CN110245192A - Identity information querying method and system - Google Patents

Identity information querying method and system Download PDF

Info

Publication number
CN110245192A
CN110245192A CN201910535977.6A CN201910535977A CN110245192A CN 110245192 A CN110245192 A CN 110245192A CN 201910535977 A CN201910535977 A CN 201910535977A CN 110245192 A CN110245192 A CN 110245192A
Authority
CN
China
Prior art keywords
identity
target
information
identity information
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910535977.6A
Other languages
Chinese (zh)
Inventor
陈明武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BOE Technology Group Co Ltd
Original Assignee
BOE Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BOE Technology Group Co Ltd filed Critical BOE Technology Group Co Ltd
Priority to CN201910535977.6A priority Critical patent/CN110245192A/en
Publication of CN110245192A publication Critical patent/CN110245192A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party

Abstract

This disclosure relates to identity information querying method, comprising: receive the identity and identity information that the first user equipment is sent;According to the identity, the identity information, and generate the temporal information generation data packet of the identity information;The data packet is stored to the node of block chain network;Receive the inquiry instruction comprising the identity that second user equipment is sent;The target identity information and target time information in the target packet comprising the identity are obtained from the node;The target identity information and the target time information are sent to the second user equipment.In accordance with an embodiment of the present disclosure, without informing the identity information of the first user of second user by entity business card, the problem of occupying user's space so as to avoid entity business card, when also avoiding the loss of entity business card or staiing, second user determines that the identity information of the first user accuses existing inconvenience by entity business card.

Description

Identity information querying method and system
Technical field
This disclosure relates to block chain technical field more particularly to identity information querying method, identity information issuer's genealogy of law System and electronic equipment and computer readable storage medium.
Background technique
In traditional commercial social activity, business people is obtained in interactive process often through switching entity business card Know the identity information of other side.
However the preservation of entity business card needs occupied space, and there is loss and unsharp possibility because of contamination, causes The identity information of itself timely and accurately cannot be informed into other side and generate inconvenience.And when user updates identity information, also Need to remake entity business card, process is relatively complicated.
Summary of the invention
The disclosure provides identity information querying method and identity information querying method system and electronic equipment and computer Readable storage medium storing program for executing, to solve deficiency in the related technology.
According to the first aspect of the embodiments of the present disclosure, a kind of identity information querying method is provided, comprising:
Receive identity and the identity information of the transmission of the first user equipment;
According to the identity, the identity information, and generate the temporal information generation data of the identity information Packet;
The data packet is stored to the node of block chain network;
Receive the inquiry instruction comprising the identity that second user equipment is sent;
Target identity information and the object time in the target packet comprising the identity are obtained from the node Information;
The target identity information and the target time information are sent to the second user equipment.
Optionally, the target identity information obtained from the node in the target packet comprising the identity Include: with target time information
The inquiry request comprising the identity is sent to the node;
Target identity information and the object time in the target packet comprising the identity are received from the node Information.
Optionally, the target identity information obtained from the node in the target packet comprising the identity And target time information further include:
Sequencing requests are sent to the node;
Wherein, it is described from the node obtain comprising the identity target packet in target identity information and Target time information includes:
The node is received according to the sequencing requests according to the target identities after target time information sequence Information.
Optionally, by the target identity information and the target time information be sent to the second user equipment it Before, the method also includes:
The target identity information in each target packet is ranked up according to the target time information;
Wherein, described that the target identity information and the target time information are sent to the second user equipment packet It includes:
By after sequence the target identity information and the target time information be sent to the second user equipment.
Optionally, before receiving the identity and identity information that the first user equipment is sent, the method also includes:
To the user name of first user equipment, general exclusive identification code and timestamp carry out Hash operation, to generate The identity, wherein at the time of the timestamp corresponds to progress Hash operation.
According to the second aspect of an embodiment of the present disclosure, a kind of identity information inquiry system is provided, comprising:
Identity reception module, for receiving identity and the identity information of the transmission of the first user equipment;
Data packet generation module, for according to the identity, the identity information, and the generation identity information Temporal information generate data packet;
Data packet memory module, for storing the data packet to the node of block chain network;
Command reception module, for receiving the inquiry instruction comprising the identity of second user equipment transmission;
Data obtaining module, for obtaining the target body in the target packet comprising the identity from the node Part information and target time information;
Information sending module is used for the target identity information and the target time information to be sent to described second Family equipment.
Optionally, the data obtaining module includes:
Submodule is inquired, for sending the inquiry request comprising the identity to the node;
Receiving submodule, for receiving the target identities in the target packet comprising the identity from the node Information and target time information.
Optionally, the data obtaining module further include:
Sorting sub-module, for sending sequencing requests to the node;
Wherein, the receiving submodule, for receiving the node according to the sequencing requests according to the object time The target identity information after information sorting.
Optionally, the system also includes:
Message ordering module, for according to the target time information to the target identities in each target packet Information is ranked up;
Wherein, the information sending module, for the target identity information and object time letter after sorting Breath is sent to the second user equipment.
Optionally, the system also includes:
Identifier generation module, for the user name to first user equipment, general exclusive identification code and timestamp into Row Hash operation, to generate the identity, wherein at the time of the timestamp corresponds to progress Hash operation.
According to the third aspect of an embodiment of the present disclosure, a kind of electronic equipment is provided, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to realizing method described in any of the above-described embodiment.
According to a fourth aspect of embodiments of the present disclosure, a kind of computer readable storage medium is provided, calculating is stored thereon with Machine program, the program realize the step in any of the above-described embodiment the method when being executed by processor.
In accordance with an embodiment of the present disclosure, by depositing the temporal information of the identity information of the first user and generation identity information On the one hand storage informs the identity information of the first user of second user in the node of block chain network without passing through entity business card, The problem of occupying user's space so as to avoid entity business card, when also avoiding the loss of entity business card or staiing, second user is logical It crosses entity business card and determines that the identity information of the first user accuses existing inconvenience.
And the identity information of the first user is stored based on block chain network and generates the temporal information of identity information, it can be with The identity information for ensuring the first user and the temporal information for generating identity information can not all distort, and then second user can basis The temporal information for generating identity information accurately determines the first user past and present identity information, to accurately determine The case where first subscriber identity information changes.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is the schematic flow diagram according to a kind of identity information querying method shown in the embodiment of the present disclosure.
Fig. 2 is the schematic flow diagram according to another identity information querying method shown in the embodiment of the present disclosure.
Fig. 3 is the schematic flow diagram according to another identity information querying method shown in the embodiment of the present disclosure.
Fig. 4 is the schematic flow diagram according to another identity information querying method shown in the embodiment of the present disclosure.
Fig. 5 is the schematic flow diagram according to another identity information querying method shown in the embodiment of the present disclosure.
Fig. 6 is the schematic block diagram according to a kind of identity information inquiry system shown in the embodiment of the present disclosure.
Fig. 7 is the schematic block diagram according to another identity information inquiry unit shown in the embodiment of the present disclosure.
Fig. 8 is the schematic block diagram according to another identity information inquiry unit shown in the embodiment of the present disclosure.
Fig. 9 is the schematic block diagram according to another identity information inquiry unit shown in the embodiment of the present disclosure.
Figure 10 is the schematic block diagram according to another identity information inquiry unit shown in the embodiment of the present disclosure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is the schematic flow diagram according to a kind of identity information querying method shown in the embodiment of the present disclosure.The method Can be adapted for the identity information inquiry system comprising multiple servers, wherein the server can be local server, It can be Cloud Server.In one embodiment, the system may include gateway server and network server.
As shown in Figure 1, the identity information querying method may comprise steps of:
In step sl, the identity and identity information that the first user equipment is sent are received;
In one embodiment, step S1 can be executed by the gateway server.Gateway server can be used first The identity information of the first user equipment is generated when family is registered on the client, such as when the first user registers on the client, The user name (such as IP address, SIM card information etc.) of available first user equipment, then generates general exclusive identification code (Universally Unique Identifier, abbreviation UUID), and the time based on subsequent first user input identity information Information generates timestamp, then carries out Hash fortune to the user name of first user equipment, general exclusive identification code and timestamp It calculates, to generate the identity, wherein the hash algorithm used, including but not limited to SHA256.
In one embodiment, the first user equipment can be mobile phone, tablet computer, the terminals such as wearable device.? One user equipment can be equipped with for the client with the gateway server communication, and the first user can infuse on the client Volume and login, after the first user logs on the client, can inquire the identity information of other users.
When the first user registers on the client, identity can be obtained from gateway server first, then inputted The identity information of first user, the identity information include but is not limited to the name of the first user, occupation, company, phone number, Identity and identity information are sent to gateway server by fixed telephone number, mail etc., last client, such as can be with Identity and identity information are sent to gateway server by the form of list or POST data.
In step s 2, according to the identity, the identity information, and the time letter of the identity information is generated Breath generates data packet;
In one embodiment, gateway server can be by the identity, the identity information and the time Information is sent to network server, then generates the data packet by network server, wherein the data packet can be by can Algorithm for inversion encryption, can not also encrypt, and be only by identity, the identity information and the temporal information three phase Association is used as a data packet.
In one embodiment, network server is can receive whithin a period of time to a data packet, also can receive To multiple data packets, the data packet can be referred to as transaction in block chain, and network server can be according in a period of time The data packet received generates block, and the mode for generating block includes but is not limited to calculate block using the algorithm of Merkle tree Merkle tree root cryptographic Hash.
It can also include but is not limited to other fields, example in the data structure of block in addition to the cryptographic Hash of Merkle tree root Such as version field, version field can indicate version number, for tracking the update of software and agreement;Such as the address of a upper block The address field of field, a upper block specifically can be the cryptographic Hash of a block;Such as timestamp field, timestamp field table The time for showing block where generating timestamp field, it specifically can be UnixNano timestamp.
In step s3, the data packet is stored to the node of block chain network;
In one embodiment, the block of data packet can be distributed to the block chain comprising multiple nodes by network server Then network is stored the block comprising data packet sequentially in time to preset block by some node of block chain network In chain data structure, stored in the same fashion on other nodes for being re-synchronised in block chain network.Specific node storage The mode of block is not the main improvement of the present embodiment, and details are not described herein.
In step s 4, the inquiry instruction comprising the identity that second user equipment is sent is received;
In one embodiment, gateway server can receive the inquiry instruction of second user equipment transmission, second user Equipment can be mobile phone, tablet computer, the terminals such as wearable device.Second user equipment can be equipped with for the net The client of server communication is closed, second user can log on the client, can be with after second user logs on the client The identity information of other users is inquired, such as the identity can be inputted to inquire the identity information of the first user.
Gateway server can receive the inquiry instruction of second user equipment transmission, the body carried based on inquiry instruction Part mark, gateway server can send inquiry request to the node in block chain network, and requesting node inquiry includes the body The target packet of part mark.
In step s 5, the target identity information in the target packet comprising the identity is obtained from the node And target time information;
In one embodiment, the identity carried based on inquiry instruction, gateway server can be to block chain Node in network sends inquiry request, and requesting node inquiry includes the target packet of the identity, and then node will Target identity information and target time information in target packet feed back to gateway server, and target packet includes described Identity, then target identity information therein is exactly the identity information of the first user, target time information is exactly to generate institute State the temporal information of identity information.
It should be noted that querying node to the target packet comprising identity can be one, be also possible to It is multiple, and in the case where the target packet comprising identity is multiple, different target packets can be the first use Family is inputted in different moments, namely generates the target time information difference of target identity information in different target data packet.
In step s 6, the target identity information and the target time information second user is sent to set It is standby.
In one embodiment, gateway server can by the target identity information obtained from block chain network interior joint and The target time information is sent to the second user equipment, so as to obtain first using the second user of second user equipment The identity information of user, and determine the time that the identity information generates.
In accordance with an embodiment of the present disclosure, by depositing the temporal information of the identity information of the first user and generation identity information On the one hand storage informs the identity information of the first user of second user in the node of block chain network without passing through entity business card, The problem of occupying user's space so as to avoid entity business card, when also avoiding the loss of entity business card or staiing, second user is logical It crosses entity business card and determines that the identity information of the first user accuses existing inconvenience.
And the identity information of the first user is stored based on block chain network and generates the temporal information of identity information, it can be with The identity information for ensuring the first user and the temporal information for generating identity information can not all distort, and then second user can basis The temporal information for generating identity information accurately determines the first user past and present identity information, to accurately determine The case where first subscriber identity information changes.
Such as first user from time t1 to, in first company work, the t12 moment between t1 and t2 is defeated during time t2 Enter identity information generate data packet A, in the future the first user from time t3 to during time t4 company B work, t3 and t4 it Between the t34 moment input identity information generate data packet B.
And data packet A and data packet B can not be distorted after being stored in the node of block chain network, therefore work as second user root When inquiring the identity information of the first user according to the identity of the first user, the identity information that the t12 moment generates can be inquired It is the first user in first company work, and inquiring the identity information that the t34 moment generates is that the first user works in company B, from And accurately determine the job change from the t12 moment to the first user of t34 moment.
Fig. 2 is the schematic flow diagram according to another identity information querying method shown in the embodiment of the present disclosure.Such as Fig. 2 institute Show, the target identity information and object time letter obtained from the node in the target packet comprising the identity Breath includes:
In step s 51, Xiang Suoshu node sends the inquiry request comprising the identity;
In step S52, the target identities letter in the target packet comprising the identity is received from the node Breath and target time information.
In one embodiment, gateway server, can be to block after the inquiry request for receiving second user transmission Node in chain network sends inquiry request, target packet of the requesting node inquiry comprising the identity, and then node By in target packet target identity information and target time information feed back to gateway server, and target packet includes institute Identity is stated, then target identity information therein is exactly the identity information of the first user, target time information is exactly to generate The temporal information of the identity information.
Fig. 3 is the schematic flow diagram according to another identity information querying method shown in the embodiment of the present disclosure.Such as Fig. 3 institute Show, the target identity information and object time letter obtained from the node in the target packet comprising the identity Breath further include:
In step S53, Xiang Suoshu node sends sequencing requests;
Wherein, it is described from the node obtain comprising the identity target packet in target identity information and Target time information includes:
In step S61, receive the node according to the sequencing requests according to the target time information sequence after The target identity information.
It should be noted that the execution sequence of step S53 is not limited to situation shown in Fig. 3, but can according to need Setting executes sequence, such as can be performed simultaneously with step S51, it is only necessary to execute before step S52.
In one embodiment, gateway server is in addition to that can send inquiry request to the node in block chain network, also Sequencing requests can be sent to the node in block chain network, node, can be to inquiring based on the sequencing requests received Target identity information and target time information sort to target identity information according to target time information, so as to second user energy The case where enough identity information variations for easily determining the first user.And sorting operation is executed without gateway server, can be with Reduce the pressure of gateway server.
Such as the target identity information and target time information inquired includes the t12 and data packet A in above-described embodiment In identity information and t34 and data packet B in identity information, wherein t12 is located at before t34, then can be by data packet Before identity information in A comes the identity information in data packet B, so as to second user according to the time the first user after arrive first Identity information, to more intuitively understand the situation of change of the first subscriber identity information.
Fig. 4 is the schematic flow diagram according to another identity information querying method shown in the embodiment of the present disclosure.Such as Fig. 4 institute Show, before the target identity information and the target time information are sent to the second user equipment, the method Further include:
In the step s 7, according to the target time information to the target identity information in each target packet into Row sequence;
Wherein, described that the target identity information and the target time information are sent to the second user equipment packet It includes:
In step S62, by after sequence the target identity information and the target time information be sent to described Two user equipmenies.
In one embodiment, gateway server can believe the target identity information got from node and object time Breath sorts to target identity information according to target time information, so that second user can easily determine the body of the first user The case where part information change.And sorting operation is executed by gateway server, it is possible to reduce the pressure of node.
Such as the target identity information and target time information inquired includes the t12 and data packet A in above-described embodiment In identity information and t34 and data packet B in identity information, wherein t12 is located at before t34, then can be by data packet Before identity information in A comes the identity information in data packet B, so as to second user according to the time the first user after arrive first Identity information, to more intuitively understand the situation of change of the first subscriber identity information.
Fig. 5 is the schematic flow diagram according to another identity information querying method shown in the embodiment of the present disclosure.Such as Fig. 5 institute Show, before receiving the identity and identity information that the first user equipment is sent, the method also includes:
In step s 8, Hash is carried out to the user name of first user equipment, general exclusive identification code and timestamp Operation, to generate the identity, wherein at the time of the timestamp corresponds to progress Hash operation.
In one embodiment, gateway server can generate the first user when the first user registers on the client and set Standby identity information, for example, when the first user registers on the client, the user name of available first user equipment, then General exclusive identification code is generated, and timestamp is generated based on the temporal information that subsequent first user inputs identity information, then to institute The user name of the first user equipment is stated, general exclusive identification code and timestamp carry out Hash operation, to generate the identity.
Due to user name, timestamp although it is larger may on the case where being not in repetition, but be still likely to occur difference User uses the case where user name, or at the time of same timestamp corresponds under different user while inputting the feelings of identity information Condition, and the present embodiment generates identity not only in accordance with user name and timestamp, goes back according to general exclusive identification code, and it is general The case where exclusive identification code can't duplicate, it is possible to the identity not only user with the first user for ensuring to generate Name and the timestamp for generating identity information are associated, are also equipped with uniqueness, carry the first user so that subsequent second user is sent Identity inquiry instruction when, can accurately inquire the identity information of the first user.
With above-mentioned identity information querying method correspondingly, embodiment of the disclosure also proposed identity information inquiry system Embodiment.
Fig. 6 is the schematic block diagram according to a kind of identity information inquiry system shown in the embodiment of the present disclosure.As shown in fig. 6, The identity information inquiry system, comprising:
Identity reception module 1, for receiving identity and the identity information of the transmission of the first user equipment;
Data packet generation module 2, for according to the identity, the identity information, and generation the identity letter The temporal information of breath generates data packet;
Data packet memory module 3, for storing the data packet to the node of block chain network;
Command reception module 4, for receiving the inquiry instruction comprising the identity of second user equipment transmission;
Data obtaining module 5, for obtaining the target in the target packet comprising the identity from the node Identity information and target time information;
Information sending module 6, for the target identity information and the target time information to be sent to described second User equipment.
Fig. 7 is the schematic block diagram according to another identity information inquiry unit shown in the embodiment of the present disclosure.Such as Fig. 7 institute Show, the data obtaining module 5 includes:
Submodule 51 is inquired, for sending the inquiry request comprising the identity to the node;
Receiving submodule 52, for receiving the target body in the target packet comprising the identity from the node Part information and target time information.
Fig. 8 is the schematic block diagram according to another identity information inquiry unit shown in the embodiment of the present disclosure.Such as Fig. 8 institute Show, the data obtaining module 5 further include:
Sorting sub-module 53, for sending sequencing requests to the node;
Wherein, the receiving submodule 52, for receive the node according to the sequencing requests according to the target when Between the target identity information after information sorting.
Fig. 9 is the schematic block diagram according to another identity information inquiry unit shown in the embodiment of the present disclosure.Such as Fig. 9 institute Show, the system also includes:
Message ordering module 7, for according to the target time information to the target body in each target packet Part information is ranked up;
Wherein, the information sending module 6, for the target identity information and object time letter after sorting Breath is sent to the second user equipment.
Figure 10 is the schematic block diagram according to another identity information inquiry unit shown in the embodiment of the present disclosure.Such as Figure 10 institute Show, the system also includes:
Identifier generation module 8, for the user name to first user equipment, general exclusive identification code and timestamp into Row Hash operation, to generate the identity, wherein at the time of the timestamp corresponds to progress Hash operation.
About the system in above-described embodiment, wherein modules execute the concrete mode of operation in correlation technique It is described in detail in embodiment, no detailed explanation will be given here.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The module of explanation may or may not be physically separated, and the component shown as module can be or can also be with It is not physical module, it can it is in one place, or may be distributed on multiple network modules.It can be according to actual The purpose for needing to select some or all of the modules therein to realize disclosure scheme.Those of ordinary skill in the art are not paying Out in the case where creative work, it can understand and implement.
Embodiment of the disclosure also proposes a kind of electronic equipment, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to realizing method described in any of the above-described embodiment.
Embodiment of the disclosure also proposes a kind of computer readable storage medium, is stored thereon with computer program, the journey The step in any of the above-described embodiment the method is realized when sequence is executed by processor.
Those skilled in the art will readily occur to its of the disclosure after considering specification and practicing disclosure disclosed herein Its embodiment.The disclosure is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (12)

1. a kind of identity information querying method characterized by comprising
Receive identity and the identity information of the transmission of the first user equipment;
According to the identity, the identity information, and generate the temporal information generation data packet of the identity information;
The data packet is stored to the node of block chain network;
Receive the inquiry instruction comprising the identity that second user equipment is sent;
The target identity information and target time information in the target packet comprising the identity are obtained from the node;
The target identity information and the target time information are sent to the second user equipment.
2. the method according to claim 1, wherein described obtain from the node comprising the identity Target identity information and target time information in target packet include:
The inquiry request comprising the identity is sent to the node;
The target identity information and target time information in the target packet comprising the identity are received from the node.
3. according to the method described in claim 2, it is characterized in that, described obtain from the node comprising the identity Target identity information and target time information in target packet further include:
Sequencing requests are sent to the node;
Wherein, the target identity information and target obtained from the node in the target packet comprising the identity Temporal information includes:
The node is received according to the sequencing requests according to the target identity information after target time information sequence.
4. the method according to claim 1, wherein believing by the target identity information and the object time Breath is sent to before the second user equipment, the method also includes:
The target identity information in each target packet is ranked up according to the target time information;
Wherein, described the target identity information and the target time information are sent to the second user equipment to include:
By after sequence the target identity information and the target time information be sent to the second user equipment.
5. method according to claim 1 to 4, which is characterized in that receiving what the first user equipment was sent Before identity and identity information, the method also includes:
To the user name of first user equipment, general exclusive identification code and timestamp carry out Hash operation, described in generating Identity, wherein at the time of the timestamp corresponds to progress Hash operation.
6. a kind of identity information inquiry system characterized by comprising
Identity reception module, for receiving identity and the identity information of the transmission of the first user equipment;
Data packet generation module, for according to the identity, the identity information, and generate the identity information when Between information generate data packet;
Data packet memory module, for storing the data packet to the node of block chain network;
Command reception module, for receiving the inquiry instruction comprising the identity of second user equipment transmission;
Data obtaining module, for obtaining the target identities letter in the target packet comprising the identity from the node Breath and target time information;
Information sending module is set for the target identity information and the target time information to be sent to the second user It is standby.
7. system according to claim 6, which is characterized in that the data obtaining module includes:
Submodule is inquired, for sending the inquiry request comprising the identity to the node;
Receiving submodule, for receiving the target identity information in the target packet comprising the identity from the node And target time information.
8. system according to claim 7, which is characterized in that the data obtaining module further include:
Sorting sub-module, for sending sequencing requests to the node;
Wherein, the receiving submodule, for receiving the node according to the sequencing requests according to the target time information The target identity information after sequence.
9. system according to claim 6, which is characterized in that the system also includes:
Message ordering module, for according to the target time information to the target identity information in each target packet It is ranked up;
Wherein, the information sending module, for the target identity information and target time information hair after sorting It send to the second user equipment.
10. system according to any one of claims 6 to 9, which is characterized in that the system also includes:
Identifier generation module, for the user name to first user equipment, general exclusive identification code and timestamp are breathed out Uncommon operation, to generate the identity, wherein at the time of the timestamp corresponds to progress Hash operation.
11. a kind of electronic equipment characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to realizing method described in any one of claims 1 to 5.
12. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The step in any one of claims 1 to 5 the method is realized when execution.
CN201910535977.6A 2019-06-20 2019-06-20 Identity information querying method and system Pending CN110245192A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910535977.6A CN110245192A (en) 2019-06-20 2019-06-20 Identity information querying method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910535977.6A CN110245192A (en) 2019-06-20 2019-06-20 Identity information querying method and system

Publications (1)

Publication Number Publication Date
CN110245192A true CN110245192A (en) 2019-09-17

Family

ID=67888420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910535977.6A Pending CN110245192A (en) 2019-06-20 2019-06-20 Identity information querying method and system

Country Status (1)

Country Link
CN (1) CN110245192A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010395A (en) * 2019-12-17 2020-04-14 支付宝(杭州)信息技术有限公司 Credit-based information identifier generation method and device
WO2022033094A1 (en) * 2020-08-14 2022-02-17 格力电器(武汉)有限公司 Positioning base station data stream processing method and apparatus, device, and computer-readable medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system
CN107579979A (en) * 2017-09-07 2018-01-12 成都理工大学 The sharing query method of electronic health record based on block chain technology
CN108595719A (en) * 2018-07-12 2018-09-28 王跃平 A kind of recorder generates the block catenary system of the personal prestige of long and proof
CN109472161A (en) * 2018-11-21 2019-03-15 京东方科技集团股份有限公司 A kind of network server, information storage means, information exchange method and block catenary system
CN109889479A (en) * 2018-12-21 2019-06-14 中链科技有限公司 User identity based on block chain deposits card, verification method and device and verification system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system
CN107579979A (en) * 2017-09-07 2018-01-12 成都理工大学 The sharing query method of electronic health record based on block chain technology
CN108595719A (en) * 2018-07-12 2018-09-28 王跃平 A kind of recorder generates the block catenary system of the personal prestige of long and proof
CN109472161A (en) * 2018-11-21 2019-03-15 京东方科技集团股份有限公司 A kind of network server, information storage means, information exchange method and block catenary system
CN109889479A (en) * 2018-12-21 2019-06-14 中链科技有限公司 User identity based on block chain deposits card, verification method and device and verification system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010395A (en) * 2019-12-17 2020-04-14 支付宝(杭州)信息技术有限公司 Credit-based information identifier generation method and device
CN111010395B (en) * 2019-12-17 2021-09-24 支付宝(杭州)信息技术有限公司 Credit-based information identifier generation method and device
WO2022033094A1 (en) * 2020-08-14 2022-02-17 格力电器(武汉)有限公司 Positioning base station data stream processing method and apparatus, device, and computer-readable medium

Similar Documents

Publication Publication Date Title
US11005848B2 (en) Service processing method, apparatus and server
CA2919113C (en) Processing electronic tokens
CN105897675A (en) Video service providing method, access authentication method, server and system
US8756657B2 (en) Mobile or user device authentication and tracking
US20210192446A1 (en) Anonymity system for goods delivery
CN104852990A (en) Information processing method and intelligent household control system
CN105228140A (en) A kind of data access method and device
CN106453349B (en) Account login method and device
CN108965107B (en) Friend adding method, device, system, client and server
CN104767714A (en) Method, terminal and system for associating user resource information
CN109756896A (en) A kind of information processing method, the network equipment and computer readable storage medium
WO2017041562A1 (en) Method and device for identifying user identity of terminal device
CN104618388B (en) Fast registration login method and corresponding resetting server, information server
CN108390954A (en) A kind of message transmitting method and equipment
CN111431818B (en) Cross-domain request flow distribution method and device, storage medium and computer equipment
CN110245192A (en) Identity information querying method and system
US10931723B2 (en) Solution for establishing a communication session
CN112738019B (en) Method and device for displaying device information, storage medium and electronic device
CN106657140B (en) Application authorization method and device
CN110324824A (en) Vice card adding method, user terminal and block chain network system
CN107113281A (en) Content shared method, terminal, server and system
US20150281946A1 (en) Communication Agent Method
CN105376727A (en) Data card processing method and device
RU2720639C1 (en) Automated registration method
US11368835B2 (en) Method for verifying the validity of a user's telephone line

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination