CN111553693A - Associated certificate storage method and system based on secondary hash - Google Patents
Associated certificate storage method and system based on secondary hash Download PDFInfo
- Publication number
- CN111553693A CN111553693A CN202010437975.6A CN202010437975A CN111553693A CN 111553693 A CN111553693 A CN 111553693A CN 202010437975 A CN202010437975 A CN 202010437975A CN 111553693 A CN111553693 A CN 111553693A
- Authority
- CN
- China
- Prior art keywords
- abstract
- data
- transaction
- biological characteristic
- characteristic data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a method and a system for storing a certificate in association based on secondary hash, wherein when the method and the system are used, a first abstract is used as an irreversible hash result of transaction data, a second abstract is used as an irreversible hash result of biological characteristic data, and when the transaction data and the biological characteristic data need to be subjected to data verification in the later period, only one hash operation comparison is needed to be carried out on the transaction data and the biological characteristic data, and whether the transaction data and the biological characteristic data are falsified can be known; after the first abstract and the second abstract are pieced together, performing hash operation for the first time, namely, performing hash for the second time; when the relevance of the transaction data and the biological characteristic data needs to be verified in the later stage, only one-time hash operation needs to be carried out on the spelling string and the third abstract is compared, the fact that the first abstract and the second abstract in the spelling string are tampered or not can be known, the first abstract and the second abstract in the spelling string are not tampered, two data in the group are both originally sealed and cannot be tampered in matching.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a correlation evidence storing method and system based on secondary hash.
Background
Blockchains can be used for automation tasks and processes not limited to the field of cryptocurrency, and such a solution would enable better cryptographic processing of transactions using the properties of blockchains. All publications in the market have a serious centralization phenomenon, and the publications are popularized by respective enterprises or platforms no matter whether credit cards, aviation flights, shopping in shopping malls or online shopping malls in the telecommunication industry. There are some block chain digital transaction processing technologies based on facial recognition, and there is no effective solution for guaranteeing the matching correlation between transaction data and facial data.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a secondary hash-based association certificate storing method and system, which can ensure the matching association of transaction data and face data.
A correlation certificate storage method based on secondary hash comprises the following steps:
counting transaction data on a plurality of transaction nodes, acquiring the biological characteristics of a transactor during transaction, and establishing association between the transaction data and the biological characteristic data;
performing hash operation on transaction data to obtain a first abstract, performing hash operation on biological characteristic data to obtain a second abstract, stringing the first abstract and the second abstract, and performing hash operation on the string to obtain a third abstract;
encrypting the third abstract by a private key to obtain a digital signature, encrypting a public key corresponding to the private key to obtain a digital certificate, and uploading the digital signature and the digital certificate to a network;
packaging the transaction data and the biological characteristic data of all transaction nodes into a block within a preset time period, recording the transaction time, the time for acquiring the biological characteristic data, the Hash of the transaction data and the Hash of the biological characteristic data into the block head of the current block as a characteristic value, and calculating the Hash of the current block according to the characteristic value; constructing blocks generated successively into a block chain; the transaction data and the biological characteristic data in the block are downloaded to each transaction node for distributed storage;
and encrypting the second abstract obtained by calculation by using a private key to obtain a digital signature, encrypting a public key corresponding to the private key to obtain a digital certificate, and attaching the digital signature and the digital certificate to biological characteristic data and uploading the biological characteristic data and the digital certificate to a network.
Further, the first abstract, the second abstract and the third abstract are different from each other.
Further, the method also comprises the following steps:
and the transaction node is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate.
Further, a MongoDB database is adopted for collecting biological characteristics;
the biometric data includes a fingerprint, an iris, and facial structured light.
A storable computing device comprising a memory and a processor; the memory is used for storing a computer program; the processor, when executing the computer program, is adapted to carry out the method steps of any of claims 1-4.
A correlation deposit certificate system based on secondary hash comprises a plurality of transaction node modules, wherein storable computing equipment is arranged in each transaction node module and used for counting transaction data, a biological characteristic acquisition module is arranged in each transaction node module and used for acquiring biological characteristics of an accessor during transaction, and correlation is established between the transaction data and the biological characteristic data;
the storable computing equipment performs Hash operation on transaction data to obtain a first abstract, performs Hash operation on biological characteristic data to obtain a second abstract, strings the first abstract and the second abstract, and performs Hash operation on the strings to obtain a third abstract; the storable computing device encrypts the third abstract by a private key to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, and uploads the digital signature and the digital certificate to a network;
the method comprises the steps that a single or a plurality of storable computing devices pack transaction data and biological characteristic data of all transaction node modules into a block within a preset time period, the transaction time, the biological characteristic data acquisition time, the hash of the transaction data and the hash of the biological characteristic data are recorded into the head of the block of the current block to serve as characteristic values, the hash of the current block is calculated according to the characteristic values, and the blocks generated successively are mutually constructed into a block chain; the transaction data and the biological characteristic data in the block are downloaded to each transaction node module for distributed storage;
and the storable computing equipment encrypts the second abstract by a private key to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, attaches the digital signature and the digital certificate to the biological characteristic data and uploads the biological characteristic data and the digital certificate to the network.
Further, the first abstract, the second abstract and the third abstract are different from each other.
Further, the transaction node module is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by the third party monitoring system to obtain a digital certificate.
Further, a MongoDB database is adopted for collecting biological characteristics, and the biological characteristic data comprises fingerprints, irises and facial structured light.
When the transaction data and the biological characteristic data are required to be subjected to data verification in the later period, only one hash operation comparison is required to be carried out on the transaction data and the biological characteristic data, and whether the transaction data and the biological characteristic data are tampered or not can be known only by comparing the two data with the first abstract and the second abstract or not; in the above process, however, the biometric data and the transaction data must be associated and bound, so that the biometric data is bound to the correct transaction data; establishing an association between the transaction data and the biometric data alone is not sufficient to ensure that the association is not tampered with; therefore, the first abstract and the second abstract are pieced together and then subjected to a hash operation, namely, a secondary hash; when the relevance of the transaction data and the biological characteristic data needs to be verified in the later stage, only one-time hash operation needs to be carried out on the spelling string and the result is compared with the third abstract, so that whether the first abstract and the second abstract in the spelling string are tampered or not can be known, the first abstract and the second abstract in the spelling string are not tampered, the transaction data and the biological characteristic data in the group are both original, and the matching is not tampered. The non-tamper property of distributed storage based on the block chain, the transaction time, the time for acquiring biological characteristic data, the hash of the transaction data and the hash of the biological characteristic data are added into the block head, and the transaction data and the biological characteristic data are added into the block body, so that all relevant data of the transaction data and the biological characteristic data cannot be tampered. In the subsequent data use, the public key can be used for decrypting the digital signature to obtain a second abstract, and the biological characteristic data is subjected to hash operation once and compared with the second abstract, so that whether the biological characteristic data is falsified or not can be known; meanwhile, the digital certificate can prove the authenticity of the digital signature, and the uncorruptable property of the biological characteristic data is ensured through triple encryption of Hash operation, the digital signature and the digital certificate.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only examples, and the protection scope of the present invention is not limited thereby.
It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
In one embodiment, the present invention first provides a secondary hash-based associated certificate storing method, which includes the steps of:
counting transaction data on a plurality of transaction nodes, acquiring the biological characteristics of a transactor during transaction, and establishing association between the transaction data and the biological characteristic data;
performing hash operation on transaction data to obtain a first abstract, performing hash operation on biological characteristic data to obtain a second abstract, stringing the first abstract and the second abstract, and performing hash operation on the string to obtain a third abstract;
encrypting the third abstract by a private key to obtain a digital signature, encrypting a public key corresponding to the private key to obtain a digital certificate, and uploading the digital signature and the digital certificate to a network;
packaging the transaction data and the biological characteristic data of all transaction nodes into a block within a preset time period, recording the transaction time, the time for acquiring the biological characteristic data, the Hash of the transaction data and the Hash of the biological characteristic data into the block head of the current block as a characteristic value, and calculating the Hash of the current block according to the characteristic value; constructing blocks generated successively into a block chain; the transaction data and the biological characteristic data in the block are downloaded to each transaction node for distributed storage;
and encrypting the second abstract obtained by calculation by using a private key to obtain a digital signature, encrypting a public key corresponding to the private key to obtain a digital certificate, and attaching the digital signature and the digital certificate to biological characteristic data and uploading the biological characteristic data and the digital certificate to a network.
In the operation process, the first abstract is used as an irreversible hash result of the transaction data, the second abstract is used as an irreversible hash result of the biological characteristic data, and when data verification is needed to be performed on the transaction data and the biological characteristic data in the later period, only one hash operation comparison is needed to be performed on the transaction data and the biological characteristic data, and whether the two are equal to the first abstract or the second abstract or not can be known, so that whether the transaction data and the biological characteristic data are tampered or not;
in the above process, however, the biometric data and the transaction data must be associated and bound, so that the biometric data is bound to the correct transaction data; establishing an association between the transaction data and the biometric data alone is not sufficient to ensure that the association is not tampered with;
therefore, the first abstract and the second abstract are pieced together and then subjected to a hash operation, namely, a secondary hash; when the relevance of the transaction data and the biological characteristic data needs to be verified in the later stage, only one-time hash operation needs to be carried out on the spelling string and the result is compared with the third abstract, so that whether the first abstract and the second abstract in the spelling string are tampered or not can be known, the first abstract and the second abstract in the spelling string are not tampered, the transaction data and the biological characteristic data in the group are both original, and the matching is not tampered.
The non-tamper property of distributed storage based on the block chain, the transaction time, the time for acquiring biological characteristic data, the hash of the transaction data and the hash of the biological characteristic data are added into the block head, and the transaction data and the biological characteristic data are added into the block body, so that all relevant data of the transaction data and the biological characteristic data cannot be tampered.
In the subsequent data use, the public key can be used for decrypting the digital signature to obtain a second abstract, and the biological characteristic data is subjected to hash operation once and compared with the second abstract, so that whether the biological characteristic data is falsified or not can be known; meanwhile, the digital certificate can prove the authenticity of the digital signature, and the uncorruptable property of the biological characteristic data is ensured through triple encryption of Hash operation, the digital signature and the digital certificate.
The biometric of the visitor may be collected in a variety of ways, such as by including fingerprint, iris, and facial structured light data.
Specifically, the first abstract, the second abstract and the third abstract are different from each other.
Specifically, the transaction node is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by the third party monitoring system to obtain a digital certificate.
Preferably, a MongoDB database is adopted for collecting biological characteristics; compared with other distributed databases, the MongoDB has more storage advantages, and data can be stored in a binary Json format Bson, so that the data storage format is uniform, and the occupied size of the data is reduced.
The biometric data includes a fingerprint, an iris, and facial structured light.
In particular, the access control module may be a biometric verifier, such as a fingerprint recognizer, an iris recognizer, a facial structure light recognizer, or the like.
The present invention also contemplates a storable computing device,
the storable computing device comprises a memory and a processor; the memory is used for storing a computer program; the processor is adapted to carry out any of the above-mentioned method steps when executing the computer program.
The invention also provides an associated storage certificate system based on the secondary hash,
the system comprises a plurality of transaction node modules, wherein storable computing equipment is arranged in each transaction node module, the storable computing equipment carries out statistics on transaction data, a biological characteristic acquisition module is arranged in each transaction node module, the biological characteristic acquisition module acquires biological characteristics of an accessor during transaction, and correlation is established between the transaction data and the biological characteristic data;
the storable computing equipment performs Hash operation on transaction data to obtain a first abstract, performs Hash operation on biological characteristic data to obtain a second abstract, strings the first abstract and the second abstract, and performs Hash operation on the strings to obtain a third abstract; the storable computing device encrypts the third abstract by a private key to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, and uploads the digital signature and the digital certificate to a network;
the method comprises the steps that a single or a plurality of storable computing devices pack transaction data and biological characteristic data of all transaction node modules into a block within a preset time period, the transaction time, the biological characteristic data acquisition time, the hash of the transaction data and the hash of the biological characteristic data are recorded into the head of the block of the current block to serve as characteristic values, the hash of the current block is calculated according to the characteristic values, and the blocks generated successively are mutually constructed into a block chain; the transaction data and the biological characteristic data in the block are downloaded to each transaction node module for distributed storage;
and the storable computing equipment encrypts the second abstract by a private key to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, attaches the digital signature and the digital certificate to the biological characteristic data and uploads the biological characteristic data and the digital certificate to the network.
Similarly, the first abstract is used as an irreversible Hash result of the transaction data, the second abstract is used as an irreversible Hash result of the biological characteristic data, and when the transaction data and the biological characteristic data need to be subjected to data verification in the later period, only one Hash operation comparison is needed to be carried out on the transaction data and the biological characteristic data, whether the two abstracts are equal to the first abstract/the second abstract or not is judged, and whether the transaction data and the biological characteristic data are falsified or not can be known;
in the above process, however, the biometric data and the transaction data must be associated and bound, so that the biometric data is bound to the correct transaction data; establishing an association between the transaction data and the biometric data alone is not sufficient to ensure that the association is not tampered with;
therefore, the first abstract and the second abstract are pieced together and then subjected to a hash operation, namely, a secondary hash; when the relevance of the transaction data and the biological characteristic data needs to be verified in the later stage, only one-time hash operation needs to be carried out on the spelling string and the result is compared with the third abstract, so that whether the first abstract and the second abstract in the spelling string are tampered or not can be known, the first abstract and the second abstract in the spelling string are not tampered, the transaction data and the biological characteristic data in the group are both original, and the matching is not tampered.
The non-tamper property of distributed storage based on the block chain, the transaction time, the time for acquiring biological characteristic data, the hash of the transaction data and the hash of the biological characteristic data are added into the block head, and the transaction data and the biological characteristic data are added into the block body, so that all relevant data of the transaction data and the biological characteristic data cannot be tampered.
In the subsequent data use, the public key can be used for decrypting the digital signature to obtain a second abstract, and the biological characteristic data is subjected to hash operation once and compared with the second abstract, so that whether the biological characteristic data is falsified or not can be known; meanwhile, the digital certificate can prove the authenticity of the digital signature, and the uncorruptable property of the biological characteristic data is ensured through triple encryption of Hash operation, the digital signature and the digital certificate.
The biometric characteristic of the visitor may be collected in a variety of ways, such as a facial recognition module, an iris collection module, a fingerprint collection module, and the like.
Specifically, the first abstract, the second abstract and the third abstract are different from each other.
Similarly, in this embodiment, the transaction node module is interfaced with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate. Collecting biological characteristics by adopting a MongoDB database; compared with other distributed databases, the MongoDB has more storage advantages, and data can be stored in a binary Json format Bson, so that the data storage format is uniform, and the occupied size of the data is reduced. The biometric data includes fingerprint, iris, and facial structured light. The access control module may be a biometric verifier such as a fingerprint recognizer, iris recognizer, facial structure light recognizer, etc.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.
Claims (9)
1. A correlation certificate storing method based on secondary hash is characterized in that: the method comprises the following steps:
counting transaction data on a plurality of transaction nodes, acquiring the biological characteristics of a transactor during transaction, and establishing association between the transaction data and the biological characteristic data;
performing hash operation on transaction data to obtain a first abstract, performing hash operation on biological characteristic data to obtain a second abstract, stringing the first abstract and the second abstract, and performing hash operation on the string to obtain a third abstract;
encrypting the third abstract by a private key to obtain a digital signature, encrypting a public key corresponding to the private key to obtain a digital certificate, and uploading the digital signature and the digital certificate to a network;
packaging the transaction data and the biological characteristic data of all transaction nodes into a block within a preset time period, recording the transaction time, the time for acquiring the biological characteristic data, the Hash of the transaction data and the Hash of the biological characteristic data into the block head of the current block as a characteristic value, and calculating the Hash of the current block according to the characteristic value; constructing blocks generated successively into a block chain; the transaction data and the biological characteristic data in the block are downloaded to each transaction node for distributed storage;
and encrypting the second abstract obtained by calculation by using a private key to obtain a digital signature, encrypting a public key corresponding to the private key to obtain a digital certificate, and attaching the digital signature and the digital certificate to biological characteristic data and uploading the biological characteristic data and the digital certificate to a network.
2. The correlation evidence storing method based on the secondary hash as claimed in claim 1, wherein:
the first, second and third summaries are mutually different.
3. The correlation evidence storing method based on the secondary hash as claimed in claim 2, wherein: further comprising the steps of:
and the transaction node is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate.
4. The correlation evidence storing method based on the secondary hash as claimed in claim 3, wherein:
collecting biological characteristics by adopting a MongoDB database;
the biometric data includes a fingerprint, an iris, and facial structured light.
5. A storable computing device characterized by:
the storable computing device comprises a memory and a processor; the memory is used for storing a computer program; the processor, when executing the computer program, is adapted to carry out the method steps of any of claims 1-4.
6. A correlation deposit certificate system based on secondary hash is characterized in that:
the system comprises a plurality of transaction node modules, wherein storable computing equipment is arranged in each transaction node module, the storable computing equipment carries out statistics on transaction data, a biological characteristic acquisition module is arranged in each transaction node module, the biological characteristic acquisition module acquires biological characteristics of an accessor during transaction, and correlation is established between the transaction data and the biological characteristic data;
the storable computing equipment performs Hash operation on transaction data to obtain a first abstract, performs Hash operation on biological characteristic data to obtain a second abstract, strings the first abstract and the second abstract, and performs Hash operation on the strings to obtain a third abstract; the storable computing device encrypts the third abstract by a private key to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, and uploads the digital signature and the digital certificate to a network;
the method comprises the steps that a single or a plurality of storable computing devices pack transaction data and biological characteristic data of all transaction node modules into a block within a preset time period, the transaction time, the biological characteristic data acquisition time, the hash of the transaction data and the hash of the biological characteristic data are recorded into the head of the block of the current block to serve as characteristic values, the hash of the current block is calculated according to the characteristic values, and the blocks generated successively are mutually constructed into a block chain; the transaction data and the biological characteristic data in the block are downloaded to each transaction node module for distributed storage;
and the storable computing equipment encrypts the second abstract by a private key to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, attaches the digital signature and the digital certificate to the biological characteristic data and uploads the biological characteristic data and the digital certificate to the network.
7. The associative witness system according to claim 6, wherein:
the first, second and third summaries are mutually different.
8. The associative witness system according to claim 7, wherein:
and the transaction node module is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate.
9. The associative witness system according to claim 8, wherein:
and collecting biological characteristics by adopting a MongoDB database, wherein the biological characteristic data comprises fingerprints, irises and facial structured light.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010437975.6A CN111553693A (en) | 2020-05-21 | 2020-05-21 | Associated certificate storage method and system based on secondary hash |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010437975.6A CN111553693A (en) | 2020-05-21 | 2020-05-21 | Associated certificate storage method and system based on secondary hash |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111553693A true CN111553693A (en) | 2020-08-18 |
Family
ID=72004913
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010437975.6A Withdrawn CN111553693A (en) | 2020-05-21 | 2020-05-21 | Associated certificate storage method and system based on secondary hash |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111553693A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114745173A (en) * | 2022-04-08 | 2022-07-12 | 湖南长银五八消费金融股份有限公司 | Login verification method, login verification device, computer equipment, storage medium and program product |
CN117852107A (en) * | 2024-03-05 | 2024-04-09 | 国家海洋局北海海洋技术保障中心 | Ocean scientific investigation data sharing platform based on block chain and data processing method |
-
2020
- 2020-05-21 CN CN202010437975.6A patent/CN111553693A/en not_active Withdrawn
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114745173A (en) * | 2022-04-08 | 2022-07-12 | 湖南长银五八消费金融股份有限公司 | Login verification method, login verification device, computer equipment, storage medium and program product |
CN117852107A (en) * | 2024-03-05 | 2024-04-09 | 国家海洋局北海海洋技术保障中心 | Ocean scientific investigation data sharing platform based on block chain and data processing method |
CN117852107B (en) * | 2024-03-05 | 2024-05-07 | 国家海洋局北海海洋技术保障中心 | Ocean scientific investigation data sharing platform based on block chain and data processing method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10305875B1 (en) | Hybrid blockchain | |
CN112926092B (en) | Privacy-protecting identity information storage and identity authentication method and device | |
US10404455B2 (en) | Multiple-phase rewritable blockchain | |
CN110874646B (en) | Exception handling method and device for federated learning and electronic equipment | |
Karabat et al. | THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system | |
WO2006054208A1 (en) | Securely computing a similarity measure | |
CN111475828B (en) | Encryption method and device, decryption method and device of block chain account book data | |
Bringer et al. | Faster secure computation for biometric identification using filtering | |
CN110868295B (en) | Anti-quantum computing union chain system based on secret sharing and communication method | |
CN111553689A (en) | Matching correlation method and system based on quadratic hash | |
US20100161988A1 (en) | Method of authenticating an entity by a verification entity | |
US9497026B2 (en) | Authorizing removable medium access | |
CN111553693A (en) | Associated certificate storage method and system based on secondary hash | |
CN110543526B (en) | Optimized storage method and system based on block chain | |
US20200145220A1 (en) | Verification system, verification method and non-transitory computer readable storage medium | |
US20230246820A1 (en) | Dynamic privacy-preserving application authentication | |
US11688194B2 (en) | Method of authentication of an identity document of an individual and optionally authentication of said individual | |
CN116614251A (en) | Data security monitoring system | |
US11501580B1 (en) | Methods and systems for implementing secure biometric recognition | |
CN111553694A (en) | Distributed storage block chain method and system | |
JP3869657B2 (en) | Method for authentication of at least one subscriber in data exchange | |
CN111598570A (en) | Block chain method and system for auditing transaction based on facial recognition | |
CN107194229A (en) | A kind of computer user's personal identification method | |
CN109657447B (en) | Equipment fingerprint generation method and device | |
CN111553692A (en) | Access data encryption processing method and system for block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20200818 |