CN110049060A - Distributed trusted identity based on block chain deposits card method and system - Google Patents
Distributed trusted identity based on block chain deposits card method and system Download PDFInfo
- Publication number
- CN110049060A CN110049060A CN201910350425.8A CN201910350425A CN110049060A CN 110049060 A CN110049060 A CN 110049060A CN 201910350425 A CN201910350425 A CN 201910350425A CN 110049060 A CN110049060 A CN 110049060A
- Authority
- CN
- China
- Prior art keywords
- block chain
- user
- identity information
- information
- party platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of distributed trusted identities based on block chain to deposit card method and system, and this method is main are as follows: utilizes the encapsulation and storage that can not be distorted with decentralization characteristic realization identity information of block chain storage;Identity information capitalization is completed by reliable hardware, by personal information storage on block chain, private key is archived in user terminal, and third-party platform is by calling hardware device to realize identity authority certification.The advantages that present invention is with high security, privacy is strong, versatility is wide, it is possible to provide more efficient, more believable authentication environment.
Description
Technical field
The invention belongs to cyberspace security technology area, specially a kind of distributed trusted identity based on block chain is deposited
Demonstrate,prove method and system.
Background technique
Nowadays, people are higher and higher to the degree of dependence of cyberspace, and user behavior space is from the entity society under line
Cyberspace of the meeting on line extends, and information interchange and interaction are also more and more in cyberspace, and network, which has become, pushes society
The important tool that can develop.However, cyberspace be also faced with while rapid development network principal identity be difficult to confirm, network
The safety problem of the potential threats such as resource unauthorized access.It realizes to the certification of network identity and the retrospect of network behavior, establishes
Network trusted identity be people enjoy every Internet Information Service premise and basis and digital economy development must
It asks.
Network trusted identity identifying technology is the technical foundation and important leverage of network trusted identity construction, the purpose is to for
Solve the unification of " identity on line " and " identity under line ".By taking traditional account+password authentication as an example, user is in third party
Platform inputs the account preset, password, and password is transferred to remote service end and is compared, if compared correctly, proves to use
Family is exactly himself.However, authentication is the process of Trust Establishment between entity, existing technology is usually by third-party power
Prestige attribute, by known to user, user is all or biological characteristic confirms user identity, it is established that the letter between interworking entity
Appoint, however the protection visibility and safe range of third-party platform are also limited.
Summary of the invention
It is existing to overcome it is an object of the invention to propose that a kind of distributed trusted identity based on block chain deposits card method
In technology authentication and management in face identity information redundancy, key management security and privacy the problems such as.
Realize the technical solution of the object of the invention are as follows: a kind of distributed trusted identity based on block chain deposits card method,
It is characterized in that, specific steps are as follows:
Step 1, intelligent terminal by reliable hardware number identity information write-in block chain and to write-in information into
Row encryption, intelligent terminal simultaneously register the server that number identity information uploads to third-party platform;
Step 2, third-party platform server verified after receiving number identity information, after being verified
Block chain is written into the permission of user and write-in information is encrypted;
Step 3, when user's request logs in, send logging request of the user after the private key signature of reliable hardware to the
The server of tripartite's platform;
Step 4, third-party platform server after receiving the logging request of user, user is read from the block chain
Digital identity information is verified, if certification passes through, user is allowed to access and log in.
The invention also provides a kind of distributed trusted identity deposit system based on block chain, including reliable hardware, intelligence
Energy terminal, block chain, third-party platform, in which:
The reliable hardware individually stores the private key of user chip in a manner of mnemonic word, and the hardware not with network
Connection, and external connection is realized by USB interface;
The intelligent terminal is connect with reliable hardware, for block to be written in the number identity information in reliable hardware
It chain and uploads to third-party platform and is registered;
The third-party platform is used for verifying after received number identity information, and will after being verified
In the permission write-in block chain of user;
The block chain is for encrypting the authority information of number identity information and user;
When user's request logs in, intelligent terminal send logging request of the user after the private key signature of reliable hardware to
Third-party platform, third-party platform read the digital identity letter of user after receiving the logging request of user from block chain
Breath is verified, if certification passes through, user is allowed to access and log in.
Compared with prior art, the present invention its remarkable advantage are as follows: the overall process that trusted identity deposits card has traceable, anti-usurp
The characteristics of changing, be embodied in storage decentralization, information opening are transparent, safety it is autonomous it is controllable, method is versatile, can be effective
Ground solves the problems such as key management, multi-party trust and the privacy leakage of authentication procedures, provides for cyberspace digital identity
Truer, more reliable, healthier guarantee.
Detailed description of the invention
Fig. 1 is general frame figure of the invention.
Fig. 2 is system hardware architecture diagram of the invention.
Fig. 3 is trusted hardware equipment work flow diagram of the invention.
Fig. 4 is the work flow diagram of intelligent terminal of the invention.
Specific embodiment
Present invention is further described in detail with reference to the accompanying drawings and examples.
As shown in Figure 1, 2, a kind of distributed trusted identity based on block chain deposits card method, specific steps are as follows:
Reliable hardware is connect by step 1 with intelligent terminal, by intelligent terminal by the number identity in reliable hardware
Block chain is written in information, is infused the server that number identity information uploads to third-party platform by intelligent terminal
Volume.
Wherein, the private key of user is individually stored in a chip by reliable hardware by way of mnemonic word, with interconnection
Net isolation, realizes plug and play by USB interface.As shown in figure 3, the specific workflow of reliable hardware is as follows:
1, after reliable hardware starting, it is necessary first to judge whether to preserve the public key of user and private key, if so, then executing
Step 2;If no, executing step 3;
2, the order that reliable hardware waits intelligent terminal to send executes the 4th if receiving the order of display account information
Step;If receiving the order of signature, step 5 is executed;If receiving the order of resetting, step 6 is executed;
3, reliable hardware display creates new account information, after user's confirmation, it is random generate public private key pair and by it
Be stored in reliable hardware;
4, reliable hardware reads the public key information of user, and public key information is returned to intelligent terminal;
5, reliable hardware reads the private key for user information of its preservation, and the content that intelligent terminal is sent utilizes private key signature
Afterwards, intelligent terminal is returned to;
6, reliable hardware deletes the public private key pair saved, and generates public private key pair at random again, then saves again.
Step 2, third-party platform server verified after receiving number identity information, after being verified
By in the permission write-in block chain of user, specifically, block chain described in step 1 and step 2 includes several ever-increasing areas
Block is associated between each block by the summary info that SM3 hash algorithm obtains, each block head includes a upper block
Summary info, guarantee that all blocks linked together can be arranged in order by summary info.As user and third party
When platform writes information into block chain, block chain can be broadcasted these information to the whole network, pass through PoW+PoS between the node of block chain
Common recognition mechanism guarantees that these information are just written to area if can reach common understanding between node by the consistency of block information in chain
In block, i.e. block chain is written successfully.After number identity information and user right are written to block chain, block chain is used
SM2 generates public key and private key as public key algorithm to encrypt to subscriber identity information.
Step 3, when user request log in when, user by intelligent terminal send user by reliable hardware private key signature
Logging request afterwards is to the server of third-party platform, and intelligent terminal client operation process is as shown in figure 4, specific as follows:
1, user detects whether connection reliable hardware, if successful connection, enters step 2;If no, according to prompt
Reconnect or wait connection;
2, intelligent terminal obtains the information such as the station address saved in reliable hardware, connection third party authentication server inquiry
Whether it has been registered, if unregistered, into step 3;If registered, step 4 is executed;
3, it after user is handled the information such as address by intelligent terminal, is signed using reliable hardware by SM2 algorithm
After be sent to third party authentication server, and return to step 2;
4, user scans the two dimensional code that third-party platform provides by intelligent terminal, and reads the letter for including in two dimensional code
Breath.After the use of information reliable hardware provided in two dimensional code is carried out SM2 algorithm signature, logs in and ask to certificate server transmission
It asks, and returns and log in result.
Step 4, third-party platform server after receiving the logging request of user, user is read from the block chain
Digital identity information is verified, if certification passes through, allows user to access and log in, specifically, third-party platform is recognized
The workflow for demonstrate,proving server is specific as follows:
1, it after authentication procedure starts, monitors server and specifies communication port, handled after receiving information.If receiving note
Volume order, executes step 2;If receiving the order of log on request, step 3 is executed;
2, after authentication procedure receives order, user account information included in reading order, and send the number of user
Identity information is into block chain, the operation such as permission for corresponding account of modifying;
3, when certificate server receive intelligent terminal transmission log on request, and return one with client bind with
The unique string that machine generates waits intelligent terminal to send logon information to intelligent terminal, if receiving logon information, executes the
4 steps;
4, certificate server reads the logon information of user, and inquires the client-side information with unique string binding, so
The intelligent contract for executing block chain afterwards reads the account information of user from block chain and verifies the signature result of SM2, if certification
Success executes step 5;If authentification failure, sends to log in respectively to intelligent terminal and third-party platform and unsuccessfully order;
5, third party authentication server reads the information such as the permission of user in block chain, and sends this information to binding
Intelligent terminal, and sent respectively to intelligent terminal and third-party platform and log in success command.
Intelligent contract can guarantee that trusted identity information is carried out in no third-party situation deposits card, and deposit the information of card
Traceable and irreversible, the design of intelligent contract includes two structural bodies of user and third-party platform, the design of intelligent contract
Logic is that the third party by authorization can be to the modification of user right, and only the initial founder of intelligence contract and user oneself can
To modify the identity information of user.
A kind of distributed trusted identity deposit system based on block chain, including reliable hardware, intelligent terminal, block chain,
Third-party platform, in which:
The intelligent terminal is connect with reliable hardware, for block to be written in the number identity information in reliable hardware
It chain and uploads to third-party platform and is registered;
In certain embodiments, reliable hardware, which refers to, is individually stored with the chip of private key for user, and the chip not with network
Connection, realizes external connection by USB interface.The method that reliable hardware individually stores private key for user are as follows: pass through the side of mnemonic word
Formula imports generated private key.
The third-party platform will be used after being verified for verifying to received number identity information
In the permission write-in block chain at family;
The block chain is for encrypting the authority information of number identity information and user;The block chain
Including several ever-increasing blocks, it is associated between each block by the summary info that SM3 hash algorithm obtains, each
Block head includes the summary info of a upper block, guarantees that all blocks linked together can be by summary info by suitable
Sequence arrangement.
The work that block chain is completed are as follows: broadcast the authority information of number identity information and user to the whole network, block
The consistency for guaranteeing block information in chain between the node of chain by PoW+PoS common recognition mechanism, i.e., if reached common understanding between node,
Above- mentioned information are written in block.Block chain using SM2 algorithm generated as public key algorithm public key and private key come to
Family identity information encrypts.
When user's request logs in, intelligent terminal send logging request of the user after the private key signature of reliable hardware to
Third-party platform, third-party platform read the digital identity letter of user after receiving the logging request of user from block chain
Breath is verified, if certification passes through, user is allowed to access and log in.
In certain embodiments, block chain is written into number identity information and reads the number of user from block chain
Word identity information passes through intelligent contract and realizes that intelligent contract includes two structural bodies of user and third-party platform, and is designed to
Third-party platform by authorization can modify to user right, and only the initial founder of intelligence contract and user can repair
Change subscriber identity information.
Claims (8)
1. a kind of distributed trusted identity based on block chain deposits card method, which is characterized in that specific steps are as follows:
Step 1, intelligent terminal by the number identity information write-in block chain in reliable hardware and add write-in information
Close, intelligent terminal simultaneously registers the server that number identity information uploads to third-party platform;
Step 2, third-party platform server verified after receiving number identity information, will be used after being verified
The permission write-in block chain at family simultaneously encrypts write-in information;
Step 3, when user's request logs in, send logging request of the user after the private key signature of reliable hardware to third party
The server of platform;
Step 4, third-party platform server after receiving the logging request of user, from block chain read user number
Identity information is verified, if certification passes through, user is allowed to access and log in.
2. the distributed trusted identity according to claim 1 based on block chain deposits card method, which is characterized in that step 1
The reliable hardware refers to the chip for being individually stored with private key for user, and the chip is realized not with network connection by USB interface
External connection.
3. the distributed trusted identity according to claim 2 based on block chain deposits card method, which is characterized in that it is described can
The method that letter hardware individually stores private key for user are as follows: generated private key is imported by way of mnemonic word.
4. the distributed trusted identity according to claim 1 based on block chain deposits card method, which is characterized in that the area
Block chain includes several ever-increasing blocks, is associated between each block by the summary info that SM3 hash algorithm obtains, often
One block head includes the summary info of a upper block, guarantees that all blocks linked together can pass through summary info
It is arranged in order.
5. the distributed trusted identity according to claim 1 based on block chain deposits card method, which is characterized in that step 1
Block chain, the work that block chain is completed is written in the permission of user by middle number identity information is written in block chain and step 2
As: the authority information of number identity information and user is broadcasted to the whole network, it is total by PoW+PoS between the node of block chain
Knowledge mechanism guarantees the consistency of block information in chain, i.e., if reached common understanding between node, above- mentioned information are written in block.
6. the distributed trusted identity according to claim 1 based on block chain deposits card method, which is characterized in that step 1
Middle that number identity information is written by the permission write-in block chain of user in block chain and step 2, block chain uses SM2
Algorithm generates public key and private key as public key algorithm to encrypt to subscriber identity information.
7. the distributed trusted identity according to claim 1 based on block chain deposits card method, which is characterized in that step 1
The digital identity information that number identity information write-in block chain and step 4 read user from block chain is passed through into intelligence
Contract realizes that intelligent contract includes two structural bodies of user and third-party platform, and the third party being designed to by authorization is flat
Platform can modify to user right, and only the initial founder of intelligence contract and user can modify subscriber identity information.
8. the system based on any method of claim 1~7, which is characterized in that including reliable hardware, intelligent terminal,
Block chain, third-party platform, in which:
The intelligent terminal is connect with reliable hardware, for by reliable hardware number identity information write-in block chain with
And it uploads to third-party platform and is registered;
The third-party platform is used for verifying after received number identity information, and by user after being verified
Permission write-in block chain in;
The block chain is for encrypting the authority information of number identity information and user;
When user's request logs in, intelligent terminal sends logging request of the user after the private key signature of reliable hardware to third
Fang Pingtai, third-party platform after receiving the logging request of user, from block chain read user digital identity information into
Row is verified, if certification passes through, user is allowed to access and log in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910350425.8A CN110049060A (en) | 2019-04-28 | 2019-04-28 | Distributed trusted identity based on block chain deposits card method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910350425.8A CN110049060A (en) | 2019-04-28 | 2019-04-28 | Distributed trusted identity based on block chain deposits card method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110049060A true CN110049060A (en) | 2019-07-23 |
Family
ID=67279890
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910350425.8A Pending CN110049060A (en) | 2019-04-28 | 2019-04-28 | Distributed trusted identity based on block chain deposits card method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110049060A (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555296A (en) * | 2019-08-01 | 2019-12-10 | 阿里巴巴集团控股有限公司 | identity verification method, device and equipment based on block chain |
CN110795755A (en) * | 2019-12-26 | 2020-02-14 | 深圳市建筑科学研究院股份有限公司 | Building project scene type evidence storing and non-tampering method and system based on block chain |
CN110798483A (en) * | 2019-11-12 | 2020-02-14 | 北京芯际科技有限公司 | Identity authentication method based on block chain |
CN111245843A (en) * | 2020-01-14 | 2020-06-05 | 南京理工大学 | User identity authentication method and system based on attributes |
CN111277577A (en) * | 2020-01-14 | 2020-06-12 | 北京百度网讯科技有限公司 | Digital identity verification method, device, equipment and storage medium |
CN111291422A (en) * | 2020-03-20 | 2020-06-16 | 南京优物链科技有限公司 | Credible image platform based on block chain technology |
CN111556007A (en) * | 2020-03-03 | 2020-08-18 | 支付宝实验室(新加坡)有限公司 | Identity verification method, device and equipment based on block chain and storage medium |
US10756901B2 (en) | 2019-08-01 | 2020-08-25 | Alibaba Group Holding Limited | Blockchain-based identity authentication method, apparatus, and device |
CN111600844A (en) * | 2020-04-17 | 2020-08-28 | 丝链(常州)控股有限公司 | Identity distribution and authentication method based on zero-knowledge proof |
CN111614687A (en) * | 2020-05-26 | 2020-09-01 | 牛津(海南)区块链研究院有限公司 | Identity verification method, system and related device |
CN111914019A (en) * | 2020-06-18 | 2020-11-10 | 国电南瑞科技股份有限公司 | Stable control data management system and method based on block chain technology |
CN112100269A (en) * | 2020-11-19 | 2020-12-18 | 北京连琪科技有限公司 | Interface cooperation method and system capable of proving |
CN112688786A (en) * | 2021-03-19 | 2021-04-20 | 中企链信(北京)科技有限公司 | Evidence construction and real-name identity authentication method based on block chain |
CN112734331A (en) * | 2020-12-30 | 2021-04-30 | 福建慧连物流科技有限公司 | Waybill client information verification method |
CN112989300A (en) * | 2021-03-15 | 2021-06-18 | 京东数科海益信息科技有限公司 | Digital identity information processing method and device and electronic equipment |
CN113553605A (en) * | 2021-06-25 | 2021-10-26 | 北京八分量信息科技有限公司 | De-centering authentication system based on block chain |
CN113973016A (en) * | 2020-04-17 | 2022-01-25 | 支付宝(杭州)信息技术有限公司 | Authorization processing method, device, equipment and system based on verifiable statement |
CN114448654A (en) * | 2021-09-02 | 2022-05-06 | 中国科学院信息工程研究所 | Block chain-based distributed trusted audit security evidence storing method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107079036A (en) * | 2016-12-23 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Registration and authorization method, apparatus and system |
CN107453862A (en) * | 2017-05-15 | 2017-12-08 | 杭州复杂美科技有限公司 | Private key generation storage and the scheme used |
CN107507091A (en) * | 2017-09-07 | 2017-12-22 | 复旦大学 | Enhanced data Right protection method based on block chain and intelligent contract |
CN108712431A (en) * | 2018-05-24 | 2018-10-26 | 广东工业大学 | A kind of traffic information deposit method and device based on alliance's chain |
US20190028277A1 (en) * | 2017-07-24 | 2019-01-24 | International Business Machines Corporation | Anonymous consent and data sharing on a blockchain |
-
2019
- 2019-04-28 CN CN201910350425.8A patent/CN110049060A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107079036A (en) * | 2016-12-23 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Registration and authorization method, apparatus and system |
CN107453862A (en) * | 2017-05-15 | 2017-12-08 | 杭州复杂美科技有限公司 | Private key generation storage and the scheme used |
US20190028277A1 (en) * | 2017-07-24 | 2019-01-24 | International Business Machines Corporation | Anonymous consent and data sharing on a blockchain |
CN107507091A (en) * | 2017-09-07 | 2017-12-22 | 复旦大学 | Enhanced data Right protection method based on block chain and intelligent contract |
CN108712431A (en) * | 2018-05-24 | 2018-10-26 | 广东工业大学 | A kind of traffic information deposit method and device based on alliance's chain |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555296A (en) * | 2019-08-01 | 2019-12-10 | 阿里巴巴集团控股有限公司 | identity verification method, device and equipment based on block chain |
CN110555296B (en) * | 2019-08-01 | 2020-08-18 | 阿里巴巴集团控股有限公司 | Identity verification method, device and equipment based on block chain |
US10756901B2 (en) | 2019-08-01 | 2020-08-25 | Alibaba Group Holding Limited | Blockchain-based identity authentication method, apparatus, and device |
CN110798483A (en) * | 2019-11-12 | 2020-02-14 | 北京芯际科技有限公司 | Identity authentication method based on block chain |
CN110795755A (en) * | 2019-12-26 | 2020-02-14 | 深圳市建筑科学研究院股份有限公司 | Building project scene type evidence storing and non-tampering method and system based on block chain |
CN111245843A (en) * | 2020-01-14 | 2020-06-05 | 南京理工大学 | User identity authentication method and system based on attributes |
CN111277577A (en) * | 2020-01-14 | 2020-06-12 | 北京百度网讯科技有限公司 | Digital identity verification method, device, equipment and storage medium |
CN111277577B (en) * | 2020-01-14 | 2022-06-07 | 北京百度网讯科技有限公司 | Digital identity verification method, device, equipment and storage medium |
CN111556007A (en) * | 2020-03-03 | 2020-08-18 | 支付宝实验室(新加坡)有限公司 | Identity verification method, device and equipment based on block chain and storage medium |
CN111556007B (en) * | 2020-03-03 | 2021-09-24 | 支付宝实验室(新加坡)有限公司 | Identity verification method, device and equipment based on block chain and storage medium |
CN111291422B (en) * | 2020-03-20 | 2021-08-06 | 南京优物链科技有限公司 | Credible image platform based on block chain technology |
CN111291422A (en) * | 2020-03-20 | 2020-06-16 | 南京优物链科技有限公司 | Credible image platform based on block chain technology |
CN113973016A (en) * | 2020-04-17 | 2022-01-25 | 支付宝(杭州)信息技术有限公司 | Authorization processing method, device, equipment and system based on verifiable statement |
CN111600844A (en) * | 2020-04-17 | 2020-08-28 | 丝链(常州)控股有限公司 | Identity distribution and authentication method based on zero-knowledge proof |
CN111614687A (en) * | 2020-05-26 | 2020-09-01 | 牛津(海南)区块链研究院有限公司 | Identity verification method, system and related device |
CN111914019A (en) * | 2020-06-18 | 2020-11-10 | 国电南瑞科技股份有限公司 | Stable control data management system and method based on block chain technology |
CN112100269A (en) * | 2020-11-19 | 2020-12-18 | 北京连琪科技有限公司 | Interface cooperation method and system capable of proving |
CN112100269B (en) * | 2020-11-19 | 2021-02-12 | 北京连琪科技有限公司 | Interface cooperation method and system capable of proving |
CN112734331A (en) * | 2020-12-30 | 2021-04-30 | 福建慧连物流科技有限公司 | Waybill client information verification method |
CN112989300A (en) * | 2021-03-15 | 2021-06-18 | 京东数科海益信息科技有限公司 | Digital identity information processing method and device and electronic equipment |
CN112688786B (en) * | 2021-03-19 | 2021-06-22 | 中企链信(北京)科技有限公司 | Evidence construction and real-name identity authentication method based on block chain |
CN112688786A (en) * | 2021-03-19 | 2021-04-20 | 中企链信(北京)科技有限公司 | Evidence construction and real-name identity authentication method based on block chain |
CN113553605A (en) * | 2021-06-25 | 2021-10-26 | 北京八分量信息科技有限公司 | De-centering authentication system based on block chain |
CN114448654A (en) * | 2021-09-02 | 2022-05-06 | 中国科学院信息工程研究所 | Block chain-based distributed trusted audit security evidence storing method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110049060A (en) | Distributed trusted identity based on block chain deposits card method and system | |
US8737624B2 (en) | Secure email communication system | |
CN106488452B (en) | Mobile terminal safety access authentication method combining fingerprint | |
CN108243166A (en) | A kind of identity identifying method and system based on USBKey | |
CN105282179B (en) | A method of family's Internet of Things security control based on CPK | |
CN101714918A (en) | Safety system for logging in VPN and safety method for logging in VPN | |
CN105162808B (en) | A kind of safe login method based on national secret algorithm | |
CN104468126B (en) | A kind of safe communication system and method | |
CN102685749A (en) | Wireless safety authentication method orienting to mobile terminal | |
CN105491015B (en) | A kind of communication of data and storage method | |
CN109587100A (en) | A kind of cloud computing platform user authentication process method and system | |
CN115865320A (en) | Block chain-based security service management method and system | |
CN105978688B (en) | A kind of cross-domain safety certifying method based on information separation management | |
CN106789845A (en) | A kind of method of network data security transmission | |
WO2020038361A1 (en) | Alliance chain-based authentication method, device and equipment and readable storage medium | |
CN106027256B (en) | A kind of identity card card reading response system | |
CN110809000B (en) | Service interaction method, device, equipment and storage medium based on block chain network | |
CN109474431A (en) | Client certificate method and computer readable storage medium | |
CN111563980B (en) | Bluetooth lock key generation and authentication method | |
CN111489462B (en) | Personal Bluetooth key system | |
CN101521571B (en) | Method for authenticating safety unit and server side of mobile hardware | |
CN111539032B (en) | Electronic signature application system resistant to quantum computing disruption and implementation method thereof | |
CN114329395A (en) | Supply chain financial privacy protection method and system based on block chain | |
CN104683979B (en) | A kind of authentication method and equipment | |
CN111489461B (en) | Bluetooth key system for group |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190723 |
|
RJ01 | Rejection of invention patent application after publication |