CN109983466B - Account management system and method based on block chain and storage medium - Google Patents

Account management system and method based on block chain and storage medium Download PDF

Info

Publication number
CN109983466B
CN109983466B CN201880002422.9A CN201880002422A CN109983466B CN 109983466 B CN109983466 B CN 109983466B CN 201880002422 A CN201880002422 A CN 201880002422A CN 109983466 B CN109983466 B CN 109983466B
Authority
CN
China
Prior art keywords
mobile terminal
identity information
server
private key
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880002422.9A
Other languages
Chinese (zh)
Other versions
CN109983466A (en
Inventor
袁振南
林正显
陈国豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Quliantong Network Co ltd
Original Assignee
Quliantong Network Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Quliantong Network Co ltd filed Critical Quliantong Network Co ltd
Publication of CN109983466A publication Critical patent/CN109983466A/en
Application granted granted Critical
Publication of CN109983466B publication Critical patent/CN109983466B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The application discloses an account management system based on a block chain, a management method and a storage medium, wherein the account management method comprises the following steps: the method comprises the steps that when a mobile terminal receives an account generation instruction, a private key and a public key are generated; the mobile terminal stores the private key and sends the public key to the first server; the first server generates identity information based on the public key; the first server sends the identity information to the mobile terminal so that the mobile terminal stores the identity information, and broadcasts a pair formed by the public key and the identity information in the blockchain network so that nodes in the blockchain network store the pair in the blockchain network. Through the mode, on one hand, the public key is stored in the block chain in the form of the key pair, so that the safety degree of the account information is enhanced, and on the other hand, the problem that the authentication cannot be performed due to the failure of the authentication center when the authentication center is needed to perform the account authentication in the prior art is solved.

Description

Account management system and method based on block chain and storage medium
Technical Field
The present application relates to the field of identity authentication technologies, and in particular, to an account management system and a management method based on a block chain, and a storage medium.
Background
Identity authentication is a process of determining whether a user is a legitimate user. The most common simple identity authentication method is that the system checks the user name and password input by the user to see whether the user name and password are consistent with the user name and password stored in the server, so as to judge whether the user identity is correct. More complex authentication methods employ more complex encryption algorithms and protocols, requiring users to present more information (e.g., private keys) to prove their identity, such as the Kerberos authentication system.
However, since these authentications are based on dedicated authentication servers, which are restricted by the authentication center, the authentication can be performed only on servers disposed in association with the authentication center, and the authentication cannot be performed if the service center fails.
With the continuous development and maturity of the block chain technology, various block chain applications are widely applied and implemented in industries such as data currency, payment clearing, financial transaction, big data and the like. The block chain technology is called as a distributed account book technology, is an internet database technology, has the characteristics of decentralization, collective maintenance, high transparency, distrust, anonymity and the like, and realizes value end-to-end transfer, so that more and more people accept, believe and start to use the block chain technology to construct and transform a new financial and social service system.
Disclosure of Invention
The application aims to provide an account management system based on a block chain, a management method and a storage medium, which can improve the safety and convenience of accounts.
In order to achieve the above object, the present application provides an account management method based on a blockchain, where the account management method is applied to an account management system, the account management system includes a mobile terminal and a first server, the first server is a node in a blockchain network, and the account management method includes: the method comprises the steps that when a mobile terminal receives an account generation instruction, a private key and a public key are generated; the mobile terminal stores the private key and sends the public key to the first server; the first server generates identity information based on the public key; the first server sends the identity information to the mobile terminal so that the mobile terminal stores the identity information, and broadcasts a pairing formed by the public key and the identity information in the blockchain network so that nodes in the blockchain network store the pairing in the blockchain network.
On the other hand, the application also provides an account management method based on the block chain, the account management method is applied to a mobile terminal, the mobile terminal and a first server jointly form an account management system, the first server is a node in the block chain network, and the account management method comprises the following steps: generating a private key and a public key when an account generation instruction is received; storing the private key, sending the public key to the first server, so that the first server generates identity information based on the public key, sending the identity information to the mobile terminal, and broadcasting a pairing formed by the public key and the identity information in the blockchain network by the first server, so that nodes in the blockchain network store the pairing in the blockchain network; and receiving the identity information sent by the first server.
On the other hand, the application also provides an account management method based on the block chain, the account management method is applied to a first server, the first server and the mobile terminal jointly form an account management system, the first server is a node in the block chain network, and the account management method comprises the following steps: receiving a public key sent by a mobile terminal; wherein, the public key is generated by the mobile terminal; generating identity information based on the public key; and sending the identity information to the mobile terminal so that the mobile terminal stores the identity information, and broadcasting a pair formed by the public key and the identity information in the block chain network so that nodes in the block chain network store the pair in the block chain network.
On the other hand, the application also provides an account management system of the account management system, which comprises a mobile terminal and a first server, wherein the first server is a node in the block chain network; the mobile terminal is used for generating a private key and a public key when receiving an account generation instruction, storing the private key and sending the public key to the first server; the first server is used for generating identity information based on the public key and sending the identity information to the mobile terminal so that the mobile terminal stores the identity information, and the first server broadcasts a pairing formed by the public key and the identity information in the block chain network so that nodes in the block chain network store the pairing in the block chain network.
In another aspect, the present application further provides a mobile terminal, where the mobile terminal includes a first processor and a first memory, where the first memory stores a first computer program, and the first computer program, when executed by the first processor, is configured to implement the account management method as described above.
In another aspect, the present application further proposes a server, where the server includes a second processor and a second memory, and the second memory stores a second computer program, and the second computer program, when executed by the second processor, is used to implement the account management method as described above.
On the other hand, the present application also proposes a computer storage medium, in which a computer program is stored, and the computer program is used for realizing the account management method as described above when being executed by a processor.
Has the advantages that: different from the prior art, the account management method based on the block chain provided by the application comprises the following steps: the method comprises the steps that when a mobile terminal receives an account generation instruction, a private key and a public key are generated; the mobile terminal stores the private key and sends the public key to the first server; the first server generates identity information based on the public key; the first server sends the identity information to the mobile terminal so that the mobile terminal stores the identity information, and broadcasts a pair formed by the public key and the identity information in the blockchain network so that nodes in the blockchain network store the pair in the blockchain network. Through the mode, on one hand, the public key is stored in the block chain in the form of the key pair, so that the safety degree of account information is enhanced, and on the other hand, the problem that the account cannot be authenticated due to the failure of the authentication center when the authentication center is required to authenticate the account in the prior art is solved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts. Wherein:
FIG. 1 is a schematic block diagram of an embodiment of an account management system provided in the present application;
fig. 2 is a schematic flowchart of a first embodiment of an account management method based on a blockchain according to the present application;
FIG. 3 is an interaction diagram of FIG. 2;
FIG. 4 is a flowchart illustrating a second embodiment of a method for account management based on blockchains provided in the present application;
FIG. 5 is the interaction diagram of FIG. 4;
FIG. 6 is a flowchart illustrating a third embodiment of a method for account management based on blockchains according to the present application;
FIG. 7 is a block flow diagram of the account registration process of FIG. 6;
FIG. 8 is a block flow diagram of the account login process of FIG. 6;
FIG. 9 is a schematic flowchart of a fourth embodiment of a method for account management based on a blockchain according to the present application;
FIG. 10 is a block diagram of an embodiment of a mobile terminal provided herein;
FIG. 11 is a flowchart illustrating a fifth embodiment of a method for account management based on blockchains provided in the present application;
FIG. 12 is a schematic block diagram of an embodiment of a server provided by the present application;
FIG. 13 is a schematic structural diagram of an embodiment of a computer storage medium provided in the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any inventive step based on the embodiments in the present application, are within the scope of protection of the present application.
It should be noted that if directional indications (such as up, down, left, right, front, back, 8230; \8230;) are referred to in the embodiments of the present application, the directional indications are only used to explain the relative positional relationship between the components, the motion situation, etc. in a specific posture (as shown in the attached drawings), and if the specific posture is changed, the directional indications are correspondingly changed.
In addition, if there is a description relating to "first", "second", etc. in the embodiments of the present application, the description of "first", "second", etc. is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a schematic structural diagram of an embodiment of an account management system provided in the present application, where the account management system includes a mobile terminal 11 and a first server 12, where the first server 12 is a node in a blockchain network, and it can be understood that the blockchain network includes a plurality of nodes, as shown in fig. 1, the first server 12, a terminal 13, a terminal 14, a terminal 15 \8230, and \8230jointlyform the blockchain network.
The blockchain network is a multi-node network system formed by using blockchain technology. In this embodiment, the blockchain network includes a plurality of nodes (also referred to as blockchain nodes) that run blockchain techniques to participate in the same blockchain. The block chain technology is a new distributed data organization method and operation method emerging along with digital encryption currency such as bitcoin. The method is characterized in that: decentralization enables the data to realize distributed collective maintenance, and greatly improves the efficiency of data operation, management and maintenance; and (3) consensus, wherein the nodes are based on a set of consensus mechanism, the whole block chain is maintained together through competition calculation, any node fails, and other nodes can still work normally. Meanwhile, the block chain carrying the asymmetric encryption technology has high safety and traceability, and can effectively prevent data leakage or illegal tampering. The application provides that management of accounts, including generation, registration and login of the accounts, is realized by using a block chain technology.
For the sake of understanding the blockchain network of the present application, the blockchain technology adopted in the present application is first illustrated. In one embodiment, the first server 12 runs the blockchain technique to become a node of the blockchain network, the blockchain technique including a technology layer, a service layer, and a user layer.
The technical layer uses an Etheng public chain platform to package the identity information in a block mode to form a block chain. It is understood that the technology layer is not limited to running the etherhouse public chain, and in other application examples, other public chains that can implement blockchain technology, such as bitcoin public chain, can be run. The service layer is based on the technical layer and realizes the generation, registration, login and the like of the account. The user layer is mainly expressed in the form of a user interface of the mobile terminal running the blockchain technology, so that information interaction between a user and other nodes in the blockchain network is realized.
The embodiment is based on an ether house technology platform, so that the number of bytes of processing records of a block chain network is less, a hash algorithm is faster, and a more efficient PoW + PoS consensus mechanism is added, so that the generation time of a new block is reduced to 16.6s. The mode of combining the account, the full node and the cloud storage ensures that the data protection is safer, and the privacy safety of the user is fully ensured.
Based on the above account management system, specifically referring to fig. 2 and fig. 3, fig. 2 is a schematic flowchart of a first embodiment of an account management method based on a blockchain provided in the present application, and fig. 3 is an interaction schematic diagram of fig. 2, where the account management method includes:
step 21: and when receiving the account generation instruction, the mobile terminal generates a private key and a public key.
Wherein the account generation instruction can be issued by the user. Specifically, a client is installed in the mobile terminal, and a user can issue an account generation instruction by operating an operation interface of the client. It will be appreciated that the same user is typically only able to generate a first account, which has a unique correspondence with the user.
The Public Key (Public Key) and the Private Key (Private Key) are a Key pair (i.e., a Public Key and a Private Key) obtained through an algorithm, the Public Key is a Public part of the Key pair, and the Private Key is a Private part. The public key is typically used to encrypt session keys, verify digital signatures, or encrypt data that can be decrypted with a corresponding private key. The key pair derived by such an algorithm can be guaranteed to be unique worldwide. When using this key pair, if one of the keys is used to encrypt a piece of data, the other key must be used to decrypt it. For example, encrypting data with a public key would necessitate decryption with the private key, and if encrypted with the private key, would also necessitate decryption with the public key, otherwise the decryption would not succeed.
Optionally, in an embodiment, the mobile terminal generates the private key and the public key by using an elliptic curve encryption algorithm, for example, curve25519 elliptic curve algorithm.
In Elliptic Curve Cryptography (ECC) some special form of elliptic curve is used, i.e. an elliptic curve defined over a finite field. The equation is as follows:
y 2 =x 3 +ax+b(mod p);
where p is a prime number, a and b are two non-negative integers less than p which satisfy: 4a3+27b 2 (mod p) ≠ 0, where x, y, a, b ∈ Fp, the point (x, y) satisfying the formula (2) and an infinite point O constitute an elliptic curve E.
The elliptic curve discrete logarithm problem ECD LP is defined as follows: given a prime number P and an elliptic curve E, for Q = kP, a positive integer k smaller than P is found with P, Q known. It can be proved that k and P are known to be easier to calculate Q, and k is known to be more difficult to calculate by Q and P, so that no effective method is available to solve the problem, which is the principle of the elliptic curve encryption algorithm.
Step 22: the mobile terminal stores the private key and sends the public key to the first server.
In an embodiment, the mobile terminal may send the public key to the base station in a data network manner, and send the public key to the first server through the base station; in another embodiment, the mobile terminal may send the information to the router through the WIFI network, send the information to the base station through the router, and send the information to the first server through the base station.
Step 23: the first server generates identity information based on the public key.
Wherein, the identity information may be OpenID. OpenID is a user-centric digital identification framework that is open and decentralized. The creation of OpenID is based on the concept of: we can authenticate the unique identity of a website by URI (also called URL or website address), and similarly, we can also authenticate the identity of the user by this way.
In a specific embodiment, the first server performs a hash operation (hash) on the public key to generate the identity information. The hash operation is generally called "hash" and is a process of converting an input of arbitrary length (also called pre-mapped pre-image) into an output of fixed length by a hash algorithm, and the output is a hash value. This transformation is a kind of compression mapping, i.e. the space of hash values is usually much smaller than the space of inputs, different inputs may hash to the same output, so it is not possible to determine a unique input value from a hash value. In short, it is a function that compresses a message of arbitrary length to a message digest of some fixed length.
And step 24: the first server sends the identity information to the mobile terminal so that the mobile terminal stores the identity information, and broadcasts a pairing formed by the public key and the identity information in the blockchain network so that nodes in the blockchain network store the pairing in the blockchain network.
The generation of the identity information is completed in step 23 and the identity information is sent to the mobile terminal and the pairing of the identity information and the public key is sent to the blockchain network in step 24, respectively. In the process of steps 21-24, the registration of the account is completed. The logging on of an account is explained below by another embodiment.
Referring to fig. 4 and 5, fig. 4 is a schematic flowchart of a second embodiment of an account management method based on a blockchain provided in the present application, and fig. 5 is an interaction schematic diagram of fig. 4, where the account management method includes:
step 41: the mobile terminal signs the identity information by using the private key to obtain a signature file.
It will be appreciated that in the above embodiments, the generated key pair (private and public) is uniquely corresponding. Therefore, the private key can sign any information to form a signature file; and the signature file can be de-signed only through the corresponding public key to obtain the information in the signature file.
Step 42: the mobile terminal sends the signature file and the identity information to the first server.
Step 43: the first server verifies the signature file and the identity information to obtain a verification result, and sends the verification result to the mobile terminal.
In this step, the first server specifically verifies whether the identity information is consistent with the information in the signature file, and if so, the first server considers that the identity information is verified to be passed.
In a specific embodiment, step 43 may specifically include:
the first server searches a public key matched with the identity information from the block chain network based on the identity information; the first server uses the public key to sign off the signature file so as to obtain sign off information; and when the identity information is consistent with the de-signing information, the first server obtains a result of successful verification.
It can be understood that, in the first embodiment, a correspondence between the identity information and the public key is stored in the blockchain network, so that the first server may obtain, from the blockchain network, the public key matched with the identity information based on the identity information sent by the mobile terminal, then perform the signature de-signing with the public key, and if the identity information obtained through the signature de-signing is consistent with the identity information sent by the mobile terminal, the verification is successful, and the account can log in.
The two embodiments described above are illustrated below by way of a specific example:
in the account registration process, the mobile terminal generates a key pair (including a public key and a private key) according to an elliptic curve encryption algorithm, then stores the private key, sends the public key to the first server, the first server performs hash operation on the public key to obtain OpenID (namely identity information), and then broadcasts the public key-OpenID to the blockchain network to complete registration.
In the account login process, the mobile terminal signs the OpenID by using a private key, the OpenID and a signature file are sent to a first server, the first server searches a public key corresponding to the OpenID in a block chain network by using the OpenID, then the public key is used for de-signing the signature file to obtain another OpenID, and if the two OpenIDs are consistent, a user can log in after verification is passed.
Referring to fig. 6, fig. 6 is a schematic flowchart of a third embodiment of an account management method based on a blockchain according to the present application, where the account management method includes:
step 61: and when receiving the account generation instruction, the mobile terminal generates a private key and a public key.
Step 62: the mobile terminal obtains a password input by a user, codes the private key by adopting the password, stores the coded private key and sends the public key to the first server.
And step 63: the first server generates identity information based on the public key.
Step 64: the first server sends the identity information to the mobile terminal so that the mobile terminal stores the identity information, and broadcasts a pairing formed by the public key and the identity information in the blockchain network so that nodes in the blockchain network store the pairing in the blockchain network.
As shown in fig. 7, fig. 7 is a block flow diagram of the account registration process of fig. 6. In the registration process, the mobile terminal generates a public key and a private key by adopting an elliptic curve encryption algorithm, wherein the private key is encoded according to an acquired password input by a user to obtain the encoded private key and is stored, in addition, the public key is sent to a first server, the first server carries out a Hash algorithm on the public key to obtain OpenID, and the pairing formed by the public key and the OpenID is broadcasted in a block chain network.
Step 65: the mobile terminal obtains a password input by a user, and the mobile terminal decodes the encoded private key by adopting the password to obtain a decoded private key.
And step 66: the mobile terminal signs the identity information by using the private key to obtain a signature file.
Step 67: the mobile terminal sends the signature file and the identity information to the first server.
Step 68: the first server searches a public key matched with the identity information from the block chain network based on the identity information; the first server uses the public key to perform label-removing on the signature file so as to obtain label-removing information.
Step 69: and when the identity information is consistent with the de-signing information, the first server obtains a result of successful verification.
Step 610: and after the first server successfully verifies, sending an instruction for acquiring the user information to the second server so that the second server sends the user information corresponding to the identity information to the mobile terminal.
As shown in fig. 8, fig. 8 is a block flow diagram of the account login process of fig. 6. In the login process, the mobile terminal encodes the encoded private key according to the acquired password input by the user to obtain the private key, signs the OpenID by using the private key to obtain a signature file, and sends the signature file and the OpenID to the first server. The first server searches a public key matched with the OpenID in the block chain network based on the OpenID sent by the mobile terminal, then uses the public key to perform de-signing on the signature file to obtain a de-signed OpenID, then compares the de-signed OpenID with the OpenID sent by the mobile terminal to judge whether the de-signed OpenID is consistent with the OpenID sent by the mobile terminal, and if so, the login is successful.
In addition, after the verification is successful, the first server also sends an instruction for acquiring the user information to the second server, so that the second server sends the user information corresponding to the identity information to the mobile terminal. The user information includes information such as name, gender, age, etc. of the user.
The account management method based on the block chain provided by the embodiment comprises the following steps: the method comprises the steps that when a mobile terminal receives an account generation instruction, a private key and a public key are generated; the mobile terminal stores the private key and sends the public key to the first server; the first server generates identity information based on the public key; the first server sends the identity information to the mobile terminal so that the mobile terminal stores the identity information, and broadcasts a pair formed by the public key and the identity information in the blockchain network so that nodes in the blockchain network store the pair in the blockchain network. Through the mode, on one hand, the public key is stored in the block chain in the form of the key pair, so that the safety degree of the account information is enhanced, and on the other hand, the problem that the authentication cannot be performed due to the failure of the authentication center when the authentication center is needed to perform the account authentication in the prior art is solved.
Referring to fig. 9, fig. 9 is a flowchart illustrating a fourth embodiment of an account management method based on a blockchain according to the present application, where the account management method is applied to a mobile terminal, where the mobile terminal may be a mobile phone, a tablet computer, an intelligent wearable device, and the like, where a corresponding client is installed in the mobile terminal, and the client may be a client of any application program, which is not listed here, and the account management method includes:
step 91: upon receiving the account generation instruction, a private key and a public key are generated.
And step 92: the private key is stored, the public key is sent to the first server, so that the first server generates identity information based on the public key, the identity information is sent to the mobile terminal, and the first server broadcasts a pair formed by the public key and the identity information in the block chain network, so that nodes in the block chain network store the pair in the block chain network.
Step 93: and receiving the identity information sent by the first server.
The method steps of this embodiment are the method steps executed by the mobile terminal in the above embodiment, and the principle is similar, which is not described herein again.
Optionally, in a specific embodiment, the private key may be encrypted by using a password, and specifically, the step of storing the private key includes: and coding the private key and storing the coded private key.
Optionally, in another embodiment, the account management method further includes: decoding the encoded private key to obtain a decoded private key; signing the identity information by using a private key to obtain a signature file; sending the signature file and the identity information to a first server so that the first server verifies the signature file to obtain a verification result and sends the verification result to the mobile terminal; and receiving the verification result sent by the first server.
Among them, it may be specifically: acquiring a password input by a user; and coding the private key by adopting a password, and storing the coded private key. Acquiring a password input by a user; and decoding the encoded private key by adopting the password to obtain a decoded private key.
Referring to fig. 10, fig. 10 is a schematic structural diagram of an embodiment of a mobile terminal provided in the present application, where the mobile terminal 100 includes a first processor 101, a first memory 102 and a first communication module 103, where the first communication module 103 is used for data interaction with a first server, and the first memory 102 is used for storing a first computer program, and when the first computer program is executed by the processor 101, the first computer program is used to implement the following method steps:
generating a private key and a public key when an account generation instruction is received; storing the private key, sending the public key to the first server, so that the first server generates identity information based on the public key, sending the identity information to the mobile terminal, and broadcasting a pairing formed by the public key and the identity information in the blockchain network by the first server, so that nodes in the blockchain network store the pairing in the blockchain network; and receiving the identity information sent by the first server.
In addition, the mobile terminal 100 may further include a display screen for implementing human-computer interaction of the mobile terminal with a user.
It is to be understood that, in other embodiments, when the first computer program is executed by the first processor 101, the method for implementing may specifically refer to the fourth embodiment described above, and details are not described here.
Referring to fig. 11, fig. 11 is a schematic flowchart of a fifth embodiment of an account management method based on a blockchain according to the present application, where the account management method of the present embodiment is applied to a first server, and the account management method includes:
step 111: receiving a public key sent by a mobile terminal; wherein the public key is generated by the mobile terminal.
Step 112: identity information is generated based on the public key.
Step 113: and sending the identity information to the mobile terminal so that the mobile terminal stores the identity information, and broadcasting a pairing formed by the public key and the identity information in the blockchain network so that the node in the blockchain network stores the pairing in the blockchain network.
The method steps of this embodiment are the method steps executed by the first server in the above embodiment, and the principle is similar, which is not described herein again.
Optionally, in a specific embodiment, the account management method may further include: acquiring a signature file and identity information sent by a mobile terminal; the signature file is obtained by the mobile terminal by signing identity information by using a private key, and the private key is generated by the mobile terminal and forms a key pair with the public key; and verifying the signature file to obtain a verification result, and sending the verification result to the mobile terminal.
Optionally, in another embodiment, the method may specifically be: searching a public key matched with the identity information from the block chain network based on the identity information; the public key is used for carrying out signature removal on the signature file to obtain signature removal information; and when the identity information is consistent with the signature information, obtaining a result of successful verification.
Referring to fig. 12, fig. 12 is a schematic structural diagram of an embodiment of a server provided by the present application, where the server 120 includes a second processor 121, a second memory 122 and a second communication module 123, where the second communication module 123 is configured to perform data interaction with a mobile terminal and data interaction with each node in a blockchain network, and the second memory 122 is configured to store a second computer program, where the second computer program is configured to implement the following method steps when executed by the processor 121:
receiving a public key sent by a mobile terminal; wherein, the public key is generated by the mobile terminal; generating identity information based on the public key; and sending the identity information to the mobile terminal so that the mobile terminal stores the identity information, and broadcasting a pairing formed by the public key and the identity information in the blockchain network so that the node in the blockchain network stores the pairing in the blockchain network.
It is to be understood that, in other embodiments, when the second computer program is executed by the second processor 121, the method for implementing may specifically refer to the fifth embodiment described above, and details are not described here.
Referring to fig. 13, fig. 13 is a schematic structural diagram of an embodiment of a computer storage medium provided in the present application, and a computer program 131 is stored in the computer storage medium 130, it can be understood that the computer storage medium 130 may be a memory applied to a mobile terminal, and may also be a memory applied to a first server.
Therefore, if the computer storage medium 130 is applied to a mobile terminal, the computer program 131 therein is used for implementing the following method when being executed by a processor:
generating a private key and a public key when an account generation instruction is received; storing the private key, sending the public key to the first server to enable the first server to generate identity information based on the public key, sending the identity information to the mobile terminal, and enabling the first server to broadcast a pair formed by the public key and the identity information in the block chain network so that nodes in the block chain network store the pair in the block chain network; and receiving the identity information sent by the first server.
If the computer storage medium 130 is applied to a first server, the computer program 131 therein is used for implementing the following method when being executed by a processor:
receiving a public key sent by a mobile terminal; wherein, the public key is generated by the mobile terminal; generating identity information based on the public key; and sending the identity information to the mobile terminal so that the mobile terminal stores the identity information, and broadcasting a pairing formed by the public key and the identity information in the blockchain network so that the node in the blockchain network stores the pairing in the blockchain network.
Embodiments of the present application may be implemented in software functional units and may be stored in a computer readable storage medium when sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, and various media capable of storing program codes.
The above description is only an embodiment of the present application, and is not intended to limit the scope of the present application, and all equivalent structures or equivalent processes performed by the present application and the contents of the attached drawings, which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (16)

1. An account management method based on a blockchain is applied to an account management system, the account management system comprises a mobile terminal and a first server, the first server is a node in a blockchain network, and the account management method comprises the following steps:
the mobile terminal generates a private key and a public key when receiving an account generation instruction;
the mobile terminal stores the private key and sends the public key to the first server;
the first server generates identity information based on the public key;
the first server sends the identity information to the mobile terminal so that the mobile terminal stores the identity information, and broadcasts a pair formed by the public key and the identity information in the blockchain network so that nodes in the blockchain network store the pair in the blockchain network;
the step of storing the private key by the mobile terminal comprises the following steps:
the mobile terminal encodes the private key and stores the encoded private key;
the account management method further comprises the following steps:
the mobile terminal decodes the encoded private key to obtain a decoded private key;
the mobile terminal signs the identity information by using the private key to obtain a signature file;
the mobile terminal sends the signature file and the identity information to the first server;
the first server searches a public key matched with the identity information from the block chain network based on the identity information;
the first server uses the public key to sign off the signature file so as to obtain sign off information;
and when the identity information is consistent with the label-releasing information, the first server obtains a result of successful verification and sends the result of successful verification to the mobile terminal.
2. The account management method according to claim 1,
the mobile terminal encodes the private key and stores the encoded private key, and the steps comprise:
the mobile terminal acquires a password input by a user;
and the mobile terminal encodes the private key by adopting the password and stores the encoded private key.
3. The account management method according to claim 2,
the step that the mobile terminal decodes the encoded private key to obtain a decoded private key comprises the following steps:
the mobile terminal acquires a password input by a user;
and the mobile terminal decodes the coded private key by adopting the password to obtain a decoded private key.
4. The account management method according to claim 1,
the account management system further comprises a second server;
the account management method further comprises the following steps:
after the first server successfully verifies, sending an instruction for acquiring user information to the second server;
and the second server sends the user information corresponding to the identity information to the mobile terminal.
5. The account management method according to claim 1,
the step of generating a private key and a public key when the mobile terminal receives an account generation instruction comprises the following steps:
the mobile terminal acquires an account generation instruction;
the mobile terminal generates a private key and a public key by adopting an elliptic curve encryption algorithm.
6. The account management method according to claim 1,
the step of the first server generating identity information based on the public key comprises:
and the first server performs hash operation on the public key to generate identity information.
7. An account management method based on a blockchain is applied to a mobile terminal, the mobile terminal and a first server jointly form an account management system, the first server is a node in a blockchain network, and the account management method comprises the following steps:
generating a private key and a public key when an account generation instruction is received;
storing the private key, sending the public key to the first server, so that the first server generates identity information based on the public key, sending the identity information to the mobile terminal, and broadcasting a pairing formed by the public key and the identity information in the blockchain network by the first server, so that a node in the blockchain network stores the pairing in the blockchain network;
receiving identity information sent by the first server;
the step of saving the private key comprises:
the private key is coded, and the coded private key is stored;
the account management method further comprises the following steps:
decoding the encoded private key to obtain a decoded private key;
signing the identity information by using the private key to obtain a signature file;
sending the signature file and the identity information to the first server so that the first server searches a public key matched with the identity information from the block chain network based on the identity information; the public key is used for carrying out signature removal on the signature file so as to obtain signature removal information; when the identity information is consistent with the label-off information, obtaining a result of successful verification, and sending the result of successful verification to the mobile terminal;
and receiving a verification result sent by the first server, wherein the verification result comprises a result of successful verification obtained when the identity information is consistent with the de-signing information.
8. The account management method according to claim 7,
the step of encoding the private key and storing the encoded private key comprises the following steps:
acquiring a password input by a user;
and encoding the private key by adopting the password, and storing the encoded private key.
9. The account management method according to claim 8,
the step of decoding the encoded private key to obtain a decoded private key comprises:
acquiring a password input by a user;
and decoding the encoded private key by adopting the password to obtain a decoded private key.
10. The account management method is applied to a first server, the first server and a mobile terminal jointly form an account management system, the first server is a node in a blockchain network, and the account management method comprises the following steps:
receiving a public key sent by a mobile terminal; wherein the public key is generated by the mobile terminal;
generating identity information based on the public key;
sending the identity information to the mobile terminal so that the mobile terminal stores the identity information, and broadcasting a pair formed by the public key and the identity information in the blockchain network so that a node in the blockchain network stores the pair in the blockchain network;
the account management method further comprises the following steps:
receiving a signature file and the identity information of the mobile terminal, wherein the signature file is obtained by the mobile terminal by using a private key to sign the identity information;
searching a public key matched with the identity information from the block chain network based on the identity information;
the public key is used for carrying out signature removal on the signature file so as to obtain signature removal information;
and when the identity information is consistent with the label-releasing information, obtaining a result of successful verification, and sending the result of successful verification to the mobile terminal.
11. The account management method according to claim 10,
the account management method further comprises the following steps:
acquiring a signature file and the identity information sent by the mobile terminal; the signature file is obtained by the mobile terminal by signing the identity information by using a private key, and the private key is generated by the mobile terminal and forms a key pair with the public key;
and verifying the signature file to obtain a verification result, and sending the verification result to the mobile terminal.
12. The account management method according to claim 11,
the step of verifying the signature file to obtain a verification result includes:
searching a public key matched with the identity information from the block chain network based on the identity information;
the public key is used for carrying out signature removal on the signature file so as to obtain signature removal information;
and when the identity information is consistent with the label-releasing information, obtaining a result of successful verification.
13. An account management system is characterized by comprising a mobile terminal and a first server, wherein the first server is a node in a block chain network;
the mobile terminal is used for generating a private key and a public key when receiving an account generation instruction, storing the private key and sending the public key to the first server;
the first server is configured to generate identity information based on the public key and send the identity information to the mobile terminal, so that the mobile terminal stores the identity information, and the first server broadcasts a pair formed by the public key and the identity information in the blockchain network, so that a node in the blockchain network stores the pair in the blockchain network;
the mobile terminal is used for encoding the private key and storing the encoded private key;
the mobile terminal is used for decoding the encoded private key to obtain a decoded private key;
the mobile terminal is used for signing the identity information by using the private key to obtain a signature file;
the mobile terminal is used for sending the signature file and the identity information to the first server;
the first server is used for searching a public key matched with the identity information from the block chain network based on the identity information;
the first server is used for carrying out label release on the signature file by utilizing the public key to obtain label release information;
and the first server is used for obtaining a successful verification result when the identity information is consistent with the signing release information and sending the successful verification result to the mobile terminal.
14. A mobile terminal, characterized in that the mobile terminal comprises a first processor and a first memory, the first memory having stored therein a first computer program for implementing the account management method according to any of claims 7-9 when executed by the first processor.
15. A server, characterized in that the server comprises a second processor and a second memory, in which a second computer program is stored, which second computer program, when being executed by the second processor, is adapted to carry out the account management method of any of the claims 10-12.
16. A computer storage medium, in which a computer program is stored which, when executed by a processor, is adapted to carry out the account management method of any one of claims 1 to 13.
CN201880002422.9A 2018-09-27 2018-09-27 Account management system and method based on block chain and storage medium Active CN109983466B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/108016 WO2020061923A1 (en) 2018-09-27 2018-09-27 Blockchain-based account management system and management method, and storage medium

Publications (2)

Publication Number Publication Date
CN109983466A CN109983466A (en) 2019-07-05
CN109983466B true CN109983466B (en) 2023-03-03

Family

ID=67077726

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880002422.9A Active CN109983466B (en) 2018-09-27 2018-09-27 Account management system and method based on block chain and storage medium

Country Status (2)

Country Link
CN (1) CN109983466B (en)
WO (1) WO2020061923A1 (en)

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381075B (en) * 2019-07-26 2021-10-29 烨链(上海)科技有限公司 Block chain-based equipment identity authentication method and device
CN110351302B (en) * 2019-07-29 2021-08-31 杭州复杂美科技有限公司 Bank account login method, equipment and storage medium
CN110430201A (en) * 2019-08-09 2019-11-08 北京智汇信元科技有限公司 A kind of distribution identity documents generate, verification method and system
CN110740120B (en) * 2019-09-06 2023-04-07 西安万像电子科技有限公司 Account information processing method and device
CN110601827B (en) * 2019-09-12 2022-09-02 腾讯科技(深圳)有限公司 Block chain-based identity recognition method, device and system and storage medium
CN110958118B (en) * 2019-10-12 2021-09-28 深圳赛安特技术服务有限公司 Certificate authentication management method, device, equipment and computer readable storage medium
CN111163466B (en) * 2019-12-30 2022-12-16 全链通有限公司 Method for 5G user terminal to access block chain, user terminal equipment and medium
CN111132156B (en) * 2019-12-30 2023-04-14 全链通有限公司 Registration method of 5G user terminal, user terminal equipment and medium
CN111163467B (en) * 2019-12-30 2022-04-08 全链通有限公司 Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN111132305B (en) * 2019-12-30 2022-04-08 全链通有限公司 Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN111148213B (en) * 2019-12-30 2023-02-03 全链通有限公司 Registration method of 5G user terminal, user terminal equipment and medium
CN111241533A (en) * 2020-01-08 2020-06-05 深圳壹账通智能科技有限公司 Block chain-based password management method and device and computer-readable storage medium
CN111259411B (en) * 2020-01-09 2023-09-08 中信银行股份有限公司 Block chain management method, device, electronic equipment and readable storage medium
CN111541671A (en) * 2020-04-16 2020-08-14 北京海益同展信息科技有限公司 Personnel information storage and verification method, system and storage medium
CN111506930B (en) * 2020-04-21 2023-07-18 广州上云区块链科技有限公司 E-commerce transaction information management system and method based on blockchain
CN113572717B (en) * 2020-04-29 2024-02-20 青岛海尔洗涤电器有限公司 Communication connection establishment method, washing and protecting equipment and server
CN111641615A (en) * 2020-05-20 2020-09-08 深圳市今天国际物流技术股份有限公司 Distributed identity authentication method and system based on certificate
CN111723347B (en) * 2020-06-01 2023-06-06 清华大学 Identity authentication method, identity authentication device, electronic equipment and storage medium
CN111694531A (en) * 2020-06-09 2020-09-22 重庆锐云科技有限公司 Large-screen display control system and method based on Ether house block chain and storage medium
CN111858754A (en) * 2020-06-30 2020-10-30 全链通有限公司 Artificial intelligence training method based on block chain, block chain node and medium
CN111768181A (en) * 2020-07-01 2020-10-13 厦门力含信息技术服务有限公司 Data clearing system combining big data and credit block chain
CN111914270A (en) * 2020-07-08 2020-11-10 广西佳壹大数据科技股份有限公司 Programmable authentication service method and system based on block chain technology
CN111914230B (en) * 2020-07-17 2023-06-23 中国联合网络通信集团有限公司 Identity verification method, system, terminal equipment and storage medium based on block chain
CN111787530B (en) * 2020-08-06 2024-01-09 联通雄安产业互联网有限公司 Block chain digital identity management method based on SIM card
CN112235409B (en) * 2020-10-19 2023-10-10 平安证券股份有限公司 File uploading method and device, electronic equipment and computer readable storage medium
CN112507296B (en) * 2020-11-12 2024-04-05 迅鳐成都科技有限公司 User login verification method and system based on blockchain
CN112581285B (en) * 2020-12-28 2022-12-09 上海万向区块链股份公司 Block chain-based account generation method, system and medium in stock right transaction system
CN112667977A (en) * 2020-12-29 2021-04-16 齐鲁工业大学 Smart city-oriented block chain identity authentication and access control method and system
CN112988412B (en) * 2021-02-07 2023-06-27 中国联合网络通信集团有限公司 Edge caching method, base station and system based on block chain network
CN113569210A (en) * 2021-07-09 2021-10-29 远光软件股份有限公司 Distributed identity authentication method, equipment access method and device
CN113672994B (en) * 2021-09-03 2023-12-01 中国联合网络通信集团有限公司 Cooking equipment data management method, device and system based on blockchain
CN113839947B (en) * 2021-09-24 2023-09-05 深圳前海微众银行股份有限公司 Block chain-based data processing method, equipment and system
CN114051031A (en) * 2021-11-16 2022-02-15 中国电信股份有限公司 Encryption communication method, system, equipment and storage medium based on distributed identity
CN114401096B (en) * 2022-01-19 2024-02-09 深圳市电子商务安全证书管理有限公司 Block chain data uplink control method, device, equipment and storage medium
CN114531277B (en) * 2022-01-21 2024-01-26 北京送好运信息技术有限公司 User identity authentication method based on blockchain technology
CN114884702A (en) * 2022-04-19 2022-08-09 海南大学 Identity registration method, identity authentication method and identity management system
CN115459920A (en) * 2022-08-25 2022-12-09 浪潮云信息技术股份公司 Certificateless alliance chain identity authentication method and system based on intelligent contract
CN115567324B (en) * 2022-11-24 2023-09-15 湖南天河国云科技有限公司 Data encryption transmission method, system, computer equipment and storage medium
CN117376035B (en) * 2023-12-08 2024-02-23 中汽智联技术有限公司 Vehicle data transmission method, system, equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106097073A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain gives the method for the numeral exclusive ID of account trading process
US10749684B2 (en) * 2016-09-30 2020-08-18 Entrust, Inc. Methods and apparatus for providing blockchain participant identity binding
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain
CN108282339B (en) * 2018-01-25 2020-10-30 中国科学院合肥物质科学研究院 Digital identity retrieving method based on intelligent contracts and self-social media

Also Published As

Publication number Publication date
WO2020061923A1 (en) 2020-04-02
CN109983466A (en) 2019-07-05

Similar Documents

Publication Publication Date Title
CN109983466B (en) Account management system and method based on block chain and storage medium
US11323272B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN109756485B (en) Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
US20220058655A1 (en) Authentication system
US10797879B2 (en) Methods and systems to facilitate authentication of a user
US8539569B2 (en) Systems and methods for facilitating user authentication over a network
Choi et al. Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction
CN111400727B (en) Block chain access control method and device and electronic equipment
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
TW201545526A (en) Method, apparatus, and system for providing a security check
CN105515783A (en) Identity authentication method, server and authentication terminal
CN109981576B (en) Key migration method and device
US20210241270A1 (en) System and method of blockchain transaction verification
CN114900304B (en) Digital signature method and apparatus, electronic device, and computer-readable storage medium
CN108400962A (en) A kind of Authentication and Key Agreement method under multiserver framework
Chang et al. A secure and efficient authentication scheme for e-coupon systems
CN114244530A (en) Resource access method and device, electronic equipment and computer readable storage medium
CN103368831A (en) Anonymous instant messaging system based on frequent visitor recognition
CN103368918A (en) Method, device and system for dynamic password authentication
Kumar et al. Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing
US20150350170A1 (en) Secure authentication of mobile users with no connectivity between authentication service and requesting entity
Zhu et al. A Novel One-Time Identity-Password Authenticated Scheme Based on Biometrics for E-coupon System.
Kalapaaking et al. Blockchain-enabled and multisignature-powered verifiable model for securing federated learning systems
KR20200064017A (en) Method for generating fido2.o public key and private key based on blockchain
US10608997B1 (en) Context-based data access control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant