CN109831307B - Computer information authentication method and information authentication system - Google Patents

Computer information authentication method and information authentication system Download PDF

Info

Publication number
CN109831307B
CN109831307B CN201910098736.XA CN201910098736A CN109831307B CN 109831307 B CN109831307 B CN 109831307B CN 201910098736 A CN201910098736 A CN 201910098736A CN 109831307 B CN109831307 B CN 109831307B
Authority
CN
China
Prior art keywords
node
information
authentication
verification
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910098736.XA
Other languages
Chinese (zh)
Other versions
CN109831307A (en
Inventor
胡凝
丛宏雷
刘秋杉
程林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Distributed Technologies Co ltd
Original Assignee
Shanghai Distributed Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Distributed Technologies Co ltd filed Critical Shanghai Distributed Technologies Co ltd
Publication of CN109831307A publication Critical patent/CN109831307A/en
Application granted granted Critical
Publication of CN109831307B publication Critical patent/CN109831307B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a computer information authentication method, which comprises the following steps: the verification node authenticates, signs and stores first node information passing electronic authentication, the second node constructs audit information and an audit template, the first node extracts first node authentication information and constructs authentication information, the second node scores and judges the authentication information, after the second node signs the first node, the first node is successfully authenticated by the second node, after the second node is successfully authenticated by the third node, the third node sequentially passes through first authentication and second authentication, the first node is successfully authenticated by the third node, an information authentication process between the first node and the second node is not required to be repeated, the information authentication process between the first node and the third node is simplified, and the information authentication efficiency is improved. The invention also provides an information authentication system for realizing the computer information authentication method.

Description

Computer information authentication method and information authentication system
Technical Field
The invention relates to the technical field of information processing, in particular to a computer information authentication method and an information authentication system.
Background
Trust is the relationship that a trusting party trusts a trusted party through a certain trust endorsement, different entities bound by different trust relationships form a trust network. Information can be transmitted only after information authentication between computers is successful, but in the prior art, the cascade connection relation of trust endorsements is not supported, the computers need to perform the same information authentication process, the information authentication process is complex, the efficiency of the information authentication is greatly reduced, and the application range is limited.
For example, chinese invention with publication number CN108989468 discloses a method and an apparatus for constructing a trust network, where an agent program is installed on a target node applying for joining in the trust network, a first environment information of the target node is obtained through the agent program, a first common identification request carrying the first environment information is transmitted to at least two first common identification nodes in the trust network, and whether the target node is trusted is determined by using the at least two first common identification nodes according to the first environment information carried by the first common identification request. However, the application lacks a cascade relationship, the same information authentication process needs to be performed between the nodes, and the information authentication efficiency is low.
Therefore, there is a need to provide a new information authentication method and system to solve the above problems in the prior art.
Disclosure of Invention
The invention aims to provide a computer information authentication method and an information authentication system, which solve the problem of low information authentication efficiency in the prior art.
In order to achieve the above object, the computer information authentication method of the present invention includes the following steps:
s1: the first node transmits first node information to a verification node according to a first identity certificate, and after the verification node electronically authenticates the first node information, the verification node authenticates, signs and stores the first node information passing the electronic authentication;
s2: the second node constructs audit information and an audit template according to the second node information, and then transmits the audit template to the first node;
s3: the first node extracts first node authentication information from the verification node according to the audit template, constructs authentication information according to the first node authentication information, and transmits the authentication information to the second node;
s4: the second node scores and judges the authentication information according to the audit information so as to judge whether a second public key is used for signing the first node;
s5: after the second node uses the second public key to sign the first node, and the first node has a second signature after the signature is successful, namely the first node is successfully verified by the second node;
s6: after the second node is successfully verified by a third node, the second node has a third signature;
s7: and the third node performs first verification on the third signature, performs second verification on the second signature after the first verification passes, and the first node is successfully verified by the third node after the second verification passes.
The computer information authentication method has the beneficial effects that: after the first node is successfully verified by the second node, the first node has the second signature, after the second node is successfully verified by the third node, the second node has the third signature, the third signature and the second signature are sequentially verified by the third node, the first verification and the second verification are performed, after the second verification passes, the first node is successfully verified by the third node, and an information authentication process between the first node and the second node is not required to be repeated between the first node and the third node, so that the information authentication process between the first node and the third node is simplified, and the efficiency of information authentication is improved.
Preferably, if the verification node determines that the first node information does not pass the electronic authentication, the verification node does not perform authentication signature on the first node information and deletes the first node information, which has the following beneficial effects: and removing the unreal first node information, and improving the reliability of the information.
Preferably, the second node information includes requirement information and a requirement tag of the requirement information, the audit information includes audit comparison information and qualified line information, the audit comparison information includes comparison information of the requirement tag and the requirement information, the second node constructs the audit comparison information and the qualified line information according to the requirement information and the requirement tag of the requirement information, and constructs the audit template according to the requirement tag.
Preferably, the first node information includes verification information and a verification tag of the verification information, in step S3, the first node extracts the verification information corresponding to the verification tag and the verification tag that are the same as the requirement tag from the verification node, and the first node constructs the authentication information according to the verification information and the verification tag and then transmits the authentication information to the second node.
Further preferably, the authentication information includes the verification information and a verification tag of the verification information, the scoring judgment includes that, when the verification tag is the same as the requirement tag, the second node compares the verification information with the comparison information to obtain a comparison result, and scores the comparison result to obtain a scoring result, after the verification information is compared with all the comparison information, the scoring result is summed to obtain a scoring result, and then the scoring result is compared with the qualified line information to judge whether the second node uses the second public key to perform the first signature on the first node, which has the advantages that: and obtaining the scoring result through the scoring, obtaining the scoring result through the summation of the scoring results, comparing the scoring result with the qualified line information, and judging whether the second node uses the second public key to carry out the first signature on the first node or not, so that the accidental performance of the comparison result is reduced, the influence of single comparison information on the whole is reduced, and the reliability is improved.
Further preferably, when the second node determines that the scoring result is greater than or equal to the qualified line information, the second public key is used to perform the first signature on the first node, and the first node is successfully verified by the second node.
Further preferably, if the second node determines that the scoring result is smaller than the qualified line information, the first node is not signed, and the first node fails to be verified by the second node.
Preferably, before the first node transmits the authentication information to the second node, the first node determines whether to encrypt the authentication information, and the beneficial effects are that: performing the encryption processing can play a role in preventing the authentication information from being leaked.
Further preferably, the first node determines to perform the encryption processing on the authentication information, the verification node transmits a key to the first node, and the first node performs the encryption processing on the authentication information by using the key to obtain encrypted authentication information, and then transmits the encrypted authentication information to the second node.
Further preferably, the first node determines not to perform the encryption processing on the authentication information, and the first node transmits the authentication information to the second node.
Further preferably, when the first node transmits the encrypted authentication information to the second node, the verification node transmits a key certificate to the second node, where the key certificate is used for proving the authenticity of the encrypted authentication information.
The information authentication system comprises a first node, a second node, a third node and a verification node, wherein the first node comprises a first read-write module and a first information construction module, the second node comprises a second read-write module, a second information construction module, a second judgment module and a second authentication signature module, the third node comprises a third authentication signature module and a third verification module, the verification node comprises a verification read-write module, a verification signature module and a storage module, the first read-write module is used for transmitting the first node information to the verification read-write module, the first read-write module is used for receiving the first node authentication information, the first read-write module is used for receiving the verification template, and the first read-write module is used for transmitting the authentication information to the second read-write module, the first information construction module is configured to construct the authentication information according to the first node authentication information, the second read-write module is configured to transmit the audit template to the first read-write module, the second read-write module is configured to receive the authentication information, the second information construction module is configured to construct the audit information and the audit template according to the second node information, the second judgment module is configured to perform scoring judgment on the authentication information according to the audit information, the second authentication signature module is configured to perform the signature on the first node, the third authentication signature module is configured to perform the signature on the second node, the third verification module is configured to perform the first verification on the third signature, the third verification module is configured to perform the second verification on the second signature, and the verification read-write module is configured to receive the first node information, the verification read-write module is used for transmitting the first node authentication information to the first read-write module, the verification module is used for performing electronic authentication on the first node information, the verification signature module is used for performing the authentication signature on the first node information passing the electronic authentication, and the storage module is used for storing the first node information passing the electronic authentication.
The information authentication system has the advantages that: after the first node is successfully verified by the second node and the second node is successfully verified by the third node, the third signature and the second signature are sequentially verified by the third verification module, after the second verification passes, the first node is successfully verified by the third node, and an information authentication process between the first node and the second node is not required to be repeated between the first node and the third node, so that the information authentication process between the first node and the third node is simplified, and the efficiency of information authentication is improved.
Drawings
FIG. 1 is a flow chart of a computer information authentication method of the present invention;
fig. 2 is a block diagram of the information authentication system according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings of the present invention, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. Unless defined otherwise, technical or scientific terms used herein shall have the ordinary meaning as understood by one of ordinary skill in the art to which this invention belongs. As used herein, the word "comprising" and similar words are intended to mean that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items.
To solve the problems in the prior art, an embodiment of the present invention provides a computer information authentication method, and with reference to fig. 1, the method includes the following steps:
s1: the first node transmits first node information to a verification node according to a first identity certificate, and after the verification node electronically authenticates the first node information, the verification node authenticates, signs and stores the first node information passing the electronic authentication;
s2: the second node constructs audit information and an audit template according to the second node information, and then transmits the audit template to the first node;
s3: the first node extracts first node authentication information from the verification node according to the audit template, constructs authentication information according to the first node authentication information, and transmits the authentication information to the second node;
s4: the second node scores and judges the authentication information according to the audit information so as to judge whether a second public key is used for signing the first node;
s5: after the second node uses the second public key to sign the first node, and the first node has a second signature after the signature is successful, namely the first node is successfully verified by the second node;
s6: after the second node is successfully verified by a third node, the second node has a third signature;
s7: and the third node performs first verification on the third signature, performs second verification on the second signature after the first verification passes, and the first node is successfully verified by the third node after the second verification passes.
In some embodiments of the present invention, if the verification node determines that the first node information does not pass the electronic authentication, the verification node does not perform an authentication signature on the first node information, and deletes the first node information.
In some embodiments of the present invention, the second node information includes requirement information and a requirement tag of the requirement information, the audit information includes audit comparison information and qualified line information, the audit comparison information includes comparison information between the requirement tag and the requirement information, the second node constructs the audit comparison information and the qualified line information according to the requirement information and the requirement tag of the requirement information, and constructs the audit template according to the requirement tag.
In some embodiments of the present invention, the first node information includes verification information and a verification tag of the verification information, in step S3, the first node extracts the verification information corresponding to the verification tag and the verification tag which are the same as the requirement tag from the verification node, constructs the authentication information according to the verification information and the verification tag, and then transmits the authentication information to the second node.
In some embodiments of the present invention, the authentication information includes the verification information and a verification tag of the verification information, the scoring determination includes that, when the verification tag is the same as the requirement tag, the second node compares the verification information with the comparison information to obtain a comparison result, and scores the comparison result to obtain a scoring result, after the verification information is compared with all the comparison information, the scoring result is summed to obtain a scoring result, and then the scoring result is compared with the qualified line information to determine whether the second node uses the second public key to perform the first signature on the first node.
In some embodiments of the present invention, when the second node determines that the scoring result is greater than or equal to the qualified line information, the second public key is used to perform the first signature on the first node, and the first node is successfully verified by the second node.
In some embodiments of the present invention, if the second node determines that the scoring result is smaller than the qualified line information, the first node is not signed, and the first node fails to be verified by the second node.
In some embodiments of the present invention, before the first node transmits the authentication information to the second node, the first node determines whether to encrypt the authentication information.
In some embodiments of the present invention, the first node determines to perform the encryption processing on the authentication information, the verification node transmits a key to the first node, and the first node performs the encryption processing on the authentication information by using the key to obtain encrypted authentication information, and then transmits the encrypted authentication information to the second node.
In some embodiments of the present invention, the first node determines not to perform the encryption processing on the authentication information, and the first node transmits the authentication information to the second node.
In some embodiments of the present invention, when the first node transmits the encrypted authentication information to the second node, the verification node transmits a key attestation to the second node, the key attestation proving authenticity of the encrypted authentication information.
Fig. 2 is the information authentication system in some embodiments of the invention. Referring to fig. 2, the information authentication system includes a first node 1, a second node 2, a third node 3 and a verification node 4, where the first node 1 includes a first read-write module 11 and a first information building module 12, the second node 2 includes a second read-write module 21, a second information building module 22, a second determining module 23 and a second authentication signature module 24, the third node 3 includes a third authentication signature module 31 and a third verification module 32, the verification node 4 includes a verification read-write module 41, a verification module 42, a verification signature module 43 and a storage module 44, the first read-write module 11 is configured to transmit the first node information to the verification read-write module 41, the first read-write module 11 is configured to receive the first node authentication information, the first read-write module 11 is configured to receive the audit template, and the first read-write module 11 is configured to transmit the authentication information to the second read-write module 21, the first information constructing module 12 is configured to construct the authentication information according to the first node authentication information, the second read/write module 21 is configured to transmit the audit template to the first read/write module 11, the second read/write module 21 is configured to receive the authentication information, the second information constructing module 22 is configured to construct the audit information and the audit template according to the second node information, the second determining module 23 is configured to perform a scoring determination on the authentication information according to the audit information, the second authentication signature module 24 is configured to perform the signature on the first node, the third authentication signature module 31 is configured to perform the signature on the second node, the third verifying module 32 is configured to perform the first verification on the third signature, and the third verifying module 32 is configured to perform the second verification on the second signature, the verification read-write module 41 is configured to receive the first node information, the verification read-write module 41 is configured to transmit the first node authentication information to the first read-write module 11, the verification module 42 is configured to perform the electronic authentication on the first node information, the verification signature module 43 is configured to perform the authentication signature on the first node information that passes the electronic authentication, and the storage module 44 is configured to store the first node information that passes the electronic authentication.
In some embodiments of the invention, the first identity credential is a name and the verification node is a trust anchor.
In some embodiments of the present invention, the first node is a first computer, the second node is a second computer, a user of the second computer is a company, a user of the first computer is an interviewer, and the information authentication method includes: the first node stores the verification information and a verification tag of the verification information into a trust anchor by name, wherein the verification tag comprises age, gender, assets, building project appraisal, occupation certificate, working age and personal quality, and the verification information comprises the age of 23 years, the gender of men, the assets of $ 200 ten thousand, the building project examination of good, the occupation certificate of nothing, the working age of 2 years and the personal quality of good; the second node constructs audit comparison information and qualified line information according to the demand information and a demand label of the demand information, and constructs audit information and an audit template according to the demand label, wherein the audit template is provided with the demand label, the demand label is provided with age, gender, assets, building project evaluation and personal quality, the audit information is provided with the audit comparison information and the qualified line information, the audit comparison information is provided with the age of more than 18 years, the gender is male, the assets are more than 100 ten thousand dollars, the building project evaluation quarter is good and above, the personal quality is good, and the qualified line information is 4 points; the first node matches the verification label with the demand label, extracts the verification information with the same verification label and the same demand label, and the verification information has the age of 23 years, the gender of men, the asset of $ 200 ten thousand, the construction project evaluation of good and the qualification of good, and the authentication information is constructed by the age of 23 years, the gender of men, the asset of $ 200 ten thousand, the construction project evaluation of good and the qualification of good; the first node does not encrypt the authentication information and transmits the authentication information to the second node; the second node performs the scoring judgment on the authentication information, judges that the age is 23 years old and is larger than 18 years old, scores 1 point, the gender is male, scores 1 point, assets are 200 ten thousand dollars, the 200 ten thousand dollars are larger than 100 ten thousand dollars, scores 1 point, the building project examination score is good, scores 1 point, the personal quality is good, scores 1 point, and a scoring result is 5 points, the scoring result is larger than the qualified line information by 4 points, the second node performs the signature on the first node through the second public key, the first node has a second signature, and the first node is successfully verified by the second node.
In some embodiments of the present invention, the trust anchor obtains the age and gender from a chinese financial authentication center according to the name, completes the electronic authentication of the age and gender by comparing with the first node information, obtains an asset certification from a bank according to the name, completes the electronic authentication of the asset by comparing with the first node information, obtains a construction project appraisal from company a according to the name, completes the electronic authentication of the construction project appraisal by comparing with the first node information, obtains an appraisal certification of a colleague from company a according to the name, and completes the electronic authentication of the personal belonging by comparing with the first node information.
In some embodiments of the present invention, when the first node and the third node perform information authentication, the third node sends first node detection information to an associated node of the third node, if the associated node is associated with the first node, the associated node passes reply information back to the third node, the third node receives the reply information, determines that there is an associated node between the first node and the third node, if the associated node is the second node, the third node extracts a third signature of the second node to perform the first verification, the third node compares the third signature with a private key of the third node, and determines that the third signature matches the private key, the second node has been successfully verified by the third node, and the third node compares the second signature with a public key of the second node, and if the second signature is the same as the public key, the first node is successfully verified by the second node, the third node trusts the first node, and the first node is successfully verified by the third node.
In some embodiments of the present invention, the service user performs the encryption processing on the trust endorsement, the authentication information is encrypted according to the audit comparison information, after the encryption processing, the authentication information is converted into a format conforming to the audit comparison information to obtain encrypted authentication information, and the encrypted authentication information has an age of more than 18 years old, a sex of male, an asset of more than 100 ten thousand dollars, a good quarter of building project appraisal, and a good personal quality.
Although the embodiments of the present invention have been described in detail hereinabove, it is apparent to those skilled in the art that various modifications and variations can be made to these embodiments. However, it is to be understood that such modifications and variations are within the scope and spirit of the present invention as set forth in the following claims. Moreover, the invention as described herein is capable of other embodiments and of being practiced or of being carried out in various ways.

Claims (12)

1. A computer information authentication method is characterized by comprising the following steps:
s1: the first node transmits first node information to a verification node according to a first identity certificate, and after the verification node electronically authenticates the first node information, the verification node authenticates, signs and stores the first node information passing the electronic authentication;
s2: the second node constructs audit information and an audit template according to the second node information, and then transmits the audit template to the first node;
s3: the first node extracts first node authentication information from the verification node according to the audit template, constructs authentication information according to the first node authentication information, and transmits the authentication information to the second node;
s4: the second node scores and judges the authentication information according to the audit information so as to judge whether a second public key is used for signing the first node;
s5: after the second node uses the second public key to sign the first node, and the first node has a second signature after the signature is successful, namely the first node is successfully verified by the second node;
s6: after the second node is successfully verified by a third node, the second node has a third signature;
s7: and the third node performs first verification on the third signature, performs second verification on the second signature after the first verification passes, and the first node is successfully verified by the third node after the second verification passes.
2. The computer information authentication method according to claim 1, wherein if the verification node determines that the first node information does not pass the electronic authentication, the verification node does not perform an authentication signature on the first node information and deletes the first node information.
3. The computer information authentication method according to claim 1, wherein the second node information includes requirement information and a requirement tag of the requirement information, the audit information includes audit comparison information and qualified line information, the audit comparison information includes comparison information of the requirement tag and the requirement information, the second node constructs the audit comparison information and the qualified line information through the requirement information and the requirement tag of the requirement information, and constructs the audit template according to the requirement tag.
4. The computer information authentication method according to claim 3, wherein the first node information includes verification information and a verification tag of the verification information, and in step S3, the first node extracts the verification information corresponding to the verification tag and the verification tag which are the same as the requirement tag from the verification node, constructs the authentication information from the verification information and the verification tag, and transfers the authentication information to the second node.
5. The computer information authentication method according to claim 4, wherein the scoring determination includes, in a case where the verification tag and the requirement tag are the same, comparing, by the second node, the verification information with the comparison information to obtain a comparison result, scoring the comparison result to obtain a scoring result, after the verification information is compared with all the comparison information, summing up the scoring result to obtain a scoring result, and comparing the scoring result with the qualified line information to determine whether the second node uses the second public key to perform the first signature on the first node.
6. The computer information authentication method according to claim 5, wherein the second node determines that the scoring result is greater than or equal to the qualified line information, and performs the first signature on the first node using the second public key, so that the first node is successfully verified by the second node.
7. The computer information authentication method of claim 5, wherein if the second node determines that the scoring result is less than the qualified line information, the first node is not signed, and the first node fails to be verified by the second node.
8. The computer information authentication method of claim 1, wherein before the first node transmits the authentication information to the second node, the first node determines whether to encrypt the authentication information.
9. The computer information authentication method of claim 8, wherein the first node determines to perform the encryption processing on the authentication information, the verification node transmits a key to the first node, the first node performs the encryption processing on the authentication information using the key to obtain encrypted authentication information, and then transmits the encrypted authentication information to the second node.
10. The computer information authentication method according to claim 8, wherein the first node determines not to perform the encryption processing on the authentication information, and the first node transfers the authentication information to the second node.
11. The computer information authentication method of claim 9, wherein when the first node transfers the encrypted authentication information to the second node, the verification node transfers a key attestation to the second node, the key attestation proving the authenticity of the encrypted authentication information.
12. An information authentication system, wherein the information authentication system is configured to implement the computer information authentication method according to any one of claims 1 to 11, the information authentication system includes a first node, a second node, a third node, and a verification node, the first node includes a first read/write module and a first information construction module, the second node includes a second read/write module, a second information construction module, a second judgment module, and a second authentication signature module, the third node includes a third authentication signature module and a third verification module, the verification node includes a verification read/write module, a verification signature module, and a storage module, the first read/write module is configured to transmit the first node information to the verification read/write module, and the first read/write module is configured to receive the first node authentication information, the first read-write module is configured to receive the audit template, the first read-write module is configured to transmit the authentication information to the second read-write module, the first information construction module is configured to construct the authentication information according to the first node authentication information, the second read-write module is configured to transmit the audit template to the first read-write module, the second read-write module is configured to receive the authentication information, the second information construction module is configured to construct the audit information and the audit template according to the second node information, the second judgment module is configured to perform scoring judgment on the authentication information according to the audit information, the second authentication signature module is configured to perform the signature on the first node, the third authentication signature module is configured to perform the signature on the second node, and the third verification module is configured to perform the first verification on the third signature, the third verification module is configured to perform the second verification on the second signature, the verification read-write module is configured to receive the first node information, the verification read-write module is configured to transmit the first node authentication information to the first read-write module, the verification module is configured to perform the electronic authentication on the first node information, the verification signature module is configured to perform the authentication signature on the first node information that passes the electronic authentication, and the storage module is configured to store the first node information that passes the electronic authentication.
CN201910098736.XA 2018-12-28 2019-01-31 Computer information authentication method and information authentication system Active CN109831307B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811618887 2018-12-28
CN2018116188875 2018-12-28

Publications (2)

Publication Number Publication Date
CN109831307A CN109831307A (en) 2019-05-31
CN109831307B true CN109831307B (en) 2021-07-20

Family

ID=66863188

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910098736.XA Active CN109831307B (en) 2018-12-28 2019-01-31 Computer information authentication method and information authentication system

Country Status (1)

Country Link
CN (1) CN109831307B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222335A (en) * 2008-02-02 2008-07-16 国电信息中心 Cascade connection authentication method and device between application systems
CN106101092A (en) * 2016-06-07 2016-11-09 腾讯科技(深圳)有限公司 A kind of information evaluation processing method and first instance
CN107231363A (en) * 2017-06-12 2017-10-03 华南理工大学 A kind of distributed authentication method and authentication model
CN107249004A (en) * 2017-07-24 2017-10-13 广州市玄武无线科技股份有限公司 A kind of identity identifying method, device and client
CN108009825A (en) * 2017-11-29 2018-05-08 江苏安凰领御科技有限公司 A kind of identity management system and method based on block chain technology
EP3337126A1 (en) * 2016-12-13 2018-06-20 Nxp B.V. Legitimacy verification of a node in a distributed network
CN108737374A (en) * 2018-04-12 2018-11-02 三维通信股份有限公司 The method for secret protection that data store in a kind of block chain
CN108989468A (en) * 2018-08-31 2018-12-11 北京八分量信息科技有限公司 A kind of trust network construction method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9680818B2 (en) * 2014-10-15 2017-06-13 Barracuda Network, Inc. Method and apparatus for bulk authentication and load balancing of networked appliances
US20170288866A1 (en) * 2016-03-30 2017-10-05 AVAST Software s.r.o. Systems and methods of creating a distributed ring of trust

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222335A (en) * 2008-02-02 2008-07-16 国电信息中心 Cascade connection authentication method and device between application systems
CN106101092A (en) * 2016-06-07 2016-11-09 腾讯科技(深圳)有限公司 A kind of information evaluation processing method and first instance
EP3337126A1 (en) * 2016-12-13 2018-06-20 Nxp B.V. Legitimacy verification of a node in a distributed network
CN107231363A (en) * 2017-06-12 2017-10-03 华南理工大学 A kind of distributed authentication method and authentication model
CN107249004A (en) * 2017-07-24 2017-10-13 广州市玄武无线科技股份有限公司 A kind of identity identifying method, device and client
CN108009825A (en) * 2017-11-29 2018-05-08 江苏安凰领御科技有限公司 A kind of identity management system and method based on block chain technology
CN108737374A (en) * 2018-04-12 2018-11-02 三维通信股份有限公司 The method for secret protection that data store in a kind of block chain
CN108989468A (en) * 2018-08-31 2018-12-11 北京八分量信息科技有限公司 A kind of trust network construction method and device

Also Published As

Publication number Publication date
CN109831307A (en) 2019-05-31

Similar Documents

Publication Publication Date Title
US12021992B2 (en) System and method for authenticating user identity
US11671267B2 (en) System and method for verifying an identity of a user using a cryptographic challenge based on a cryptographic operation
US11018869B2 (en) Blockchain-based digital identity management (DIM) system
US20210051027A1 (en) User identity information authentication and verification methods and devices
US20200013026A1 (en) Systems and methods for blockchain addresses and owner verification
CN113239382A (en) Credible identity model based on block chain intelligent contract
CN109547206B (en) Digital certificate processing method and related device
CN112926092A (en) Privacy-protecting identity information storage and identity authentication method and device
EP4178155A1 (en) Blockchain-based certification audit data sharing and integrity verification system, device, and method thereof
RU2019109206A (en) BIOMETRIC IDENTIFICATION AND VERIFICATION AMONG IOT DEVICES AND APPLICATIONS
CN111164632A (en) Information processing method and device based on block chain and block chain network
CN105871786B (en) A kind of verification method of user information, device and system
CN109102404B (en) Privacy protection method and system for block chain real-name communication
CN111460525B (en) Block chain-based data processing method, device and storage medium
CN111460457A (en) Real estate property registration supervision method, device, electronic equipment and storage medium
CN113347008B (en) Loan information storage method adopting addition homomorphic encryption
CN105978855A (en) System and method for protecting personal information security in real-name system
CN109447791A (en) A kind of funds transaction method and device based on block chain
Zhu et al. Secure Online Examination with Biometric Authentication and Blockchain‐Based Framework
Jain et al. AI and democracy's digital identity crisis
CN109831307B (en) Computer information authentication method and information authentication system
CN109658041A (en) Generating means and its generation method, the equipment and readable storage medium storing program for executing of file
CN115396225B (en) Data platform user identity authentication method and device
US11916906B2 (en) Identity management using remote authentication
CN115412256A (en) Identity authentication method and device based on block chain, storage medium and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant