CN111553693A - Associated certificate storage method and system based on secondary hash - Google Patents

Associated certificate storage method and system based on secondary hash Download PDF

Info

Publication number
CN111553693A
CN111553693A CN202010437975.6A CN202010437975A CN111553693A CN 111553693 A CN111553693 A CN 111553693A CN 202010437975 A CN202010437975 A CN 202010437975A CN 111553693 A CN111553693 A CN 111553693A
Authority
CN
China
Prior art keywords
abstract
data
transaction
biological characteristic
characteristic data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010437975.6A
Other languages
Chinese (zh)
Inventor
陈议尊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010437975.6A priority Critical patent/CN111553693A/en
Publication of CN111553693A publication Critical patent/CN111553693A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a method and a system for storing a certificate in association based on secondary hash, wherein when the method and the system are used, a first abstract is used as an irreversible hash result of transaction data, a second abstract is used as an irreversible hash result of biological characteristic data, and when the transaction data and the biological characteristic data need to be subjected to data verification in the later period, only one hash operation comparison is needed to be carried out on the transaction data and the biological characteristic data, and whether the transaction data and the biological characteristic data are falsified can be known; after the first abstract and the second abstract are pieced together, performing hash operation for the first time, namely, performing hash for the second time; when the relevance of the transaction data and the biological characteristic data needs to be verified in the later stage, only one-time hash operation needs to be carried out on the spelling string and the third abstract is compared, the fact that the first abstract and the second abstract in the spelling string are tampered or not can be known, the first abstract and the second abstract in the spelling string are not tampered, two data in the group are both originally sealed and cannot be tampered in matching.

Description

Associated certificate storage method and system based on secondary hash
Technical Field
The invention relates to the technical field of block chains, in particular to a correlation evidence storing method and system based on secondary hash.
Background
Blockchains can be used for automation tasks and processes not limited to the field of cryptocurrency, and such a solution would enable better cryptographic processing of transactions using the properties of blockchains. All publications in the market have a serious centralization phenomenon, and the publications are popularized by respective enterprises or platforms no matter whether credit cards, aviation flights, shopping in shopping malls or online shopping malls in the telecommunication industry. There are some block chain digital transaction processing technologies based on facial recognition, and there is no effective solution for guaranteeing the matching correlation between transaction data and facial data.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a secondary hash-based association certificate storing method and system, which can ensure the matching association of transaction data and face data.
A correlation certificate storage method based on secondary hash comprises the following steps:
counting transaction data on a plurality of transaction nodes, acquiring the biological characteristics of a transactor during transaction, and establishing association between the transaction data and the biological characteristic data;
performing hash operation on transaction data to obtain a first abstract, performing hash operation on biological characteristic data to obtain a second abstract, stringing the first abstract and the second abstract, and performing hash operation on the string to obtain a third abstract;
encrypting the third abstract by a private key to obtain a digital signature, encrypting a public key corresponding to the private key to obtain a digital certificate, and uploading the digital signature and the digital certificate to a network;
packaging the transaction data and the biological characteristic data of all transaction nodes into a block within a preset time period, recording the transaction time, the time for acquiring the biological characteristic data, the Hash of the transaction data and the Hash of the biological characteristic data into the block head of the current block as a characteristic value, and calculating the Hash of the current block according to the characteristic value; constructing blocks generated successively into a block chain; the transaction data and the biological characteristic data in the block are downloaded to each transaction node for distributed storage;
and encrypting the second abstract obtained by calculation by using a private key to obtain a digital signature, encrypting a public key corresponding to the private key to obtain a digital certificate, and attaching the digital signature and the digital certificate to biological characteristic data and uploading the biological characteristic data and the digital certificate to a network.
Further, the first abstract, the second abstract and the third abstract are different from each other.
Further, the method also comprises the following steps:
and the transaction node is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate.
Further, a MongoDB database is adopted for collecting biological characteristics;
the biometric data includes a fingerprint, an iris, and facial structured light.
A storable computing device comprising a memory and a processor; the memory is used for storing a computer program; the processor, when executing the computer program, is adapted to carry out the method steps of any of claims 1-4.
A correlation deposit certificate system based on secondary hash comprises a plurality of transaction node modules, wherein storable computing equipment is arranged in each transaction node module and used for counting transaction data, a biological characteristic acquisition module is arranged in each transaction node module and used for acquiring biological characteristics of an accessor during transaction, and correlation is established between the transaction data and the biological characteristic data;
the storable computing equipment performs Hash operation on transaction data to obtain a first abstract, performs Hash operation on biological characteristic data to obtain a second abstract, strings the first abstract and the second abstract, and performs Hash operation on the strings to obtain a third abstract; the storable computing device encrypts the third abstract by a private key to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, and uploads the digital signature and the digital certificate to a network;
the method comprises the steps that a single or a plurality of storable computing devices pack transaction data and biological characteristic data of all transaction node modules into a block within a preset time period, the transaction time, the biological characteristic data acquisition time, the hash of the transaction data and the hash of the biological characteristic data are recorded into the head of the block of the current block to serve as characteristic values, the hash of the current block is calculated according to the characteristic values, and the blocks generated successively are mutually constructed into a block chain; the transaction data and the biological characteristic data in the block are downloaded to each transaction node module for distributed storage;
and the storable computing equipment encrypts the second abstract by a private key to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, attaches the digital signature and the digital certificate to the biological characteristic data and uploads the biological characteristic data and the digital certificate to the network.
Further, the first abstract, the second abstract and the third abstract are different from each other.
Further, the transaction node module is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by the third party monitoring system to obtain a digital certificate.
Further, a MongoDB database is adopted for collecting biological characteristics, and the biological characteristic data comprises fingerprints, irises and facial structured light.
When the transaction data and the biological characteristic data are required to be subjected to data verification in the later period, only one hash operation comparison is required to be carried out on the transaction data and the biological characteristic data, and whether the transaction data and the biological characteristic data are tampered or not can be known only by comparing the two data with the first abstract and the second abstract or not; in the above process, however, the biometric data and the transaction data must be associated and bound, so that the biometric data is bound to the correct transaction data; establishing an association between the transaction data and the biometric data alone is not sufficient to ensure that the association is not tampered with; therefore, the first abstract and the second abstract are pieced together and then subjected to a hash operation, namely, a secondary hash; when the relevance of the transaction data and the biological characteristic data needs to be verified in the later stage, only one-time hash operation needs to be carried out on the spelling string and the result is compared with the third abstract, so that whether the first abstract and the second abstract in the spelling string are tampered or not can be known, the first abstract and the second abstract in the spelling string are not tampered, the transaction data and the biological characteristic data in the group are both original, and the matching is not tampered. The non-tamper property of distributed storage based on the block chain, the transaction time, the time for acquiring biological characteristic data, the hash of the transaction data and the hash of the biological characteristic data are added into the block head, and the transaction data and the biological characteristic data are added into the block body, so that all relevant data of the transaction data and the biological characteristic data cannot be tampered. In the subsequent data use, the public key can be used for decrypting the digital signature to obtain a second abstract, and the biological characteristic data is subjected to hash operation once and compared with the second abstract, so that whether the biological characteristic data is falsified or not can be known; meanwhile, the digital certificate can prove the authenticity of the digital signature, and the uncorruptable property of the biological characteristic data is ensured through triple encryption of Hash operation, the digital signature and the digital certificate.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only examples, and the protection scope of the present invention is not limited thereby.
It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
In one embodiment, the present invention first provides a secondary hash-based associated certificate storing method, which includes the steps of:
counting transaction data on a plurality of transaction nodes, acquiring the biological characteristics of a transactor during transaction, and establishing association between the transaction data and the biological characteristic data;
performing hash operation on transaction data to obtain a first abstract, performing hash operation on biological characteristic data to obtain a second abstract, stringing the first abstract and the second abstract, and performing hash operation on the string to obtain a third abstract;
encrypting the third abstract by a private key to obtain a digital signature, encrypting a public key corresponding to the private key to obtain a digital certificate, and uploading the digital signature and the digital certificate to a network;
packaging the transaction data and the biological characteristic data of all transaction nodes into a block within a preset time period, recording the transaction time, the time for acquiring the biological characteristic data, the Hash of the transaction data and the Hash of the biological characteristic data into the block head of the current block as a characteristic value, and calculating the Hash of the current block according to the characteristic value; constructing blocks generated successively into a block chain; the transaction data and the biological characteristic data in the block are downloaded to each transaction node for distributed storage;
and encrypting the second abstract obtained by calculation by using a private key to obtain a digital signature, encrypting a public key corresponding to the private key to obtain a digital certificate, and attaching the digital signature and the digital certificate to biological characteristic data and uploading the biological characteristic data and the digital certificate to a network.
In the operation process, the first abstract is used as an irreversible hash result of the transaction data, the second abstract is used as an irreversible hash result of the biological characteristic data, and when data verification is needed to be performed on the transaction data and the biological characteristic data in the later period, only one hash operation comparison is needed to be performed on the transaction data and the biological characteristic data, and whether the two are equal to the first abstract or the second abstract or not can be known, so that whether the transaction data and the biological characteristic data are tampered or not;
in the above process, however, the biometric data and the transaction data must be associated and bound, so that the biometric data is bound to the correct transaction data; establishing an association between the transaction data and the biometric data alone is not sufficient to ensure that the association is not tampered with;
therefore, the first abstract and the second abstract are pieced together and then subjected to a hash operation, namely, a secondary hash; when the relevance of the transaction data and the biological characteristic data needs to be verified in the later stage, only one-time hash operation needs to be carried out on the spelling string and the result is compared with the third abstract, so that whether the first abstract and the second abstract in the spelling string are tampered or not can be known, the first abstract and the second abstract in the spelling string are not tampered, the transaction data and the biological characteristic data in the group are both original, and the matching is not tampered.
The non-tamper property of distributed storage based on the block chain, the transaction time, the time for acquiring biological characteristic data, the hash of the transaction data and the hash of the biological characteristic data are added into the block head, and the transaction data and the biological characteristic data are added into the block body, so that all relevant data of the transaction data and the biological characteristic data cannot be tampered.
In the subsequent data use, the public key can be used for decrypting the digital signature to obtain a second abstract, and the biological characteristic data is subjected to hash operation once and compared with the second abstract, so that whether the biological characteristic data is falsified or not can be known; meanwhile, the digital certificate can prove the authenticity of the digital signature, and the uncorruptable property of the biological characteristic data is ensured through triple encryption of Hash operation, the digital signature and the digital certificate.
The biometric of the visitor may be collected in a variety of ways, such as by including fingerprint, iris, and facial structured light data.
Specifically, the first abstract, the second abstract and the third abstract are different from each other.
Specifically, the transaction node is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by the third party monitoring system to obtain a digital certificate.
Preferably, a MongoDB database is adopted for collecting biological characteristics; compared with other distributed databases, the MongoDB has more storage advantages, and data can be stored in a binary Json format Bson, so that the data storage format is uniform, and the occupied size of the data is reduced.
The biometric data includes a fingerprint, an iris, and facial structured light.
In particular, the access control module may be a biometric verifier, such as a fingerprint recognizer, an iris recognizer, a facial structure light recognizer, or the like.
The present invention also contemplates a storable computing device,
the storable computing device comprises a memory and a processor; the memory is used for storing a computer program; the processor is adapted to carry out any of the above-mentioned method steps when executing the computer program.
The invention also provides an associated storage certificate system based on the secondary hash,
the system comprises a plurality of transaction node modules, wherein storable computing equipment is arranged in each transaction node module, the storable computing equipment carries out statistics on transaction data, a biological characteristic acquisition module is arranged in each transaction node module, the biological characteristic acquisition module acquires biological characteristics of an accessor during transaction, and correlation is established between the transaction data and the biological characteristic data;
the storable computing equipment performs Hash operation on transaction data to obtain a first abstract, performs Hash operation on biological characteristic data to obtain a second abstract, strings the first abstract and the second abstract, and performs Hash operation on the strings to obtain a third abstract; the storable computing device encrypts the third abstract by a private key to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, and uploads the digital signature and the digital certificate to a network;
the method comprises the steps that a single or a plurality of storable computing devices pack transaction data and biological characteristic data of all transaction node modules into a block within a preset time period, the transaction time, the biological characteristic data acquisition time, the hash of the transaction data and the hash of the biological characteristic data are recorded into the head of the block of the current block to serve as characteristic values, the hash of the current block is calculated according to the characteristic values, and the blocks generated successively are mutually constructed into a block chain; the transaction data and the biological characteristic data in the block are downloaded to each transaction node module for distributed storage;
and the storable computing equipment encrypts the second abstract by a private key to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, attaches the digital signature and the digital certificate to the biological characteristic data and uploads the biological characteristic data and the digital certificate to the network.
Similarly, the first abstract is used as an irreversible Hash result of the transaction data, the second abstract is used as an irreversible Hash result of the biological characteristic data, and when the transaction data and the biological characteristic data need to be subjected to data verification in the later period, only one Hash operation comparison is needed to be carried out on the transaction data and the biological characteristic data, whether the two abstracts are equal to the first abstract/the second abstract or not is judged, and whether the transaction data and the biological characteristic data are falsified or not can be known;
in the above process, however, the biometric data and the transaction data must be associated and bound, so that the biometric data is bound to the correct transaction data; establishing an association between the transaction data and the biometric data alone is not sufficient to ensure that the association is not tampered with;
therefore, the first abstract and the second abstract are pieced together and then subjected to a hash operation, namely, a secondary hash; when the relevance of the transaction data and the biological characteristic data needs to be verified in the later stage, only one-time hash operation needs to be carried out on the spelling string and the result is compared with the third abstract, so that whether the first abstract and the second abstract in the spelling string are tampered or not can be known, the first abstract and the second abstract in the spelling string are not tampered, the transaction data and the biological characteristic data in the group are both original, and the matching is not tampered.
The non-tamper property of distributed storage based on the block chain, the transaction time, the time for acquiring biological characteristic data, the hash of the transaction data and the hash of the biological characteristic data are added into the block head, and the transaction data and the biological characteristic data are added into the block body, so that all relevant data of the transaction data and the biological characteristic data cannot be tampered.
In the subsequent data use, the public key can be used for decrypting the digital signature to obtain a second abstract, and the biological characteristic data is subjected to hash operation once and compared with the second abstract, so that whether the biological characteristic data is falsified or not can be known; meanwhile, the digital certificate can prove the authenticity of the digital signature, and the uncorruptable property of the biological characteristic data is ensured through triple encryption of Hash operation, the digital signature and the digital certificate.
The biometric characteristic of the visitor may be collected in a variety of ways, such as a facial recognition module, an iris collection module, a fingerprint collection module, and the like.
Specifically, the first abstract, the second abstract and the third abstract are different from each other.
Similarly, in this embodiment, the transaction node module is interfaced with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate. Collecting biological characteristics by adopting a MongoDB database; compared with other distributed databases, the MongoDB has more storage advantages, and data can be stored in a binary Json format Bson, so that the data storage format is uniform, and the occupied size of the data is reduced. The biometric data includes fingerprint, iris, and facial structured light. The access control module may be a biometric verifier such as a fingerprint recognizer, iris recognizer, facial structure light recognizer, etc.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (9)

1. A correlation certificate storing method based on secondary hash is characterized in that: the method comprises the following steps:
counting transaction data on a plurality of transaction nodes, acquiring the biological characteristics of a transactor during transaction, and establishing association between the transaction data and the biological characteristic data;
performing hash operation on transaction data to obtain a first abstract, performing hash operation on biological characteristic data to obtain a second abstract, stringing the first abstract and the second abstract, and performing hash operation on the string to obtain a third abstract;
encrypting the third abstract by a private key to obtain a digital signature, encrypting a public key corresponding to the private key to obtain a digital certificate, and uploading the digital signature and the digital certificate to a network;
packaging the transaction data and the biological characteristic data of all transaction nodes into a block within a preset time period, recording the transaction time, the time for acquiring the biological characteristic data, the Hash of the transaction data and the Hash of the biological characteristic data into the block head of the current block as a characteristic value, and calculating the Hash of the current block according to the characteristic value; constructing blocks generated successively into a block chain; the transaction data and the biological characteristic data in the block are downloaded to each transaction node for distributed storage;
and encrypting the second abstract obtained by calculation by using a private key to obtain a digital signature, encrypting a public key corresponding to the private key to obtain a digital certificate, and attaching the digital signature and the digital certificate to biological characteristic data and uploading the biological characteristic data and the digital certificate to a network.
2. The correlation evidence storing method based on the secondary hash as claimed in claim 1, wherein:
the first, second and third summaries are mutually different.
3. The correlation evidence storing method based on the secondary hash as claimed in claim 2, wherein: further comprising the steps of:
and the transaction node is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate.
4. The correlation evidence storing method based on the secondary hash as claimed in claim 3, wherein:
collecting biological characteristics by adopting a MongoDB database;
the biometric data includes a fingerprint, an iris, and facial structured light.
5. A storable computing device characterized by:
the storable computing device comprises a memory and a processor; the memory is used for storing a computer program; the processor, when executing the computer program, is adapted to carry out the method steps of any of claims 1-4.
6. A correlation deposit certificate system based on secondary hash is characterized in that:
the system comprises a plurality of transaction node modules, wherein storable computing equipment is arranged in each transaction node module, the storable computing equipment carries out statistics on transaction data, a biological characteristic acquisition module is arranged in each transaction node module, the biological characteristic acquisition module acquires biological characteristics of an accessor during transaction, and correlation is established between the transaction data and the biological characteristic data;
the storable computing equipment performs Hash operation on transaction data to obtain a first abstract, performs Hash operation on biological characteristic data to obtain a second abstract, strings the first abstract and the second abstract, and performs Hash operation on the strings to obtain a third abstract; the storable computing device encrypts the third abstract by a private key to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, and uploads the digital signature and the digital certificate to a network;
the method comprises the steps that a single or a plurality of storable computing devices pack transaction data and biological characteristic data of all transaction node modules into a block within a preset time period, the transaction time, the biological characteristic data acquisition time, the hash of the transaction data and the hash of the biological characteristic data are recorded into the head of the block of the current block to serve as characteristic values, the hash of the current block is calculated according to the characteristic values, and the blocks generated successively are mutually constructed into a block chain; the transaction data and the biological characteristic data in the block are downloaded to each transaction node module for distributed storage;
and the storable computing equipment encrypts the second abstract by a private key to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, attaches the digital signature and the digital certificate to the biological characteristic data and uploads the biological characteristic data and the digital certificate to the network.
7. The associative witness system according to claim 6, wherein:
the first, second and third summaries are mutually different.
8. The associative witness system according to claim 7, wherein:
and the transaction node module is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate.
9. The associative witness system according to claim 8, wherein:
and collecting biological characteristics by adopting a MongoDB database, wherein the biological characteristic data comprises fingerprints, irises and facial structured light.
CN202010437975.6A 2020-05-21 2020-05-21 Associated certificate storage method and system based on secondary hash Withdrawn CN111553693A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010437975.6A CN111553693A (en) 2020-05-21 2020-05-21 Associated certificate storage method and system based on secondary hash

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010437975.6A CN111553693A (en) 2020-05-21 2020-05-21 Associated certificate storage method and system based on secondary hash

Publications (1)

Publication Number Publication Date
CN111553693A true CN111553693A (en) 2020-08-18

Family

ID=72004913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010437975.6A Withdrawn CN111553693A (en) 2020-05-21 2020-05-21 Associated certificate storage method and system based on secondary hash

Country Status (1)

Country Link
CN (1) CN111553693A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745173A (en) * 2022-04-08 2022-07-12 湖南长银五八消费金融股份有限公司 Login verification method, login verification device, computer equipment, storage medium and program product
CN117852107A (en) * 2024-03-05 2024-04-09 国家海洋局北海海洋技术保障中心 Ocean scientific investigation data sharing platform based on block chain and data processing method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745173A (en) * 2022-04-08 2022-07-12 湖南长银五八消费金融股份有限公司 Login verification method, login verification device, computer equipment, storage medium and program product
CN117852107A (en) * 2024-03-05 2024-04-09 国家海洋局北海海洋技术保障中心 Ocean scientific investigation data sharing platform based on block chain and data processing method
CN117852107B (en) * 2024-03-05 2024-05-07 国家海洋局北海海洋技术保障中心 Ocean scientific investigation data sharing platform based on block chain and data processing method

Similar Documents

Publication Publication Date Title
US10305875B1 (en) Hybrid blockchain
CN112926092B (en) Privacy-protecting identity information storage and identity authentication method and device
US10404455B2 (en) Multiple-phase rewritable blockchain
CN110874646B (en) Exception handling method and device for federated learning and electronic equipment
Karabat et al. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system
WO2006054208A1 (en) Securely computing a similarity measure
CN111475828B (en) Encryption method and device, decryption method and device of block chain account book data
Bringer et al. Faster secure computation for biometric identification using filtering
CN110868295B (en) Anti-quantum computing union chain system based on secret sharing and communication method
CN111553689A (en) Matching correlation method and system based on quadratic hash
US20100161988A1 (en) Method of authenticating an entity by a verification entity
US9497026B2 (en) Authorizing removable medium access
CN111553693A (en) Associated certificate storage method and system based on secondary hash
CN110543526B (en) Optimized storage method and system based on block chain
US20200145220A1 (en) Verification system, verification method and non-transitory computer readable storage medium
US20230246820A1 (en) Dynamic privacy-preserving application authentication
US11688194B2 (en) Method of authentication of an identity document of an individual and optionally authentication of said individual
CN116614251A (en) Data security monitoring system
US11501580B1 (en) Methods and systems for implementing secure biometric recognition
CN111553694A (en) Distributed storage block chain method and system
JP3869657B2 (en) Method for authentication of at least one subscriber in data exchange
CN111598570A (en) Block chain method and system for auditing transaction based on facial recognition
CN107194229A (en) A kind of computer user's personal identification method
CN109657447B (en) Equipment fingerprint generation method and device
CN111553692A (en) Access data encryption processing method and system for block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200818