CN110740112B - Authentication method, apparatus and computer readable storage medium - Google Patents

Authentication method, apparatus and computer readable storage medium Download PDF

Info

Publication number
CN110740112B
CN110740112B CN201810801285.7A CN201810801285A CN110740112B CN 110740112 B CN110740112 B CN 110740112B CN 201810801285 A CN201810801285 A CN 201810801285A CN 110740112 B CN110740112 B CN 110740112B
Authority
CN
China
Prior art keywords
sub
block
picture
authentication
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810801285.7A
Other languages
Chinese (zh)
Other versions
CN110740112A (en
Inventor
方焕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201810801285.7A priority Critical patent/CN110740112B/en
Publication of CN110740112A publication Critical patent/CN110740112A/en
Application granted granted Critical
Publication of CN110740112B publication Critical patent/CN110740112B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present disclosure relates to an authentication method, apparatus, and computer-readable storage medium, and relates to the field of internet technology. The method comprises the following steps: providing a plurality of sub-pictures obtained from a block chain for a user, wherein the plurality of sub-pictures can be spliced into an authentication picture; under the condition that a user can splice a plurality of sub-pictures into an authentication picture, sending a verification code generated according to the plurality of sub-pictures to the user; and if the user returns the correct verification code, the user passes the authentication. The technical scheme of the present disclosure can improve the reliability of user authentication.

Description

Authentication method, apparatus and computer readable storage medium
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to an authentication method, an authentication device, and a computer readable storage medium.
Background
With the rapid development of internet technology, electronic commerce and social networking sites such as big data online shopping and forum have the requirement of interaction with users. During the interaction, the registration or login of the user account is an indispensable step, and is a unique mark of the basic information of the associated user. However, lawbreakers can log in through a user account to perform some illegal actions, which threatens the data security of the user.
The prior art is mainly used for authenticating a user in a mode of mobile phone verification and the like.
Disclosure of Invention
The inventors of the present disclosure found that the above-described related art has the following problems: the authentication mode is easy to crack, so that the reliability of user authentication is low.
In view of this, the present disclosure proposes an authentication technical solution capable of improving reliability of user authentication.
According to some embodiments of the present disclosure, there is provided an authentication method including: providing a plurality of sub-pictures obtained from a block chain for a user, wherein the plurality of sub-pictures can be spliced into an authentication picture; under the condition that the user can splice the plurality of sub-images into the authentication picture, sending the verification code generated according to the plurality of sub-images to the user; and under the condition that the user returns a correct verification code, passing the authentication of the user.
In some embodiments, the authentication picture is partitioned into the plurality of sub-pictures; and respectively agglomerating each sub-picture and storing the sub-pictures in the block chain, wherein each block corresponding to each sub-picture comprises a front hash value.
In some embodiments, the sub-picture is stored in a block body of a block; storing the hash value of the sub-picture in a block header of the block; calculating a hash value of a block head of a previous block of the block as a pre-hash value; the pre-hash value is stored in a block header of the block.
In some embodiments, the pictures in the gallery are sequentially scrambled, and a picture is randomly extracted as the authentication picture.
In some embodiments, the plurality of sub-pictures are provided to the user after being encrypted.
According to other embodiments of the present disclosure, there is provided an authentication apparatus including: the device comprises a transmitter, a verification code generator and a user, wherein the transmitter is used for providing a plurality of sub-pictures for the user, the plurality of sub-pictures can be spliced into one authentication picture, and the verification code is transmitted to the user under the condition that the user can splice the plurality of sub-pictures into the authentication picture; and the processor is used for generating the verification code according to the plurality of sub-images and passing the authentication of the user under the condition that the user returns the correct verification code.
In some embodiments, the processor divides the authentication picture into the plurality of sub-pictures, performs agglomeration processing on each sub-picture, and stores the sub-picture in the blockchain, wherein a block corresponding to each sub-picture includes a pre-hash value.
In some embodiments, the processor stores the sub-picture in a block body of a block, a hash value of the sub-picture in a block header of the block, and a pre-hash value in a block header of the block, the pre-hash value being a hash value of a block header of a previous block of the block.
In some embodiments, the processor randomly extracts a picture as the authentication picture by scrambling the order of the pictures in the gallery.
In some embodiments, the processor encrypts the plurality of sub-pictures and the transmitter provides the encrypted plurality of sub-pictures to the user.
According to still further embodiments of the present disclosure, there is provided an authentication apparatus including: a memory; and a processor coupled to the memory, the processor configured to perform one or more steps of the authentication method in any of the embodiments described above based on instructions stored in the memory device.
According to still further embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements one or more steps of the authentication method in any of the embodiments described above.
In the embodiment, the user is subjected to double authentication by the jigsaw and the input of the verification code, and the reliability of the sub-picture for verification and the corresponding verification code thereof is ensured by utilizing the block chain technology, so that the reliability of the user authentication is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The disclosure may be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings in which:
FIG. 1 illustrates a flow chart of some embodiments of an authentication method of the present disclosure;
fig. 2 shows a flow chart of further embodiments of the authentication method of the present disclosure.
FIG. 3 illustrates a flow chart of some embodiments of sub-picture storage;
FIG. 4 shows a flow chart of some embodiments of step 102 in FIG. 3;
FIG. 5 illustrates a block diagram of some embodiments of a block structure;
fig. 6 illustrates a block diagram of some embodiments of an authentication device of the present disclosure;
FIG. 7 illustrates a block diagram of other embodiments of an authentication device of the present disclosure;
fig. 8 illustrates a block diagram of still further embodiments of an authentication device of the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless it is specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective parts shown in the drawings are not drawn in actual scale for convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but should be considered part of the specification where appropriate.
In all examples shown and discussed herein, any specific values should be construed as merely illustrative, and not a limitation. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further discussion thereof is necessary in subsequent figures.
Fig. 1 illustrates a flow chart of some embodiments of an authentication method of the present disclosure.
As shown in fig. 1, the method includes: step 130, providing a plurality of sub-pictures for a user; step 140, transmitting the verification code; and step 150, authenticating the user.
In step 130, a plurality of sub-pictures obtained from the blockchain are provided to the user, and the plurality of sub-pictures can be spliced into one authentication picture. For example, a plurality of sub-images in a disordered order may be displayed on a user's registration or login interface for the user to splice. In some embodiments, the plurality of sub-images may be encrypted and provided to the user to further improve the reliability of user authentication.
In step 140, in case the user is able to splice the plurality of sub-pictures into an authentication picture, a verification code generated from the plurality of sub-pictures is transmitted to the user. For example, after the user completes the splice, the user may click on the obtain verification code button, and the system displays the processed verification code on the interface; and the verification code can also be sent to the user terminal in response to the user completing the splicing correctly.
In step 150, the user is authenticated in the event that the user returns the correct verification code. For example, the user may enter the retrieved verification code in the interface. Thus, the user identity is subjected to double authentication through the graph splicing and the verification code, and the reliability of user authentication is improved.
In some embodiments, the technical solutions of the present disclosure may be implemented by the embodiment in fig. 2.
Fig. 2 shows a flow chart of further embodiments of the authentication method of the present disclosure.
As shown in fig. 2, the method includes: step 110, obtaining a plurality of sub-pictures; step 120, generating a verification code; step 130, providing a plurality of sub-pictures for a user; step 140, transmitting the verification code; and step 150, authenticating the user.
In step 110, a plurality of sub-pictures are obtained from the blockchain, and the plurality of sub-pictures can be spliced into one authentication picture. For example, multiple sub-pictures may be pre-stored in the blockchain for retrieval when authenticating a user.
In step 120, a verification code is generated from the plurality of sub-pictures. For example, the verification code may be generated from hash values of a plurality of sub-pictures.
In step 130, a plurality of sub-pictures are provided to the user.
In step 140, in case the user is able to splice the plurality of sub-pictures into an authentication picture, a verification code is sent to the user.
In step 150, the user is authenticated in the event that the user returns the correct verification code.
In some embodiments, multiple sub-pictures may be stored in the blockchain by the steps in fig. 3 prior to step 110.
Fig. 3 illustrates a flow chart of some embodiments of sub-picture storage.
As shown in fig. 3, the process includes: step 101, dividing the sub-picture; and step 102, agglomerating to store the sub-pictures.
In step 101, the authentication picture is divided into a plurality of sub-pictures. For example, the sequence of the pictures in the gallery may be disordered, one picture may be randomly extracted as an authentication picture, and the authentication picture may be cut into multiple sub-pictures according to a certain proportion.
In step 102, each sub-picture is stored in the blockchain after being agglomerated, and the corresponding block of each sub-picture contains the pre-hash value. For example, each sub-graph is stored as a block, and the blocks are concatenated into a blockchain in the order of storage.
In some embodiments, step 102 may be implemented by the steps in fig. 4.
Fig. 4 shows a flow chart of some embodiments of step 102 in fig. 3.
As shown in fig. 4, step 102 includes: step 1021, storing the sub-picture; step 1022, storing the hash value; step 1023, calculating a front hash value; and step 1024, storing the pre-hash value.
In step 1021, the sub-picture is stored in the block body of the block.
In step 1022, the hash value of the sub-picture is stored in the block header of the block. For example, the SHA256 method may be used to calculate the hash value of the sub-picture.
In step 1023, the hash value of the block header of the previous block of the block is calculated as the pre-hash value. The block heights of the blocks in the block chain are different according to the agglomeration sequence, namely, the block height of the blocks agglomerated earlier is lower than the block height of the blocks agglomerated later. A block preceding a block may be understood as a block having a block height that is higher than the block of the first level of the current block.
In step 1024, the pre-hash value is stored in the block header of the block.
Steps 1021-1024 can be better understood by the schematic diagram in fig. 5.
Fig. 5 illustrates a block diagram of some embodiments of a block structure.
As shown in FIG. 5, the blockchain has agglomerated to form a plurality of blocks, such as block 51, block 52, and the like. Block 52 blocks earlier than block 51, i.e., block 52 is the previous block to block 51. Sub-picture a is stored in block bank 512 of block 51 and sub-picture b is stored in block bank 522 of block 52.
The block header 511 of the block 51 includes the hash value of the sub-picture a and the pre-hash value of the block 51. The pre-hash value of block 51 is the hash value of block header 521 of block 52.
For example, the hash value of the sub-picture b in the block header 521 is a string of 256-bit numbers, the front hash value of the block 52 is also a string of 256-bit numbers, the hash value of the sub-picture b and the front hash value of the block 52 may be combined into a string of 512-bit numbers, and then the hash value of the string of 512-bit numbers is calculated and stored in the block header 511 as the front hash value of the block header 511. The pre-hash value of block 52 may also be obtained as described above.
By the above-described embodiment, the hash value (including information of the current stored content) and the pre-hash value (including information of all the stored contents before) of the current block are included in the block header of each block in the blockchain. That is, the hash value of the block header of each block includes the content information stored in all the blocks in the blockchain.
Based on such a structure, any one of the stored contents in the blockchain is tampered with, which results in a change in the hash value of the blockhead of the current block. If one tampers with one of the blocks, the hash of the block header of that block becomes that block will not be able to be attached to the blockchain. Therefore, the content stored in the blockchain can be ensured not to be tampered randomly, and the reliability can be improved by taking the content as the basis of user authentication.
In the embodiment, the user is subjected to double authentication by the jigsaw and the input of the verification code, and the reliability of the sub-picture for verification and the corresponding verification code thereof is ensured by utilizing the block chain technology, so that the reliability of the user authentication is improved.
Fig. 6 illustrates a block diagram of some embodiments of an authentication device of the present disclosure.
As shown in fig. 6, the authentication apparatus 6 includes a transmitter 61 and a processor 62.
The transmitter 61 is configured to provide the plurality of sub-pictures to the user, the plurality of sub-pictures being capable of being spliced into one authentication picture, and to transmit the authentication code to the user in case the user is capable of splicing the plurality of sub-pictures into the authentication picture. For example, the processor 62 encrypts the plurality of sub-images, and the transmitter 61 provides the encrypted plurality of sub-images to the user
The processor 62 is arranged to generate a verification code from the plurality of sub-pictures and to pass the authentication of the user in case the user returns the correct verification code. For example, the processor 62 randomly extracts a picture as an authentication picture by scrambling the order of pictures in the gallery. The processor 62 divides the authentication picture into a plurality of sub-pictures, and each sub-picture is stored in the blockchain after being subjected to the agglomeration processing. The corresponding block of each sub-picture contains the pre-hash value.
In some embodiments, processor 62 stores the sub-picture in a block body of the block, the hash value of the sub-picture in a block header of the block, and the pre-hash value in the block header of the block. The pre-hash value is the hash value of the block header of the block preceding the block.
In some embodiments, the user is doubly authenticated by the jigsaw and the input verification code, and the reliability of the sub-picture for verification and the corresponding verification code thereof is ensured by using the blockchain technology, so that the reliability of the user authentication is improved.
Fig. 7 shows a block diagram of further embodiments of an authentication device of the present disclosure.
As shown in fig. 7, the apparatus 7 of this embodiment includes: a memory 71 and a processor 72 coupled to the memory 71, the processor 72 being configured to perform one or more steps of the authentication method in any one of the embodiments of the present disclosure based on instructions stored in the memory 71.
The memory 71 may include, for example, a system memory, a fixed nonvolatile storage medium, and the like. The system memory stores, for example, an operating system, application programs, boot Loader (Boot Loader), database, and other programs.
Fig. 8 illustrates a block diagram of still further embodiments of an authentication device of the present disclosure.
As shown in fig. 8, the authentication apparatus 7 of this embodiment includes: a memory 810 and a processor 820 coupled to the memory 810, the processor 820 being configured to perform the authentication method of any of the previous embodiments based on instructions stored in the memory 810.
Memory 810 may include, for example, system memory, fixed nonvolatile storage media, and the like. The system memory stores, for example, an operating system, application programs, boot Loader (Boot Loader), and other programs.
The authentication device 8 may also include an input-output interface 830, a network interface 840, a storage interface 850, and the like. These interfaces 830, 840, 850 and the memory 810 and the processor 820 may be connected by, for example, a bus 860. The input/output interface 830 provides a connection interface for input/output devices such as a display, a mouse, a keyboard, a touch screen, and the like. The network interface 840 provides a connection interface for various networking devices. The storage interface 840 provides a connection interface for external storage devices such as SD cards, U discs, and the like.
It will be appreciated by those skilled in the art that embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
Up to this point, the authentication method, the authentication apparatus, and the computer-readable storage medium according to the present disclosure have been described in detail. In order to avoid obscuring the concepts of the present disclosure, some details known in the art are not described. How to implement the solutions disclosed herein will be fully apparent to those skilled in the art from the above description.
The methods and systems of the present disclosure may be implemented in a number of ways. For example, the methods and systems of the present disclosure may be implemented by software, hardware, firmware, or any combination of software, hardware, firmware. The above-described sequence of steps for the method is for illustration only, and the steps of the method of the present disclosure are not limited to the sequence specifically described above unless specifically stated otherwise. Furthermore, in some embodiments, the present disclosure may also be implemented as programs recorded in a recording medium, the programs including machine-readable instructions for implementing the methods according to the present disclosure. Thus, the present disclosure also covers a recording medium storing a program for executing the method according to the present disclosure.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the above examples are for illustration only and are not intended to limit the scope of the present disclosure. It will be appreciated by those skilled in the art that modifications may be made to the above embodiments without departing from the scope and spirit of the disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (12)

1. An authentication method, comprising:
each of the plurality of sub-pictures is stored in a blockchain after being respectively agglomerated;
providing the plurality of sub-images obtained from the blockchain for a user, wherein the plurality of sub-images can be spliced into an authentication picture;
under the condition that the user can splice the plurality of sub-images into the authentication picture, sending the verification code generated according to the plurality of sub-images to the user;
and under the condition that the user returns a correct verification code, passing the authentication of the user.
2. The authentication method of claim 1, further comprising, before acquiring the plurality of sub-images:
dividing the authentication picture into a plurality of sub-pictures, wherein each sub-picture corresponding block comprises a preposed hash value.
3. The authentication method according to claim 2, wherein the agglomeration process includes:
storing the sub-picture in a block body of a block;
storing the hash value of the sub-picture in a block header of the block;
calculating a hash value of a block head of a previous block of the block as a pre-hash value;
the pre-hash value is stored in a block header of the block.
4. The authentication method according to any one of claims 1 to 3, further comprising, before acquiring the plurality of sub-images:
and randomly extracting a picture to serve as the authentication picture by scrambling the picture sequence in the picture library.
5. An authentication method according to any one of claims 1 to 3, wherein,
and encrypting the plurality of sub-pictures and providing the encrypted sub-pictures to the user.
6. An authentication apparatus comprising:
the device comprises a transmitter, a verification code generator and a user, wherein the transmitter is used for providing a plurality of sub-pictures for the user, the plurality of sub-pictures can be spliced into one authentication picture, and the verification code is transmitted to the user under the condition that the user can splice the plurality of sub-pictures into the authentication picture;
the processor is used for generating the verification code according to the plurality of sub-images and passing the authentication of the user under the condition that the user returns a correct verification code;
the processor respectively carries out agglomeration treatment on each sub-picture and stores the sub-pictures in a blockchain.
7. The authentication apparatus according to claim 6, wherein,
the processor divides the authentication picture into a plurality of sub-pictures, and each block corresponding to the sub-picture comprises a front hash value.
8. The authentication apparatus according to claim 7, wherein,
the processor stores the sub-picture in a block body of a block, stores a hash value of the sub-picture in a block header of the block, and stores a pre-hash value in a block header of the block, the pre-hash value being a hash value of a block header of a block preceding the block.
9. The authentication device according to any one of claims 6 to 7,
the processor scrambles the sequence of the pictures in the picture library and randomly extracts a picture as the authentication picture.
10. The authentication device according to any one of claims 6-7, wherein,
the processor encrypts the plurality of sub-pictures, and the transmitter provides the encrypted plurality of sub-pictures to the user.
11. An authentication apparatus comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform one or more steps of the authentication method of any of claims 1-5 based on instructions stored in the memory device.
12. A computer readable storage medium having stored thereon a computer program which when executed by a processor performs one or more steps of the authentication method of any of claims 1-5.
CN201810801285.7A 2018-07-20 2018-07-20 Authentication method, apparatus and computer readable storage medium Active CN110740112B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810801285.7A CN110740112B (en) 2018-07-20 2018-07-20 Authentication method, apparatus and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810801285.7A CN110740112B (en) 2018-07-20 2018-07-20 Authentication method, apparatus and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110740112A CN110740112A (en) 2020-01-31
CN110740112B true CN110740112B (en) 2023-05-12

Family

ID=69235139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810801285.7A Active CN110740112B (en) 2018-07-20 2018-07-20 Authentication method, apparatus and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110740112B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111163109B (en) * 2020-02-04 2021-01-12 四川云天盛德科技有限公司 Block chain center-removing type node anti-counterfeiting method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323065A (en) * 2014-07-21 2016-02-10 腾讯科技(深圳)有限公司 Safety verification method and device
CN105323218A (en) * 2014-06-30 2016-02-10 腾讯科技(深圳)有限公司 Identity verifying method and device
WO2018008800A1 (en) * 2016-07-04 2018-01-11 (주)코인플러그 Accredited certificate authentication system based on blockchain, and accredited certificate authentication method based on blockchain, using same
CN107807951A (en) * 2017-09-18 2018-03-16 联动优势科技有限公司 A kind of block chain generation method, data verification method, node and system
CN107968779A (en) * 2017-11-17 2018-04-27 天脉聚源(北京)科技有限公司 Auth method and device
CN108010097A (en) * 2017-11-30 2018-05-08 广州品唯软件有限公司 Generation, verification method and the device of identifying code image

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323218A (en) * 2014-06-30 2016-02-10 腾讯科技(深圳)有限公司 Identity verifying method and device
CN105323065A (en) * 2014-07-21 2016-02-10 腾讯科技(深圳)有限公司 Safety verification method and device
WO2018008800A1 (en) * 2016-07-04 2018-01-11 (주)코인플러그 Accredited certificate authentication system based on blockchain, and accredited certificate authentication method based on blockchain, using same
CN107807951A (en) * 2017-09-18 2018-03-16 联动优势科技有限公司 A kind of block chain generation method, data verification method, node and system
CN107968779A (en) * 2017-11-17 2018-04-27 天脉聚源(北京)科技有限公司 Auth method and device
CN108010097A (en) * 2017-11-30 2018-05-08 广州品唯软件有限公司 Generation, verification method and the device of identifying code image

Also Published As

Publication number Publication date
CN110740112A (en) 2020-01-31

Similar Documents

Publication Publication Date Title
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US10958436B2 (en) Methods contract generator and validation server for access control of contract data in a distributed system with distributed consensus
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
JP6548667B2 (en) Method, apparatus and system for providing security checks
CN110798315B (en) Data processing method and device based on block chain and terminal
CN104767735B (en) information security processing method, processing server and processing client
JP6814147B2 (en) Terminals, methods, non-volatile storage media
CN111314069B (en) Block chain-based shaking system and method, electronic device and storage medium
JP2018513650A (en) Data forgery recognition method for two-dimensional code security check
CN108683667B (en) Account protection method, device, system and storage medium
CN104796257A (en) Flexible data authentication
CN114266033A (en) Verification code generation method and device, verification code login system and electronic equipment
CN108900472B (en) Information transmission method and device
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN108235067B (en) Authentication method and device for video stream address
CN114363088A (en) Method and device for requesting data
CN110740112B (en) Authentication method, apparatus and computer readable storage medium
JP6059788B2 (en) Network authentication method using card device
CN114036364B (en) Method, apparatus, device, medium, and system for identifying crawlers
CN114245374B (en) Security authentication method, system and related equipment
CN105610811B (en) Authentication method and its relevant equipment and system
CN110858803B (en) Authentication method, system, server, and computer-readable storage medium
CN112434327B (en) Information protection method and device and electronic equipment
KR102155240B1 (en) Digital forensic data decoding device
CN110675158A (en) Transaction payment method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant