CN110417790A - Block chain system of real name queuing system and method - Google Patents

Block chain system of real name queuing system and method Download PDF

Info

Publication number
CN110417790A
CN110417790A CN201910710931.3A CN201910710931A CN110417790A CN 110417790 A CN110417790 A CN 110417790A CN 201910710931 A CN201910710931 A CN 201910710931A CN 110417790 A CN110417790 A CN 110417790A
Authority
CN
China
Prior art keywords
transaction
user
node
intelligent contract
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910710931.3A
Other languages
Chinese (zh)
Other versions
CN110417790B (en
Inventor
裴磊
苏恒
罗伟彬
龚开圳
赵开山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201910710931.3A priority Critical patent/CN110417790B/en
Publication of CN110417790A publication Critical patent/CN110417790A/en
Application granted granted Critical
Publication of CN110417790B publication Critical patent/CN110417790B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A kind of block chain system of real name queuing system and method, the system include client and queuing system business chain;The queuing system business chain includes transaction access node, rights management node and multiple transaction verification nodes;System of real name certification is carried out by each node of the biological identification technology in business chain, queue discipline establishment is disposed and is operated on transaction verification node for intelligent contract, the sequence information for being lined up member is reduced in process of exchange as the mode that perdurable data is stored on transaction verification node because of malicious act or unexpected bring dispute, is ensured the disclosure of queuing process and is lined up the just of result.

Description

Block chain system of real name queuing system and method
Technical field
The present invention relates to block chain technical field, the system of real name queuing system and method for especially a kind of block chain.
Background technique
With the development of block chain technology, open, anti-tamper technical characteristic is more and more used the public letter of needs In the scene of power, queuing system is exactly one of.Queuing system is exactly a kind of suitable according to the arrival for being lined up member in brief Sequence determines the service system of service order according to the rule of agreement.In reality, queuing system is widely used in each business field Scape, such as medical treatment, education, the application of house public resource enable queuing member is fair orderly to enjoy to ensure queuing order It is serviced.But current internet rapid development digital times, queuing system in actual application, because of queue discipline Opacity under run mode causes queuing member to leave a question open the publicity of its operational process and the fairness of operation result, Even cause dispute, largely influence the public credibility of its service organization, or even its service organization's reputation and interests is caused to damage Lose, and be related to multi-party right and have to participate in business system in many ways for queuing system is this, need by establish one it is positive, Open communication replaces to obtain the trust of each participant.
Summary of the invention
It is an object of that present invention to provide a kind of system of real name queuing system of block chain and method, rely on block chain disclose, Anti-tamper technical characteristic is executed by intelligent contract and is lined up transaction, is reduced in process of exchange and is brought because of malicious act or surprisingly Dispute, ensure queuing process disclosure and be lined up result it is just.
In order to achieve the above object, block chain system of real name queuing system provided by the present invention, the system include client and Queuing system business chain;The queuing system business chain includes transaction access node, rights management node and multiple transaction verifications Node;Wherein, the rights management node is preset Notified Body, according to preset rules to the transaction access node and institute It states transaction verification node and carries out authentic authentication, according to the transaction access node, rights management node after authentic authentication passes through Block chain is constructed with transaction verification node, user name and cipher list are generated according to the block chain;And the transaction is connect The subscriber identity information in transaction request that ingress provides carries out Authority Verification, raw according to the block chain after being verified At certificate of fair, the certificate of fair is fed back into the transaction access node and the transaction verification node;The transaction connects Ingress is used to generate transaction unique number, user identity authentication solicited message and user according to the transaction request received and be lined up Service requesting information;Pass through living things feature recognition skill according to the transaction unique number and the user identity authentication solicited message Art carries out real-name authentication to the subscriber identity information in the transaction request, after real-name authentication passes through, by the transaction request It transfers to the rights management node to carry out user right verifying and receives the certificate of fair of the rights management node feeding back;By institute It states user's queuing service solicited message and is converted to intelligent contract transaction request, the intelligent contract is handed over by the certificate of fair Easily the transaction verification node is sent to after request encryption;The transaction verification node is for disposing preset intelligent contract journey Sequence;And the type of close post analysis described in intelligence contract transaction is tested by certificate of fair the intelligent contract transaction, when described When the type of intelligent contract transaction is newly-increased data, intelligence is completed into the intelligent contract transaction broadcast to other transaction verification nodes After the processing of energy contract transaction common recognition and request data persistence, intelligent contract transaction is lined up to the intelligent contract transaction execution And implementing result is fed back into the client;The client is used to obtain user name according to the user name and cipher list And password, the username and password is provided to user, receiving user, by username and password to log in the client defeated The transaction request is transferred to the transaction access node by the transaction request entered;And the implementing result received is fed back to User.
In above-mentioned block chain system of real name queuing system, it is preferred that the user identity authentication solicited message includes user Type of credential, user certificate number and user's collection in worksite photo;User's queuing service solicited message includes intelligent contract Function name corresponds to parameter with intelligent contract function.
In above-mentioned block chain system of real name queuing system, it is preferred that the transaction access node includes that user requests to receive Device, biological characteristic comparison device and cochain transaction packaging system;The user requests reception device for receiving the client The transaction request provided is provided, transaction unique number, user identity authentication solicited message and user are generated according to the transaction request Queuing service solicited message;The biological characteristic comparison device according to the transaction unique number and the user identity for recognizing It demonstrate,proves solicited message and real-name authentication is carried out to the subscriber identity information in the transaction request by biometrics identification technology;It is described Cochain trades packaging system for transferring to the rights management node to use the transaction request after real-name authentication passes through Family Authority Verification and the certificate of fair for receiving the rights management node feeding back;User's queuing service solicited message is converted For intelligent contract transaction request, the transaction is sent to after encrypting by the certificate of fair to the intelligent contract transaction request Verify node.
In above-mentioned block chain system of real name queuing system, it is preferred that the biological characteristic comparison device includes In vivo detection Module, benchmark shine acquisition module, characteristic extracting module and feature comparison module;The In vivo detection module is used for special by biology In vivo detection silence algorithm in sign identification technology detects user's scene photograph for sending in user's request;The benchmark It is used to user certificate type in user request and user certificate number being sent to the user certificate class according to acquisition module The legal mechanism of signing and issuing of type is verified, in the legal trusted identity benchmark signed and issued mechanism and obtain user after being verified Photo;The characteristic extracting module is used for through feature extraction algorithm to user's scene photograph and user's reference picture Feature extraction and calculation is carried out, user's scene photograph characteristic value and reference picture characteristic value are obtained;The feature comparison module is used for Characteristic similarity ratio is carried out to user's scene photograph characteristic value and the reference picture characteristic value by feature alignment algorithm It is right, user is judged whether it is according to the misclassification rate parameter setting of algorithm, completes the user identity based on biological identification technology It veritifies.
In above-mentioned block chain system of real name queuing system, it is preferred that the cochain transaction packaging system includes certificate acquisition Module and transaction encryption module;The certificate acquisition module obtains certificate of fair, root for interacting with the rights management node Public key and private key pair are generated according to elliptic curve;The transaction encryption module is used for user's queuing service solicited message by row Team's intelligence contract transaction interface carries out reference format conversion, obtains intelligent contract transaction request;By the private key to intelligent conjunction About transaction request carries out encrypting and transmitting to the transaction verification node.
In above-mentioned block chain system of real name queuing system, it is preferred that the transaction verification node include transaction R-T unit, Intelligent contract route device and transaction common recognition and executive device;The transaction R-T unit is for receiving the transaction access node The intelligent contract transaction request of offer, it is close according to test to transaction from the certificate of fair;And detect preset intelligent contract Whether normally dispose and is operated on current transaction verification node;The intelligence contract route device is used for preset intelligence Contract is deployed on current transaction verification node;And response intelligent operation state inquiry request;Dress is known together and is executed in the transaction The type for analyzing the intelligent contract transaction is set, it, will be described when the type of the intelligent contract transaction is newly-increased data Intelligent contract transaction broadcast to other transaction verification nodes complete the processing of intelligent contract transaction common recognition and request data persistence Afterwards, it trades to the intelligent contract of the intelligent contract transaction execution queuing and implementing result is fed back into the client.
In above-mentioned block chain system of real name queuing system, it is preferred that the intelligence contract route device includes intelligent contract Deployment module and intelligent contract enquiry module;The intelligence contract deployment module is used to carry out the code of preset intelligent contract The intelligent contract is deployed on current transaction verification node by specification and safety inspection, inspection after passing through;The intelligence contract Enquiry module is used to carry out the intelligent contract operation monitoring, and the fortune of the intelligent contract is inquired according to intelligence and about ID Row state and regular source code.
In above-mentioned block chain system of real name queuing system, it is preferred that the transaction common recognition and executive device are handed over comprising message Mutual module, transaction common recognition module and transaction execution module;The interacting message module is used for total in each transaction verification node The common recognition message that current transaction verification node generates is sent during knowing;And receive other transaction verification nodes hair in block chain Common recognition message out;The transaction common recognition module is used to carry out repeating to the intelligent contract transaction and parameter legitimacy verifies, Enter pre-prepare common recognition, prepare common recognition, commit common recognition after verification passes through;Current first order section is accumulative to receive 2f+1 After the consistent confirmation message of other a transaction common recognition nodes, next stage is completed and entered to the common recognition of current generation, when three ranks It is after the common recognition of section is fully completed, the intelligent contract transaction is writable by the data after being lined up intelligent contract business logic processing Block carries out persistence;The transaction execution module obtains current block chain persistence disk for executing block data record Account book is converted to the SeqNo of Successful Transaction information, transaction results information and block common recognition that the transaction common recognition module is completed NoHashData is saved in block, and implementing result is fed back to the client.
In above-mentioned block chain system of real name queuing system, it is preferred that the rights management node includes rights management device With certificate management device;The rights management device is used to test the transaction access node and the transaction according to preset rules It demonstrate,proves node and carries out authentic authentication, tested after authentic authentication passes through according to the transaction access node, rights management node and transaction It demonstrate,proves node and constructs block chain, user name and cipher list are generated according to the block chain;And the transaction access node is mentioned Subscriber identity information in the transaction request of confession carries out Authority Verification;The certificate management device is used for raw according to the block chain At certificate of fair;The certificate of fair generates public key and private key cryptographic pair according to elliptic curve;And it is the certificate of fair is wide Cast on block chain for All Activity verifying node for trade test it is close.
In above-mentioned block chain system of real name queuing system, it is preferred that the number of the transaction verification node is 3f+1;Its In, f be node fault-tolerance number, minimum 1.
In above-mentioned block chain system of real name queuing system, it is preferred that the client includes resource bid system server With multiple user clients;The resource bid system server is used to obtain user name according to the user name and cipher list And password, the username and password is provided to user;The user client passes through user name and close for receiving user Code logs in the transaction request of the client input, and the transaction request is transferred to institute by the resource bid system server State transaction access node;And the implementing result received is fed back into user.
The present invention also provides a kind of block chain system of real name queuing strategies, and the method includes: with preset Notified Body work For rights management node, by the rights management node according to preset rules to transaction access node and transaction verification node into Row authentic authentication constructs area according to transaction access node, rights management node and transaction verification node after authentic authentication passes through Block chain generates user name and cipher list according to the block chain;Preset intelligent contract program is deployed in the transaction to test It demonstrate,proves on node;Client obtains username and password according to the user name and cipher list, and the username and password is mentioned It is supplied to user;The transaction request that user logs in client input by username and password is received, the transaction request is transferred to The transaction access node;The transaction access node generates transaction unique number, Yong Hushen according to the transaction request received Part certification request information and user's queuing service solicited message;It is asked according to the transaction unique number and the user identity authentication Information is asked to carry out real-name authentication to the subscriber identity information in the transaction request by biometrics identification technology, when real name is recognized After card passes through, the rights management node is transferred to carry out user right verifying the transaction request;The rights management node To it is described transaction access node provide transaction request in subscriber identity information carry out Authority Verification, after being verified according to The block chain generates certificate of fair, and the certificate of fair is fed back to the transaction access node and the transaction verification section Point;User's queuing service solicited message is converted to intelligent contract transaction request by the transaction access node, by described Certificate of fair is sent to the transaction verification node after encrypting to the intelligent contract transaction request;The transaction verification node is logical The type that certificate of fair tests the intelligent contract transaction transaction of intelligence contract described in close post analysis is crossed, when the intelligent contract is handed over When easy type is newly-increased data, intelligent contract transaction is completed into the intelligent contract transaction broadcast to other transaction verification nodes After the processing of common recognition and request data persistence, trades to the intelligent contract of the intelligent contract transaction execution queuing and knot will be executed Fruit feeds back to the client;The implementing result received is fed back to user by the client.
In above-mentioned block chain system of real name queuing strategy, it is preferred that by the intelligent contract transaction broadcast to other transaction Verifying node completes intelligent contract transaction common recognition and the processing of request data persistence includes: the transaction verification node receives intelligence Intelligent contract query function acquisition current block height, HASH, block data can be executed as forerunner's friendship after contract transaction request Easy common recognition data;It is matched according to user's real-name authentication result with the current block data inquired, verifies and whether submit Transaction Information when not there is no duplicate customer information is cached to local memory array and according to intelligence by duplicate customer information The sequence information of setting all users of logic calculation current block in contract;New block counts are generated according to the sequence information According to, and trade using current block height, HASH, block data, newly-increased transaction results block data as common recognition message to other It verifies node and initiates common recognition;It, will be described new when receiving the consistent confirmation message of 2f+1 other transaction verification node feeding backs Block data is written block and carries out persistence;When the consistent of 2f+1 other transaction verification node feeding backs is not received in cycle time Confirmation message carries out current transaction verification node transaction rollback, and removes local memory array;Wherein, in the block chain The number of the transaction verification node is 3f+1;F be node fault-tolerance number, minimum 1.
The present invention also provides a kind of computer equipment, including memory, processor and storage on a memory and can located The computer program run on reason device, the processor realize the above method when executing the computer program.
The present invention also provides a kind of computer readable storage medium, the computer-readable recording medium storage has in execution State the computer program of method.
The beneficial technical effect of the present invention lies in: it can ensure and be lined up the true uniqueness of member identities, queueing message discloses Brightization promotes the public credibility and authority of queuing service system;
It is really unique to be lined up member identities: being verified, is led to by identity information of the biological identification technology to operation user Physical examination survey technology, the biological characteristic comparison technology guarantee queuing accredited members' identity of making a living are authentic and valid, prevent unification user from repeating It is lined up, solves the problems, such as that user's fraud repeats application resource in traditional queuing system;
Queueing message is open and clear: introducing block chain technology, by its disclosure, the technical characteristic that can not be distorted, will be lined up Rule research and development are disposed and are operated in block chain network for intelligent contract;User can check the intelligent contract code of deployment to supervise The fairness for superintending and directing queue discipline supervises the public affairs for being lined up result by inquiring oneself and the user sequence information in block catenary system Levelling solves the hidden danger of black-box operation in traditional queuing system;
Promote the public credibility of queuing service system and authoritative: by its member identities it is stringent verify and queue discipline and Operation result it is open and clear, ensure the fair and just of operation result.User is excluded to promotion queuing service system operation And the query of result, ensure phase public credibility and authority.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, not Constitute limitation of the invention.In the accompanying drawings:
Figure 1A and Figure 1B is a kind of structure chart of the system of real name queuing system of block chain;
Fig. 2 is authentication intra-node structure chart;
Fig. 3 is transaction verification intra-node structure chart;
Fig. 4 is rights management intra-node structure chart;
Fig. 5 A and Fig. 5 B are a kind of flow chart of the system of real name queuing strategy of block chain;
Fig. 6 is transaction verification node common recognition flow chart.
Specific embodiment
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings and examples, how to apply to the present invention whereby Technological means solves technical problem, and the realization process for reaching technical effect can fully understand and implement.It needs to illustrate As long as not constituting conflict, each feature in each embodiment and each embodiment in the present invention can be combined with each other, institute The technical solution of formation is within the scope of the present invention.
In addition, step shown in the flowchart of the accompanying drawings can be in the department of computer science of such as a group of computer-executable instructions It is executed in system, although also, logical order is shown in flow charts, and it in some cases, can be to be different from herein Sequence execute shown or described step.
It please refers to shown in Figure 1A, block chain system of real name queuing system provided by the present invention, the system includes client With queuing system business chain;The queuing system business chain includes that transaction access node, rights management node and multiple transaction are tested Demonstrate,prove node;Wherein, the rights management node be preset Notified Body, according to preset rules to the transaction access node with The transaction verification node carries out authentic authentication, according to the transaction access node, rights management section after authentic authentication passes through Point and transaction verification node construct block chain, generate user name and cipher list according to the block chain;And to the transaction The subscriber identity information in transaction request that access node provides carries out Authority Verification, according to the block chain after being verified Certificate of fair is generated, the certificate of fair is fed back into the transaction access node and the transaction verification node;The transaction Access node is used to generate transaction unique number, user identity authentication solicited message and user row according to the transaction request received Team's service requesting information;Pass through living things feature recognition according to the transaction unique number and the user identity authentication solicited message Technology, which carries out real-name authentication to the subscriber identity information in the transaction request, asks the transaction after real-name authentication passes through It asks and transfers to the rights management node to carry out user right verifying and receive the certificate of fair of the rights management node feeding back;It will User's queuing service solicited message is converted to intelligent contract transaction request, by the certificate of fair to the intelligent contract The transaction verification node is sent to after transaction request encryption;The transaction verification node is for disposing preset intelligent contract journey Sequence;And the type of close post analysis described in intelligence contract transaction is tested by certificate of fair the intelligent contract transaction, when described When the type of intelligent contract transaction is newly-increased data, intelligence is completed into the intelligent contract transaction broadcast to other transaction verification nodes After the processing of energy contract transaction common recognition and request data persistence, intelligent contract transaction is lined up to the intelligent contract transaction execution And implementing result is fed back into the client;The client is used to obtain user name according to the user name and cipher list And password, the username and password is provided to user, receiving user, by username and password to log in the client defeated The transaction request is transferred to the transaction access node by the transaction request entered;And the implementing result received is fed back to User.
In the above-described embodiments, the client may include resource bid system server and multiple user clients;Institute Resource bid system server is stated for obtaining username and password according to the user name and cipher list, by the user name User is provided to password;The user client logs in the client input by username and password for receiving user Transaction request, the transaction request is transferred into the transaction access node by the resource bid system server;And The implementing result received is fed back into user.The user identity authentication solicited message includes user certificate type, user certificate Part number and user's collection in worksite photo;User's queuing service solicited message includes that intelligent contract function name and intelligence are closed About function corresponds to parameter;The number of the transaction verification node is 3f+1;Wherein, f be node fault-tolerance number, minimum 1.
Specifically, please refer to shown in Figure 1B, in actual operation, block chain system of real name queuing system provided by the present invention By introducing biometric authentication technology, queue discipline establishment is disposed for intelligent contract and is operated on block catenary system, is arranged The sequence information of team member is stored in a kind of system of real name for block chain technology that block chain is deposited on card node as perdurable data Queuing system, it may include queuing system business chain 1, resource bid system 5, user client 6 are needed, in queuing system business chain Portion's node includes transaction access node 2, transaction verification node 3, rights management node 4.With reference to the accompanying drawing to the technology of the present invention Scheme is described in detail.
As shown in Figure 1B, the mechanisms such as public service mechanism such as hospital, school are according to resource allocation principle by corresponding resource system The rule of system distribution resource is written as the intelligent contract of computer automatic execution, operates in block chain network, composition is lined up industry Business business chain;User needs to apply that resource or query result Shi Zecong user client are docked by resource bid server of the system Queuing system business column execute corresponding transaction request.Include transaction access node 2, transaction access node 3 and permission pipe on chain Node 4 is managed, wherein transaction verification node, node number is 3f+1, and each transaction verification node structure is identical, wherein f Supported fault tolerant node number in expression business connection, minimum value 1, transaction common recognition process are calculated using pbft Byzantine failure tolerance Method, a requests transaction must receive at least 2f+1 from the consistent of other verifying nodes by each verifying node in a network After confirmation message, which could complete the common recognition of current generation, the common recognition of three phases all after the completion of trade executive device In queuing intelligence contract be just performed, it is lasting that implementing result is just carried out in the block depending on making valid data write-in block chain Change.
" the transaction access node 2 " is the network node that real-name authentication and Authority Verification are carried out to transaction request user, To pass through the safety certification of rights management node 4 when network is added.For receiving user's request, and by authoritative with the Ministry of Public Security etc. Notified Body carries out the trusted identity reference picture that docking obtains user, is calculated by the In vivo detection in biometrics identification technology Method come detect photo and video fraud, it is ensured that above send scene photograph be user be I be taken on site photo, pass through biological characteristic Feature calculation algorithm in identification technology carries out feature extraction and aspect ratio pair to user's scene photograph and reference picture, completes note The real-name authentication of volume user identity.
" the transaction verification node 3 " is the trustable network that block chain network is added after the certification of rights management node 4 Node.Transaction common recognition and executive device 33 are responsible for receiving the transaction of intelligent 32 distribution of contract route device, complete transaction common recognition simultaneously Corresponding transaction data processing is completed according to the business processing logic for being lined up intelligent Contracts Definitions, by processing result and common recognition result It is written in corresponding block.
" the rights management node 4 " is responsible for carrying out authentication guarantee to the transaction verification node that block chain network is added What is be added is trusted node, is responsible for initiating transaction user's progress authorization check, it is ensured that user can and can only access and oneself Relevant business chain is licit traffic dispensing transaction certificate, the safety that transaction access node 3 ensures to trade by certificate verification Property.
In an embodiment of the present invention, the transaction access node may include that user requests reception device, biological characteristic ratio To device and cochain transaction packaging system;The transaction that the user requests reception device to be used to receive the client offer is asked It asks, transaction unique number, user identity authentication solicited message and user's queuing service request letter is generated according to the transaction request Breath;The biological characteristic comparison device according to the transaction unique number and the user identity authentication solicited message for passing through Biometrics identification technology carries out real-name authentication to the subscriber identity information in the transaction request;The cochain transaction encapsulation dress It sets for transferring to the rights management node to carry out user right verifying the transaction request and connecing after real-name authentication passes through Receive the certificate of fair of the rights management node feeding back;User's queuing service solicited message is converted into intelligent contract transaction Request is sent to the transaction verification node after encrypting by the certificate of fair to the intelligent contract transaction request.Wherein, The biological characteristic comparison device is comprising In vivo detection module, benchmark according to acquisition module, characteristic extracting module and aspect ratio to mould Block;The In vivo detection module is used for through the In vivo detection silence algorithm in biometrics identification technology in user's request The user's scene photograph sent detects;The benchmark according to acquisition module be used for by the user request in user certificate type and The legal mechanism of signing and issuing that user certificate number is sent to the user certificate type is verified, in the method after being verified Surely the trusted identity reference picture that mechanism obtains user is signed and issued;The characteristic extracting module is used for through feature extraction algorithm to institute It states user's scene photograph and user's reference picture carries out feature extraction and calculation, obtain user's scene photograph characteristic value and benchmark Photo eigen value;The feature comparison module is used for through feature alignment algorithm to user's scene photograph characteristic value and described Reference picture characteristic value carries out characteristic similarity comparison, judges whether it is user according to the misclassification rate parameter setting of algorithm, The user identity based on biological identification technology is completed to veritify.The cochain transaction packaging system includes certificate acquisition module and transaction Encrypting module;The certificate acquisition module obtains certificate of fair for interacting with the rights management node, according to elliptic curve Generate public key and private key pair;The transaction encryption module is used for user's queuing service solicited message by the intelligent contract of queuing Transaction interface carries out reference format conversion, obtains intelligent contract transaction request;By the private key to intelligent contract transaction request Encrypting and transmitting is carried out to the transaction verification node.
Specifically, please referring to shown in Fig. 2, may include in access node of trading: user requests reception device 21, biological characteristic Comparison device 22, cochain transaction packaging system 23.
The user requests reception device 21 to be responsible for receiving user's queuing transaction request, generates transaction unique serial number uuid. Solicited message includes subscriber identity information, and registration is lined up the intelligent contract business transactions such as user, inquiry queueing message, receives user User right verification is carried out by the permission control module of rights management node 4 after request.
The biological characteristic comparison device 22 carries out authentication to user, and the identity that confirmation registration is lined up user is true Property, validity, the user of confirmation inquiry queueing message is to possess the user of queuing system business chain permission to operate, including work Body detection module 221, benchmark shine acquisition module 222, characteristic extracting module 223, feature comparison module 224.
The In vivo detection module 221 requests user using the In vivo detection silence algorithm in biometrics identification technology In on user's scene photograph for sending carry out quality testing, if it is detected that user's scene photograph is that video intercepting or photo reproduction are then lived Physical examination survey does not pass through, by transaction request backtracking prompt information to user.
The benchmark is responsible for whether the authoritative Notified Body such as docking Ministry of Public Security verifies subscriber identity information according to acquisition module 222 It is legal and obtain user's trusted identity reference picture.By user request on send user certificate type, user certificate number, use Family name is packaged into request packet and interacts in authoritative Notified Body, the correctness of name and certificate information is verified, if just True authoritative institution's user's reference picture that then gigback is retained, if name and certificate information are wrong, by transaction request original road Prompt information is returned to user.
The characteristic extracting module 223 is using the feature extraction algorithm in biometrics identification technology to In vivo detection module User's reference picture that the user's scene photograph and benchmark that 221 certifications pass through are obtained according to the communication of acquisition module 222 carries out feature and mentions Calculating is taken, user's scene photograph characteristic value and reference picture characteristic value are obtained.
The feature comparison module 224 is using the feature alignment algorithm in biometrics identification technology to characteristic extracting module The 223 user's scene photograph characteristic values being calculated and reference picture characteristic value carry out characteristic similarity comparison, according to algorithm Misclassification rate parameter setting judges whether it is user, completes the user identity based on biological identification technology and veritifies.If veritified It is operated in person to be non-, by transaction request backtracking prompt information to user.
The cochain transaction packaging system 23 is to convert intelligent contract for user's request message in block chain network to call The device of transaction.Including certificate acquisition module 231, transaction encryption module 232.
The certificate acquisition module 231 is responsible for interacting the certificate of fair got with rights management node 4, according to oval bent Line generates public key and private key pair.
The transaction encryption module 232 carries out reference format conversion by intelligent contract transaction interface is lined up, by user Restful request is converted to Grpc the or Http agreement that transaction verification several points 3 require, and encrypt to the transaction of intelligent contract concurrent It is sent to transaction verification node and carries out transaction verification and data persistence operation.
Transaction verification node is in block chain system of real name queuing system provided herein as practical business processing Unit, in an embodiment of the present invention, the transaction verification node include transaction R-T unit, intelligent contract route device and friendship Easily common recognition and executive device;The transaction R-T unit is used to receive the intelligent contract transaction that the transaction access node provides and asks It asks, it is close according to test to transaction from the certificate of fair;And detect whether preset intelligent contract has normally been disposed and run On current transaction verification node;The intelligence contract route device is used to preset intelligent contract being deployed in current transaction and test It demonstrate,proves on node;And response intelligent operation state inquiry request;The transaction common recognition and executive device are closed for analyzing the intelligence The type about traded broadcasts the intelligent contract transaction to it when the type that the intelligent contract is traded is newly-increased data After his transaction verification node completes the processing of intelligent contract transaction common recognition and request data persistence, trade to the intelligent contract It executes and is lined up intelligent contract transaction and implementing result is fed back into the client.
In the above-described embodiments, the intelligent contract route device includes intelligent contract deployment module and intelligent contract inquiry Module;The intelligence contract deployment module is used to carry out specification and safety inspection to the code of preset intelligent contract, checks logical Later the intelligent contract is deployed on current transaction verification node;The intelligence contract enquiry module is used for the intelligence Contract carries out operation monitoring, and the operating status and rule source code of the intelligent contract are inquired according to intelligence and about ID.
In the above-described embodiments, transaction common recognition and executive device include interacting message module, transaction common recognition module and Transaction execution module;The interacting message module is used to send current transaction during each transaction verification node common recognition and test Demonstrate,prove the common recognition message that node generates;And receive the common recognition message that other transaction verification nodes issue in block chain;The transaction Common recognition module is used to carry out repeating to the intelligent contract transaction and parameter legitimacy verifies, and pre- is entered after verification passes through Prepare common recognition, prepare common recognition, commit common recognition;Current first order section is accumulative to receive 2f+1 other common recognition nodes of trading After consistent confirmation message, next stage is completed and entered to the common recognition of current generation, will after the common recognition of three phases is fully completed The intelligence contract transaction carries out persistence by the writable block of data after being lined up intelligent contract business logic processing;The friendship Easy execution module obtains current block chain persistence disk account book, by transaction common recognition mould for executing block data record The SeqNo of Successful Transaction information, transaction results information and block common recognition that block is completed is converted to NoHashData and is saved in block In, implementing result is fed back into the client.
Specifically, please refer to shown in Fig. 3, transaction verification node provided by the present invention may include transaction R-T unit 31, Intelligent contract route device 32, transaction common recognition and executive device 33.
The transaction R-T unit 31 is responsible for receiving the intelligent contract transaction request that cochain transaction packaging system 23 is submitted, root Transaction test according to the certificate of fair obtained from rights management node 4 close, detects intelligent contract whether normally deployment and fortune Row is in current network node.
The intelligence contract route device 32 is responsible for the device of intelligent contract deployment and response intelligent operation state inquiry request, Including intelligent contract deployment module 321, intelligent contract enquiry module 322.
The intelligence contract deployment module 321 is responsible for carrying out specification to intelligent contract code and safety inspection, inspection pass through It is then deployed on the transaction verification node afterwards.
322 pairs of the intelligence contract enquiry module intelligent contracts carry out operation monitoring, can inquire it by intelligence and about ID Operating status and browsing and regular source code.
The transaction common recognition and executive device 33 are the core work devices of transaction verification node, are responsible for handing over intelligent contract Legitimacy verifies are easily carried out, transaction common recognition is carried out in queuing service connection and is executed according to the business rule for being lined up intelligent contract Intelligent contract transaction writes result data to block, including interacting message module 331, transaction common recognition module 332, transaction execution Module 333.
The interacting message module 331 is the module that transaction verification node directly carries out information exchange, is mainly known together The common recognition message that current transaction access node 3 transaction common recognition module 332 generates is sent in journey, receives other transaction accesses in network The common recognition message that the transaction common recognition module 332 of node 3 issues.
The transaction common recognition module 332 is to complete the nucleus module of transaction common recognition, repeat to transaction and parameter is legal Property verification, verification then enters three-stage and knows together process after passing through, the first stage is that pre-prepare knows together, and second stage is Prepare common recognition, phase III are commit common recognition, and three phases are that sequence executes, and current first order section is accumulative to receive 2f+1 Next stage is completed and entered to the common recognition of current generation after the consistent confirmation message of other transaction common recognition nodes, and three phases are total to Knowledge represents that the transaction of this queuing request is legal after being fully completed, by being lined up, the data after intelligent contract business logic processing are writable Block carries out persistence.
The transaction execution module 333 is responsible for completing block data record, obtains current block chain persistence disk account book, The SeqNo of Successful Transaction information, transaction results information and block common recognition that transaction common recognition module 332 is completed is converted to NoHashData is saved in block, sends onblock executing success events, carries out the strong consistency inspection so transaction access node 3 Look into (block height, forerunner, current Hash).
In an embodiment of the present invention, the rights management node includes rights management device and certificate management device;Institute Rights management device is stated for credible recognizing according to preset rules to the transaction access node and transaction verification node progress Card constructs block chain according to the transaction access node, rights management node and transaction verification node after authentic authentication passes through, User name and cipher list are generated according to the block chain;And the use in the transaction request provided the transaction access node Family identity information carries out Authority Verification;The certificate management device is used to generate certificate of fair according to the block chain;The friendship Easy certificate generates public key and private key cryptographic pair according to elliptic curve;And by the certificate of fair broadcast on block chain for all Transaction verification node is tested close for transaction.It specifically please refers to shown in Fig. 4, rights management node is mainly responsible for queuing system access and uses It family authentication, the control of queuing system business chain permission and the storage of certificate and signs and issues, including rights management device 41, certificate Managing device 42.The rights management device 41 be responsible for queuing system business chain permission control with ensure user privacy information and System safety operation.Whether the log-on message for verifying user by the user information sent on user is accurate, judges whether user has Access the permission of queuing service chain.The secure and trusted of node on certificate support chain is provided to trusted node when passing through networking.It is described Certificate management device 42 is responsible for the certificate request and storage management of queuing system business chain, is responsible for generating queuing system business chain Certificate of fair, certificate of fair generate public key, private key cryptographic pair according to elliptic curve, and certificate of fair is broadcasted to All Activity on chain and tested Card node is tested close for transaction.
It please refers to shown in Fig. 5 A, the present invention also provides a kind of block chain system of real name queuing strategies, and the method includes: S501 Using preset Notified Body as rights management node, by the rights management node according to preset rules to transaction access section Point and transaction verification node carry out authentic authentication, after authentic authentication passes through according to transaction access node, rights management node and Transaction verification node constructs block chain, generates user name and cipher list according to the block chain;S502 closes preset intelligence About program is deployed on the transaction verification node;S503 client according to the user name and cipher list obtain user name and The username and password is provided to user by password;Receive the friendship that user logs in client input by username and password Easily request, transfers to the transaction access node for the transaction request;Transaction access node is according to the friendship received described in S504 Easily request generates transaction unique number, user identity authentication solicited message and user's queuing service solicited message;According to the friendship Easy unique number and the user identity authentication solicited message pass through biometrics identification technology to the use in the transaction request Family identity information carry out real-name authentication, after real-name authentication passes through, by the transaction request transfer to the rights management node into The verifying of row user right;User's body in transaction request that rights management node described in S505 provides the transaction access node Part information carries out Authority Verification, generates certificate of fair according to the block chain after being verified, the certificate of fair is fed back To the transaction access node and the transaction verification node;Transaction access node described in S506 asks user's queuing service It asks information to be converted to intelligent contract transaction request, is sent after being encrypted by the certificate of fair to the intelligent contract transaction request To the transaction verification node;Transaction verification node described in S507 tests close rear point to the intelligent contract transaction by certificate of fair The type for analysing the intelligent contract transaction, when the type of the intelligent contract transaction is newly-increased data, by the intelligent contract After transaction broadcast to other transaction verification nodes complete the processing of intelligent contract transaction common recognition and request data persistence, to described Intelligent contract transaction, which executes, to be lined up intelligent contract transaction and implementing result is fed back to the client;Client described in S508 will The implementing result received feeds back to user.
In real work, above-mentioned process implementation be can refer to shown in Fig. 5 B:
Step S101: resource bid system 5 is developed and is adjusted according to the intelligent contract of block chain intelligence contract development project completion Intelligent contract deployment is completed with bottom deployment deploy interface.The exploitation of intelligent contract includes data structure, input parameter, output Parameter definition, the realization of queue discipline service logic are write.Wherein queue discipline is customized, has both been supported by parameter weighting sequence Responsible rule also supports the simple rule by the sequence of registion time sequence.
Step S102: starting block chain node networking, and network includes 4, transaction access sections of a rights management node (f is node fault-tolerance number, minimum 1) a transaction verification node 3 by point 2,3f+1.Wherein rights management node is to be weighed in advance The node of prestige certification, trade access node and transaction verification node are to obtain the authentic authentication of rights management node this could be added Block chain networking, the intelligent contract program for disposing request after networking success on transaction verification node form queuing system business Chain, and return to user name and cipher list that permission management node is business chain distribution.
Step S103: resource bid system queuing system 5 externally issues the queuing intelligence contract rule of its resource allocation, and To the user name and password for being lined up participant's granting queuing system business chain 1.
Step S104: queuing participation Member Users input user name in user client 6 and code entry system concurrency is sent Queuing service is requested to resource bid system 5, and resource bid system sends the request to transaction access node 2.
Step S105: customer transaction request is sent transaction access node 2 by resource bid system 5, access node 2 of trading It requests reception device 21 to receive the transaction request from external user by user and generates transaction unique number uuid, in request It need to include user identity authentication solicited message and user's queuing service solicited message.Wherein authentication information includes: user certificate Part type-userCertificateType, user certificate number-userCertificateNumber, address name- UserName and user's collection in worksite photo-userLocalPhoto.Queuing service solicited message includes: intelligent contract function name Title-function, intelligent contract function correspond to parameter-args.User requests reception device parsing transaction request and will trade only One number-uuid and user identity authentication solicited message are forwarded to biological characteristic comparison device 22 and go forward side by side access customer authentication Journey carries out In vivo detection using biometrics identification technology and characteristic value carries out similarity calculation and basis passes through threshold by algorithm Value determines whether authentication passes through.
Step S106A: after authentication passes through, cochain transaction retransmission unit 23 handles user's queuing service solicited message Afterwards, by intelligent contract function name-function, intelligent contract function corresponds to parameter-args, and transaction unique number-uuid is slow There are in local cache.Certificate acquisition module 231 is responsible for interacting with rights management node 4, carries out user right verifying and obtains The certificate of fair generated for transaction.Queuing service solicited message is converted to intelligent contract transaction request by transaction encryption module 232 (intelligence and about id, function, args), after being encrypted using certificate of fair to transaction from 3f+1 transaction verification node The normal node of one mesa-shaped state of random selection simultaneously sends intelligent contract transaction request.
Step S106B: authentication does not pass through, and interrupts user's request processing, backtracking prompt information is to user client End 6.
Step S107A: the transaction R-T unit 31 of transaction verification node 3 receives intelligent contract transaction request, uses transaction Certificate test to transaction close, tests after close success judge whether intelligent contract state is normal according to intelligence and about id, normal judgement Intelligent contract function-function type of transaction is traded if it is inquiry-query, then directly in this transaction verification node block In inquired, return query result (by taking the queue discipline of time sequencing as an example: [user name 1, it is current to be lined up tagmeme 1, registration Time 1 }, { user name 2, current to be lined up tagmeme 2, registion time 2 } ... ...).
Step S107B: if transaction, is broadcasted the transaction all into all-network by non-inquiry transaction such as newly-increased-add The transaction common recognition and executive device 33 of verifying node complete the treatment process of intelligent contract transaction common recognition and request data persistence.
Step S108A: the transaction common recognition and executive device 33 of All Activity common recognition node 2 then start after completing common recognition process It executes and is lined up intelligent contract transaction, Successful Transaction information, transaction results new information and block consensus information are saved in and work as prosthomere In the KV database of point, perdurable data is generated.And implementing result is returned to user client (with the queue discipline of time sequencing For: [{ user name 1, current to be lined up tagmeme 1, registion time 1 }, and user name 2, it is current to be lined up tagmeme 2, registion time 2 } ... ...).
Step S108B: recording unsuccessfully log if failure of knowing together, and progress transaction rollback and backtracking prompt information, which are given, to be used Family client.
The intelligent contract transaction broadcast intelligent contract is completed to other transaction verification nodes in the above-described embodiments to hand over The processing of easily common recognition and request data persistence includes: the transaction verification node executes intelligence after receiving intelligent contract transaction request Energy contract query function obtains the common recognition data that current block height, HASH, block data are traded as forerunner;According to user's reality Name authentication result is matched with the current block data inquired, and whether verification has submitted duplicate customer information, when not existing When duplicate customer information, Transaction Information is cached to local memory array and works as proparea according to logic calculation is set in intelligent contract The sequence information of all users of block;New block data is generated according to the implementing result of intelligent contract transaction request, and will be current Block height, HASH, block data, newly-increased transaction results block data are initiated as common recognition message to other transaction verification nodes Common recognition;When receiving the consistent confirmation message of 2f+1 other transaction verification node feeding backs, the new block data is written Block carries out persistence;When the consistent confirmation message for not receiving 2f+1 other transaction verification node feeding backs in cycle time, into Transaction verification node transaction rollback before the trade, and remove local memory array;Wherein, the transaction verification in the block chain The number of node is 3f+1;F be node fault-tolerance number, minimum 1.Specifically, please referring to shown in Fig. 6:
Step S201: transaction verification node 3, which receives, to be first carried out intelligent contract query function after intelligent contract transaction request and obtains Current block height, HASH, block data are taken, the common recognition data as forerunner's transaction.
Step S202: matching according to user's real-name authentication result with the current block data inquired, and whether verification Have submitted duplicate customer information.
Step S203A: if being verified as effectively trading, Transaction Information is cached to local memory array reqStore.
Step S203B: it carries out abandoning processing, record log as invalid transaction if being verified as user and repeating queueing message Backtracking prompt information is to user client afterwards.
Step S204: the new increasing function for executing intelligent contract recalculates all users' of current block according to queue discipline Sequence information, transaction implementing result generate new block data, by current block height, HASH, block data, newly-increased transaction knot Fruit block data sends common recognition confirmation message to remaining transaction verification node as common recognition message, and common recognition is initiated in broadcast.
Step S205A: if receiving the consistent confirmation message of 2f+1 transaction verification node 3, success of knowing together, by intelligent conjunction The new block data write-in block generated after about executing carries out persistence.
Step S205B: if the consistent confirmation message of 2f+1 transaction verification node 3 can not be received in time-out time, altogether Know failure, carry out current transaction verification node transaction rollback, memory array reqStore is removed in record failure log.
The present invention also provides a kind of computer equipment, including memory, processor and storage on a memory and can located The computer program run on reason device, the processor realize the above method when executing the computer program.
The present invention also provides a kind of computer readable storage medium, the computer-readable recording medium storage has in execution State the computer program of method.
The beneficial technical effect of the present invention lies in: it can ensure and be lined up the true uniqueness of member identities, queueing message discloses Brightization promotes the public credibility and authority of queuing service system;
It is really unique to be lined up member identities: being verified, is led to by identity information of the biological identification technology to operation user Physical examination survey technology, the biological characteristic comparison technology guarantee queuing accredited members' identity of making a living are authentic and valid, prevent unification user from repeating It is lined up, solves the problems, such as that user's fraud repeats application resource in traditional queuing system;
Queueing message is open and clear: introducing block chain technology, by its disclosure, the technical characteristic that can not be distorted, will be lined up Rule research and development are disposed and are operated in block chain network for intelligent contract;User can check the intelligent contract code of deployment to supervise The fairness for superintending and directing queue discipline supervises the public affairs for being lined up result by inquiring oneself and the user sequence information in block catenary system Levelling solves the hidden danger of black-box operation in traditional queuing system;
Promote the public credibility of queuing service system and authoritative: by its member identities it is stringent verify and queue discipline and Operation result it is open and clear, ensure the fair and just of operation result.User is excluded to promotion queuing service system operation And the query of result, ensure phase public credibility and authority.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Particular embodiments described above has carried out further in detail the purpose of the present invention, technical scheme and beneficial effects Describe in detail it is bright, it should be understood that the above is only a specific embodiment of the present invention, the guarantor being not intended to limit the present invention Range is protected, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should be included in this Within the protection scope of invention.

Claims (15)

1. a kind of block chain system of real name queuing system, which is characterized in that the system includes client and queuing system business chain;
The queuing system business chain includes transaction access node, rights management node and multiple transaction verification nodes;
Wherein, the rights management node is preset Notified Body, according to preset rules to the transaction access node and institute It states transaction verification node and carries out authentic authentication, according to the transaction access node, rights management node after authentic authentication passes through Block chain is constructed with transaction verification node, user name and cipher list are generated according to the block chain;And the transaction is connect The subscriber identity information in transaction request that ingress provides carries out Authority Verification, raw according to the block chain after being verified At certificate of fair, the certificate of fair is fed back into the transaction access node and the transaction verification node;
The transaction access node is used to generate transaction unique number, user identity authentication request according to the transaction request received Information and user's queuing service solicited message;Passed through according to the transaction unique number and the user identity authentication solicited message Biometrics identification technology carries out real-name authentication to the subscriber identity information in the transaction request, after real-name authentication passes through, It transfers to the rights management node to carry out user right verifying the transaction request and receives the rights management node feeding back Certificate of fair;User's queuing service solicited message is converted into intelligent contract transaction request, passes through the certificate of fair The transaction verification node is sent to after encrypting to the intelligent contract transaction request;
The transaction verification node is for disposing preset intelligent contract program;And by certificate of fair to the intelligent contract The type of the transaction of intelligence contract described in close post analysis is tested in transaction, will when the type of the intelligent contract transaction is newly-increased data The intelligence contract transaction broadcast to other transaction verification nodes complete intelligent contract transaction common recognition and request data persistence After processing, trades to the intelligent contract of the intelligent contract transaction execution queuing and implementing result is fed back into the client;
The client is used to obtain username and password according to the user name and cipher list, by the username and password It is provided to user, the transaction request that user logs in the client input by username and password is received, the transaction is asked It asks and transfers to the transaction access node;And the implementing result received is fed back into user.
2. block chain system of real name queuing system according to claim 1, which is characterized in that the user identity authentication request Information includes user certificate type, user certificate number and user's collection in worksite photo;User's queuing service solicited message Parameter is corresponded to intelligent contract function comprising intelligent contract function name.
3. block chain system of real name queuing system according to claim 1, which is characterized in that the transaction access node includes User requests reception device, biological characteristic comparison device and cochain transaction packaging system;
The user requests reception device to be used to receive the transaction request that the client provides, and is generated according to the transaction request Transaction unique number, user identity authentication solicited message and user's queuing service solicited message;
The biological characteristic comparison device is used for logical according to the transaction unique number and the user identity authentication solicited message It crosses biometrics identification technology and real-name authentication is carried out to the subscriber identity information in the transaction request;
The cochain transaction packaging system is used for after real-name authentication passes through, and the transaction request is transferred to the rights management section Point carries out user right verifying and receives the certificate of fair of the rights management node feeding back;User's queuing service is requested Information is converted to intelligent contract transaction request, is sent to after being encrypted by the certificate of fair to the intelligent contract transaction request The transaction verification node.
4. block chain system of real name queuing system according to claim 3, which is characterized in that the biological characteristic comparison device Acquisition module, characteristic extracting module and feature comparison module are shone comprising In vivo detection module, benchmark;
The In vivo detection module is used for through the In vivo detection silence algorithm in biometrics identification technology in user's request On user's scene photograph for sending detect;
The benchmark is used to user certificate type in user request and user certificate number being sent to institute according to acquisition module The legal mechanism of signing and issuing for stating user certificate type is verified, and obtains user's in the legal mechanism of signing and issuing after being verified Trusted identity reference picture;
The characteristic extracting module is used for through feature extraction algorithm to user's scene photograph and user's reference picture Feature extraction and calculation is carried out, user's scene photograph characteristic value and reference picture characteristic value are obtained;
The feature comparison module is used to shine user's scene photograph characteristic value and the benchmark by feature alignment algorithm Piece characteristic value carries out characteristic similarity comparison, judges whether it is user according to the misclassification rate parameter setting of algorithm, completes base It is veritified in the user identity of biological identification technology.
5. block chain system of real name queuing system according to claim 3, which is characterized in that the cochain transaction packaging system Include certificate acquisition module and transaction encryption module;
The certificate acquisition module obtains certificate of fair for interacting with the rights management node, is generated according to elliptic curve public Key and private key pair;
The transaction encryption module is used to carry out user's queuing service solicited message by intelligent contract transaction interface is lined up Reference format conversion obtains intelligent contract transaction request;Intelligent contract transaction request encrypt by the private key concurrent It is sent to the transaction verification node.
6. block chain system of real name queuing system according to claim 1, which is characterized in that the transaction verification node includes Transaction R-T unit, intelligent contract route device and transaction common recognition and executive device;
The transaction R-T unit is used to receive the intelligent contract transaction request that the transaction access node provides, according to from described Certificate of fair test to transaction close;And detect whether preset intelligent contract is normally disposed and operate in current transaction verification On node;
The intelligence contract route device is used to preset intelligent contract being deployed in current transaction verification node;And response Intelligent operation state inquiry request;
The transaction common recognition and executive device are used to analyze the type of the intelligent contract transaction, when the intelligent contract transaction When type is newly-increased data, intelligent contract transaction common recognition is completed into the intelligent contract transaction broadcast to other transaction verification nodes It is to the intelligent contract transaction execution queuing intelligence contract transaction and implementing result is anti-and after the processing of request data persistence It is fed to the client.
7. block chain system of real name queuing system according to claim 6, which is characterized in that the intelligence contract route device Include intelligent contract deployment module and intelligent contract enquiry module;
The intelligence contract deployment module is used to carry out specification to the code of preset intelligent contract and safety inspection, inspection pass through The intelligent contract is deployed on current transaction verification node afterwards;
The intelligence contract enquiry module is used to carry out operation monitoring to the intelligent contract, and is inquired according to intelligence and about ID The operating status of the intelligence contract and regular source code.
8. block chain system of real name queuing system according to claim 6, which is characterized in that dress is known together and executed in the transaction It sets comprising interacting message module, transaction common recognition module and transaction execution module;
The interacting message module is used to send current transaction verification node during each transaction verification node common recognition and produce Raw common recognition message;And receive the common recognition message that other transaction verification nodes issue in block chain;
The transaction common recognition module is used to carry out repeating to the intelligent contract transaction and parameter legitimacy verifies, when verification passes through Enter pre-prepare common recognition, prepare common recognition, commit common recognition afterwards;Current first order section is accumulative to receive 2f+1 other transaction It knows together after the consistent confirmation message of node, next stage is completed and entered to the common recognition of current generation, when the common recognition of three phases is complete After the completion of portion, the intelligent contract transaction is held by the writable block of data after being lined up intelligent contract business logic processing Longization;
For the transaction execution module for executing block data record, acquisition current block chain persistence disk account book will be described The SeqNo of Successful Transaction information, transaction results information and block common recognition that transaction common recognition module is completed is converted to NoHashData It is saved in block, implementing result is fed back into the client.
9. block chain system of real name queuing system according to claim 1, which is characterized in that the rights management node includes Rights management device and certificate management device;
The rights management device is used to carry out the transaction access node and the transaction verification node according to preset rules Authentic authentication constructs after authentic authentication passes through according to the transaction access node, rights management node and transaction verification node Block chain generates user name and cipher list according to the block chain;And the transaction provided the transaction access node is asked Subscriber identity information in asking carries out Authority Verification;
The certificate management device is used to generate certificate of fair according to the block chain;The certificate of fair is raw according to elliptic curve At public key and private key cryptographic pair;And the certificate of fair is broadcasted on block chain and is used to trade for All Activity verifying node It tests close.
10. block chain system of real name queuing system according to any one of claim 1 to 9, which is characterized in that the transaction The number for verifying node is 3f+1;Wherein, f be node fault-tolerance number, minimum 1.
11. block chain system of real name queuing system according to any one of claim 1 to 9, which is characterized in that the client End includes resource bid system server and multiple user clients;
The resource bid system server is used to obtain username and password according to the user name and cipher list, will be described Username and password is provided to user;
The user client is used to receive the transaction request that user logs in the client input by username and password, will The transaction request transfers to the transaction access node by the resource bid system server;And it is held what is received Row result feeds back to user.
12. a kind of block chain system of real name queuing strategy, which is characterized in that the method includes:
Using preset Notified Body as rights management node, transaction is connect according to preset rules by the rights management node Ingress and transaction verification node carry out authentic authentication, according to transaction access node, rights management section after authentic authentication passes through Point and transaction verification node construct block chain, generate user name and cipher list according to the block chain;
Preset intelligent contract program is deployed on the transaction verification node;
Client obtains username and password according to the user name and cipher list, and the username and password is provided to use Family;The transaction request that user logs in client input by username and password is received, the transaction request is transferred into the friendship Easy access node;
The transaction access node generates transaction unique number, user identity authentication solicited message according to the transaction request received With user's queuing service solicited message;Pass through biology according to the transaction unique number and the user identity authentication solicited message Feature identification technique carries out real-name authentication to the subscriber identity information in the transaction request, after real-name authentication passes through, by institute Stating transaction request transfers to the rights management node to carry out user right verifying;
The subscriber identity information in transaction request that the rights management node provides the transaction access node carries out permission Verifying generates certificate of fair according to the block chain after being verified, and the certificate of fair is fed back to the transaction and is accessed Node and the transaction verification node;
User's queuing service solicited message is converted to intelligent contract transaction request by the transaction access node, by described Certificate of fair is sent to the transaction verification node after encrypting to the intelligent contract transaction request;
The transaction verification node tests the transaction of intelligence contract described in close post analysis to the intelligent contract transaction by certificate of fair Type, when the type of the intelligent contract transaction is newly-increased data, by the intelligent contract transaction broadcast to other transaction After the processing for verifying the intelligent contract transaction common recognition of node completion and request data persistence, to the intelligent contract transaction row of execution Team's intelligence contract trades and implementing result is fed back to the client;
The implementing result received is fed back to user by the client.
13. block chain system of real name queuing strategy according to claim 12, which is characterized in that the intelligent contract is traded It broadcasts to the processing that other transaction verification nodes complete intelligent contract transaction common recognition and request data persistence and includes:
The intelligent contract query function acquisition current block of execution is high after the transaction verification node receives intelligent contract transaction request The common recognition data that degree, HASH, block data are traded as forerunner;
It is matched according to user's real-name authentication result with the current block data inquired, verifies whether have submitted duplicate customer Transaction Information is cached to local memory array and according to setting in intelligent contract when not there is no duplicate customer information by information The sequence information of all users of logic calculation current block;
Generate new block data according to the sequence information, and by current block height, HASH, block data, newly-increased transaction As a result block data initiates to know together as common recognition message to other transaction verification nodes;
When receiving the consistent confirmation message of 2f+1 other transaction verification node feeding backs, by the new block data write area Block carries out persistence;
When the consistent confirmation message for not receiving 2f+1 other transaction verification node feeding backs in cycle time, carries out current transaction and test Node transaction rollback is demonstrate,proved, and removes local memory array;
Wherein, the number of the transaction verification node in the block chain is 3f+1;F is node fault-tolerance number, minimum 1。
14. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes that claim 12 to 13 is any described when executing the computer program Method.
15. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has perform claim It is required that the computer program of 12 to 13 any the methods.
CN201910710931.3A 2019-08-02 2019-08-02 Block chain real-name system queuing system and method Active CN110417790B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910710931.3A CN110417790B (en) 2019-08-02 2019-08-02 Block chain real-name system queuing system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910710931.3A CN110417790B (en) 2019-08-02 2019-08-02 Block chain real-name system queuing system and method

Publications (2)

Publication Number Publication Date
CN110417790A true CN110417790A (en) 2019-11-05
CN110417790B CN110417790B (en) 2021-11-23

Family

ID=68365410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910710931.3A Active CN110417790B (en) 2019-08-02 2019-08-02 Block chain real-name system queuing system and method

Country Status (1)

Country Link
CN (1) CN110417790B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111311258A (en) * 2020-01-20 2020-06-19 布比(北京)网络技术有限公司 Block chain based trusted transaction method, device, system, equipment and medium
CN111611572A (en) * 2020-06-28 2020-09-01 支付宝(杭州)信息技术有限公司 Real-name authentication method and device based on face authentication
CN111767215A (en) * 2020-06-23 2020-10-13 中国工商银行股份有限公司 Block chain continuous integration test method, device and system
CN112261427A (en) * 2020-10-20 2021-01-22 中国联合网络通信集团有限公司 Malicious node identification method and device and electronic equipment
CN112328997A (en) * 2020-11-26 2021-02-05 安徽继远软件有限公司 Credible identity recognition method and system based on block chain
CN113487469A (en) * 2021-07-22 2021-10-08 杭州铲子科技有限公司 Carbon emission data processing method and system
CN113763139A (en) * 2020-06-05 2021-12-07 富泰华工业(深圳)有限公司 Block chain-based queuing number bidding method, electronic device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107742352A (en) * 2017-09-20 2018-02-27 黄玉宇 Decentralization lot/queuing strategy and system based on block chain and intelligent contract
CN108243241A (en) * 2017-11-10 2018-07-03 杭州复杂美科技有限公司 A kind of storage mode of block chain transaction and queueing form
US20180205725A1 (en) * 2017-01-18 2018-07-19 CertiflD LLC Verifying Party Identities for Secure Transactions
CN108696514A (en) * 2018-04-27 2018-10-23 腾讯科技(深圳)有限公司 Resource collects task management method, device, storage medium and system
CN109064063A (en) * 2018-09-11 2018-12-21 北京工商大学 A kind of food safety risk Source Tracing system and method based on block chain
CN109242636A (en) * 2018-09-26 2019-01-18 盈盈(杭州)网络技术有限公司 A kind of data transacting system and its implementation based on block chain
CN109325854A (en) * 2018-08-16 2019-02-12 北京京东尚科信息技术有限公司 Block chain network, dispositions method and storage medium
CN109902952A (en) * 2019-02-26 2019-06-18 广东工业大学 A kind of photovoltaic micro electric intelligent transaction system and method based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180205725A1 (en) * 2017-01-18 2018-07-19 CertiflD LLC Verifying Party Identities for Secure Transactions
CN107742352A (en) * 2017-09-20 2018-02-27 黄玉宇 Decentralization lot/queuing strategy and system based on block chain and intelligent contract
CN108243241A (en) * 2017-11-10 2018-07-03 杭州复杂美科技有限公司 A kind of storage mode of block chain transaction and queueing form
CN108696514A (en) * 2018-04-27 2018-10-23 腾讯科技(深圳)有限公司 Resource collects task management method, device, storage medium and system
CN109325854A (en) * 2018-08-16 2019-02-12 北京京东尚科信息技术有限公司 Block chain network, dispositions method and storage medium
CN109064063A (en) * 2018-09-11 2018-12-21 北京工商大学 A kind of food safety risk Source Tracing system and method based on block chain
CN109242636A (en) * 2018-09-26 2019-01-18 盈盈(杭州)网络技术有限公司 A kind of data transacting system and its implementation based on block chain
CN109902952A (en) * 2019-02-26 2019-06-18 广东工业大学 A kind of photovoltaic micro electric intelligent transaction system and method based on block chain

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111311258A (en) * 2020-01-20 2020-06-19 布比(北京)网络技术有限公司 Block chain based trusted transaction method, device, system, equipment and medium
CN111311258B (en) * 2020-01-20 2023-07-21 布比(北京)网络技术有限公司 Block chain-based trusted transaction method, device, system, equipment and medium
CN113763139A (en) * 2020-06-05 2021-12-07 富泰华工业(深圳)有限公司 Block chain-based queuing number bidding method, electronic device and storage medium
CN113763139B (en) * 2020-06-05 2023-11-10 富泰华工业(深圳)有限公司 Queuing number bidding method based on blockchain, electronic device and storage medium
CN111767215A (en) * 2020-06-23 2020-10-13 中国工商银行股份有限公司 Block chain continuous integration test method, device and system
CN111767215B (en) * 2020-06-23 2023-08-08 中国工商银行股份有限公司 Block chain continuous integration test method, device and system
CN111611572A (en) * 2020-06-28 2020-09-01 支付宝(杭州)信息技术有限公司 Real-name authentication method and device based on face authentication
CN112261427A (en) * 2020-10-20 2021-01-22 中国联合网络通信集团有限公司 Malicious node identification method and device and electronic equipment
CN112328997A (en) * 2020-11-26 2021-02-05 安徽继远软件有限公司 Credible identity recognition method and system based on block chain
CN113487469A (en) * 2021-07-22 2021-10-08 杭州铲子科技有限公司 Carbon emission data processing method and system

Also Published As

Publication number Publication date
CN110417790B (en) 2021-11-23

Similar Documents

Publication Publication Date Title
AU2021206913B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
CA3053316C (en) Method for providing simplified account registration service and user authentication service, and authentication server using same
CN110417790A (en) Block chain system of real name queuing system and method
EP3732857B1 (en) Apparatus and method for decentralized-identifier creation
CN110268678B (en) PKI-based login method for authentication agent user and server using same
EP3726412B1 (en) Selectively verifying personal data
US20180336554A1 (en) Secure electronic transaction authentication
CN109840771A (en) A kind of block chain intimacy protection system and its method based on homomorphic cryptography
EP3413251B1 (en) Method and server for providing notary service for file and verifying file recorded by notary service
CN110599147A (en) Ciphertext retrieval fair payment method and system based on block chain
CN110235410A (en) Replace the method for the login of user using the block chain database of the agreement based on UTXO and by the certification based on PKI and utilizes its server
CN110069908A (en) A kind of authority control method and device of block chain
EP3413252A1 (en) Method and server for providing notary service for file and verifying file recorded by notary service
CN110555029A (en) ticket management method and device based on block chain and storage medium
KR20190075772A (en) AuthenticationSystem Using Block Chain Through Combination of Data after Separating Personal Information
CN109889497A (en) A kind of data integrity verification method for going to trust
CN101479987A (en) Biometric credential verification framework
CN110493237A (en) Identity management method, device, computer equipment and storage medium
CN110177124A (en) Identity identifying method and relevant device based on block chain
CN109727044A (en) Brand transaction methods, device, equipment and medium based on block chain
US20030135734A1 (en) Secure mutual authentication system
CN112839046A (en) Traceable anonymous crowdsourcing method and system based on block chain
Li et al. Toward decentralized fair data trading based on blockchain
US20240187259A1 (en) Method and apparatus for generating, providing and distributing a trusted electronic record or certificate based on an electronic document relating to a user
Pujari et al. A decentralized consensus application using blockchain ecosystem

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant