CN110049060A - Distributed trusted identity based on block chain deposits card method and system - Google Patents

Distributed trusted identity based on block chain deposits card method and system Download PDF

Info

Publication number
CN110049060A
CN110049060A CN201910350425.8A CN201910350425A CN110049060A CN 110049060 A CN110049060 A CN 110049060A CN 201910350425 A CN201910350425 A CN 201910350425A CN 110049060 A CN110049060 A CN 110049060A
Authority
CN
China
Prior art keywords
block chain
user
identity information
information
party platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910350425.8A
Other languages
Chinese (zh)
Inventor
魏松杰
王佳贺
徐臻
李帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Science and Technology
Original Assignee
Nanjing University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Science and Technology filed Critical Nanjing University of Science and Technology
Priority to CN201910350425.8A priority Critical patent/CN110049060A/en
Publication of CN110049060A publication Critical patent/CN110049060A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of distributed trusted identities based on block chain to deposit card method and system, and this method is main are as follows: utilizes the encapsulation and storage that can not be distorted with decentralization characteristic realization identity information of block chain storage;Identity information capitalization is completed by reliable hardware, by personal information storage on block chain, private key is archived in user terminal, and third-party platform is by calling hardware device to realize identity authority certification.The advantages that present invention is with high security, privacy is strong, versatility is wide, it is possible to provide more efficient, more believable authentication environment.

Description

Distributed trusted identity based on block chain deposits card method and system
Technical field
The invention belongs to cyberspace security technology area, specially a kind of distributed trusted identity based on block chain is deposited Demonstrate,prove method and system.
Background technique
Nowadays, people are higher and higher to the degree of dependence of cyberspace, and user behavior space is from the entity society under line Cyberspace of the meeting on line extends, and information interchange and interaction are also more and more in cyberspace, and network, which has become, pushes society The important tool that can develop.However, cyberspace be also faced with while rapid development network principal identity be difficult to confirm, network The safety problem of the potential threats such as resource unauthorized access.It realizes to the certification of network identity and the retrospect of network behavior, establishes Network trusted identity be people enjoy every Internet Information Service premise and basis and digital economy development must It asks.
Network trusted identity identifying technology is the technical foundation and important leverage of network trusted identity construction, the purpose is to for Solve the unification of " identity on line " and " identity under line ".By taking traditional account+password authentication as an example, user is in third party Platform inputs the account preset, password, and password is transferred to remote service end and is compared, if compared correctly, proves to use Family is exactly himself.However, authentication is the process of Trust Establishment between entity, existing technology is usually by third-party power Prestige attribute, by known to user, user is all or biological characteristic confirms user identity, it is established that the letter between interworking entity Appoint, however the protection visibility and safe range of third-party platform are also limited.
Summary of the invention
It is existing to overcome it is an object of the invention to propose that a kind of distributed trusted identity based on block chain deposits card method In technology authentication and management in face identity information redundancy, key management security and privacy the problems such as.
Realize the technical solution of the object of the invention are as follows: a kind of distributed trusted identity based on block chain deposits card method, It is characterized in that, specific steps are as follows:
Step 1, intelligent terminal by reliable hardware number identity information write-in block chain and to write-in information into Row encryption, intelligent terminal simultaneously register the server that number identity information uploads to third-party platform;
Step 2, third-party platform server verified after receiving number identity information, after being verified Block chain is written into the permission of user and write-in information is encrypted;
Step 3, when user's request logs in, send logging request of the user after the private key signature of reliable hardware to the The server of tripartite's platform;
Step 4, third-party platform server after receiving the logging request of user, user is read from the block chain Digital identity information is verified, if certification passes through, user is allowed to access and log in.
The invention also provides a kind of distributed trusted identity deposit system based on block chain, including reliable hardware, intelligence Energy terminal, block chain, third-party platform, in which:
The reliable hardware individually stores the private key of user chip in a manner of mnemonic word, and the hardware not with network Connection, and external connection is realized by USB interface;
The intelligent terminal is connect with reliable hardware, for block to be written in the number identity information in reliable hardware It chain and uploads to third-party platform and is registered;
The third-party platform is used for verifying after received number identity information, and will after being verified In the permission write-in block chain of user;
The block chain is for encrypting the authority information of number identity information and user;
When user's request logs in, intelligent terminal send logging request of the user after the private key signature of reliable hardware to Third-party platform, third-party platform read the digital identity letter of user after receiving the logging request of user from block chain Breath is verified, if certification passes through, user is allowed to access and log in.
Compared with prior art, the present invention its remarkable advantage are as follows: the overall process that trusted identity deposits card has traceable, anti-usurp The characteristics of changing, be embodied in storage decentralization, information opening are transparent, safety it is autonomous it is controllable, method is versatile, can be effective Ground solves the problems such as key management, multi-party trust and the privacy leakage of authentication procedures, provides for cyberspace digital identity Truer, more reliable, healthier guarantee.
Detailed description of the invention
Fig. 1 is general frame figure of the invention.
Fig. 2 is system hardware architecture diagram of the invention.
Fig. 3 is trusted hardware equipment work flow diagram of the invention.
Fig. 4 is the work flow diagram of intelligent terminal of the invention.
Specific embodiment
Present invention is further described in detail with reference to the accompanying drawings and examples.
As shown in Figure 1, 2, a kind of distributed trusted identity based on block chain deposits card method, specific steps are as follows:
Reliable hardware is connect by step 1 with intelligent terminal, by intelligent terminal by the number identity in reliable hardware Block chain is written in information, is infused the server that number identity information uploads to third-party platform by intelligent terminal Volume.
Wherein, the private key of user is individually stored in a chip by reliable hardware by way of mnemonic word, with interconnection Net isolation, realizes plug and play by USB interface.As shown in figure 3, the specific workflow of reliable hardware is as follows:
1, after reliable hardware starting, it is necessary first to judge whether to preserve the public key of user and private key, if so, then executing Step 2;If no, executing step 3;
2, the order that reliable hardware waits intelligent terminal to send executes the 4th if receiving the order of display account information Step;If receiving the order of signature, step 5 is executed;If receiving the order of resetting, step 6 is executed;
3, reliable hardware display creates new account information, after user's confirmation, it is random generate public private key pair and by it Be stored in reliable hardware;
4, reliable hardware reads the public key information of user, and public key information is returned to intelligent terminal;
5, reliable hardware reads the private key for user information of its preservation, and the content that intelligent terminal is sent utilizes private key signature Afterwards, intelligent terminal is returned to;
6, reliable hardware deletes the public private key pair saved, and generates public private key pair at random again, then saves again.
Step 2, third-party platform server verified after receiving number identity information, after being verified By in the permission write-in block chain of user, specifically, block chain described in step 1 and step 2 includes several ever-increasing areas Block is associated between each block by the summary info that SM3 hash algorithm obtains, each block head includes a upper block Summary info, guarantee that all blocks linked together can be arranged in order by summary info.As user and third party When platform writes information into block chain, block chain can be broadcasted these information to the whole network, pass through PoW+PoS between the node of block chain Common recognition mechanism guarantees that these information are just written to area if can reach common understanding between node by the consistency of block information in chain In block, i.e. block chain is written successfully.After number identity information and user right are written to block chain, block chain is used SM2 generates public key and private key as public key algorithm to encrypt to subscriber identity information.
Step 3, when user request log in when, user by intelligent terminal send user by reliable hardware private key signature Logging request afterwards is to the server of third-party platform, and intelligent terminal client operation process is as shown in figure 4, specific as follows:
1, user detects whether connection reliable hardware, if successful connection, enters step 2;If no, according to prompt Reconnect or wait connection;
2, intelligent terminal obtains the information such as the station address saved in reliable hardware, connection third party authentication server inquiry Whether it has been registered, if unregistered, into step 3;If registered, step 4 is executed;
3, it after user is handled the information such as address by intelligent terminal, is signed using reliable hardware by SM2 algorithm After be sent to third party authentication server, and return to step 2;
4, user scans the two dimensional code that third-party platform provides by intelligent terminal, and reads the letter for including in two dimensional code Breath.After the use of information reliable hardware provided in two dimensional code is carried out SM2 algorithm signature, logs in and ask to certificate server transmission It asks, and returns and log in result.
Step 4, third-party platform server after receiving the logging request of user, user is read from the block chain Digital identity information is verified, if certification passes through, allows user to access and log in, specifically, third-party platform is recognized The workflow for demonstrate,proving server is specific as follows:
1, it after authentication procedure starts, monitors server and specifies communication port, handled after receiving information.If receiving note Volume order, executes step 2;If receiving the order of log on request, step 3 is executed;
2, after authentication procedure receives order, user account information included in reading order, and send the number of user Identity information is into block chain, the operation such as permission for corresponding account of modifying;
3, when certificate server receive intelligent terminal transmission log on request, and return one with client bind with The unique string that machine generates waits intelligent terminal to send logon information to intelligent terminal, if receiving logon information, executes the 4 steps;
4, certificate server reads the logon information of user, and inquires the client-side information with unique string binding, so The intelligent contract for executing block chain afterwards reads the account information of user from block chain and verifies the signature result of SM2, if certification Success executes step 5;If authentification failure, sends to log in respectively to intelligent terminal and third-party platform and unsuccessfully order;
5, third party authentication server reads the information such as the permission of user in block chain, and sends this information to binding Intelligent terminal, and sent respectively to intelligent terminal and third-party platform and log in success command.
Intelligent contract can guarantee that trusted identity information is carried out in no third-party situation deposits card, and deposit the information of card Traceable and irreversible, the design of intelligent contract includes two structural bodies of user and third-party platform, the design of intelligent contract Logic is that the third party by authorization can be to the modification of user right, and only the initial founder of intelligence contract and user oneself can To modify the identity information of user.
A kind of distributed trusted identity deposit system based on block chain, including reliable hardware, intelligent terminal, block chain, Third-party platform, in which:
The intelligent terminal is connect with reliable hardware, for block to be written in the number identity information in reliable hardware It chain and uploads to third-party platform and is registered;
In certain embodiments, reliable hardware, which refers to, is individually stored with the chip of private key for user, and the chip not with network Connection, realizes external connection by USB interface.The method that reliable hardware individually stores private key for user are as follows: pass through the side of mnemonic word Formula imports generated private key.
The third-party platform will be used after being verified for verifying to received number identity information In the permission write-in block chain at family;
The block chain is for encrypting the authority information of number identity information and user;The block chain Including several ever-increasing blocks, it is associated between each block by the summary info that SM3 hash algorithm obtains, each Block head includes the summary info of a upper block, guarantees that all blocks linked together can be by summary info by suitable Sequence arrangement.
The work that block chain is completed are as follows: broadcast the authority information of number identity information and user to the whole network, block The consistency for guaranteeing block information in chain between the node of chain by PoW+PoS common recognition mechanism, i.e., if reached common understanding between node, Above- mentioned information are written in block.Block chain using SM2 algorithm generated as public key algorithm public key and private key come to Family identity information encrypts.
When user's request logs in, intelligent terminal send logging request of the user after the private key signature of reliable hardware to Third-party platform, third-party platform read the digital identity letter of user after receiving the logging request of user from block chain Breath is verified, if certification passes through, user is allowed to access and log in.
In certain embodiments, block chain is written into number identity information and reads the number of user from block chain Word identity information passes through intelligent contract and realizes that intelligent contract includes two structural bodies of user and third-party platform, and is designed to Third-party platform by authorization can modify to user right, and only the initial founder of intelligence contract and user can repair Change subscriber identity information.

Claims (8)

1. a kind of distributed trusted identity based on block chain deposits card method, which is characterized in that specific steps are as follows:
Step 1, intelligent terminal by the number identity information write-in block chain in reliable hardware and add write-in information Close, intelligent terminal simultaneously registers the server that number identity information uploads to third-party platform;
Step 2, third-party platform server verified after receiving number identity information, will be used after being verified The permission write-in block chain at family simultaneously encrypts write-in information;
Step 3, when user's request logs in, send logging request of the user after the private key signature of reliable hardware to third party The server of platform;
Step 4, third-party platform server after receiving the logging request of user, from block chain read user number Identity information is verified, if certification passes through, user is allowed to access and log in.
2. the distributed trusted identity according to claim 1 based on block chain deposits card method, which is characterized in that step 1 The reliable hardware refers to the chip for being individually stored with private key for user, and the chip is realized not with network connection by USB interface External connection.
3. the distributed trusted identity according to claim 2 based on block chain deposits card method, which is characterized in that it is described can The method that letter hardware individually stores private key for user are as follows: generated private key is imported by way of mnemonic word.
4. the distributed trusted identity according to claim 1 based on block chain deposits card method, which is characterized in that the area Block chain includes several ever-increasing blocks, is associated between each block by the summary info that SM3 hash algorithm obtains, often One block head includes the summary info of a upper block, guarantees that all blocks linked together can pass through summary info It is arranged in order.
5. the distributed trusted identity according to claim 1 based on block chain deposits card method, which is characterized in that step 1 Block chain, the work that block chain is completed is written in the permission of user by middle number identity information is written in block chain and step 2 As: the authority information of number identity information and user is broadcasted to the whole network, it is total by PoW+PoS between the node of block chain Knowledge mechanism guarantees the consistency of block information in chain, i.e., if reached common understanding between node, above- mentioned information are written in block.
6. the distributed trusted identity according to claim 1 based on block chain deposits card method, which is characterized in that step 1 Middle that number identity information is written by the permission write-in block chain of user in block chain and step 2, block chain uses SM2 Algorithm generates public key and private key as public key algorithm to encrypt to subscriber identity information.
7. the distributed trusted identity according to claim 1 based on block chain deposits card method, which is characterized in that step 1 The digital identity information that number identity information write-in block chain and step 4 read user from block chain is passed through into intelligence Contract realizes that intelligent contract includes two structural bodies of user and third-party platform, and the third party being designed to by authorization is flat Platform can modify to user right, and only the initial founder of intelligence contract and user can modify subscriber identity information.
8. the system based on any method of claim 1~7, which is characterized in that including reliable hardware, intelligent terminal, Block chain, third-party platform, in which:
The intelligent terminal is connect with reliable hardware, for by reliable hardware number identity information write-in block chain with And it uploads to third-party platform and is registered;
The third-party platform is used for verifying after received number identity information, and by user after being verified Permission write-in block chain in;
The block chain is for encrypting the authority information of number identity information and user;
When user's request logs in, intelligent terminal sends logging request of the user after the private key signature of reliable hardware to third Fang Pingtai, third-party platform after receiving the logging request of user, from block chain read user digital identity information into Row is verified, if certification passes through, user is allowed to access and log in.
CN201910350425.8A 2019-04-28 2019-04-28 Distributed trusted identity based on block chain deposits card method and system Pending CN110049060A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910350425.8A CN110049060A (en) 2019-04-28 2019-04-28 Distributed trusted identity based on block chain deposits card method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910350425.8A CN110049060A (en) 2019-04-28 2019-04-28 Distributed trusted identity based on block chain deposits card method and system

Publications (1)

Publication Number Publication Date
CN110049060A true CN110049060A (en) 2019-07-23

Family

ID=67279890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910350425.8A Pending CN110049060A (en) 2019-04-28 2019-04-28 Distributed trusted identity based on block chain deposits card method and system

Country Status (1)

Country Link
CN (1) CN110049060A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555296A (en) * 2019-08-01 2019-12-10 阿里巴巴集团控股有限公司 identity verification method, device and equipment based on block chain
CN110795755A (en) * 2019-12-26 2020-02-14 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain
CN110798483A (en) * 2019-11-12 2020-02-14 北京芯际科技有限公司 Identity authentication method based on block chain
CN111245843A (en) * 2020-01-14 2020-06-05 南京理工大学 User identity authentication method and system based on attributes
CN111277577A (en) * 2020-01-14 2020-06-12 北京百度网讯科技有限公司 Digital identity verification method, device, equipment and storage medium
CN111291422A (en) * 2020-03-20 2020-06-16 南京优物链科技有限公司 Credible image platform based on block chain technology
CN111556007A (en) * 2020-03-03 2020-08-18 支付宝实验室(新加坡)有限公司 Identity verification method, device and equipment based on block chain and storage medium
US10756901B2 (en) 2019-08-01 2020-08-25 Alibaba Group Holding Limited Blockchain-based identity authentication method, apparatus, and device
CN111600844A (en) * 2020-04-17 2020-08-28 丝链(常州)控股有限公司 Identity distribution and authentication method based on zero-knowledge proof
CN111614687A (en) * 2020-05-26 2020-09-01 牛津(海南)区块链研究院有限公司 Identity verification method, system and related device
CN111914019A (en) * 2020-06-18 2020-11-10 国电南瑞科技股份有限公司 Stable control data management system and method based on block chain technology
CN112100269A (en) * 2020-11-19 2020-12-18 北京连琪科技有限公司 Interface cooperation method and system capable of proving
CN112688786A (en) * 2021-03-19 2021-04-20 中企链信(北京)科技有限公司 Evidence construction and real-name identity authentication method based on block chain
CN112734331A (en) * 2020-12-30 2021-04-30 福建慧连物流科技有限公司 Waybill client information verification method
CN112989300A (en) * 2021-03-15 2021-06-18 京东数科海益信息科技有限公司 Digital identity information processing method and device and electronic equipment
CN113553605A (en) * 2021-06-25 2021-10-26 北京八分量信息科技有限公司 De-centering authentication system based on block chain
CN113973016A (en) * 2020-04-17 2022-01-25 支付宝(杭州)信息技术有限公司 Authorization processing method, device, equipment and system based on verifiable statement
CN114448654A (en) * 2021-09-02 2022-05-06 中国科学院信息工程研究所 Block chain-based distributed trusted audit security evidence storing method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079036A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 Registration and authorization method, apparatus and system
CN107453862A (en) * 2017-05-15 2017-12-08 杭州复杂美科技有限公司 Private key generation storage and the scheme used
CN107507091A (en) * 2017-09-07 2017-12-22 复旦大学 Enhanced data Right protection method based on block chain and intelligent contract
CN108712431A (en) * 2018-05-24 2018-10-26 广东工业大学 A kind of traffic information deposit method and device based on alliance's chain
US20190028277A1 (en) * 2017-07-24 2019-01-24 International Business Machines Corporation Anonymous consent and data sharing on a blockchain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079036A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 Registration and authorization method, apparatus and system
CN107453862A (en) * 2017-05-15 2017-12-08 杭州复杂美科技有限公司 Private key generation storage and the scheme used
US20190028277A1 (en) * 2017-07-24 2019-01-24 International Business Machines Corporation Anonymous consent and data sharing on a blockchain
CN107507091A (en) * 2017-09-07 2017-12-22 复旦大学 Enhanced data Right protection method based on block chain and intelligent contract
CN108712431A (en) * 2018-05-24 2018-10-26 广东工业大学 A kind of traffic information deposit method and device based on alliance's chain

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555296A (en) * 2019-08-01 2019-12-10 阿里巴巴集团控股有限公司 identity verification method, device and equipment based on block chain
CN110555296B (en) * 2019-08-01 2020-08-18 阿里巴巴集团控股有限公司 Identity verification method, device and equipment based on block chain
US10756901B2 (en) 2019-08-01 2020-08-25 Alibaba Group Holding Limited Blockchain-based identity authentication method, apparatus, and device
CN110798483A (en) * 2019-11-12 2020-02-14 北京芯际科技有限公司 Identity authentication method based on block chain
CN110795755A (en) * 2019-12-26 2020-02-14 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain
CN111245843A (en) * 2020-01-14 2020-06-05 南京理工大学 User identity authentication method and system based on attributes
CN111277577A (en) * 2020-01-14 2020-06-12 北京百度网讯科技有限公司 Digital identity verification method, device, equipment and storage medium
CN111277577B (en) * 2020-01-14 2022-06-07 北京百度网讯科技有限公司 Digital identity verification method, device, equipment and storage medium
CN111556007A (en) * 2020-03-03 2020-08-18 支付宝实验室(新加坡)有限公司 Identity verification method, device and equipment based on block chain and storage medium
CN111556007B (en) * 2020-03-03 2021-09-24 支付宝实验室(新加坡)有限公司 Identity verification method, device and equipment based on block chain and storage medium
CN111291422B (en) * 2020-03-20 2021-08-06 南京优物链科技有限公司 Credible image platform based on block chain technology
CN111291422A (en) * 2020-03-20 2020-06-16 南京优物链科技有限公司 Credible image platform based on block chain technology
CN113973016A (en) * 2020-04-17 2022-01-25 支付宝(杭州)信息技术有限公司 Authorization processing method, device, equipment and system based on verifiable statement
CN111600844A (en) * 2020-04-17 2020-08-28 丝链(常州)控股有限公司 Identity distribution and authentication method based on zero-knowledge proof
CN111614687A (en) * 2020-05-26 2020-09-01 牛津(海南)区块链研究院有限公司 Identity verification method, system and related device
CN111914019A (en) * 2020-06-18 2020-11-10 国电南瑞科技股份有限公司 Stable control data management system and method based on block chain technology
CN112100269A (en) * 2020-11-19 2020-12-18 北京连琪科技有限公司 Interface cooperation method and system capable of proving
CN112100269B (en) * 2020-11-19 2021-02-12 北京连琪科技有限公司 Interface cooperation method and system capable of proving
CN112734331A (en) * 2020-12-30 2021-04-30 福建慧连物流科技有限公司 Waybill client information verification method
CN112989300A (en) * 2021-03-15 2021-06-18 京东数科海益信息科技有限公司 Digital identity information processing method and device and electronic equipment
CN112688786B (en) * 2021-03-19 2021-06-22 中企链信(北京)科技有限公司 Evidence construction and real-name identity authentication method based on block chain
CN112688786A (en) * 2021-03-19 2021-04-20 中企链信(北京)科技有限公司 Evidence construction and real-name identity authentication method based on block chain
CN113553605A (en) * 2021-06-25 2021-10-26 北京八分量信息科技有限公司 De-centering authentication system based on block chain
CN114448654A (en) * 2021-09-02 2022-05-06 中国科学院信息工程研究所 Block chain-based distributed trusted audit security evidence storing method

Similar Documents

Publication Publication Date Title
CN110049060A (en) Distributed trusted identity based on block chain deposits card method and system
US8737624B2 (en) Secure email communication system
CN106488452B (en) Mobile terminal safety access authentication method combining fingerprint
CN108243166A (en) A kind of identity identifying method and system based on USBKey
CN105282179B (en) A method of family's Internet of Things security control based on CPK
CN101714918A (en) Safety system for logging in VPN and safety method for logging in VPN
CN105162808B (en) A kind of safe login method based on national secret algorithm
CN104468126B (en) A kind of safe communication system and method
CN102685749A (en) Wireless safety authentication method orienting to mobile terminal
CN105491015B (en) A kind of communication of data and storage method
CN109587100A (en) A kind of cloud computing platform user authentication process method and system
CN115865320A (en) Block chain-based security service management method and system
CN105978688B (en) A kind of cross-domain safety certifying method based on information separation management
CN106789845A (en) A kind of method of network data security transmission
WO2020038361A1 (en) Alliance chain-based authentication method, device and equipment and readable storage medium
CN106027256B (en) A kind of identity card card reading response system
CN110809000B (en) Service interaction method, device, equipment and storage medium based on block chain network
CN109474431A (en) Client certificate method and computer readable storage medium
CN111563980B (en) Bluetooth lock key generation and authentication method
CN111489462B (en) Personal Bluetooth key system
CN101521571B (en) Method for authenticating safety unit and server side of mobile hardware
CN111539032B (en) Electronic signature application system resistant to quantum computing disruption and implementation method thereof
CN114329395A (en) Supply chain financial privacy protection method and system based on block chain
CN104683979B (en) A kind of authentication method and equipment
CN111489461B (en) Bluetooth key system for group

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190723

RJ01 Rejection of invention patent application after publication