CN112162984B - Real-name authentication method, system, equipment and storage medium based on blockchain - Google Patents

Real-name authentication method, system, equipment and storage medium based on blockchain Download PDF

Info

Publication number
CN112162984B
CN112162984B CN202011043491.XA CN202011043491A CN112162984B CN 112162984 B CN112162984 B CN 112162984B CN 202011043491 A CN202011043491 A CN 202011043491A CN 112162984 B CN112162984 B CN 112162984B
Authority
CN
China
Prior art keywords
user
data
authentication
index value
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011043491.XA
Other languages
Chinese (zh)
Other versions
CN112162984A (en
Inventor
杨良志
白琳
汪志新
卢业波
白小刚
蒋文斌
朱建涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Richinfo Technology Co ltd
Original Assignee
Richinfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Richinfo Technology Co ltd filed Critical Richinfo Technology Co ltd
Priority to CN202011043491.XA priority Critical patent/CN112162984B/en
Publication of CN112162984A publication Critical patent/CN112162984A/en
Application granted granted Critical
Publication of CN112162984B publication Critical patent/CN112162984B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Computational Linguistics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a real-name authentication method, a system, equipment and a storage medium based on a blockchain. The method comprises the following steps: receiving real-name authentication of a first user to obtain first authentication data; storing the first authentication data to a preset blockchain to obtain a first index value; the first index value is sent to a second user to enable the second user to search the blockchain for the first authentication data. The embodiment of the invention realizes high-efficiency and convenient real-name authentication.

Description

Real-name authentication method, system, equipment and storage medium based on blockchain
Technical Field
The embodiment of the invention relates to a blockchain technology, in particular to a blockchain-based real-name authentication method, a blockchain-based real-name authentication system, blockchain-based real-name authentication equipment and a storage medium.
Background
With the rapid development of computer science and network technology, more and more advanced technologies are developed to facilitate the life of people.
Blockchains are a term of art in information technology. Essentially, the system is a shared database, and data or information stored in the shared database has the characteristics of 'non-falsifiability', 'whole-course trace', 'traceability', 'disclosure transparency', 'collective maintenance', and the like. Based on the characteristics, the blockchain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect.
At present, each enterprise is applied to the field of real-name authentication of users, and needs to guide individual users or enterprise users to finish real-name authentication, so that the problems of repeated authentication, low authentication efficiency, high authentication cost and the like are generally existed; secondly, the user has weak wish of repeatedly authenticating on different platforms; again, the authentication information is unsafe to use and the like; finally, the real-name authentication is not effectively combined with the authorized certificate storage field.
Disclosure of Invention
The embodiment of the invention provides a real-name authentication method, a system, equipment and a storage medium based on a blockchain so as to realize efficient and convenient real-name authentication.
To achieve the purpose, the embodiment of the invention provides a real-name authentication method based on a blockchain, which comprises the following steps:
receiving real-name authentication of a first user to obtain first authentication data;
storing the first authentication data to a preset blockchain to obtain a first index value;
The first index value is sent to a second user to enable the second user to search the blockchain for the first authentication data.
Further, before receiving the real-name authentication of the first user to obtain the first authentication data, the method includes:
Receiving real-name authentication of a second user to obtain second authentication data;
storing the second authentication data to a preset blockchain to obtain a second index value;
said sending said first index value to a second user to cause said second user to search said blockchain for said first authentication data includes;
the first index value is sent to a third user to cause the third user to search the blockchain for the first authentication data, or the second index value is sent to a third user to cause the third user to search the blockchain for the second authentication data, the third user including a first user and/or a second user.
Further, the storing the first authentication data in a preset blockchain to obtain a first index value includes:
Receiving an authentication protocol signed by the first user and the second user, wherein the authentication protocol comprises protocol data, a first index value and a second index value;
saving the authentication protocol to the blockchain to obtain a third index value;
the third index value is sent to the third user to cause the third user to search the blockchain for the authentication protocol.
Further, the storing the authentication protocol to the blockchain to obtain a third index value includes:
receiving operation data of the first user;
storing the operation data and the third index value to the blockchain according to the protocol data to obtain a fourth index value;
The fourth index value is sent to the third user to cause the third user to search the blockchain for the authentication protocol and operational data.
In one aspect, an embodiment of the present invention further provides a real name authentication system based on a blockchain, where the system includes:
The data receiving module is used for receiving real-name authentication of the first user to obtain first authentication data;
the data storage module is used for storing the first authentication data to a preset blockchain to obtain a first index value;
And the data sending module is used for sending the first index value to a second user so that the second user searches the first authentication data in the blockchain.
Further, the method comprises the steps of,
The data receiving module is also used for receiving real-name authentication of the second user to obtain second authentication data;
The data storage module is further used for storing the second authentication data to a preset blockchain to obtain a second index value;
the data sending module is specifically configured to send the first index value to a third user to enable the third user to search the blockchain for the first authentication data, or send the second index value to the third user to enable the third user to search the blockchain for the second authentication data, where the third user includes a first user and/or a second user.
Further, the method comprises the steps of,
The data receiving module is further used for receiving an authentication protocol signed by the first user and the second user, and the authentication protocol comprises protocol data, a first index value and a second index value;
the data storage module is further used for storing the authentication protocol to the blockchain to obtain a third index value;
The data transmission module is further configured to transmit the third index value to the third user to cause the third user to search the blockchain for the authentication protocol.
Further, the method comprises the steps of,
The data receiving module is also used for receiving operation data of the first user;
the data saving module is further configured to save the operation data and the third index value to the blockchain according to the protocol data to obtain a fourth index value;
the data transmission module is further configured to transmit the fourth index value to the third user to cause the third user to search the blockchain for the authentication protocol and the operation data.
In another aspect, an embodiment of the present invention further provides a computer device, including: one or more processors; and a storage means for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to implement a method as provided by any of the embodiments of the present invention.
In yet another aspect, embodiments of the present invention further provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method as provided by any of the embodiments of the present invention.
The embodiment of the invention obtains the first authentication data by receiving the real-name authentication of the first user; storing the first authentication data to a preset blockchain to obtain a first index value; the first index value is sent to the second user so that the second user searches the first authentication data in the blockchain, the problems of repeated authentication, low authentication efficiency and high authentication cost existing between enterprises and users are solved, and the effect of efficient and convenient real-name authentication is achieved.
Drawings
FIG. 1 is a flowchart of a real-name authentication method based on blockchain according to an embodiment of the present invention;
fig. 2 is a flowchart of a real-name authentication method based on blockchain according to a second embodiment of the present invention;
Fig. 3 is a flowchart of a real-name authentication method based on blockchain according to a second embodiment of the present invention;
Fig. 4 is a schematic structural diagram of a real-name authentication system based on blockchain according to the third embodiment of the present invention;
Fig. 5 is a schematic structural diagram of a computer device according to a fourth embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are for purposes of illustration and not of limitation. It should be further noted that, for convenience of description, only some, but not all of the structures related to the present invention are shown in the drawings.
Before discussing exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart depicts steps as a sequential process, many of the steps may be implemented in parallel, concurrently, or with other steps. Furthermore, the order of the steps may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figures. The processes may correspond to methods, functions, procedures, subroutines, and the like.
Furthermore, the terms "first," "second," and the like, may be used herein to describe various directions, acts, steps, or elements, etc., but these directions, acts, steps, or elements are not limited by these terms. These terms are only used to distinguish one direction, action, step or element from another direction, action, step or element. For example, a first module may be referred to as a second module, and similarly, a second module may be referred to as a first module, without departing from the scope of the application. Both the first module and the second module are modules, but they are not the same module. The terms "first," "second," and the like, are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more of the described features. In the description of the embodiments of the present application, the meaning of "plurality" is at least two, for example, two, three, etc., unless explicitly defined otherwise.
Example 1
As shown in fig. 1, a first embodiment of the present invention provides a real name authentication method based on a blockchain, which includes:
S110, receiving real-name authentication of the first user to obtain first authentication data.
In this embodiment, the method may be used in a real-name authentication platform, where the first user may perform real-name authentication in the real-name authentication platform, that is, the real-name authentication platform receives real-name authentication of the first user, so as to obtain first authentication data of the first user, where the first user may be a personal user, and the first user may be multiple first users.
S120, the first authentication data is stored in a preset blockchain to obtain a first index value.
S130, the first index value is sent to a second user so that the second user searches the first authentication data in the blockchain.
In this embodiment, after obtaining the first authentication data of the first user, the real-name authentication platform may save the first authentication data to a preset blockchain, return a first index value in the blockchain, and send the first index value to the second user, where the second user may use the first index value to search for the first authentication data of the first user in the blockchain, where the second user may be an enterprise, and the second user may be multiple.
Therefore, the second user, namely a plurality of enterprises, can conveniently inquire the real-name authentication data of the first user, namely the individual user in the blockchain, and the individual user only needs to carry out the real-name authentication once, and the security is high in storage in the blockchain, so that the authentication willingness of the individual user is improved.
The embodiment of the invention obtains the first authentication data by receiving the real-name authentication of the first user; storing the first authentication data to a preset blockchain to obtain a first index value; the first index value is sent to the second user so that the second user searches the first authentication data in the blockchain, the problems of repeated authentication, low authentication efficiency and high authentication cost existing between enterprises and users are solved, and the effect of efficient and convenient real-name authentication is achieved.
Example two
As shown in fig. 2, a second embodiment of the present invention provides a real-name authentication method based on a blockchain, and the second embodiment of the present invention is further explained based on the first embodiment of the present invention, where the method includes:
S210, receiving real-name authentication of the second user to obtain second authentication data.
S220, the second authentication data is stored in a preset blockchain to obtain a second index value.
In this embodiment, before receiving the real-name authentication of the first user, the real-name authentication platform also needs to receive the real-name authentication of the second user to obtain second authentication data, and store the second authentication data to a preset blockchain to obtain a second index value, so that the authentication information of the second user, i.e. the enterprise, can also be stored in a uplink for searching by other users.
S230, receiving real-name authentication of the first user to obtain first authentication data.
S240, the first authentication data is stored in a preset blockchain to obtain a first index value.
S250, the first index value is sent to a third user to enable the third user to search the blockchain for the first authentication data, or the second index value is sent to the third user to enable the third user to search the blockchain for the second authentication data, and the third user comprises a first user and/or a second user.
In this embodiment, since the real-name authentication platform obtains the first index value of the first user and the second index value of the second user, when the third user sends the query request, the real-name authentication platform may send the first index value to the third user to enable the third user to search the blockchain for the first authentication data, or send the second index value to the third user to enable the third user to search the blockchain for the second authentication data, where the third user may be the first user, the second user, or the first user and the second user, so that the enterprise and the enterprise may search the real-name authentication information with each other, the personal user and the personal user may search the real-name authentication information with each other, and the enterprise and the personal user may search the real-name authentication information with each other, and after one authentication, the application is wide.
It should be noted that, the third user has already performed real name authentication, so that the third user who has performed the query can be conveniently locked when the subsequent information leakage is overtaking.
In this embodiment, as shown in fig. 3, the following steps may be further included after step S240:
S300, receiving an authentication protocol signed by the first user and the second user, wherein the authentication protocol comprises protocol data, a first index value and a second index value.
In this embodiment, after the first index value and the second index value are obtained, an authentication protocol signed by the first user and the second user may also be received, where the authentication protocol includes protocol data, the first index value and the second index value, the protocol data may be provided by the second user, that is, the enterprise, and the first user, that is, the personal user agrees to sign after reading, where part or all of the first authentication data of the first user and the second authentication data of the second user may be agreed to be stored in the blockchain in the protocol data. The first index value and the second index value are then packaged together with the protocol data to obtain an authentication protocol.
S400, the authentication protocol is saved to the blockchain to obtain a third index value.
S410, the third index value is sent to the third user so that the third user searches the blockchain for the authentication protocol.
In this embodiment, after the authentication protocol is obtained, the authentication protocol may be saved in the blockchain to obtain the third index value, and if the third user sends a query request, the third index value may be sent to the third user to enable the third user to search and obtain the authentication protocol in the blockchain.
S420, receiving operation data of the first user.
S421, the operation data and the third index value are saved to the blockchain according to the protocol data to obtain a fourth index value.
S422, transmitting the fourth index value to the third user to enable the third user to search the blockchain for the authentication protocol and operation data.
In this embodiment, after step S400, step S420 to step S422 may be further executed, the protocol data may also be agreed to obtain operation data of the first user, where the operation data may be operation data of the first user operated in an application program provided by the second user, according to the protocol data, the real name authentication platform receives the operation data of the first user, stores part or all of the operation data and the third index value in the blockchain according to the protocol data to obtain a fourth index value, and after the third user sends a query request, sends the fourth index value to the third user to enable the third user to search the blockchain for authentication protocol and operation data. The fourth index value obtained in this way can be used by the first user and/or the second user to query the blockchain for the first authentication data, the second authentication data, the protocol data and the operation data.
Further, the protocol data may also agree on a query authority of each index value, for example, for the first index value, all second users may query, so that the enterprise may query the first authentication data of the real name of each individual user, for the second index value and the third index value, some of the first users and the second users may query, so that the cooperating enterprise and the personal user with high authority may query the second authentication data and the protocol data of the real name of the enterprise, and for the fourth index value, some of the second users may query, so that the cooperating enterprise and the enterprise may query the operation data of the personal user. The method and the system greatly facilitate the inquiry of real-name authentication data between the individual user and the enterprise, ensure the safety by storing the real-name authentication data in a blockchain, ensure the long-term use of one-time authentication, improve the authentication intention of the individual user, have no repeated authentication, have high authentication efficiency and low authentication cost, and realize the effective combination of the real-name authentication and the authorized authentication storage field.
Example III
As shown in fig. 4, the third embodiment of the present invention provides a real-name authentication system 100 based on a blockchain, and the real-name authentication system 100 based on a blockchain provided in the third embodiment of the present invention can execute the real-name authentication method based on a blockchain provided in any embodiment of the present invention, and has functional modules and beneficial effects corresponding to the execution method. The blockchain-based real-name authentication system 100 includes a data receiving module 200, a data saving module 300, and a data transmitting module 400.
Specifically, the data receiving module 200 is configured to receive real-name authentication of a first user to obtain first authentication data; the data saving module 300 is configured to save the first authentication data to a preset blockchain to obtain a first index value; the data transmitting module 400 is configured to transmit the first index value to a second user to enable the second user to search the blockchain for the first authentication data.
In this embodiment, the data receiving module 200 is further configured to receive real-name authentication of the second user to obtain second authentication data; the data saving module 300 is further configured to save the second authentication data to a preset blockchain to obtain a second index value; the data sending module 400 is specifically configured to send the first index value to a third user to enable the third user to search the blockchain for the first authentication data, or send the second index value to a third user to enable the third user to search the blockchain for the second authentication data, where the third user includes a first user and/or a second user.
Further, the data receiving module 200 is further configured to receive an authentication protocol signed by the first user and the second user, where the authentication protocol includes protocol data, a first index value, and a second index value; the data saving module 300 is further configured to save the authentication protocol to the blockchain to obtain a third index value; the data transmission module 400 is further configured to transmit the third index value to the third user to enable the third user to search the blockchain for the authentication protocol.
Further, the data receiving module 200 is further configured to receive operation data of the first user; the data saving module 300 is further configured to save the operation data and the third index value to the blockchain according to the protocol data to obtain a fourth index value; the data transmitting module 400 is further configured to transmit the fourth index value to the third user to enable the third user to search the blockchain for the authentication protocol and the operation data.
Example IV
Fig. 5 is a schematic structural diagram of a computer device 12 according to a fourth embodiment of the present invention. Fig. 5 illustrates a block diagram of an exemplary computer device 12 suitable for use in implementing embodiments of the present invention. The computer device 12 shown in fig. 5 is merely an example and should not be construed as limiting the functionality and scope of use of embodiments of the present invention.
As shown in FIG. 5, the computer device 12 is in the form of a general purpose computing device. Components of computer device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, a bus 18 that connects the various system components, including the system memory 28 and the processing units 16.
Bus 18 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, micro channel architecture (MAC) bus, enhanced ISA bus, video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer device 12 typically includes a variety of computer system readable media. Such media can be any available media that is accessible by computer device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 30 and/or cache memory 32. The computer device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from or write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, commonly referred to as a "hard disk drive"). Although not shown in fig. 5, a magnetic disk drive for reading from and writing to a removable non-volatile magnetic disk (e.g., a "floppy disk"), and an optical disk drive for reading from or writing to a removable non-volatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In such cases, each drive may be coupled to bus 18 through one or more data medium interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored in, for example, memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment. Program modules 42 generally perform the functions and/or methods of the embodiments described herein.
The computer device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), one or more devices that enable a user to interact with the computer device 12, and/or any devices (e.g., network card, modem, etc.) that enable the computer device 12 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 22. Moreover, computer device 12 may also communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet, through network adapter 20. As shown, network adapter 20 communicates with other modules of computer device 12 via bus 18. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with computer device 12, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
The processing unit 16 executes various functional applications and data processing by running programs stored in the system memory 28, for example, implementing the methods provided by embodiments of the present invention:
receiving real-name authentication of a first user to obtain first authentication data;
storing the first authentication data to a preset blockchain to obtain a first index value;
The first index value is sent to a second user to enable the second user to search the blockchain for the first authentication data.
Example five
The fifth embodiment of the present application further provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the methods as provided by all the embodiments of the present application:
receiving real-name authentication of a first user to obtain first authentication data;
storing the first authentication data to a preset blockchain to obtain a first index value;
The first index value is sent to a second user to enable the second user to search the blockchain for the first authentication data.
The computer storage media of embodiments of the invention may take the form of any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
Note that the above is only a preferred embodiment of the present invention and the technical principle applied. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, while the invention has been described in connection with the above embodiments, the invention is not limited to the above embodiments, but may include many other equivalent embodiments without departing from the spirit of the invention, the scope of which is determined by the scope of the appended claims.

Claims (6)

1. A blockchain-based real name authentication method, comprising:
receiving real-name authentication of a first user to obtain first authentication data;
storing the first authentication data to a preset blockchain to obtain a first index value;
Transmitting the first index value to a second user to cause the second user to search the blockchain for the first authentication data;
The method comprises the steps of receiving real-name authentication of a first user to obtain first authentication data, and specifically receiving the real-name authentication of the first user once through a real-name authentication platform to obtain the first authentication data;
The method for receiving the real-name authentication of the first user to obtain the first authentication data comprises the following steps:
Receiving real-name authentication of a second user to obtain second authentication data;
storing the second authentication data to a preset blockchain to obtain a second index value;
said sending said first index value to a second user to cause said second user to search said blockchain for said first authentication data includes;
Transmitting the first index value to a third user to cause the third user to search for the first authentication data in the blockchain, or transmitting the second index value to a third user to cause the third user to search for the second authentication data in the blockchain, the third user including a first user and/or a second user;
the step of storing the first authentication data to a preset blockchain to obtain a first index value includes:
Receiving an authentication protocol signed by the first user and the second user, wherein the authentication protocol comprises protocol data, a first index value and a second index value; the protocol data agrees with the inquiry authority of each index value;
saving the authentication protocol to the blockchain to obtain a third index value;
the third index value is sent to the third user to cause the third user to search the blockchain for the authentication protocol.
2. The method of claim 1, wherein the saving the authentication protocol to the blockchain to obtain a third index value comprises:
receiving operation data of the first user;
storing the operation data and the third index value to the blockchain according to the protocol data to obtain a fourth index value;
The fourth index value is sent to the third user to cause the third user to search the blockchain for the authentication protocol and operational data.
3. A blockchain-based real name authentication system, comprising:
The data receiving module is used for receiving real-name authentication of the first user to obtain first authentication data;
the data storage module is used for storing the first authentication data to a preset blockchain to obtain a first index value;
a data transmitting module for transmitting the first index value to a second user to enable the second user to search the blockchain for the first authentication data;
The data receiving module is specifically used for receiving real-name authentication of the first user through the real-name authentication platform to obtain first authentication data;
The data receiving module is further used for receiving real-name authentication of the second user to obtain second authentication data;
The data storage module is further used for storing the second authentication data to a preset blockchain to obtain a second index value;
The data sending module is specifically configured to send the first index value to a third user to enable the third user to search the blockchain for the first authentication data, or send the second index value to a third user to enable the third user to search the blockchain for the second authentication data, where the third user includes a first user and/or a second user;
The data receiving module is further used for receiving an authentication protocol signed by the first user and the second user, and the authentication protocol comprises protocol data, a first index value and a second index value; the protocol data agrees with the inquiry authority of each index value;
the data storage module is further used for storing the authentication protocol to the blockchain to obtain a third index value;
The data transmission module is further configured to transmit the third index value to the third user to cause the third user to search the blockchain for the authentication protocol.
4. The system of claim 3, wherein the system further comprises a controller configured to control the controller,
The data receiving module is also used for receiving operation data of the first user;
the data saving module is further configured to save the operation data and the third index value to the blockchain according to the protocol data to obtain a fourth index value;
the data transmission module is further configured to transmit the fourth index value to the third user to cause the third user to search the blockchain for the authentication protocol and the operation data.
5. A computer device, comprising:
One or more processors;
storage means for storing one or more programs,
When executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-2.
6. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method according to any of claims 1-2.
CN202011043491.XA 2020-09-28 2020-09-28 Real-name authentication method, system, equipment and storage medium based on blockchain Active CN112162984B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011043491.XA CN112162984B (en) 2020-09-28 2020-09-28 Real-name authentication method, system, equipment and storage medium based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011043491.XA CN112162984B (en) 2020-09-28 2020-09-28 Real-name authentication method, system, equipment and storage medium based on blockchain

Publications (2)

Publication Number Publication Date
CN112162984A CN112162984A (en) 2021-01-01
CN112162984B true CN112162984B (en) 2024-07-19

Family

ID=73861944

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011043491.XA Active CN112162984B (en) 2020-09-28 2020-09-28 Real-name authentication method, system, equipment and storage medium based on blockchain

Country Status (1)

Country Link
CN (1) CN112162984B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196966A (en) * 2017-07-05 2017-09-22 北京信任度科技有限公司 The identity identifying method and system of multi-party trust based on block chain
CN109637606A (en) * 2018-12-12 2019-04-16 浪潮电子信息产业股份有限公司 A kind of medical record data management method, system and associated component

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10007913B2 (en) * 2015-05-05 2018-06-26 ShoCard, Inc. Identity management service using a blockchain providing identity transactions between devices
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
WO2019104690A1 (en) * 2017-11-30 2019-06-06 深圳前海达闼云端智能科技有限公司 Mobile network access authentication method, device, storage medium and block chain node
CN110753016B (en) * 2018-07-23 2021-12-14 国网辽宁招标有限公司 Real name authentication method based on block chain
CN109063138B (en) * 2018-08-03 2021-07-30 上海点融信息科技有限责任公司 Method, apparatus, and storage medium for searching data in a blockchain as a service platform
CN109257342B (en) * 2018-09-04 2020-05-26 阿里巴巴集团控股有限公司 Block chain cross-chain authentication method, system, server and readable storage medium
US10425230B1 (en) * 2019-03-01 2019-09-24 Capital One Services, Llc Identity and electronic signature verification in blockchain
CN111316303B (en) * 2019-07-02 2023-11-10 创新先进技术有限公司 Systems and methods for blockchain-based cross-entity authentication
CN110581860B (en) * 2019-09-19 2022-08-26 腾讯科技(深圳)有限公司 Identity authentication method, device, storage medium and equipment based on block chain
CN110851857B (en) * 2019-10-14 2022-07-01 上海唯链信息科技有限公司 Method and device for realizing identity endorsement on block chain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196966A (en) * 2017-07-05 2017-09-22 北京信任度科技有限公司 The identity identifying method and system of multi-party trust based on block chain
CN109637606A (en) * 2018-12-12 2019-04-16 浪潮电子信息产业股份有限公司 A kind of medical record data management method, system and associated component

Also Published As

Publication number Publication date
CN112162984A (en) 2021-01-01

Similar Documents

Publication Publication Date Title
CN112035858B (en) API access control method, device, equipment and medium
US20210256431A1 (en) Methods for unlocking shared bikes
US20190065624A1 (en) Method and device for obtaining answer, and computer device
CN109597640B (en) Account management method, device, equipment and medium for application program
CN114528044B (en) Interface calling method, device, equipment and medium
CN111680313B (en) Data processing method, device, equipment and storage medium
CN110471728B (en) Method and related device for displaying interface based on user permission
CN112367370A (en) Management method, device, equipment and medium for hybrid cloud resource data
CN113254969B (en) Business data processing method and device, electronic equipment and storage medium
CN109359449B (en) Authentication method, device, server and storage medium based on micro service
CN109951553B (en) Data processing method, system, electronic device and computer readable storage medium
CN111291330A (en) SVN authority management method, SVN authority management device, computer equipment and storage medium
US20200034042A1 (en) Method for writing data in a distributed storage system
CN113922995A (en) Cloud desktop sharing method and device, storage medium and electronic equipment
CN111178849A (en) Linear process engine implementation method, device, equipment and storage medium
CN111586177B (en) Cluster session loss prevention method and system
CN113761552A (en) Access control method, device, system, server and storage medium
CN107817962A (en) A kind of long-range control method, device, control server and storage medium
CN111753996A (en) Optimization method, device, equipment and storage medium of scheme determination model
CN109669790A (en) Data sharing method, device, shared platform and storage medium based on cloud platform
CN112000491B (en) Application program interface calling method, device, equipment and storage medium
WO2023246480A1 (en) Identity authentication method and apparatus, device, medium and product
CN111399818B (en) Recommendation engine design method, recommendation engine design device, server and storage medium
CN108399128A (en) A kind of generation method of user data, device, server and storage medium
CN111489139A (en) Order payment method, device, equipment and medium based on big data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant