CN110753016A - Real name authentication method based on block chain - Google Patents
Real name authentication method based on block chain Download PDFInfo
- Publication number
- CN110753016A CN110753016A CN201810811010.1A CN201810811010A CN110753016A CN 110753016 A CN110753016 A CN 110753016A CN 201810811010 A CN201810811010 A CN 201810811010A CN 110753016 A CN110753016 A CN 110753016A
- Authority
- CN
- China
- Prior art keywords
- real
- name
- authentication
- information
- data block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to a real-name authentication method based on a block chain. The method comprises the steps of 1, filling real-name data, confirming the real-name data, and writing real-name data blocks into a real-name data block chain; 2. real-name data authentication service: the client side initiates a real-name authentication request, the server side performs real-name authentication processing and records real-name authentication records, and various types of authentication services including login authentication, real-name owner identity information authentication, business role information authentication and business authorization information authentication are provided. The invention relates to two private block chains: the real-name data block chain is used for storing real-name data, and the real-name authentication recording block chain is used for storing recorded data in a real-name authentication process. The invention is a novel real-name authentication technology based on the network, can be widely applied to informatization systems of various large enterprises, can be used for constructing a credible cooperation platform of real identity authentication based on the block chain technology, and provides safe, reliable and efficient service support for various applications requiring identity authentication, role authentication and the like.
Description
Technical Field
The invention belongs to the field of enterprise informatization application based on a block chain, and particularly relates to a real-name authentication method based on the block chain.
Background
With the continuous enhancement of enterprise informatization construction, various business processing of enterprises increasingly depend on related business systems, and access user identity authentication relates to system security and is always a key problem to be solved by various information systems. The traditional method comprises the following steps: the user identity is issued by a certification authority in the form of network data, generally needs to handle an electronic key, can only handle certification to a specific certification authority, is tedious in procedure, is limited to the interoperability and service agreement of a certificate of a CA center, is high in protection cost, poor in compatibility and usability, and also has the problems of compatibility and usability of a PC side browser.
At present, most of user data of the enterprise information system is stored by a single data center, and unified access and authentication are performed when the user data are used, so that higher requirements on the security and the stability of the center are provided, the operation and maintenance cost is correspondingly increased, and the risk caused by single-point storage cannot be fundamentally solved; on the other hand, the traditional single user authentication method is not completely applicable to large-scale interactive enterprise applications across regions, units, departments and networks, for example, the power enterprise supplies all participating units and departments related to material and settlement, such as suppliers, owner units, construction units, supervision units, material management units and the like; the fulfillment process relates to a delivery receipt, an acceptance receipt, a warehousing receipt, a delivery receipt, a quality insurance receipt and the like, a plurality of systems are required to be accessed, and meanwhile, the delivery is carried out by combining paper receipts, so that the efficiency is very low.
A blockchain provides a good solution, which is essentially a decentralized database, a series of data blocks associated using cryptography, each data block containing specific information for verifying the validity of the information (anti-counterfeiting) and generating the next block. Blockchains have many good characteristics, including decentralization, openness, autonomy, and information non-falsification, and once information is verified and added to the blockchain, it is permanently stored, so that the data stability and reliability of the blockchain are extremely high. Therefore, the block chain is used as an identity information record carrier and is used as the bottom layer technology of real-name authentication, and the method has good safety and reliability.
Disclosure of Invention
In view of the above-mentioned shortcomings in the prior art, the present patent provides a block chain-based real-name authentication method, which can overcome the above-mentioned problems or can partially solve the above-mentioned problems. According to the invention, the enterprise private chain is established, and the personnel identity information, the service role information and the service authorization information are uniformly stored on the block chain by virtue of the characteristics of decentralized block chain and information non-falsification, so that the uniformity and the safety of the real-name information are ensured. The system reads information on the block chain through a uniform access interface to complete various service requirements, including login authentication, identity information authentication of real-name owners, service role information authentication, service authorization information authentication and the like. All authentication processes are used as a real-name authentication record and recorded in a real-name authentication record block chain, so that the integrity, the safety and the traceability of all authentication operations are ensured.
The technical scheme adopted by the invention for realizing the purpose is as follows: a real-name authentication method based on a block chain comprises the following steps:
the real name information data construction method comprises the following steps: acquiring real name information of a user; adopting an administrator confirmation mode or a user remote confirmation mode to carry out accuracy confirmation on the acquired real name information; constructing the confirmed real-name information into a real-name data block and writing the real-name data block into a real-name data block chain;
and (3) real name data authentication: the client side initiates a real-name authentication request, the server side receives and verifies the request information, then searches for corresponding real-name information from the real-name data block chain and returns the corresponding real-name information to the requester of the client side, and a record data block is constructed and added to the real-name authentication record block chain to complete authentication.
The collecting the real name information of the user comprises the following steps:
the method comprises the steps of sequentially collecting real name information of a user, sequentially connecting all the real name information input by the user, calculating a Hash value H of the real name information through an SHA-256 Hash algorithm, inquiring whether a real name data block with a main key ID of H exists, if yes, indicating that the real name information of the user exists, and if not, indicating that the real name data block is used for constructing a real name data block for a new user.
The real name information includes: identity information of the real-name owner, service role information and service authorization information;
the identity information of the real-name owner comprises a name, an identification card number, a login password, a mobile phone number, a unit, a department, a birth date and an address;
the service role information is function module list data which can be accessed by a user and service operation list data which can be made in the function module list;
the service authorization information is service agreement or legal document constraint list data which is confirmed and accepted by the user.
The sequentially collecting the real name information of the user comprises the following steps: and acquiring identity information of the real-name owner input by the user, service role information related to the process and selected and confirmed service authorization information in sequence.
The administrator confirmation mode is that the administrator confirms the face sign through the site, the auxiliary authentication of the reserved information and the synchronous verification of the existing account to finish the user identity confirmation;
the user remote confirmation mode is as follows: the server generates a plurality of digit and English letter mixed coding verification codes, sends the verification codes to a mobile phone number in real name information registered by a user in a short message mode, and completes identity confirmation if confirmation information of the user is received within effective time limit; the user needs to check the remote confirmation option while submitting the registration information.
The step of constructing the confirmed real-name data into real-name data blocks and writing the real-name data blocks into a real-name data block chain comprises:
constructing real-name data into real-name data blocks;
writing the constructed real-name data blocks into a real-name data block chain according to the ID sequence of a main key, wherein the block chain is an enterprise private chain;
if the enterprise has other federation chains, then a broadcast is made to all the other federation chain's certification authorities having a trust relationship, and the certification authority that received the message writes the data to the local blockchain.
The constructing of the real-name information into the real-name data block comprises:
1) connecting all real name information of the new user in sequence, calculating a hash value of the real name information through an SHA-256 hash algorithm, and using the hash value as a primary key ID of the real name data block;
2) combining the name, the identification number, the mobile phone number and the login password as identity authentication information to be stored in a real-name data block for user login and verification; the password is converted into an MD5 hash value to be stored, and the name, the identification card number and the mobile phone number are stored in a plaintext;
3) taking a unit, a department, a birth date and an address as basic identity information and storing the basic identity information in a plaintext to a real-name data block;
4) converting the service role information into an MD5 hash value format and storing the hash value format into a real-name data block;
5) the service authorization information is converted into an MD5 hash value format and stored in a real-name data block, so as to assist in confirming the operation authority of the user on the service.
The step of real name data authentication comprises:
1) the client sends a real-name authentication request containing an authentication type, valid identity information of a requester and valid identity information of an authentication real name to the server; the effective identity information of the applicant is the combination of one of a name, an identification card number and a mobile phone number and a login password; the effective identification information of the authentication real name is a name, an identification card number and a mobile phone number;
2) the server side checks whether the valid identity information of the requester and the valid identity information of the authentication real name are correct or not in sequence by inquiring the real name data block chain, and if the valid identity information of the requester and the valid identity information of the authentication real name are correct, data are returned according to the authentication type of the real name authentication request;
3) constructing a recording data block, adding the recording data block into a real-name authentication recording block chain, and recording a real-name authentication process;
the recording data block contains the following information:
a. recording a primary key ID of the real-name data block, wherein the primary key ID is a random hash field string;
b. the valid identity information of the applicant is represented by a Hash ID in the real-name data block chain;
c. authenticating the real-name valid identity information, and representing the information by using a Hash ID in a real-name data block chain;
d. recording data obtained according to the authentication type of the real-name authentication request;
e. and inquiring the time.
The authentication types include: login authentication, identity information authentication of the real name owner, service role information authentication and service authorization information authentication.
The authentication type return data according to the real-name authentication request comprises:
when the authentication type is login authentication, the server side inquires a real-name data block chain according to login information submitted by the client side, verifies the login information and returns result login information, wherein the result login information is as follows: a combination of one of a name, an identification number, a mobile phone number and a login password;
when the authentication type is the identity information authentication of the real-name owner, the server side inquires the real-name data block chain according to the inquiry condition and returns the identity related information; the query condition must include name, ID card number or mobile phone number;
when the authentication type is service role information authentication, the server side inquires the real-name data block chain according to the inquiry condition and returns service role related information; the query condition must include name, ID card number or mobile phone number;
when the authentication type is service authorization information authentication, the server side inquires the real-name data block chain according to the inquiry condition and returns service authorization related information; the query must contain a name, identification number or mobile phone number.
The invention has the following advantages and beneficial effects:
the invention can be used as a novel network-based real-name authentication technology, can be widely applied to information systems of various large enterprises, is flexible in deployment mode, can be deployed as an independent real-name authentication platform, can also be integrated and deployed as a part of the information systems, can build a uniform and mutually-trusted real-name authentication system in the enterprises by virtue of good technical characteristics and safety characteristics of a block chain technology, integrates various identity, role and authority information of users together, and builds a mutually-trusted and cooperative platform among various service systems.
Drawings
FIG. 1 is a flow of real-name information data construction and a real-name data authentication;
Detailed Description
The present invention will be described in further detail with reference to the accompanying fig. 1 and the embodiments.
1. Building a blockchain foundation environment
The invention relates to two block chains:
1) real name data block chain
For recording all real name data information.
2) Real name authentication record block chain
For recording all real-name authentication operation records.
2. Building real name data block chains
1) Real name data filling
The real name information includes 3 parts of data, which are respectively:
(1) identity information of the real-name owner: the name, ID card number, login password and mobile phone number must be filled in, and other options include unit, department, date of birth, address, etc.
(2) Service role information: the role defines the functional module which can be accessed by the user and the operation which can be done in the module, and various kinds of role definition information are in text format. Examples of the functional modules and operations that can be performed in the modules are: the definition of the accessible function and the operation authority of a certain user is described as follows:
{"QueryInfo":{"query":"yes","edit":"no","delete":"no","add":"no","print":"yes"}}
in the above description, the QueryInfo is a specific function module name, add, delete, edit, query, and print are respectively corresponding to operations of adding, deleting, modifying, querying, and printing, yes represents that the operation authority is provided, and no represents that the operation authority is not provided.
(3) Service authorization information: namely, the service agreement or legal document constraint confirmed and accepted by the user, and certain services are qualified to operate only by accepting service authorization;
the filling step is divided into two steps:
(1) applicants' data filling: the real-name owner reports personal identity information at the client, the necessary items are name, identification card number, login password and mobile phone number, and the rest selectable items comprise unit, department, birth date, address and the like; and selecting the roles related to the business process, and selecting and confirming the business authorization.
(2) Application data submission: and (3) connecting all input data according to sequence by the system according to the real-name information submitted by the user, calculating a hash value H through an SHA-256 hash algorithm, inquiring whether a real-name data block with a primary key ID of H exists, if so, indicating that the user data already exists, and otherwise, indicating that the user is a new user.
2) Real name data validation
The accuracy of the real-name information of the user can be confirmed in two ways:
(1) the administrator confirms that: namely, the administrator completes the user identity confirmation through technical means such as field confirmation face labeling, storage information auxiliary authentication, existing account synchronous verification and the like. The field confirmation face label is a face-to-face confirmation of the user and the administrator. The persistence information assists in authentication and the existing account synchronization verification is confirmation by the administrator through the information archived by the system.
(2) Remote confirmation by the user: the remote confirmation is completed by means of the mobile phone verification code, namely, the user submits the registration information and simultaneously selects the remote confirmation option, the server generates the verification code mixed with 6 digits and English letters, the verification code is sent to the mobile phone number in the registration information in a short message, the input is valid within 120 seconds, and the identity confirmation is completed when the verification is correct.
3) Real name data block write block chain
The confirmed real-name data is constructed into a data block and written into a real-name data block chain, wherein the block chain type is an enterprise private chain.
Totally classifying 3 steps:
(1) the real name data is constructed as a data block.
The data block includes the following parts:
a. primary key ID: and connecting all real-name data information in sequence, and calculating the obtained hash value by using the SHA-256 hash algorithm.
b. Authentication data: the certificate comprises a name, an identity card number, a login password and a mobile phone number, wherein the name, the identity card number and the mobile phone number can be combined with the login password to be used as a certificate for user login and verification, the password is converted into an MD5 hash value to be stored, and the rest is a plaintext.
c. Identity basic information: including units, departments, dates of birth, addresses, etc.
d. Service role information: the list of function modules that the user can access, the operation list data that can be done in the module, are converted into MD5 hash value format for storage.
e. Service authorization information: the service agreement or legal document constraint list confirmed and accepted by the user is converted into MD5 hash value format for storage, which is used to assist in confirming the operation authority of the user to the service.
(2) The data block is written into a real-name data block chain, wherein the type of the block chain is an enterprise private chain.
(3) If the enterprise has other federation chains, then it broadcasts to all other certification authorities that have a trust relationship, and the certification authority that received the message writes the data to the local blockchain.
3. Real-name data authentication service
The client accesses the real-name authentication service by submitting an authentication type and authentication data, wherein the authentication type comprises the following steps:
1) login authentication
The client submits data, queries a real-name data block chain, verifies login data, and returns a result, wherein the data is divided into three conditions:
name + login password: the name may be repeated, and if repeated, a prompt is given.
Identity card number + login password.
Mobile phone number + login password.
2) Identity information of real-name owner
And inquiring the real-name data block chain, returning the identity related data, wherein the inquiry condition needs to contain a name, an identity card number or a mobile phone number, and the data of the identity information can be effectively identified.
3) Business role information
And inquiring the real-name data block chain, and returning the relevant data of the service role, wherein the inquiry condition needs to contain a name, an identity card number or a mobile phone number, namely the data of the identity information can be effectively identified.
4) Service authorization information
And inquiring the real-name data block chain, and returning service authorization related data, wherein the inquiry condition needs to contain a name, an identity card number or a mobile phone number, namely the data of the identity information can be effectively identified.
The authentication process includes:
1) the client side initiates a real-name authentication request, and the request content must include an authentication type, valid identity information of a requester and valid identity information of an authentication real name.
Valid identity information of the requestor: name + login password (name may be duplicated, if duplicated, prompt information is given), identification number + login password, mobile phone number + login password.
And (3) authenticating the real-name valid identity information: name, ID card number, mobile phone number, and name may be duplicated, and if duplicated, prompt information is given to suggest using ID card number or mobile phone number.
2) Server real name authentication processing
The method comprises the steps of checking the effective identity information of a requester by inquiring a real-name data block chain, inquiring the effective identity information of an authentication real name in the block chain, and returning data according to the authentication type.
3) Recording real-name authentication records
Constructing a recording data block, wherein the recording data block mainly comprises the following information:
a. the primary key ID of the real name data block is recorded, 64-bit random hash field string.
b. The valid identity information of the applicant is represented by a hash ID in the real-name data block chain.
c. And authenticating the real-name valid identity information, which is represented by the Hash ID in the real-name data block chain.
d. And returning a query result.
e. And inquiring the time.
Finally, the recording data block is added to the real-name authentication recording block chain.
Claims (10)
1. A real-name authentication method based on a block chain is characterized by comprising the following steps:
the real name information data construction method comprises the following steps: acquiring real name information of a user; adopting an administrator confirmation mode or a user remote confirmation mode to carry out accuracy confirmation on the acquired real name information; constructing the confirmed real-name information into a real-name data block and writing the real-name data block into a real-name data block chain;
and (3) real name data authentication: the client side initiates a real-name authentication request, the server side receives and verifies the request information, then searches for corresponding real-name information from the real-name data block chain and returns the corresponding real-name information to the requester of the client side, and a record data block is constructed and added to the real-name authentication record block chain to complete authentication.
2. The real-name authentication method based on the blockchain according to claim 1, wherein: the collecting the real name information of the user comprises the following steps:
the method comprises the steps of sequentially collecting real name information of a user, sequentially connecting all the real name information input by the user, calculating a Hash value H of the real name information through an SHA-256 Hash algorithm, inquiring whether a real name data block with a main key ID of H exists, if yes, indicating that the real name information of the user exists, and if not, indicating that the real name data block is used for constructing a real name data block for a new user.
3. The real-name authentication method based on the block chain as claimed in claim 1 or 2, wherein: the real name information includes: identity information of the real-name owner, service role information and service authorization information;
the identity information of the real-name owner comprises a name, an identification card number, a login password, a mobile phone number, a unit, a department, a birth date and an address;
the service role information is function module list data which can be accessed by a user and service operation list data which can be made in the function module list;
the service authorization information is service agreement or legal document constraint list data which is confirmed and accepted by the user.
4. The real-name authentication method based on the blockchain according to claim 3, wherein: the sequentially collecting the real name information of the user comprises the following steps: and acquiring identity information of the real-name owner input by the user, service role information related to the process and selected and confirmed service authorization information in sequence.
5. The real-name authentication method based on the blockchain according to claim 1, wherein: the administrator confirmation mode is that the administrator confirms the face sign through the site, the auxiliary authentication of the reserved information and the synchronous verification of the existing account to finish the user identity confirmation;
the user remote confirmation mode is as follows: the server generates a plurality of digit and English letter mixed coding verification codes, sends the verification codes to a mobile phone number in real name information registered by a user in a short message mode, and completes identity confirmation if confirmation information of the user is received within effective time limit; the user needs to check the remote confirmation option while submitting the registration information.
6. The real-name authentication method based on the blockchain according to claim 1, wherein: the step of constructing the confirmed real-name data into real-name data blocks and writing the real-name data blocks into a real-name data block chain comprises:
constructing real-name data into real-name data blocks;
writing the constructed real-name data blocks into a real-name data block chain according to the ID sequence of a main key, wherein the block chain is an enterprise private chain;
if the enterprise has other federation chains, then a broadcast is made to all the other federation chain's certification authorities having a trust relationship, and the certification authority that received the message writes the data to the local blockchain.
7. The real-name authentication method based on the blockchain according to claim 6, wherein: the constructing of the real-name information into the real-name data block comprises:
1) connecting all real name information of the new user in sequence, calculating a hash value of the real name information through an SHA-256 hash algorithm, and using the hash value as a primary key ID of the real name data block;
2) combining the name, the identification number, the mobile phone number and the login password as identity authentication information to be stored in a real-name data block for user login and verification; the password is converted into an MD5 hash value to be stored, and the name, the identification card number and the mobile phone number are stored in a plaintext;
3) taking a unit, a department, a birth date and an address as basic identity information and storing the basic identity information in a plaintext to a real-name data block;
4) converting the service role information into an MD5 hash value format and storing the hash value format into a real-name data block;
5) the service authorization information is converted into an MD5 hash value format and stored in a real-name data block, so as to assist in confirming the operation authority of the user on the service.
8. The real-name authentication method based on the blockchain according to claim 1, wherein: the step of real name data authentication comprises:
1) the client sends a real-name authentication request containing an authentication type, valid identity information of a requester and valid identity information of an authentication real name to the server; the effective identity information of the applicant is the combination of one of a name, an identification card number and a mobile phone number and a login password; the effective identification information of the authentication real name is a name, an identification card number and a mobile phone number;
2) the server side checks whether the valid identity information of the requester and the valid identity information of the authentication real name are correct or not in sequence by inquiring the real name data block chain, and if the valid identity information of the requester and the valid identity information of the authentication real name are correct, data are returned according to the authentication type of the real name authentication request;
3) constructing a recording data block, adding the recording data block into a real-name authentication recording block chain, and recording a real-name authentication process;
the recording data block contains the following information:
a. recording a primary key ID of the real-name data block, wherein the primary key ID is a random hash field string;
b. the valid identity information of the applicant is represented by a Hash ID in the real-name data block chain;
c. authenticating the real-name valid identity information, and representing the information by using a Hash ID in a real-name data block chain;
d. recording data obtained according to the authentication type of the real-name authentication request;
e. and inquiring the time.
9. The real-name authentication method based on the blockchain according to claim 8, wherein: the authentication types include: login authentication, identity information authentication of the real name owner, service role information authentication and service authorization information authentication.
10. The real-name authentication method based on the blockchain according to claim 9, wherein: the authentication type return data according to the real-name authentication request comprises:
when the authentication type is login authentication, the server side inquires a real-name data block chain according to login information submitted by the client side, verifies the login information and returns result login information, wherein the result login information is as follows: a combination of one of a name, an identification number, a mobile phone number and a login password;
when the authentication type is the identity information authentication of the real-name owner, the server side inquires the real-name data block chain according to the inquiry condition and returns the identity related information; the query condition must include name, ID card number or mobile phone number;
when the authentication type is service role information authentication, the server side inquires the real-name data block chain according to the inquiry condition and returns service role related information; the query condition must include name, ID card number or mobile phone number;
when the authentication type is service authorization information authentication, the server side inquires the real-name data block chain according to the inquiry condition and returns service authorization related information; the query must contain a name, identification number or mobile phone number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810811010.1A CN110753016B (en) | 2018-07-23 | 2018-07-23 | Real name authentication method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810811010.1A CN110753016B (en) | 2018-07-23 | 2018-07-23 | Real name authentication method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110753016A true CN110753016A (en) | 2020-02-04 |
CN110753016B CN110753016B (en) | 2021-12-14 |
Family
ID=69274988
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810811010.1A Active CN110753016B (en) | 2018-07-23 | 2018-07-23 | Real name authentication method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110753016B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111540111A (en) * | 2020-04-21 | 2020-08-14 | 上海旺链信息科技有限公司 | Personnel information verification method and system based on block chain |
CN111930851A (en) * | 2020-09-25 | 2020-11-13 | 腾讯科技(深圳)有限公司 | Control data processing method, device, medium and electronic equipment of block chain network |
CN112162984A (en) * | 2020-09-28 | 2021-01-01 | 彩讯科技股份有限公司 | Real name authentication method, system, equipment and storage medium based on block chain |
CN113326489A (en) * | 2021-06-25 | 2021-08-31 | 南京金盾公共安全技术研究院有限公司 | User information authentication system and method |
CN115001721A (en) * | 2022-08-08 | 2022-09-02 | 北京科技大学 | Safety authentication method and system of smart power grid based on block chain |
CN116361753A (en) * | 2023-03-17 | 2023-06-30 | 深圳市东信时代信息技术有限公司 | Authority authentication method, device, equipment and medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140189808A1 (en) * | 2012-12-28 | 2014-07-03 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
CN106503992A (en) * | 2016-10-18 | 2017-03-15 | 北京天德科技有限公司 | A kind of block chain that Transaction Information and accounts information are stored respectively |
CN107196966A (en) * | 2017-07-05 | 2017-09-22 | 北京信任度科技有限公司 | The identity identifying method and system of multi-party trust based on block chain |
CN107465673A (en) * | 2017-07-27 | 2017-12-12 | 深圳市易成自动驾驶技术有限公司 | Identity identifying method, device and the computer-readable recording medium of vehicle |
CN108229981A (en) * | 2018-01-29 | 2018-06-29 | 杭州云象网络技术有限公司 | A kind of anti-fake source tracing method of supply chain finance based on block chain |
-
2018
- 2018-07-23 CN CN201810811010.1A patent/CN110753016B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140189808A1 (en) * | 2012-12-28 | 2014-07-03 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
CN106503992A (en) * | 2016-10-18 | 2017-03-15 | 北京天德科技有限公司 | A kind of block chain that Transaction Information and accounts information are stored respectively |
CN107196966A (en) * | 2017-07-05 | 2017-09-22 | 北京信任度科技有限公司 | The identity identifying method and system of multi-party trust based on block chain |
CN107465673A (en) * | 2017-07-27 | 2017-12-12 | 深圳市易成自动驾驶技术有限公司 | Identity identifying method, device and the computer-readable recording medium of vehicle |
CN108229981A (en) * | 2018-01-29 | 2018-06-29 | 杭州云象网络技术有限公司 | A kind of anti-fake source tracing method of supply chain finance based on block chain |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111540111A (en) * | 2020-04-21 | 2020-08-14 | 上海旺链信息科技有限公司 | Personnel information verification method and system based on block chain |
CN111930851A (en) * | 2020-09-25 | 2020-11-13 | 腾讯科技(深圳)有限公司 | Control data processing method, device, medium and electronic equipment of block chain network |
CN112162984A (en) * | 2020-09-28 | 2021-01-01 | 彩讯科技股份有限公司 | Real name authentication method, system, equipment and storage medium based on block chain |
CN113326489A (en) * | 2021-06-25 | 2021-08-31 | 南京金盾公共安全技术研究院有限公司 | User information authentication system and method |
CN115001721A (en) * | 2022-08-08 | 2022-09-02 | 北京科技大学 | Safety authentication method and system of smart power grid based on block chain |
CN115001721B (en) * | 2022-08-08 | 2022-11-08 | 北京科技大学 | Safety certification method and system for smart power grid based on block chain |
CN116361753A (en) * | 2023-03-17 | 2023-06-30 | 深圳市东信时代信息技术有限公司 | Authority authentication method, device, equipment and medium |
CN116361753B (en) * | 2023-03-17 | 2024-03-22 | 深圳市东信时代信息技术有限公司 | Authority authentication method, device, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN110753016B (en) | 2021-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110753016B (en) | Real name authentication method based on block chain | |
CN108234515B (en) | Self-authentication digital identity management system and method based on intelligent contract | |
CN106934673A (en) | A kind of electronic invoice system | |
CN107317678B (en) | A kind of electronics confirmation request processing method Internet-based and system | |
CN112085417A (en) | Industrial Internet identification distribution and data management method based on block chain | |
CN100593921C (en) | Time stamp service system and checking server for time stamp information and computer software | |
CN101022339A (en) | Electronic sign stamp identifying method combined with digital centifi cate and stamp | |
CN103020746A (en) | Method and system for online automatic checking of network user identity of enterprise | |
CN101286840A (en) | Key distributing method and system using public key cryptographic technique | |
EP2062209A1 (en) | Method and computer system for ensuring authenticity of an electronic transaction | |
CN103507450A (en) | Method and system for managing seal | |
US20080235175A1 (en) | Secure Document Management System | |
US20220309501A1 (en) | Blockchain-based trusted transaction method for data product | |
US20120191976A1 (en) | System and method for scheduling and executing secure electronic correspondence operations | |
CN102970302B (en) | Platform and method for personal information protection based on personal information universal coding | |
CN108009795A (en) | A kind of E-Government IT application in management platform and method | |
US20080235236A1 (en) | Secure Document Management System | |
TW201342298A (en) | Method for the certification of electronic mail delivery | |
KR20000049674A (en) | Method for providing and authenticating an electronic signature using a web site | |
CN113240145B (en) | Order-preserving encryption-based network vehicle-restraining platform and method thereof | |
CN111914231A (en) | Block chain-based identity authentication method, system, equipment and storage medium | |
CN202736110U (en) | Stamp management system | |
CN113065849A (en) | Resume management method based on block chain | |
CN112163870A (en) | Block chain-based information management method, analysis node and rework platform | |
CN103647650A (en) | Rule definition based automatic signature/signature verification device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |