CN110417896B (en) * 2019-07-31 2022-01-28 中国工商银行股份有限公司 System and method for dynamically networking block chain based on cloud
WO2021017427A1 (en) * 2019-08-01 2021-02-04 创新先进技术有限公司 Blockchain-based identity verification method, apparatus and device
WO2021022737A1 (en) * 2019-08-08 2021-02-11 南京中诚区块链研究院有限公司 Financial security depository receipt system and method based on blockchain
CN110888938A (en) * 2019-09-02 2020-03-17 腾讯科技(深圳)有限公司 Student identity information processing method and device based on block chain network
CN110633559A (en) * 2019-09-05 2019-12-31 南京中诚区块链研究院有限公司 Financial security evidence storage platform system and method based on block chain
CN110740120A (en) * 2019-09-06 2020-01-31 西安万像电子科技有限公司 Account information processing method and device
CN110740120B (en) * 2019-09-06 2023-04-07 西安万像电子科技有限公司 Account information processing method and device
CN110719264B (en) * 2019-09-18 2022-07-22 平安科技(深圳)有限公司 Information processing method and device, electronic equipment and storage medium
CN110719264A (en) * 2019-09-18 2020-01-21 平安科技(深圳)有限公司 Information processing method and related device
CN110851858B (en) * 2019-10-16 2023-09-05 上海源庐加佳信息科技有限公司 Hotel personal privacy data protection method based on zero knowledge proof
CN110851858A (en) * 2019-10-16 2020-02-28 上海源庐加佳信息科技有限公司 Hotel individual privacy data protection method based on zero-knowledge proof
CN110995670B (en) * 2019-11-20 2022-02-25 深圳市雄帝科技股份有限公司 Block chain-based digital identity information management method and system
CN110995670A (en) * 2019-11-20 2020-04-10 深圳市雄帝科技股份有限公司 Block chain-based digital identity information management method and system
CN110889373A (en) * 2019-11-27 2020-03-17 中国农业银行股份有限公司 Block chain-based identity recognition method, information storage method and related device
CN110889373B (en) * 2019-11-27 2022-04-08 中国农业银行股份有限公司 Block chain-based identity recognition method, information storage method and related device
CN111242759A (en) * 2019-12-25 2020-06-05 航天信息股份有限公司 Accounting electronic file processing method and system based on network
CN111541671A (en) * 2020-04-16 2020-08-14 北京海益同展信息科技有限公司 Personnel information storage and verification method, system and storage medium
CN111526024A (en) * 2020-05-06 2020-08-11 国网安徽省电力有限公司信息通信分公司 Building construction monitoring implementation method based on block chain
CN111553694A (en) * 2020-05-21 2020-08-18 陈议尊 Distributed storage block chain method and system
CN111754658A (en) * 2020-07-03 2020-10-09 中国工商银行股份有限公司 Training management method and device and electronic equipment
CN112287361A (en) * 2020-09-11 2021-01-29 杭州鸽子蛋网络科技有限责任公司 Data governance method, system, electronic device and storage medium
CN112149073A (en) * 2020-09-25 2020-12-29 山西特信环宇信息技术有限公司 Cone block chain management method and system
CN112149073B (en) * 2020-09-25 2023-09-29 山西特信环宇信息技术有限公司 Cone blockchain management method and system
CN112153151A (en) * 2020-09-28 2020-12-29 刘华 Intelligent manufacturing workshop safety management method and system based on block chain
CN112153151B (en) * 2020-09-28 2024-02-02 山西万佳印业有限公司 Intelligent manufacturing workshop safety management method and system based on blockchain
CN112822687A (en) * 2020-12-31 2021-05-18 山西特信环宇信息技术有限公司 Cone block chain mobile terminal authentication method
CN112651855A (en) * 2021-01-05 2021-04-13 福建中科星泰数据科技有限公司 Intelligent signing method and system based on alliance block chain
CN112883414A (en) * 2021-01-21 2021-06-01 贵州电网有限责任公司 IT asset management and renovation platform
CN112950376A (en) * 2021-03-05 2021-06-11 广东电网有限责任公司 Electric power industry digital identity card management method and system based on block chain technology
CN112989300A (en) * 2021-03-15 2021-06-18 京东数科海益信息科技有限公司 Digital identity information processing method and device and electronic equipment
CN113127902A (en) * 2021-04-23 2021-07-16 苏州若拙科技有限公司 File database encryption and evidence storage system based on block chain
CN113381992B (en) * 2021-06-07 2022-03-18 中国电子科技网络信息安全有限公司 License management method based on block chain
CN113381992A (en) * 2021-06-07 2021-09-10 中国电子科技网络信息安全有限公司 License management method based on block chain
CN113468496A (en) * 2021-07-26 2021-10-01 永旗(北京)科技有限公司 Cipher information processing method based on block chain
CN114610777A (en) * 2022-03-06 2022-06-10 浙江数秦科技有限公司 Intelligent management system for civil archives based on block chain
CN114697043A (en) * 2022-03-14 2022-07-01 国网山东省电力公司信息通信公司 Identity authentication unified management platform based on block chain technology and authentication method thereof
CN114697043B (en) * 2022-03-14 2023-11-14 国网山东省电力公司信息通信公司 Identity authentication unified management platform based on blockchain technology and authentication method thereof
CN114697044A (en) * 2022-03-29 2022-07-01 国网山东省电力公司信息通信公司 Identity authentication module integrated system based on block chain technology
CN114880645A (en) * 2022-06-07 2022-08-09 中关村科学城城市大脑股份有限公司 Identity verification method and device based on block chain
CN115439118A (en) * 2022-08-02 2022-12-06 上海网商电子商务有限公司 Digital certificate storage management method based on block chain
CN115439118B (en) * 2022-08-02 2023-11-21 上海网商电子商务有限公司 Digital certificate storage management method based on blockchain

Also Published As

Publication number Publication date
CN109639632B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN109639632A (en) User information management method, electronic equipment and storage medium based on block chain
CN109710823A (en) Archive management method, file administration network and electronic equipment based on block chain
US11689366B2 (en) Cryptoasset custodial system with vault-specific rules governing different actions allowed for different vaults
US11757627B2 (en) Cryptoasset custodial system with proof-of-stake blockchain support
US11238543B2 (en) Payroll based blockchain identity
CN111552955B (en) Personal identity authentication method and device based on block chain and IPFS
CN110771120B (en) System and method for blockchain based authentication
WO2020076982A1 (en) Distributed ledger for encrypted digital identity
EP3997606B1 (en) Cryptoasset custodial system with custom logic
US20220405765A1 (en) Know your customer (kyc) and anti-money laundering (aml) verification in a multi-decentralized private blockchains network
Awalu et al. Development of a distributed blockchain evoting system
Sarier Privacy preserving biometric identification on the bitcoin blockchain
Kumar et al. Blockchain and internet of things (IoT) enabled smart e-voting system
Salman et al. A Review on E-Voting Based on Blockchain Models
Cavoukian et al. Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy
KR20210117731A (en) The blockchain-based transaction history confirmation system
Xu et al. An efficient double-offloading biometric authentication scheme based on blockchain for cross domain environment
Zhang et al. PTAD: Provable and traceable assured deletion in cloud storage
Mukherjee et al. A privacy-preserving blockchain-based E-voting system
Gong-Guo et al. Personal health data identity authentication matching scheme based on blockchain
Amujo et al. Development of a National Identity Management System using Blockchain Technology
Savitha et al. Blockchain-based online voting system
US20240154959A1 (en) System and method of authentication across a distributed resource network
Sneha et al. Blockchain identity management
Gupta et al. Security, Privacy, and Trust Management and Performance Optimization of Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant