CN112162984A - Real name authentication method, system, equipment and storage medium based on block chain - Google Patents

Real name authentication method, system, equipment and storage medium based on block chain Download PDF

Info

Publication number
CN112162984A
CN112162984A CN202011043491.XA CN202011043491A CN112162984A CN 112162984 A CN112162984 A CN 112162984A CN 202011043491 A CN202011043491 A CN 202011043491A CN 112162984 A CN112162984 A CN 112162984A
Authority
CN
China
Prior art keywords
user
data
authentication
index value
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011043491.XA
Other languages
Chinese (zh)
Inventor
杨良志
白琳
汪志新
卢业波
白小刚
蒋文斌
朱建涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Richinfo Technology Co ltd
Original Assignee
Richinfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Richinfo Technology Co ltd filed Critical Richinfo Technology Co ltd
Priority to CN202011043491.XA priority Critical patent/CN112162984A/en
Publication of CN112162984A publication Critical patent/CN112162984A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Computational Linguistics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the invention discloses a real-name authentication method, a system, equipment and a storage medium based on a block chain. The method comprises the following steps: receiving real-name authentication of a first user to obtain first authentication data; storing the first authentication data to a preset block chain to obtain a first index value; sending the first index value to a second user to cause the second user to search the blockchain for the first authentication data. The embodiment of the invention realizes efficient and convenient real-name authentication.

Description

Real name authentication method, system, equipment and storage medium based on block chain
Technical Field
The embodiment of the invention relates to a block chain technology, in particular to a real-name authentication method, a system, equipment and a storage medium based on a block chain.
Background
With the rapid development of computer science and network technology, more and more advanced technologies are developed to facilitate the life of people.
Blockchains are a term of art in information technology. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect.
Currently, when each enterprise is applied to the field of real-name authentication of users, individual users or enterprise users need to be guided to finish real-name authentication respectively, and the problems of repeated authentication, low authentication efficiency, high authentication cost and the like generally exist; secondly, the willingness of the user to repeatedly authenticate on different platforms is weak; the problem that the authentication information is unsafe to use and the like is solved; and finally, the real-name authentication is not effectively combined with the authorization and certification field.
Disclosure of Invention
The embodiment of the invention provides a block chain-based real-name authentication method, a block chain-based real-name authentication system, block chain-based real-name authentication equipment and a storage medium, so as to realize efficient and convenient real-name authentication.
To achieve the object, an embodiment of the present invention provides a block chain-based real-name authentication method, where the method includes:
receiving real-name authentication of a first user to obtain first authentication data;
storing the first authentication data to a preset block chain to obtain a first index value;
sending the first index value to a second user to cause the second user to search the blockchain for the first authentication data.
Further, before receiving the real-name authentication of the first user to obtain the first authentication data, the method includes:
receiving real-name authentication of a second user to obtain second authentication data;
storing the second authentication data to a preset block chain to obtain a second index value;
said sending said first index value to a second user to cause said second user to search said blockchain for said first authentication data comprises;
sending the first index value to a third user to cause the third user to search the blockchain for the first authentication data, or sending the second index value to a third user to cause the third user to search the blockchain for the second authentication data, the third user including the first user and/or the second user.
Further, after the storing the first authentication data to a preset block chain to obtain a first index value, the method includes:
receiving an authentication protocol signed by the first user and the second user, wherein the authentication protocol comprises protocol data, a first index value and a second index value;
saving the authentication protocol to the blockchain to obtain a third index value;
sending the third index value to the third user to cause the third user to search the blockchain for the authentication protocol.
Further, the saving the authentication protocol to the blockchain to obtain a third index value comprises:
receiving operation data of the first user;
storing the operation data and the third index value to the block chain according to the protocol data to obtain a fourth index value;
sending the fourth index value to the third user to cause the third user to search the blockchain for the authentication protocol and operational data.
On one hand, the embodiment of the invention also provides a real-name authentication system based on the block chain, which comprises:
the data receiving module is used for receiving real-name authentication of a first user to obtain first authentication data;
the data storage module is used for storing the first authentication data to a preset block chain to obtain a first index value;
and the data sending module is used for sending the first index value to a second user so that the second user searches the first authentication data in the block chain.
Further, in the above-mentioned case,
the data receiving module is also used for receiving real-name authentication of a second user to obtain second authentication data;
the data storage module is further configured to store the second authentication data to a preset block chain to obtain a second index value;
the data sending module is specifically configured to send the first index value to a third user so that the third user searches the blockchain for the first authentication data, or send the second index value to the third user so that the third user searches the blockchain for the second authentication data, where the third user includes the first user and/or the second user.
Further, in the above-mentioned case,
the data receiving module is further configured to receive an authentication protocol signed by the first user and the second user, where the authentication protocol includes protocol data, a first index value, and a second index value;
the data saving module is further configured to save the authentication protocol to the block chain to obtain a third index value;
the data sending module is further configured to send the third index value to the third user so that the third user searches the blockchain for the authentication protocol.
Further, in the above-mentioned case,
the data receiving module is further used for receiving operation data of the first user;
the data saving module is further configured to save the operation data and the third index value to the block chain according to the protocol data to obtain a fourth index value;
the data sending module is further configured to send the fourth index value to the third user so that the third user searches the blockchain for the authentication protocol and the operation data.
On the other hand, an embodiment of the present invention further provides a computer device, where the computer device includes: one or more processors; a storage device for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement a method as provided by any embodiment of the invention.
In yet another aspect, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the method provided in any embodiment of the present invention.
The embodiment of the invention obtains first authentication data by receiving real-name authentication of a first user; storing the first authentication data to a preset block chain to obtain a first index value; and sending the first index value to a second user so that the second user searches the first authentication data in the block chain, thereby solving the problems of repeated authentication, low authentication efficiency and high authentication cost between enterprises and users and realizing the effect of efficient and convenient real-name authentication.
Drawings
Fig. 1 is a flowchart illustrating a block chain-based real-name authentication method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a block chain-based real-name authentication method according to a second embodiment of the present invention;
fig. 3 is a flowchart illustrating a block chain-based real-name authentication method according to a second embodiment of the present invention;
fig. 4 is a schematic structural diagram of a block chain-based real-name authentication system according to a third embodiment of the present invention;
fig. 5 is a schematic structural diagram of a computer device according to a fourth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are for purposes of illustration and not limitation. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the steps as a sequential process, many of the steps can be performed in parallel, concurrently or simultaneously. In addition, the order of the steps may be rearranged. A process may be terminated when its operations are completed, but may have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc.
Furthermore, the terms "first," "second," and the like may be used herein to describe various orientations, actions, steps, elements, or the like, but the orientations, actions, steps, or elements are not limited by these terms. These terms are only used to distinguish one direction, action, step or element from another direction, action, step or element. For example, a first module may be termed a second module, and, similarly, a second module may be termed a first module, without departing from the scope of the present application. The first module and the second module are both modules, but they are not the same module. The terms "first", "second", etc. are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, features defined as "first", "second", may explicitly or implicitly include one or more of the described features. In the description of the embodiments of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Example one
As shown in fig. 1, an embodiment of the present invention provides a block chain-based real-name authentication method, where the method includes:
s110, receiving real-name authentication of the first user to obtain first authentication data.
In this embodiment, the method may be used in a real-name authentication platform, and the first user may perform real-name authentication in the real-name authentication platform, that is, the real-name authentication platform receives real-name authentication of the first user, so as to obtain first authentication data of the first user, where the first user may be an individual user, and the first users may be multiple users.
S120, storing the first authentication data to a preset block chain to obtain a first index value.
S130, the first index value is sent to a second user so that the second user searches the first authentication data in the block chain.
In this embodiment, after obtaining the first authentication data of the first user, the real-name authentication platform may store the first authentication data in a preset blockchain, return a first index value in the blockchain, and send the first index value to the second user, and the second user may search the blockchain using the first index value to obtain the first authentication data of the first user, where the second user may be an enterprise, and the second user may be multiple users.
Therefore, the second user, namely a plurality of enterprises can conveniently inquire the data of the real-name authentication of the first user, namely the individual user in the block chain, only one-time real-name authentication is needed for the individual user, and the security is kept in the block chain, so that the authentication willingness of the individual user is improved.
The embodiment of the invention obtains first authentication data by receiving real-name authentication of a first user; storing the first authentication data to a preset block chain to obtain a first index value; and sending the first index value to a second user so that the second user searches the first authentication data in the block chain, thereby solving the problems of repeated authentication, low authentication efficiency and high authentication cost between enterprises and users and realizing the effect of efficient and convenient real-name authentication.
Example two
As shown in fig. 2, a second embodiment of the present invention provides a block chain-based real-name authentication method, and the second embodiment of the present invention further explains and explains on the basis of the first embodiment of the present invention, and the method includes:
s210, receiving real-name authentication of the second user to obtain second authentication data.
S220, storing the second authentication data to a preset block chain to obtain a second index value.
In this embodiment, before receiving the real-name authentication of the first user, the real-name authentication platform further needs to receive the real-name authentication of the second user to obtain second authentication data, and store the second authentication data in the preset block chain to obtain the second index value, so that the authentication information of the second user, i.e., the enterprise, can also be stored in the chain for other users to search.
S230, receiving real-name authentication of the first user to obtain first authentication data.
S240, storing the first authentication data to a preset block chain to obtain a first index value.
And S250, sending the first index value to a third user to enable the third user to search the first authentication data in the block chain, or sending the second index value to the third user to enable the third user to search the second authentication data in the block chain, wherein the third user comprises the first user and/or the second user.
In this embodiment, because the real-name authentication platform obtains the first index value of the first user and the second index value of the second user, when the third user sends the query request, the real-name authentication platform may send the first index value to the third user so that the third user searches for the first authentication data in the blockchain, or send the second index value to the third user so that the third user searches for the second authentication data in the blockchain, where the third user may be the first user, the second user, or both the first user and the second user, thereby implementing mutual search for real-name authentication information between an enterprise and an enterprise, mutual search for real-name authentication information between an individual user and an individual user, mutual search for real-name authentication information between an enterprise and an individual user, and a wide application after one-time authentication.
It should be noted that the third user has already performed real-name authentication, so that the queried third user can be conveniently locked when subsequent information disclosure is responsible.
In this embodiment, as shown in fig. 3, after step S240, the following steps may be further included:
s300, receiving an authentication protocol signed by the first user and the second user, wherein the authentication protocol comprises protocol data, a first index value and a second index value.
In this embodiment, after the first index value and the second index value are obtained, an authentication protocol signed by the first user and the second user may be further received, where the authentication protocol includes protocol data, the first index value and the second index value, the protocol data may be provided by the second user, that is, an enterprise, and the first user, that is, an individual user, agrees to sign after reading, and part or all of the first authentication data of the first user and the second authentication data of the second user may be agreed to be stored in the block chain in the protocol data. And then packaging the first index value and the second index value together with protocol data to obtain the authentication protocol.
S400, storing the authentication protocol to the block chain to obtain a third index value.
S410, sending the third index value to the third user so that the third user searches the authentication protocol in the block chain.
In this embodiment, after the authentication protocol is obtained, the authentication protocol may be stored in the blockchain to obtain a third index value, and if a third user sends an inquiry request, the third index value may be sent to the third user, so that the third user searches for and obtains the authentication protocol in the blockchain.
And S420, receiving the operation data of the first user.
S421, storing the operation data and the third index value to the block chain according to the protocol data to obtain a fourth index value.
S422, sending the fourth index value to the third user, so that the third user searches the block chain for the authentication protocol and the operation data.
In this embodiment, after step S400, step S420-step S422 may be further performed, the protocol data may further agree to obtain operation data of the first user, where the operation data may be operation data of the first user operating in an application program provided by the second user, and according to the protocol data, the real-name authentication platform receives the operation data of the first user, and stores part or all of the operation data and the third index value to the block chain to obtain a fourth index value according to the protocol data, and after the third user sends an inquiry request, sends the fourth index value to the third user, so that the third user searches the authentication protocol and the operation data in the block chain. The fourth index value thus obtained can be used by the first user and/or the second user to query the blockchain for the first authentication data, the second authentication data, the protocol data and the operation data.
Further, the protocol data may also agree with the query authority of each index value, for example, for the first index value, all the second users may query, so that the enterprise may query the first authentication data of the real name of each individual user, for the second index value and the third index value, part of the first users and the second users may query, so that the enterprise in cooperation and the individual user with high authority may query the second authentication data and the protocol data of the real name of the enterprise, and for the fourth index value, part of the second users may query, so that the enterprise in cooperation and the enterprise may query the operation data of the individual user. Therefore, the inquiry of real-name authentication data between the individual user and an enterprise is greatly facilitated, the real-name authentication data is stored in the block chain, the safety is also ensured, the authentication is used for a long time through one-time authentication, the authentication intention of the individual user is improved, the repeated authentication is avoided, the authentication efficiency is high, the authentication cost is low, and the effective combination of the real-name authentication and the authorization and storage field is realized.
EXAMPLE III
As shown in fig. 4, a block chain-based real-name authentication system 100 is provided in the third embodiment of the present invention, and the block chain-based real-name authentication system 100 provided in the third embodiment of the present invention can execute the block chain-based real-name authentication method provided in any embodiment of the present invention, and has functional modules and beneficial effects corresponding to the execution method. The block chain-based real-name authentication system 100 includes a data receiving module 200, a data saving module 300, and a data transmitting module 400.
Specifically, the data receiving module 200 is configured to receive real-name authentication of a first user to obtain first authentication data; the data saving module 300 is configured to save the first authentication data to a preset block chain to obtain a first index value; the data sending module 400 is configured to send the first index value to a second user so that the second user searches the blockchain for the first authentication data.
In this embodiment, the data receiving module 200 is further configured to receive real-name authentication of a second user to obtain second authentication data; the data saving module 300 is further configured to save the second authentication data to a preset block chain to obtain a second index value; the data sending module 400 is specifically configured to send the first index value to a third user so that the third user searches the blockchain for the first authentication data, or send the second index value to a third user so that the third user searches the blockchain for the second authentication data, where the third user includes the first user and/or the second user.
Further, the data receiving module 200 is further configured to receive an authentication protocol signed by the first user and the second user, where the authentication protocol includes protocol data, a first index value, and a second index value; the data saving module 300 is further configured to save the authentication protocol to the blockchain to obtain a third index value; the data sending module 400 is further configured to send the third index value to the third user so that the third user searches the blockchain for the authentication protocol.
Further, the data receiving module 200 is further configured to receive operation data of the first user; the data saving module 300 is further configured to save the operation data and the third index value to the block chain according to the protocol data to obtain a fourth index value; the data sending module 400 is further configured to send the fourth index value to the third user so that the third user searches the blockchain for the authentication protocol and the operation data.
Example four
Fig. 5 is a schematic structural diagram of a computer device 12 according to a fourth embodiment of the present invention. FIG. 5 illustrates a block diagram of an exemplary computer device 12 suitable for use in implementing embodiments of the present invention. The computer device 12 shown in FIG. 5 is only an example and should not bring any limitations to the functionality or scope of use of embodiments of the present invention.
As shown in FIG. 5, computer device 12 is in the form of a general purpose computing device. The components of computer device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. Computer device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, and commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Computer device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with computer device 12, and/or with any devices (e.g., network card, modem, etc.) that enable computer device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, computer device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via network adapter 20. As shown, network adapter 20 communicates with the other modules of computer device 12 via bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with computer device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 executes various functional applications and data processing by executing programs stored in the system memory 28, for example, implementing the methods provided by the embodiments of the present invention:
receiving real-name authentication of a first user to obtain first authentication data;
storing the first authentication data to a preset block chain to obtain a first index value;
sending the first index value to a second user to cause the second user to search the blockchain for the first authentication data.
EXAMPLE five
The fifth embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the methods provided in all the embodiments of the present invention of the present application:
receiving real-name authentication of a first user to obtain first authentication data;
storing the first authentication data to a preset block chain to obtain a first index value;
sending the first index value to a second user to cause the second user to search the blockchain for the first authentication data.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A real-name authentication method based on a block chain is characterized by comprising the following steps:
receiving real-name authentication of a first user to obtain first authentication data;
storing the first authentication data to a preset block chain to obtain a first index value;
sending the first index value to a second user to cause the second user to search the blockchain for the first authentication data.
2. The method of claim 1, wherein receiving the real-name authentication of the first user to obtain the first authentication data comprises:
receiving real-name authentication of a second user to obtain second authentication data;
storing the second authentication data to a preset block chain to obtain a second index value;
said sending said first index value to a second user to cause said second user to search said blockchain for said first authentication data comprises;
sending the first index value to a third user to cause the third user to search the blockchain for the first authentication data, or sending the second index value to a third user to cause the third user to search the blockchain for the second authentication data, the third user including the first user and/or the second user.
3. The method of claim 2, wherein saving the first authentication data to a predetermined blockchain to obtain the first index value comprises:
receiving an authentication protocol signed by the first user and the second user, wherein the authentication protocol comprises protocol data, a first index value and a second index value;
saving the authentication protocol to the blockchain to obtain a third index value;
sending the third index value to the third user to cause the third user to search the blockchain for the authentication protocol.
4. The method of claim 3, wherein saving the authentication protocol to the blockchain to obtain a third index value comprises:
receiving operation data of the first user;
storing the operation data and the third index value to the block chain according to the protocol data to obtain a fourth index value;
sending the fourth index value to the third user to cause the third user to search the blockchain for the authentication protocol and operational data.
5. A real-name authentication system based on a block chain is characterized by comprising:
the data receiving module is used for receiving real-name authentication of a first user to obtain first authentication data;
the data storage module is used for storing the first authentication data to a preset block chain to obtain a first index value;
and the data sending module is used for sending the first index value to a second user so that the second user searches the first authentication data in the block chain.
6. The system of claim 5,
the data receiving module is also used for receiving real-name authentication of a second user to obtain second authentication data;
the data storage module is further configured to store the second authentication data to a preset block chain to obtain a second index value;
the data sending module is specifically configured to send the first index value to a third user so that the third user searches the blockchain for the first authentication data, or send the second index value to the third user so that the third user searches the blockchain for the second authentication data, where the third user includes the first user and/or the second user.
7. The system of claim 6,
the data receiving module is further configured to receive an authentication protocol signed by the first user and the second user, where the authentication protocol includes protocol data, a first index value, and a second index value;
the data saving module is further configured to save the authentication protocol to the block chain to obtain a third index value;
the data sending module is further configured to send the third index value to the third user so that the third user searches the blockchain for the authentication protocol.
8. The system of claim 7,
the data receiving module is further used for receiving operation data of the first user;
the data saving module is further configured to save the operation data and the third index value to the block chain according to the protocol data to obtain a fourth index value;
the data sending module is further configured to send the fourth index value to the third user so that the third user searches the blockchain for the authentication protocol and the operation data.
9. A computer device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-4.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-4.
CN202011043491.XA 2020-09-28 2020-09-28 Real name authentication method, system, equipment and storage medium based on block chain Pending CN112162984A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011043491.XA CN112162984A (en) 2020-09-28 2020-09-28 Real name authentication method, system, equipment and storage medium based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011043491.XA CN112162984A (en) 2020-09-28 2020-09-28 Real name authentication method, system, equipment and storage medium based on block chain

Publications (1)

Publication Number Publication Date
CN112162984A true CN112162984A (en) 2021-01-01

Family

ID=73861944

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011043491.XA Pending CN112162984A (en) 2020-09-28 2020-09-28 Real name authentication method, system, equipment and storage medium based on block chain

Country Status (1)

Country Link
CN (1) CN112162984A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196966A (en) * 2017-07-05 2017-09-22 北京信任度科技有限公司 The identity identifying method and system of multi-party trust based on block chain
CN109063138A (en) * 2018-08-03 2018-12-21 上海点融信息科技有限责任公司 For in block chain, that is, service platform search data method, equipment and storage medium
CN109257342A (en) * 2018-09-04 2019-01-22 阿里巴巴集团控股有限公司 Authentication method, system, server and readable storage medium storing program for executing of the block chain across chain
WO2019052286A1 (en) * 2017-09-12 2019-03-21 广州广电运通金融电子股份有限公司 User identity verification method, apparatus and system based on blockchain
CN109637606A (en) * 2018-12-12 2019-04-16 浪潮电子信息产业股份有限公司 A kind of medical record data management method, system and associated component
WO2019104690A1 (en) * 2017-11-30 2019-06-06 深圳前海达闼云端智能科技有限公司 Mobile network access authentication method, device, storage medium and block chain node
CN110581860A (en) * 2019-09-19 2019-12-17 腾讯科技(深圳)有限公司 identity authentication method, device, storage medium and equipment based on block chain
CN110753016A (en) * 2018-07-23 2020-02-04 国网辽宁招标有限公司 Real name authentication method based on block chain
CN110851857A (en) * 2019-10-14 2020-02-28 上海唯链信息科技有限公司 Method and device for realizing identity endorsement on block chain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196966A (en) * 2017-07-05 2017-09-22 北京信任度科技有限公司 The identity identifying method and system of multi-party trust based on block chain
WO2019052286A1 (en) * 2017-09-12 2019-03-21 广州广电运通金融电子股份有限公司 User identity verification method, apparatus and system based on blockchain
WO2019104690A1 (en) * 2017-11-30 2019-06-06 深圳前海达闼云端智能科技有限公司 Mobile network access authentication method, device, storage medium and block chain node
CN110753016A (en) * 2018-07-23 2020-02-04 国网辽宁招标有限公司 Real name authentication method based on block chain
CN109063138A (en) * 2018-08-03 2018-12-21 上海点融信息科技有限责任公司 For in block chain, that is, service platform search data method, equipment and storage medium
CN109257342A (en) * 2018-09-04 2019-01-22 阿里巴巴集团控股有限公司 Authentication method, system, server and readable storage medium storing program for executing of the block chain across chain
CN109637606A (en) * 2018-12-12 2019-04-16 浪潮电子信息产业股份有限公司 A kind of medical record data management method, system and associated component
CN110581860A (en) * 2019-09-19 2019-12-17 腾讯科技(深圳)有限公司 identity authentication method, device, storage medium and equipment based on block chain
CN110851857A (en) * 2019-10-14 2020-02-28 上海唯链信息科技有限公司 Method and device for realizing identity endorsement on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王柏华 等: "远程办公中基于区块链技术的身份认证方法", 《信息安全研究》, vol. 6, no. 04, pages 317 - 326 *

Similar Documents

Publication Publication Date Title
US11238099B2 (en) Method and device for obtaining answer, and computer device
CN109597640B (en) Account management method, device, equipment and medium for application program
CN111680313B (en) Data processing method, device, equipment and storage medium
CN110191021B (en) Protocol testing method and device, electronic equipment and storage medium
CN114528044B (en) Interface calling method, device, equipment and medium
CN112367370A (en) Management method, device, equipment and medium for hybrid cloud resource data
CN109951553B (en) Data processing method, system, electronic device and computer readable storage medium
CN110471728B (en) Method and related device for displaying interface based on user permission
CN113254969B (en) Business data processing method and device, electronic equipment and storage medium
CN111291330A (en) SVN authority management method, SVN authority management device, computer equipment and storage medium
CN107817962B (en) Remote control method, device, control server and storage medium
WO2023193572A1 (en) Data management method and apparatus, server and storage medium
CN109376173A (en) A kind of data query method, apparatus, electronic equipment and storage medium
CN111178849A (en) Linear process engine implementation method, device, equipment and storage medium
CN110555150A (en) Data monitoring method, device, equipment and storage medium
CN110716960B (en) Database query method, device, equipment and storage medium
CN111586177B (en) Cluster session loss prevention method and system
CN113922995A (en) Cloud desktop sharing method and device, storage medium and electronic equipment
CN113761552A (en) Access control method, device, system, server and storage medium
CN111818145A (en) File transmission method, device, system, equipment and storage medium
CN110825802A (en) Multi-type database data backup method, device, equipment and storage medium
CN109033456B (en) Condition query method and device, electronic equipment and storage medium
CN113568764A (en) User information acquisition method, device, equipment and medium for micro service
WO2023246480A1 (en) Identity authentication method and apparatus, device, medium and product
CN111679892A (en) Distributed transaction processing method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination