CN112380287B - Distributed credible statement generation method, system, equipment and storage medium - Google Patents

Distributed credible statement generation method, system, equipment and storage medium Download PDF

Info

Publication number
CN112380287B
CN112380287B CN202011269380.0A CN202011269380A CN112380287B CN 112380287 B CN112380287 B CN 112380287B CN 202011269380 A CN202011269380 A CN 202011269380A CN 112380287 B CN112380287 B CN 112380287B
Authority
CN
China
Prior art keywords
information
verified
user
proving
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011269380.0A
Other languages
Chinese (zh)
Other versions
CN112380287A (en
Inventor
张金琳
马晓开
曹可磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Shuqin Technology Co Ltd
Original Assignee
Zhejiang Shuqin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Shuqin Technology Co Ltd filed Critical Zhejiang Shuqin Technology Co Ltd
Priority to CN202011269380.0A priority Critical patent/CN112380287B/en
Publication of CN112380287A publication Critical patent/CN112380287A/en
Application granted granted Critical
Publication of CN112380287B publication Critical patent/CN112380287B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a distributed credible statement generation method, a system, equipment and a storage medium, and belongs to the technical field of block chains. Sending a transaction containing a user identity identifier and information to be verified to M first proving parties; receiving a notice that whether the information to be verified including the first proving party signature fed back by the M first proving parties is correct or not; if receiving a notification that the information to be verified, which is fed back by the N first proving parties and contains the first proving party signature, is correct, then: constructing a transaction requesting a trusted declaration; sending a transaction requesting a trusted declaration to the blockchain system; if the transaction requesting the trusted declaration is validated, then: a trust statement is received for information to be verified. Aiming at the technical problem of low verification efficiency, the verification efficiency can be improved.

Description

Distributed credible statement generation method, system, equipment and storage medium
Technical Field
The present invention relates to the field of block chain technologies, and in particular, to a method, a system, a device, and a storage medium for generating a distributed trusted declaration.
Background
With the popularization of digital information, the authentication of related identity information spans from paper piece authentication to electronic piece authentication, but the authentication process is limited by a centralized network system and is mostly interactive with points; when a plurality of nodes are involved in authentication, the problems of low verification efficiency and complicated procedures still exist.
Disclosure of Invention
1. Technical problem to be solved by the invention
Aiming at the technical problem of low verification efficiency, the invention provides a distributed trusted statement generation method, a distributed trusted statement generation system, distributed trusted statement generation equipment and a storage medium. The verification efficiency can be improved.
2. Technical scheme
In order to solve the problems, the technical scheme provided by the invention is as follows:
a distributed authentication statement generation method is suitable for a user node and comprises the following steps:
sending a transaction containing a user identity identifier and information to be verified to M first proving parties;
receiving a notice that whether the information to be verified including the first proving party signature fed back by the M first proving parties is correct or not;
if receiving a notification that the information to be verified, which is fed back by the N first proving parties and contains the first proving party signature, is correct, then:
constructing a transaction requesting a trusted declaration;
sending a transaction requesting a trusted declaration to the blockchain system;
if the transaction verification requesting the trusted declaration passes, then:
receiving a trusted declaration for information to be verified;
wherein the content of the first and second substances,
the user identity identifier is generated on the block chain system according to the public key, the private key and the identity information of the user;
transactions that request a trusted claim include: the N first proving parties feed back a notice that the information to be verified including the first proving party signature is correct, a hash value of the information to be verified and a user identity identifier;
the credible statement of the information to be verified comprises the signatures of the N first proving parties and the hash value of the information to be verified;
n is more than or equal to 2 and less than or equal to M, M is more than or equal to 2, and M and N are integers;
a first proving party receiving the transaction containing the user identity identifier and the information to be verified verifies whether the information to be verified is correct; if the verification result is correct, signing the information to be verified and the user identifier, and sending a notice of the information to be verified signed by the first proving party to the user; receiving a consensus node requesting the transaction of the trusted declaration, and verifying the transaction of the trusted declaration; verifying the signature of the information to be verified and the user identifier according to the public keys of the N first proving parties; if the verification is passed: and generating a credible statement of the information to be verified according to the signatures of the N first proving parties and the hash value of the information to be verified.
Optionally, the method for verifying whether the information to be verified is correct by the first proving party who receives the transaction including the user identifier and the information to be verified if the identity information used for generating the user identifier includes the information to be verified includes: requesting identity information hash values contained in the user identifiers from the block chain system, comparing the hash values of the information to be verified with the identity information hash values, and if the hash values are consistent, passing the verification; or, comparing the information to be verified or the hash value of the information to be verified stored by the first proving party, and if the information to be verified or the hash value of the information to be verified is consistent, the verification is passed.
Optionally, when a transaction including the user identity identifier and the information to be verified is constructed, the hash value with the verification information is used; the method for verifying whether the information to be verified is correct by a first proving party receiving a transaction containing a user identity identifier and the information to be verified comprises the following steps: requesting identity information hash values contained in the user identifiers from the block chain system, comparing the hash values of the information to be verified with the identity information hash values, and if the hash values are consistent, passing the verification; or, comparing the information to be verified or the hash value of the information to be verified stored by the first proving party, and if the information to be verified or the hash value of the information to be verified is consistent, the verification is passed.
A distributed authentication statement generation method is suitable for a consensus node and comprises the following steps:
a first proving party receiving the transaction containing the user identity identifier and the information to be verified verifies whether the information to be verified is correct; if the verification result is correct, signing the information to be verified and the user identifier, and sending a notice of the information to be verified signed by the first proving party to the user;
receiving a transaction requesting a trusted declaration and verifying the transaction requesting the trusted declaration;
verifying the signature of the information to be verified and the user identifier according to the public keys of the N first proving parties;
if the verification is passed, then: and generating a credible statement of the information to be verified according to the signatures of the N first proving parties and the hash value of the information to be verified.
Optionally, the method for verifying whether the information to be verified is correct by the first proving party who receives the transaction including the user identifier and the information to be verified if the identity information used for generating the user identifier includes the information to be verified includes:
and requesting an identity information hash value contained in the user identifier from the block chain system, comparing the hash value of the information to be verified with the identity information hash value, and if the hash value of the information to be verified is consistent with the identity information hash value, passing the verification.
Or the like, or a combination thereof,
and comparing the information to be verified or the hash value of the information to be verified stored by the first proving party, and if the information to be verified or the hash value of the information to be verified is consistent, the verification is passed.
Optionally, when a transaction including the user identity identifier and the information to be verified is constructed, the hash value with the verification information is used; the method for verifying whether the information to be verified is correct by a first proving party receiving a transaction containing a user identity identifier and the information to be verified comprises the following steps: requesting identity information hash values contained in the user identifiers from the block chain system, comparing the hash values of the information to be verified with the identity information hash values, and if the hash values are consistent, passing the verification; or, comparing the information to be verified or the hash value of the information to be verified stored by the first proving party, and if the information to be verified or the hash value of the information to be verified is consistent, the verification is passed.
A distributed authentication assertion generation system is applicable to a consensus node, and comprises:
the authentication information receiving unit is used for receiving a transaction containing a user identity identifier and authentication information;
the to-be-verified information verification unit is used for verifying whether the to-be-verified information is correct or not;
the information to be verified signature notification unit is used for signing the information to be verified and the user identifier which pass the verification and sending the information to be verified signed by the first proving party to the user;
a request credibility statement transaction receiving unit for receiving a transaction requesting a credibility statement; the request credibility declaration transaction verification unit is used for verifying the information to be verified and the signature of the user identifier according to the public keys of the N first proving parties and verifying the transaction of the request credibility declaration; and the trusted declaration generating unit is used for generating the trusted declaration of the information to be verified according to the signatures of the N first proving parties and the hash value of the information to be verified.
Optionally, the user identifier generating unit is configured to generate the user identifier on the blockchain system according to the public key, the private key, and the identity information of the user.
Furthermore, the present invention provides an apparatus comprising: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform a method as described above.
Accordingly, the present invention provides a storage medium storing a computer program which, when executed by a processor, implements a method as claimed in any one of the above.
3. Advantageous effects
Compared with the prior art, the technical scheme provided by the invention has the following beneficial effects:
the distributed identity authentication system is not susceptible to single node failures and network outages as a centralized identity authentication system. In the distributed identity authentication system, if one node is disconnected, the rest nodes can still carry out information interaction and identity verification.
In the distributed identity authentication system, the identity information has an independent storage space, and the user data is stored in a distributed area and is not transmitted to a public block chain, so that the leakage of the user information is avoided.
The distributed identity authentication system encrypts the identity data of the user, converts the encrypted identity data into a hash value, stores the hash value in a distributed database, and establishes an effective supervision mechanism and a consensus mechanism through a blockchain network.
Drawings
FIG. 1 is a schematic diagram of an apparatus according to the present invention.
Detailed Description
For a further understanding of the present invention, reference is made to the following detailed description taken in conjunction with the accompanying drawings and examples.
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. The terms first, second, and the like in the present invention are provided for convenience of describing the technical solution of the present invention, have no specific limiting function, are all general terms, and do not limit the technical solution of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Example 1
The embodiment provides a method for generating a distributed authentication declaration, which is suitable for a user node, and includes:
sending a transaction containing a user identity identifier and information to be verified to M first proving parties;
receiving a notice that whether the information to be verified including the first proving party signature fed back by the M first proving parties is correct or not;
if receiving a notification that the information to be verified, which is fed back by the N first proving parties and contains the first proving party signature, is correct, then:
constructing a transaction requesting a trusted declaration;
sending a transaction requesting a trusted declaration to the blockchain system;
if the transaction requesting the trusted declaration is validated, then:
receiving a trusted declaration for information to be verified;
wherein the content of the first and second substances,
the user identity identifier is generated on the block chain system according to the public key, the private key and the identity information of the user;
the transaction that requests the trustworthy claim includes: the N first proving parties feed back a notice that the information to be verified including the first proving party signature is correct, a hash value of the information to be verified and a user identity identifier;
the credible statement of the information to be verified comprises the signatures of the N first proving parties and the hash value of the information to be verified;
n is more than or equal to 2 and less than or equal to M, M is more than or equal to 2, and M and N are integers;
a first proving party receiving the transaction containing the user identity identifier and the information to be verified verifies whether the information to be verified is correct; if the verification result is correct, signing the information to be verified and the user identifier, and sending a notice of the information to be verified signed by the first proving party to the user;
receiving a consensus node requesting the transaction of the trusted declaration, and verifying the transaction of the trusted declaration;
verifying the signature of the information to be verified and the user identifier according to the public keys of the N first proving parties;
if the verification is passed:
and generating a credible statement of the information to be verified according to the signatures of the N first proving parties and the hash value of the information to be verified.
The information to be verified can be identity information of the user, and also can be various information such as academic information and medical information of the user, and the information to be verified has relevance with the user. The information to be verified is related to both the user and the first proving party, that is, the first proving party stores the information to be verified, or has an encrypted value or a hashed value of the information to be verified, so that the first proving party can verify the information to be verified, and the information to be verified is used for judging whether the information to be verified is correct or not and whether signature verification is given or not.
In order to ensure the safety, reliability and no leakage of information, the user identity identifier and the information to be verified can be encrypted asymmetrically. The block chain system can quickly realize the verification process of the information to be verified, improve the verification rate and ensure the verification safety. After the information to be verified is verified to be correct by more than the set number N of first proving parties, the user can apply a trusted declaration of the information to be verified, such as a trusted declaration of a study certification, a trusted declaration of medical information, and the like, to the blockchain system, wherein the trusted declaration of the information to be verified includes signature information of the N first proving parties to ensure authority and public credibility of the trusted declaration, a hash value of the information to be verified, an object of the information to be verified representing the user to which the trusted declaration is directed, and a user identity identifier representing the user to which the trusted declaration is directed.
If the identity information used for generating the user identity identifier contains the information to be verified, the first proving party receiving the transaction containing the user identity identifier and the information to be verified verifies whether the information to be verified is correct, and the method comprises the following steps:
and requesting an identity information hash value contained in the user identifier from the block chain system, comparing the hash value of the information to be verified with the identity information hash value, and if the hash value of the information to be verified is consistent with the identity information hash value, passing the verification.
Or the like, or a combination thereof,
and comparing the information to be verified or the hash value of the information to be verified stored by the first proving party, and if the information to be verified or the hash value of the information to be verified is consistent, the verification is passed.
In order to ensure authenticity, reliability and good credit, the user identity identifier generation process includes user identity information, and if the information to be verified is just part or all of the identity information, the correctness of the information to be verified can be verified by acquiring the identity information hash value correspondingly included by the identity identifier on the chain. Therefore, the verification burden of the first proving party is reduced, and the reliability of passing the verification of the verification information is improved. The hash value of the identity information can be encrypted in a fragmentation mode or a block encryption mode, and when the information to be verified is only part of the content of the identity information, the result of correctness can be obtained by comparing the hash value encrypted in the block mode.
The hash value with the verification information is used when the transaction containing the user identity identifier and the information to be verified is constructed; the method for verifying whether the information to be verified is correct by a first proving party receiving a transaction containing a user identity identifier and the information to be verified comprises the following steps:
requesting identity information hash values contained in the user identifiers from the block chain system, comparing the hash values of the information to be verified with the identity information hash values, and if the hash values are consistent, passing the verification;
or the like, or, alternatively,
and comparing the information to be verified or the hash value of the information to be verified stored by the first proving party, and if the information to be verified or the hash value of the information to be verified is consistent, the verification is passed.
The method and the device prevent the leakage of the information to be verified, which causes the leakage of the user privacy information, when the transaction containing the user identity identifier and the information to be verified is forwarded and received, and protect the user privacy information.
A distributed authentication statement generation method is suitable for a consensus node and comprises the following steps:
a first proving party receiving the transaction containing the user identity identifier and the information to be verified verifies whether the information to be verified is correct; if the verification result is correct, signing the information to be verified and the user identifier, and sending a notice of the information to be verified signed by the first proving party to the user;
receiving a transaction requesting a trusted declaration and verifying the transaction requesting the trusted declaration;
verifying the signature of the information to be verified and the user identifier according to the public keys of the N first proving parties;
if the verification is passed:
and generating a credible statement of the information to be verified according to the signatures of the N first proving parties and the hash value of the information to be verified.
If the identity information used for generating the user identity identifier contains the information to be verified, the first proving party receiving the transaction containing the user identity identifier and the information to be verified verifies whether the information to be verified is correct, and the method comprises the following steps:
and requesting an identity information hash value contained in the user identifier from the block chain system, comparing the hash value of the information to be verified with the identity information hash value, and if the hash value of the information to be verified is consistent with the identity information hash value, passing the verification.
Or the like, or, alternatively,
and comparing the information to be verified or the hash value of the information to be verified stored by the first proving party, and if the information to be verified or the hash value of the information to be verified is consistent, the verification is passed.
The hash value with the verification information is used when the transaction containing the user identity identifier and the information to be verified is constructed; the method for verifying whether the information to be verified is correct by a first proving party receiving a transaction containing a user identity identifier and the information to be verified comprises the following steps:
requesting identity information hash values contained in the user identifiers from the block chain system, comparing the hash values of the information to be verified with the identity information hash values, and if the hash values are consistent, passing the verification;
or the like, or, alternatively,
and comparing the information to be verified or the hash value of the information to be verified stored by the first proving party, and if the information to be verified or the hash value of the information to be verified is consistent, the verification is passed.
A distributed authentication assertion generating system is applicable to a consensus node and comprises the following components:
the authentication information receiving unit is used for receiving a transaction containing a user identity identifier and authentication information;
the to-be-verified information verification unit is used for verifying whether the to-be-verified information is correct or not;
the information to be verified signature notification unit is used for signing the information to be verified and the user identifier which pass the verification and sending the information to be verified signed by the first proving party to the user;
a request credibility statement transaction receiving unit for receiving a transaction requesting a credibility statement;
the request credibility declaration transaction verification unit is used for verifying the information to be verified and the signature of the user identifier according to the public keys of the N first proving parties and verifying the transaction of the request credibility declaration;
and the credible statement generating unit is used for generating the credible statement of the information to be verified according to the signatures of the N first proving parties and the hash value of the information to be verified.
The user id generating unit is configured to generate the user id on the blockchain system according to the public key, the private key, and the identity information of the user.
Example 2
This embodiment provides an apparatus, the apparatus comprising: one or more processors; memory for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to perform a method as described above.
Furthermore, the present embodiment provides a storage medium storing a computer program that, when executed by a processor, implements the method as described in embodiment 1 above.
Fig. 1 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 1, as another aspect, the present application also provides an apparatus 500 including one or more Central Processing Units (CPUs) 501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data necessary for the operation of the apparatus 500 are also stored. The CPU501, ROM502, and RAM503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, according to embodiments disclosed herein, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method described in any of the embodiments above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1. A distributed credible statement generation method is suitable for a user node, and is characterized by comprising the following steps:
sending a transaction containing a user identity identifier and information to be verified to M first proving parties;
receiving a notice that whether the information to be verified including the signature of the first proving party fed back by the M first proving parties is correct or not;
if receiving a notification that the information to be verified, which is fed back by the N first proving parties and contains the first proving party signature, is correct, then:
constructing a transaction requesting a trusted declaration;
sending a transaction requesting a trusted declaration to the blockchain system;
if the transaction requesting the trusted declaration is validated, then:
receiving a trusted declaration for information to be verified;
wherein, the first and the second end of the pipe are connected with each other,
the user identity identifier is generated on the block chain system according to the public key, the private key and the identity information of the user;
the transaction that requests the trustworthy claim includes: the N first proving parties feed back a notice that the information to be verified including the first proving party signature is correct, a hash value of the information to be verified and a user identity identifier;
the credibility statement of the information to be verified comprises the signatures of the N first proving parties and the hash value of the information to be verified;
n is more than or equal to 2 and less than or equal to M, M is more than or equal to 2, and M and N are integers;
a first proving party receiving the transaction containing the user identity identifier and the information to be verified verifies whether the information to be verified is correct; if the verification result is correct, signing the information to be verified and the user identifier, and sending a notice of the information to be verified signed by the first proving party to the user;
receiving a consensus node requesting the transaction of the trusted declaration, and verifying the transaction of the trusted declaration;
verifying the signature of the information to be verified and the user identifier according to the public keys of the N first proving parties;
if the verification is passed:
and generating a credible statement of the information to be verified according to the signatures of the N first proving parties and the hash value of the information to be verified.
2. The method of claim 1, wherein:
the method for verifying whether the information to be verified is correct by a first proving party receiving a transaction containing the user identity identifier and the information to be verified if the identity information used for generating the user identity identifier contains the information to be verified comprises the following steps:
requesting identity information hash values contained in the user identifiers from the block chain system, comparing the hash values of the information to be verified with the identity information hash values, and if the hash values are consistent, passing the verification;
or the like, or, alternatively,
and comparing the information to be verified or the hash value of the information to be verified stored by the first proving party, and if the information to be verified or the hash value of the information to be verified is consistent, the verification is passed.
3. The method of claim 1, wherein:
when a transaction containing a user identity identifier and information to be verified is constructed, a hash value with verification information is used; the method for verifying whether the information to be verified is correct by a first proving party receiving a transaction containing a user identity identifier and the information to be verified comprises the following steps:
requesting identity information hash values contained in the user identifiers from the block chain system, comparing the hash values of the information to be verified with the identity information hash values, and if the hash values are consistent, passing the verification;
or the like, or, alternatively,
and comparing the information to be verified or the hash value of the information to be verified stored by the first proving party, and if the information to be verified or the hash value of the information to be verified is consistent, the verification is passed.
4. A distributed credible statement generation method is suitable for consensus nodes and is characterized by comprising the following steps:
a first proving party receiving the transaction containing the user identity identifier and the information to be verified verifies whether the information to be verified is correct or not; if the verification result is correct, signing the information to be verified and the user identifier, and sending a notice of the information to be verified signed by the first proving party to the user;
receiving a transaction requesting a trusted declaration and verifying the transaction requesting the trusted declaration;
verifying the signature of the information to be verified and the user identifier according to the public keys of the N first proving parties;
if the verification is passed, then:
and generating a credible statement of the information to be verified according to the signatures of the N first proving parties and the hash value of the information to be verified.
5. The method of claim 4, wherein:
the method for verifying whether the information to be verified is correct by a first proving party receiving a transaction containing the user identity identifier and the information to be verified if the identity information used for generating the user identity identifier contains the information to be verified comprises the following steps:
requesting identity information hash values contained in the user identifiers from the block chain system, comparing the hash values of the information to be verified with the identity information hash values, and if the hash values are consistent, passing the verification;
or the like, or, alternatively,
and comparing the information to be verified or the hash value of the information to be verified stored by the first proving party, and if the information to be verified or the hash value of the information to be verified is consistent, the verification is passed.
6. The method of claim 4, wherein:
when a transaction containing a user identity identifier and information to be verified is established, a hash value with verification information is used; the method for verifying whether the information to be verified is correct by a first proving party receiving a transaction containing a user identity identifier and the information to be verified comprises the following steps:
requesting identity information hash values contained in the user identifiers from the block chain system, comparing the hash values of the information to be verified with the identity information hash values, and if the hash values are consistent, passing the verification;
or the like, or, alternatively,
and comparing the hash value with the information to be verified or the hash value of the information to be verified stored by the first proving party, and if the hash value is consistent with the information to be verified, the verification is passed.
7. A distributed trusted declaration generation system, adapted to consensus nodes, comprising:
the system comprises a to-be-verified information receiving unit, a verification unit and a verification unit, wherein the to-be-verified information receiving unit is used for receiving a transaction containing a user identity identifier and to-be-verified information;
the to-be-verified information verification unit is used for verifying whether the to-be-verified information is correct or not;
the information to be verified signature notification unit is used for signing the information to be verified and the user identifier which pass the verification and sending the information to be verified signed by the first proving party to the user;
a request credibility statement transaction receiving unit for receiving a transaction requesting a credibility statement;
the request credibility declaration transaction verification unit is used for verifying the information to be verified and the signature of the user identifier according to the public keys of the N first proving parties and verifying the transaction of the request credibility declaration;
and the trusted declaration generating unit is used for generating the trusted declaration of the information to be verified according to the signatures of the N first proving parties and the hash value of the information to be verified.
8. The system of claim 7, wherein:
and the user identity identifier generating unit is used for generating the user identity identifier on the block chain system according to the public key, the private key and the identity information of the user.
9. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-6.
10. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-6.
CN202011269380.0A 2020-11-13 2020-11-13 Distributed credible statement generation method, system, equipment and storage medium Active CN112380287B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011269380.0A CN112380287B (en) 2020-11-13 2020-11-13 Distributed credible statement generation method, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011269380.0A CN112380287B (en) 2020-11-13 2020-11-13 Distributed credible statement generation method, system, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112380287A CN112380287A (en) 2021-02-19
CN112380287B true CN112380287B (en) 2022-06-10

Family

ID=74582179

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011269380.0A Active CN112380287B (en) 2020-11-13 2020-11-13 Distributed credible statement generation method, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112380287B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115860932B (en) * 2022-11-14 2023-08-01 临沂大学 Cross-fragment transaction method, device and medium
CN115550060B (en) * 2022-11-22 2023-03-14 中国信息通信研究院 Trusted certificate verification method, device, equipment and medium based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110224837A (en) * 2019-06-06 2019-09-10 西安纸贵互联网科技有限公司 Zero-knowledge proof method and terminal based on distributed identity
CN110795501A (en) * 2019-10-11 2020-02-14 支付宝(杭州)信息技术有限公司 Method, device, equipment and system for creating verifiable statement based on block chain
CN111193597A (en) * 2020-04-10 2020-05-22 支付宝(杭州)信息技术有限公司 Transmission method, device, equipment and system capable of verifying statement
CN111831674A (en) * 2020-06-29 2020-10-27 山大地纬软件股份有限公司 Block chain node, system and digital data copy distribution method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110224837A (en) * 2019-06-06 2019-09-10 西安纸贵互联网科技有限公司 Zero-knowledge proof method and terminal based on distributed identity
CN110795501A (en) * 2019-10-11 2020-02-14 支付宝(杭州)信息技术有限公司 Method, device, equipment and system for creating verifiable statement based on block chain
CN111193597A (en) * 2020-04-10 2020-05-22 支付宝(杭州)信息技术有限公司 Transmission method, device, equipment and system capable of verifying statement
CN111831674A (en) * 2020-06-29 2020-10-27 山大地纬软件股份有限公司 Block chain node, system and digital data copy distribution method

Also Published As

Publication number Publication date
CN112380287A (en) 2021-02-19

Similar Documents

Publication Publication Date Title
WO2022095244A1 (en) Cross-chain transaction method, system and apparatus, device, and storage medium
CN112131316B (en) Data processing method and device applied to block chain system
CN108924107B (en) Verifiable method for block chain remote medical data calling
CN108923925B (en) Data storage method and device applied to block chain
CN112380287B (en) Distributed credible statement generation method, system, equipment and storage medium
CN114024710A (en) Data transmission method, device, system and equipment
CN110096894B (en) Data anonymous sharing system and method based on block chain
CN112055019B (en) Method for establishing communication channel and user terminal
CN112398658A (en) Distributed digital certificate management method, system, equipment and storage medium
CN112311779B (en) Data access control method and device applied to block chain system
KR20220065049A (en) Computer implemented method and system for storing guaranteed data on blockchain
CN112395356A (en) Distributed identity authentication and verification method, equipment and storage medium
CN114244530A (en) Resource access method and device, electronic equipment and computer readable storage medium
CN112332980B (en) Digital certificate signing and verifying method, equipment and storage medium
CN112446050B (en) Business data processing method and device applied to block chain system
CN110572392A (en) Identity authentication method based on HyperLegger network
CN113221133A (en) Data transmission method and device
CN113395161A (en) Verification method, verification device, electronic equipment and storage medium
CN117454437B (en) Transaction processing method, storage medium and electronic device
US11451403B2 (en) Verification method, information processing device, and non-transitory computer-readable storage medium for storing verification program
CN114553570B (en) Method, device, electronic equipment and storage medium for generating token
US20240143730A1 (en) Multi-factor authentication using blockchain
CN112333175B (en) Data transmission method, system, equipment and storage medium based on intermediate node
CN116975936B (en) Finance qualification proving method and finance qualification verifying method
CN115987525A (en) Method and device for adding authorized signature data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A distributed trusted statement generation method and system, device and storage medium

Effective date of registration: 20220825

Granted publication date: 20220610

Pledgee: Bank of Beijing Limited by Share Ltd. Hangzhou branch

Pledgor: ZHEJIANG SHUQIN TECHNOLOGY CO.,LTD.

Registration number: Y2022330001899

PE01 Entry into force of the registration of the contract for pledge of patent right