CN113111330A - Enterprise legal identity authentication management method and system based on enterprise chain code - Google Patents

Enterprise legal identity authentication management method and system based on enterprise chain code Download PDF

Info

Publication number
CN113111330A
CN113111330A CN202110313814.0A CN202110313814A CN113111330A CN 113111330 A CN113111330 A CN 113111330A CN 202110313814 A CN202110313814 A CN 202110313814A CN 113111330 A CN113111330 A CN 113111330A
Authority
CN
China
Prior art keywords
enterprise
user
login
information
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110313814.0A
Other languages
Chinese (zh)
Other versions
CN113111330B (en
Inventor
任豪
余梓平
张广明
唐国强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Zhitou Chain Code Technology Co ltd
Original Assignee
Guangzhou Zhitou Chain Code Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Zhitou Chain Code Technology Co ltd filed Critical Guangzhou Zhitou Chain Code Technology Co ltd
Priority to CN202110313814.0A priority Critical patent/CN113111330B/en
Publication of CN113111330A publication Critical patent/CN113111330A/en
Application granted granted Critical
Publication of CN113111330B publication Critical patent/CN113111330B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Abstract

The invention discloses an enterprise legal person identity authentication management method and system based on enterprise chain codes, which adopt a block chain technology, and an enterprise exclusive identity scanning code based on the enterprise chain codes, are used for enterprise legal person identity authentication and management in various occasions, and comprise the following steps: firstly, for a user with an enterprise chain code account generated by a set way, after the identity authentication is carried out through face recognition, a legal person verifies and logs in; and acquiring enterprise information, storing the data record on the alliance chain and checking the data record, and managing the identity information of the enterprise legal person on the alliance chain.

Description

Enterprise legal identity authentication management method and system based on enterprise chain code
Technical Field
The invention relates to the field of block chains, in particular to an enterprise legal identity authentication management method and system based on enterprise chain codes.
Background
Enterprise legal is a socio-economic organization that gains legal qualifications. The unit applying for the enterprise legal person to start the business registration is approved by the registration organ to register in the book, and the enterprise is established after receiving 'enterprise legal person business license', and the legal rights and interests of the enterprise are protected by the national laws after the enterprise acquires the qualification of the legal person. At present, the identity authentication of enterprise legal personnel of a network platform only depends on the identity authentication of enterprise legal personnel and only depends on the business license of the enterprise legal personnel and the credibility of the legal personnel is low, and the legal personnel is easy to forge and falsify. If the account needs to ensure the credibility of identity authentication of a legal person, shared verification and traceability are very complicated. The above problems may cause many difficulties in the identity authentication and management of trusted legal persons of an enterprise on a network platform.
Disclosure of Invention
The invention aims to overcome the defects and shortcomings of the prior art, and provides an enterprise legal identity authentication management method based on enterprise chain codes by using a block chain technology.
The invention also aims to provide an enterprise legal identity authentication management system based on the enterprise chain code.
The purpose of the invention is realized by the following technical scheme:
an enterprise legal identity authentication management method based on enterprise chain codes comprises the following steps:
s1, firstly, for an enterprise chain code account user for which the enterprise chain code is generated, verifying and logging in by a legal person after face recognition identity authentication is carried out;
and S2, acquiring enterprise information, storing the data records in a alliance chain and checking the data records, and managing the identity information of enterprise legal personnel by an individual on the alliance chain, wherein the identity information of enterprise legal personnel comprises business licenses, invoices, contracts and seals of enterprises.
In step S1, the enterprise chain code account includes a private key, a public key, and an address, the private key is generated by a random number, and then the public key and the address are generated based on a cryptographic algorithm, and the process is one-way irreversible; the private key is used for managing an enterprise chain code account; the public key is a supplement of the private key and is used for verifying the signature of the private key and is disclosed in the block chain whole network; the address is generated by the public key and is also an identification for interaction.
The address is generated by encrypting the public key hash by SHA256, RIPEMD160 and Base58 algorithms.
In step S1, the face recognition identity authentication specifically includes the following steps:
(1) image acquisition and detection: acquiring different face images through a camera lens; the face detection is used for preprocessing of face recognition, namely, the position and the size of a face are accurately calibrated in an image;
(2) image preprocessing:
the image preprocessing of the human face is based on the human face detection result, processes the image and finally serves the process of feature extraction; the preprocessing is to perform refinement processing on the shot image and divide the detected face into pictures with certain sizes, so that the face recognition and processing are facilitated;
(3) feature extraction:
the knowledge-based characterization method is mainly used for obtaining feature data which is helpful for face classification according to shape description of face organs and distance characteristics between the face organs, and feature components of the feature data generally comprise Euclidean distance, curvature, angle and the like between feature points. The human face is composed of parts such as eyes, nose, mouth, and chin, and geometric description of the parts and their structural relationship can be used as important features for recognizing the human face, and these features are called geometric features. The knowledge-based face characterization mainly comprises a geometric feature-based method and a template matching method.
(4) And (3) reducing the dimensionality:
dimension reduction is an important step in face recognition. Different feature expression methods and dimensions directly influence the recognition rate of face recognition, and generally, in the same feature expression mode, the recognition rate is higher when the dimension is higher. However, the dimension of the feature extraction directly affects the real-time performance of the face recognition system, and the higher the dimension is, the longer the recognition time is, and the lower the real-time performance is. The currently widely used dimensionality reduction algorithm includes a PCA algorithm and the like.
(5) And (3) feature matching:
and searching and matching the extracted feature data of the face image with a feature template stored in a database, and outputting a result obtained by matching when the similarity exceeds a threshold value by setting the threshold value. The face recognition is to compare the face features to be recognized with the obtained face feature template, and judge the identity information of the face according to the similarity degree. This process is divided into two categories: one is confirmation, which is a process of performing one-to-one image comparison, and the other is recognition, which is a process of performing one-to-many image matching comparison.
The mode features in the face image comprise histogram features, color features, template features, structural features and Haar features; the face detection is to pick out the used mode features and realize the face detection by using the features.
The preprocessing process comprises the steps of light compensation, gray level transformation, histogram equalization, normalization, geometric correction, filtering and sharpening of the face image.
In step S1, the legal verification login specifically includes:
after a user logs in through a set mode, opening an enterprise chain code and entering an enterprise chain code starting page, wherein the entering of the enterprise chain code is divided into three conditions of first login, second login and third login;
the first login: opening the enterprise chain code to enter a first login page, calling a rear-end interface by the front end to verify that the user is logged in for the first time, prompting the user to add a business license required to be downloaded by a business handling enterprise, and entering the chain code first page after successful downloading to be normally used;
and (3) secondary login: opening an enterprise chain code to enter a secondary login page, selecting two login modes by a user according to the condition of the user, and logging in a first mobile phone number verification code: jumping to a secondary login mobile phone login page, clicking the next step after a user inputs a mobile phone number, entering a mobile phone verification code authentication page, requesting a back-end short message interface to send a user mobile phone verification code by the front end, and entering a chain code first page for normal use after the user inputs the verification code and verifies successfully; the second type of face recognition login jumps to a secondary login face recognition page, after the face of a user is recognized, the front end requests the back end to judge a face recognition result, and after the face of the user is recognized successfully, the user is prompted to click a return ear good handling button to log in immediately and enter a chain code home page;
and (3) three times of login: if the browsing time of the chain code home page is expired, the user is prompted that the enterprise business license is expired, the user asks for re-authentication, the user clicks to go to the authentication and jumps to a re-authentication page, and after the user inputs a uniform code and a license password, the front end requests the rear end to judge the correctness and immediately return to the chain code home page for continuous use.
The total flow of the enterprise chain code login is divided into 5 steps: 1 real-name authentication- >2 (user service interface) ordinary user login, and real-name authentication information- >3 enterprise electronic business license login- >4 (enterprise service interface) enterprise information- >5 (user service interface) enterprise user login (legal person or office person).
The enterprise legal person identity authentication management method based on the enterprise chain code has the specific process that the front end bottom layer realizes login in detail as follows:
the user firstly enters an enterprise chain code page, an interface is called to obtain login user information, the login user information is inquired, the information is returned to judge whether the user information exists, and if not, the user jumps back to the login registration page to prompt the user to complete user registration first; if the user information exists, entering an enterprise chain code function display page; jumping to a login page by clicking any place, and performing an identity authentication link;
the identity authentication supports two modes of face recognition login and mobile phone number login to carry out identity authentication: if the face recognition login is selected, a face recognition WeChat small program is called, then face recognition operation is carried out, the recognition result is called back, and the recognition result is called back to the enterprise chain code to check whether the face recognition information is consistent with the user login information or not and whether the check is passed or not; if the mobile phone number is selected for login, the rear-end interface of the enterprise chain code is called to send a verification code short message and verification code verification, and whether the verification passes or not is judged;
if the verification fails, returning to the enterprise chain code function display page again, and performing identity authentication again: if the verification enters a common user login link, the front end of the enterprise chain code firstly calls a rear end interface of the enterprise chain code, the rear end inquires whether the user is registered or not in a database according to user information parameters transmitted by the front end, if the user is registered, the user directly logs in to generate an ecbcToken value, and then returns the ecbcToken value to the front end to judge whether the login is successful or not; if the user is not registered, the back end automatically registers the user, if the user is successfully registered, the user also logs in to generate an ecbcToken value, and then the ecbcToken value is returned to the front end to judge whether the user successfully logs in;
and if the front end of the enterprise chain code judges that the login is unsuccessful, returning to the enterprise chain code function display page again, and performing identity authentication again. If the login is judged to be successful, caching the current user information ecbcToken value;
and entering an enterprise user login link after caching, wherein the front end of the enterprise chain code provides login information for a rear-end enterprise user to inquire all enterprise information related to the user, and finally, a correct state code is returned to the front end to prompt the user to successfully log in.
The enterprise legal person identity authentication management method based on the enterprise chain code comprises the following steps of adding enterprises on the bottom layer of the front end:
prompting the user to associate the enterprise when the user is not associated with the enterprise in a login state; the front end calls the interface to obtain the electronic business license authentication token first, the back end obtains the electronic business license authentication token, the electronic business license generates the token value, the back end authentication token is called, the back end uses the authentication token to call the interface to obtain the authentication serial number, inquire the electronic business license authentication serial number, the back end calls the electronic business license interface, the back end calls the electronic business license Wechat applet, the electronic business license logs in, call back the enterprise data, the back end calls the interface to save the enterprise data, then the back end newly increases or updates the enterprise information association user-enterprise relationship: a clerk or legal; after the enterprise user logs in, the back end inquires all enterprise information related to the user, and finally the front end prompts the user that the enterprise is successfully added and transacted.
The enterprise legal person identity authentication management method based on the enterprise chain code comprises the following steps of:
inquiring the token value from the electronic business platform, judging whether the response of the inquired token value is abnormal, and if the access is abnormal, finishing the execution of the back-end program; if the token value response is not abnormal, continuously judging whether the state code is normal, and if the state code is abnormal, finishing the execution of the back-end program; if the status code is normal, returning the authToken value to the front end, and finishing the execution of the back end.
The enterprise legal person identity authentication management method based on the enterprise chain code comprises the following steps of:
the front end transmits the user login information to the back end, and the back end firstly queries the complete information of the user from the database according to the mobile phone number of the user. Then judging whether a user object returned by the database is empty, if not, indicating that the user object is registered, returning the user object to the front end to prompt the user, and asking for checking whether the user identity information is real; if the mobile phone number is judged to be null, the newly added user is executed, then whether the user changes the mobile phone number or not is judged, and if the user changes the mobile phone number, the mobile phone number is stored and the user information is modified; and creating a token to generate a token value, returning the token value to the front-end user id and the token value, and ending the back-end execution.
The enterprise legal person identity authentication management method based on the enterprise chain code comprises the following steps of:
the enterprise user logs in, firstly, the database is inquired about the cached user login information, whether the login information of the user is empty is judged, if the login information is empty, the registration and the real-name authentication are not carried out, a front-end abnormal state code is returned to prompt the user to request the real-name authentication login, and the execution of a back-end program is finished; if the login information of the user is not null, the database is queried that the enterprise information associated with the user comprises role information. Then, whether the user has the associated enterprise information or not is continuously judged, if the user does not have the associated enterprise information, the user id is returned, the enterprise id is defaulted, the associated enterprise list is sent to the front end, and the execution of the back end is finished; if the user has the associated enterprise information, caching the updated user login information; then, whether the user sets a default login enterprise or not is continuously judged, if the user sets the default login enterprise, the default enterprise id of the user id is directly returned, the enterprise list is associated to the front end, and the execution of the back-end program is finished; if the user does not set a default login enterprise, automatically setting the first default login enterprise as the default login enterprise by default, then returning the user id, the default enterprise id, the associated enterprise list, and ending the execution of the back-end program; after logging in, the enterprise information is obtained, and the data record is stored in the alliance chain for verification, so that the enterprise management by individuals is facilitated.
The other purpose of the invention is realized by the following technical scheme:
an enterprise legal identity authentication management system based on enterprise chain codes comprises an enterprise legal verification login module and an enterprise legal identity information management module; wherein the content of the first and second substances,
the enterprise legal person verifies a login module: for an enterprise chain code account user for generating an enterprise chain code, after face recognition identity authentication, a legal person verifies and logs in;
the enterprise legal identity information management module: the enterprise information is obtained, the data records are stored in the alliance chain and can be verified, and the management of the identity information of the enterprise legal person by an individual on the alliance chain can be realized, wherein the identity information of the enterprise legal person comprises a business license, an invoice, a contract and a seal of the enterprise.
Compared with the prior art, the invention has the following advantages and beneficial effects:
the invention can realize the intellectualization of the account, can program the account and can be combined with the contract to realize the application of more scenes. Distributed accounting is carried out, information cannot be tampered, the information is stored permanently, and traceability can be carried out retroactively. In addition, no specific object is provided for opening an account, and an individual, an organization and equipment can open an account of the individual, the organization and the equipment.
The value of the enterprise chain code account of the invention is as follows: first, account opening is more convenient. Opening an account on the block chain is completed only by generating a pair of public keys or private keys by using an asymmetric encryption algorithm without the permission of any person; and the bank counter is not required to provide personal data, and the bank counter is accepted for data examination.
Second, accounts are intelligent. The encrypted account system is actually a computer program, and is a string of codes, and the account can be programmed, so that the encrypted account system can be intelligentized and can be combined with an intelligent contract to realize more scene applications.
Third, the accounting method is personalized. The only right you have to hold the cryptocurrency is the private key, and there is no third party intermediary to help confirm the right to the digital currency, i.e. our property rights.
Fourth, the account issuer has no specific object. On the encryption account system, not only can an individual open an account, but also an organization can open an account, and in the future, devices such as trillion sensors on the Internet can open own accounts on the devices. This is a huge departure from bank accounts, which means that more accounts, transactions are done machine to machine, not human to human. The account on the blockchain is also established with the machine, and no permission is needed for opening the account.
And fifthly, distributed accounting. The existing system has confirmations of billing, but the blockchain does not. The block chain is formed by the common accounting of multiple parties and the common maintenance of an account book, so that the information is completely peer-to-peer transparent.
And sixthly, penetrating account management. Firstly, based on the enterprise chain code, a plurality of transactions can be billed on one account, and besides the fund flow, information flow, logistics and social relations, even information of a social network can be corresponded with the account. Therefore, the most original data and the most original information can be mastered and penetrated, and the most original data, the most original information and the most original information are not falsified, are permanently stored and can be traced. Secondly, by means of the consensus algorithm, transaction clearing and settlement are completed simultaneously. The existing accounting account system takes days as accounting units, but can realize second-level response based on a distributed accounting book.
Drawings
Fig. 1 is a flowchart of legal person verification login according to the present invention.
2-1, 2-2, 2-3 are flow charts of detailed implementation login of the front end bottom layer according to the present invention; wherein, A1-H1 are the connection points of the figures 2-1 and 2-2, A2-F2 are the connection points of the figures 2-2 and 2-3.
3-1, 3-2 are flow charts of detailed implementations of add-on enterprises of the front-end bottom layer of the present invention; wherein A3-F3 are the connection points of FIGS. 3-1 and 3-2.
Fig. 4 is a flowchart of the back-end bottom layer obtaining an authentication token according to the present invention.
Fig. 5 is a flowchart of the backend bottom layer normal user login according to the present invention.
FIG. 6 is a flowchart of a backend underlying enterprise user login described in the present invention.
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited thereto.
An enterprise legal identity authentication management method based on enterprise chain codes refers to an enterprise chain code account user which is generated in a system in a set mode, after the user login is authenticated through face recognition real name, a legal person verifies the login to obtain enterprise information, data records are stored in a alliance chain and can be verified, management of the enterprise by the individual on the alliance chain can be achieved, and offline business licenses, invoices, contracts and seals are converted into online digital assets which are just transparent and can be traced.
Enterprise chain code account: there are three major elements, namely a private key, a public key and an address. Their generation is generally a private key generated by a random number, followed by a public key and an address generated based on a cryptographic algorithm, and this process is one-way irreversible. Private key: just as bank accounts generally require a password to log in, the account of the blockchain is managed by means of the password, but the password, namely the 'private key', is more complicated. As is known, computers store data with 0 and 1, and private keys consist of 256-length 0 and 1. For the block chain private key, if the set of passwords needs to be cracked, even if computers all over the world are operated, the operation is less than one billion of the passwords, so that the block chain private key is safe enough. Public key: it is a complement to the private key to verify the "signature" of the private key and is exposed across the blockchain network. The whole process is simple, and as if you need to use your account asset, you need the "private key" to cover the action with the "signature", and at the same time, tell all the people the "public key" that can verify the signature pair is not correct, and then others can verify the action validity and source.
Address: the address is generated by the public key and is also the identification of the system for interaction. On one hand, since the public key is too long and is inconvenient to use in the transaction, the address can be generated by encrypting the public key hash by SHA256, RIPEMD160 and Base58 algorithms. On the other hand, for the transaction which is not sent, the public key of the address is not exposed, but the address is generated through a digest algorithm, and the true content of the public key is not exposed.
User login: the method comprises the steps that firstly, a login mode is selected through the ear office APP, and the ear office supports three login modes including mobile phone verification code login, WeChat binding login and face recognition login. Face recognition login mode is most advocated.
Face recognition is a biometric technology for identity recognition based on facial feature information of a person. A series of related technologies, also commonly called face recognition and face recognition, are used to collect images or video streams containing faces by using a camera or a video camera, automatically detect and track the faces in the images, and then perform face recognition on the detected faces.
Basic steps of face recognition
1. Image acquisition and detection
Different face images can be collected through the camera lens, and for example, static images, dynamic images, different positions, different expressions and the like can be well collected. When the user is in the shooting range of the acquisition equipment, the acquisition equipment can automatically search and shoot the face image of the user. The face collection is generally a plurality of face pictures of the same person, different expressions and different decorations can be provided, and the male can simultaneously collect images with and without a beard. The image acquisition can be acquired according to the difficulty of the test, and the more complex the background is, the greater the identification difficulty is.
In practice, face detection is mainly used for preprocessing of face recognition, namely, the position and size of a face are accurately calibrated in an image. The face image contains abundant pattern features, such as histogram features, color features, template features, structural features, Haar features, and the like. The face detection is to extract the useful information and to use the features to realize the face detection.
2. Image pre-processing
The image preprocessing for the human face is a process of processing the image based on the human face detection result and finally serving for feature extraction. The original image acquired by the system is limited by various conditions and random interference, so that the original image cannot be directly used, and the original image needs to be subjected to image preprocessing such as gray scale correction, noise filtering and the like in the early stage of image processing. For the face image, the preprocessing process mainly includes light compensation, gray level transformation, histogram equalization, normalization, geometric correction, filtering, sharpening, and the like of the face image. In brief, the shot image is subjected to refinement processing, and the detected face is divided into pictures with certain sizes, so that the face recognition and processing are facilitated.
3. Feature extraction
Features that can be used by a face recognition system are generally classified into visual features, pixel statistical features, face image transform coefficient features, face image algebraic features, and the like. The face feature extraction is performed on some features of the face. Face feature extraction, also known as face characterization, is a process of feature modeling for a face. The methods for extracting human face features are classified into two main categories: one is a knowledge-based characterization method; the other is a characterization method based on algebraic features or statistical learning. The knowledge-based characterization method mainly obtains feature data which is helpful for face classification according to shape description of face organs and distance characteristics between the face organs, and feature components of the feature data generally comprise Euclidean distance, curvature, angle and the like between feature points. The human face is composed of parts such as eyes, nose, mouth, and chin, and geometric description of the parts and their structural relationship can be used as important features for recognizing the human face, and these features are called geometric features. The knowledge-based face characterization mainly comprises a geometric feature-based method and a template matching method.
4. Reducing vitamin
Dimension reduction is an important step in face recognition. Different feature expression methods and dimensions directly influence the recognition rate of face recognition, and generally, in the same feature expression mode, the recognition rate is higher when the dimension is higher. However, the dimension of the feature extraction directly affects the real-time performance of the face recognition system, and the higher the dimension is, the longer the recognition time is, and the lower the real-time performance is. The currently widely used dimensionality reduction algorithm includes a PCA algorithm and the like.
5. Feature matching
And searching and matching the extracted feature data of the face image with a feature template stored in a database, and outputting a result obtained by matching when the similarity exceeds a threshold value by setting the threshold value. The face recognition is to compare the face features to be recognized with the obtained face feature template, and judge the identity information of the face according to the similarity degree. This process is divided into two categories: one is confirmation, which is a process of performing one-to-one image comparison, and the other is recognition, which is a process of performing one-to-many image matching comparison.
The face recognition is characterized by a multi-light-source face recognition technology based on active near-infrared images. The method can overcome the influence of light change, has excellent recognition performance, and has overall system performance exceeding that of three-dimensional image face recognition in the aspects of precision, stability and speed. The technology is rapidly developed in two or three years, and the face recognition technology gradually becomes practical.
The human face is inherent like other biological characteristics (fingerprints, irises and the like) of a human body, the uniqueness and the good characteristic that the human face is not easy to copy provide necessary premise for identity identification, and compared with other types of biological identification, the human face identification has the following characteristics:
optional characteristics: the user does not need to be specially matched with face acquisition equipment, and can almost acquire a face image in an unconscious state, and the sampling mode is not mandatory;
non-contact property: the user can obtain the face image without directly contacting with the equipment;
concurrency: the method can be used for sorting, judging and identifying a plurality of faces in an actual application scene;
in addition, the visual characteristics are also met: the characteristic of 'people can be identified by the appearance', and the characteristics of simple operation, visual result, good concealment and the like.
As shown in fig. 1, the specific operation login process is as follows:
the user must log in through the tassel, after the tassel successfully logs in, the enterprise chain code is opened to enter an enterprise chain code starting page, and entering the enterprise chain code is divided into three conditions of first logging, secondary logging and third logging.
The first login process comprises the following steps: opening the enterprise chain code to enter a first login page, calling a rear-end interface by the front end to verify that the user is logged in for the first time, prompting the user to add a business license required to be downloaded by a business handling enterprise, and entering the chain code first page after successful downloading to be normally used; and (3) secondary login process: opening enterprise chain code and entering a secondary login page, wherein a user can select two login modes according to own conditions, and a first mobile phone number verification code logs in: jumping to a secondary login mobile phone login page, clicking the next step after a user inputs a mobile phone number, entering a mobile phone verification code authentication page, requesting a back-end short message interface to send a user mobile phone verification code by the front end, and entering a chain code first page for normal use after the user inputs the verification code and verifies successfully; and a second type of face recognition login. Jumping to a secondary login face recognition page, after the face of the user is recognized, the front end requests the back end to judge a face recognition result, and after the face of the user is recognized successfully, the user is prompted to click a return ear good handling button to immediately login and enter a chain code home page; the flow of the third login: if the browsing time of the chain code home page is expired, the user is prompted that the enterprise business license is expired, the user asks for re-authentication, the user clicks to go to the authentication and jumps to a re-authentication page, and after the user inputs a uniform code and a license password, the front end requests the rear end to judge the correctness and immediately return to the chain code home page for continuous use.
The total flow of enterprise chain code login is divided into 5 steps: 1 real-name authentication- >2 (user service interface) ordinary user login, and real-name authentication information- >3 enterprise electronic business license login- >4 (enterprise service interface) enterprise information- >5 (user service interface) enterprise user login (legal person or office person).
As shown in fig. 2-1, 2-2, and 2-3, the detailed implementation of the login process at the front-end bottom layer is as follows:
the user firstly enters an enterprise chain code page, the interface is called to obtain the information of the login user, the information of the login user is inquired in the tassel office, the information is returned to judge whether the user information exists, and if not, the user is reminded to complete the registration of the tassel office user by jumping back to the tassel office login registration page. And if the user information exists, entering an enterprise chain code function display page. And jumping to a login page by clicking any place to carry out an identity authentication link.
The identity authentication supports two modes of identity authentication 1, face recognition login 2 and mobile phone number login (only the mobile phone number which is good for the login ears can be used). If the face recognition login is selected, jumping to the ear good to call a face recognition WeChat small program, then jumping to a Guangdong letter label to perform face recognition operation, returning to the ear good recognition result, and returning the recognition result to an enterprise chain code to verify whether the face recognition information is consistent with the user login information (the recognition information is not returned, the step is omitted, and the risk exists, namely the recognition and the login are not the same user), and whether the verification is passed; if the mobile phone number is selected for login, the enterprise chain code rear-end interface is called to send the verification code short message and the verification code for verification, and whether the verification is passed or not is judged.
And if the verification fails, returning to the enterprise chain code function display page again, and performing identity authentication again. And if the verification is passed, entering a common user login link. The front end of the enterprise chain code calls the rear end interface of the enterprise chain code, the rear end inquires whether the condition that the user is registered exists in a database according to the user information parameters transmitted by the front end, if the user is registered, the user directly logs in to generate an ecbcToken value, and then the ecbcToken value is returned to the front end to judge whether the login is successful; if the user is not registered, the back end automatically registers the user, if the registration is successful, the back end also registers to generate an ecbcToken value, and then the ecbcToken value is returned to the front end to judge whether the registration is successful.
And if the front end of the enterprise chain code judges that the login is unsuccessful, returning to the enterprise chain code function display page again, and performing identity authentication again. If the login is judged to be successful, the current user information ecbcToken value is cached.
And entering an enterprise user login link after caching, wherein the front end of the enterprise chain code provides login information for a rear-end enterprise user to inquire all enterprise information related to the user, and finally, a correct state code is returned to the front end to prompt the user to successfully log in.
As shown in fig. 3-1 and 3-2, the flow of adding the enterprise is realized in detail at the front-end bottom layer as follows:
and prompting the user to associate the enterprise when the user is not associated with the enterprise in the login state. The front end calls an interface to obtain an electronic business license authentication token, the back end obtains the electronic business license authentication token, the electronic business license generates a token value, the back end authenticates the token, the back end uses the authentication token to call the interface to obtain an authentication serial number, the ear is good to inquire the electronic business license authentication serial number, the back end calls an electronic business license interface, the back end calls an electronic business license micro-messenger applet, the electronic business license performs login operation, the ear is good to do enterprise data, the back end calls the interface to store the enterprise data, and then the back end newly increases or updates the enterprise information association user-enterprise relationship: clerks or legal persons. After the enterprise user logs in, the back end inquires all enterprise information related to the user, and finally the front end prompts the user that the enterprise is successfully added and transacted.
As shown in fig. 4, the process of acquiring the authentication token by the back-end bottom layer is as follows:
inquiring the token value from the electronic business platform, judging whether the response of the inquired token value is abnormal, and if the access is abnormal, finishing the execution of the back-end program; if the token value response is not abnormal, continuously judging whether the state code is normal, and if the state code is abnormal, finishing the execution of the back-end program; if the status code is normal, returning the authToken value to the front end, and finishing the execution of the back end.
As shown in fig. 5, the process of logging in by the back-end bottom-layer general user is as follows:
the front end transmits the user login information to the back end, and the back end firstly queries the complete information of the user from the database according to the mobile phone number of the user. Then judging whether a user object returned by the database is empty, if not, indicating that the user object is registered, returning the user object to the front end to prompt the user, and asking for checking whether the user identity information is real; if the mobile phone number is judged to be null, the new user is executed if the mobile phone number is not registered, then whether the user changes the mobile phone number or not is judged, and if the user changes the mobile phone number, the mobile phone number is stored and the user information is modified. And creating a token to generate a token value, returning the token value to the front-end user id and the token value, and ending the back-end execution.
Referring to fig. 6, the back-end bottom enterprise user login process is as follows:
the enterprise user logs in, firstly, the database is inquired about the cached user login information, whether the login information of the user is empty is judged, if the login information is empty, the registration and the real-name authentication are not carried out, a front-end abnormal state code is returned to prompt the user to request the real-name authentication login, and the execution of a back-end program is finished; if the login information of the user is not null, the database is queried that the enterprise information associated with the user comprises role information. Then, whether the user has the associated enterprise information or not is continuously judged, if the user does not have the associated enterprise information, the user id is returned, the enterprise id is defaulted, the associated enterprise list is sent to the front end, and the execution of the back end is finished; and if the user has the associated enterprise information, updating the user login information cache. Then, whether the user sets a default login enterprise or not is continuously judged, if the user sets the default login enterprise, the default enterprise id of the user id is directly returned, the enterprise list is associated to the front end, and the execution of the back-end program is finished; and if the user does not set the default login enterprise, automatically setting the first default login enterprise as the default, then returning the user id, the default enterprise id, the associated enterprise list and ending the execution of the back-end program.
After logging in, the enterprise information is obtained, and the data record is stored in the alliance chain for verification, so that the enterprise management by individuals is facilitated.
Characteristics of federation chains
1. Partial decentralization is different from public chains, which to some extent are owned only by members within a federation, and consensus is easily reached because, after all, the number of nodes in a federation chain is very limited.
2. The public chain with higher controllability cannot be tampered once the block chain is formed, which mainly comes from the fact that the nodes of the public chain are generally massive, for example, bit currency nodes are too many, block data is about to be tampered with and almost impossible, and the block data can be changed in a federation chain as long as most of all organizations reach consensus;
3. the data will not be disclosed by default differently than the public chain, and the data of the federation chain is limited to only enterprises in the federation and users thereof having permission to access.
4. The transaction speed is very fast as that of the private chain, and the alliance chain is essentially the private chain, so that due to the fact that the number of nodes is small, consensus is easy to achieve, and the transaction speed is naturally very fast.
The management of an enterprise by an individual is realized on a alliance chain, and an offline business license, an invoice, a contract, a seal are converted into an online digital asset, such as an electronic business license.
Electronic business license: the electronic business license is a legal electronic certificate which is issued by a market regulatory department according to related national laws and regulations and unified standard specifications and carries registration information of market main bodies. The electronic business license has the same legal effectiveness as the paper business license, and is a legal certificate for the market subject to obtain the principal qualification. After the market subject establishes registration, an electronic business license is generated immediately and stored in an electronic business license library. The electronic business license is picked up, downloaded and used by an intelligent mobile terminal loaded with an electronic business license application program such as a mobile phone.
The main purposes of the electronic business license are as follows:
identity authentication
The electronic business license system is a nationwide uniform market subject identity verification system, supports nationwide universal verification and identification, and has the characteristics of anti-counterfeiting, anti-tampering and anti-repudiation.
The electronic business license takes the national market supervision and management bureau as a uniform trust source point, records the identity information of the market subject, and can prove the legal compliance of the enterprise identity.
Contrast holder
The downloading and using of the electronic business license adopt a real identity information registration system, and the market main body is responsible for the legality, authenticity, rationality and the like of the management and authorized personnel using behaviors.
The social public, the related units and the institutions use the electronic business license application program or access the electronic business license system, can perform real-time networking verification on the authenticity of the electronic business license of the market main body, inquire the identity information and the state of the market main body, and can synchronously compare and check the related information of the electronic business license holder.
Electronic signature
The market subject can carry out electronic signature on the data message by using the electronic business license, and the electronic signature conforms to the thirteenth regulation condition of electronic signature law, and has the same legal effectiveness as the handwritten signature or the seal.
Benefits of handling electronic business licenses: and issuing electronic business licenses carrying the identity information of market subjects for all enterprises. The electronic business license is a legal electronic certificate issued according to national laws and regulations and national uniform standards, and has the same legal effectiveness as a paper business license. The electronic business license adopts the cryptographic technology, takes the national market supervision and administration bureau as a national uniform trust source point, and provides safety guarantee in the aspects of identity authentication, anti-counterfeiting, electronic signature and the like.
Enterprises can download and use the information at any time according to needs, and various downloading ways such as WeChat, Paibao and the like are supported. The electronic business license can be used for the identity recognition of market main bodies, and enterprises can handle related businesses by holding the electronic business license without providing a paper business license. The social cognition degree of the unified social credit code is gradually improved, and the market main body 'walks all the day according to one code' is really realized.
The enterprise chain code generation and management method comprises the following steps:
s1, after the code scanning user requests to scan the enterprise chain code, the enterprise chain code user presents the enterprise chain code to the code scanning user, the front end of the enterprise chain code requests the generation parameter of the enterprise chain code to the rear end, the rear end queries the corresponding public key information of the block chain according to the account address of the enterprise chain code user, updates time through a private key pair, and then digitally signs through the public key, the rear end of the enterprise chain code takes the module identification + UUID as a key value, and takes the public key, the update time and the digital signature as a value to be stored in a redis database, and simultaneously returns the key value to the front end of the enterprise chain code to be used as the generation parameter of the enterprise chain code, and the front end of the enterprise chain code splices and links according to the parameter returned by the rear end of the enterprise chain code to generate the enterprise chain code;
s2, after the code scanning user scans the enterprise chain code, the front end of the enterprise chain code requests a code scanning result to the rear end of the enterprise chain code, the rear end of the enterprise chain code inquires in a redis database according to parameters, a corresponding public key is returned, time and a digital signature are updated and returned to the front end of the enterprise chain code, the front end of the enterprise chain code re-splices a new link according to the returned data and requests the rear end of the enterprise chain code, the rear end of the enterprise chain code verifies whether the digital signature is tampered with a block chain according to the request parameters, if the verification is passed, the code scanning result of the enterprise chain code is returned, the code scanning result comprises an enterprise name card, and the front end of the enterprise chain code displays relevant enterprise information to the code scanning user.
The enterprise link code adopts a double-layer design, and comprises a code scanning layer and a translation layer; the code scanning layer is used for the same generation and analysis process as the common two-dimensional code, and the translation layer is used for carrying out a further encryption and decryption process on the two-dimensional code in the analysis process of the two-dimensional code; and when the code scanning is successful, the Key is used as a translation Key of the translation layer to obtain the final translation result.
The method comprises the steps that the generation and scanning of the common two-dimensional code are finished in one step, namely, a user can obtain a code scanning result after the code scanning is successful, and the enterprise chain code is added with one step on the basis of the original two-dimensional code; and the generation of enterprise chain code and sweep the sign indicating number all have certain difference with ordinary two-dimensional code.
The key value is set to be Token, when the Token is designed, the Token is stored in a redis database, the Token is used as the key, the actually translated address is stored in the redis database as the value, and when the Token is stored in the redis database as the key, the item prefix is added to prevent the key repetition of different items. The mode that the Token comes out from the code scanning layer and the Token serves as the unique identifier generated by the enterprise link code can ensure timeliness and can fail after a specified time, and meanwhile, the unique Token is ensured to be unique in the whole system and cannot be repeated with the tokens of other modules. Token serves as a key parameter for connecting the code scanning layer and the translation layer.
The timeliness of the enterprise chain code is divided into three stages: a code display stage, a code scanning stage and an execution stage; in the validity period of the code display stage, a client scans codes for obtaining results for unlimited times, and the client automatically updates tokens after the validity period so as to generate a new enterprise chain code; in the validity period of the code scanning stage, a client can scan the code only once to obtain a result, the token is invalidated, the result of scanning the code again is that the code scanning fails, and the token is overdue; in the execution phase, the result is executed after code scanning, namely the business card page displaying the business chain code, and in the execution phase, only the publicable content is displayed. The disclosure includes a business license, business information, and no display of the linked digital assets.
When the enterprise chain code is scanned by a special tool, the parameters of a tool user can be supplemented, and the permission of a code scanner for checking data is conveniently controlled; when a special enterprise chain code scanning tool is used for scanning codes, the user identification of a code scanner and the account address of a user are added, namely two more parameters are added in the code scanning process, and the two more parameters are only used as the record of the code scanner and do not participate in a translation layer.
The generation rule of the enterprise chain code adopts a generation mode of website, route and token. The method can improve the code scanning effect and reduce the content data volume of the enterprise chain code.
After the code scanning user scans the enterprise chain code, the public key, the updating time and the signature data signed by the ED25519 algorithm of the code scanned user can be obtained through the token. The ED25519 algorithm is used as a signature encryption algorithm of a block chain, the signature and verification performance is extremely high, the safety is extremely high, the signature data are small, the ED25519 algorithm is very suitable for being used as a signature verification algorithm of a two-dimensional code, and after a user scans the code, the user can enter a page of an enterprise business card after the rear end confirms that the signature data are correct, and credible information of the enterprise is displayed.
The BCS is a block chain service system, realizes the intermediate service of the butt joint of the upper layer application and the block chain, reduces the complex service reading of the access block chain, reduces the development difficulty and cost of the block chain access, and enriches the block chain information query.
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.

Claims (10)

1. An enterprise legal identity authentication management method based on enterprise chain codes is characterized by comprising the following steps:
s1, firstly, for a user with an enterprise chain code account generated by set, after the identity authentication is carried out through face recognition, a legal person verifies and logs in;
and S2, acquiring the enterprise information, storing the data record on the alliance chain and checking the data record, and managing the identity information of the enterprise legal person on the alliance chain.
2. The method for identity authentication management of enterprise legal based on enterprise chain code as claimed in claim 1, wherein in step S1, the account of enterprise chain code comprises private key, public key, address, the private key is generated by random number, then the public key and address are generated based on cryptographic algorithm, and this process is one-way irreversible; the private key is used for managing an enterprise chain code account; the public key is a supplement of the private key and is used for verifying the signature of the private key and is disclosed in the block chain whole network; the address is generated by the public key and is also an identification for interaction.
3. The method for managing the identity authentication of the enterprise legal based on the enterprise chain code as claimed in claim 2, wherein the address is generated by performing SHA256, RIPEMD160 and Base58 algorithm encryption on public key hash.
4. The method for managing identity authentication of enterprise legal persons based on enterprise chain codes as claimed in claim 1, wherein in step S1, the legal person verifies login, specifically:
after a user logs in through a set mode, opening an enterprise chain code and entering an enterprise chain code starting page, wherein the entering of the enterprise chain code is divided into three conditions of first login, second login and third login;
the first login: opening the enterprise chain code to enter a first login page, calling a rear-end interface by the front end to verify that the user is logged in for the first time, prompting the user to add a business license required to be downloaded by a business handling enterprise, and entering the chain code first page after successful downloading to be normally used;
and (3) secondary login: opening an enterprise chain code to enter a secondary login page, selecting two login modes by a user according to the condition of the user, and logging in a first mobile phone number verification code: jumping to a secondary login mobile phone login page, clicking the next step after a user inputs a mobile phone number, entering a mobile phone verification code authentication page, requesting a back-end short message interface to send a user mobile phone verification code by the front end, and entering a chain code first page for normal use after the user inputs the verification code and verifies successfully; the second type of face recognition login jumps to a secondary login face recognition page, after the face of a user is recognized, the front end requests the back end to judge a face recognition result, and after the face of the user is recognized successfully, the user is prompted to click a return ear good handling button to log in immediately and enter a chain code home page;
and (3) three times of login: if the browsing time of the chain code home page is expired, the user is prompted that the enterprise business license is expired, the user asks for re-authentication, the user clicks to go to the authentication and jumps to a re-authentication page, and after the user inputs a uniform code and a license password, the front end requests the rear end to judge the correctness and immediately return to the chain code home page for continuous use.
5. The enterprise legal person identity authentication management method based on the enterprise chain code as claimed in claim 1, wherein the specific process of the front end bottom layer detailed login implementation is as follows:
the user firstly enters an enterprise chain code page, an interface is called to obtain login user information, the login user information is inquired, the information is returned to judge whether the user information exists, and if not, the user jumps back to the login registration page to prompt the user to complete user registration first; if the user information exists, entering an enterprise chain code function display page; jumping to a login page by clicking any place, and performing an identity authentication link;
the identity authentication supports two modes of face recognition login and mobile phone number login to carry out identity authentication: if the face recognition login is selected, a face recognition WeChat small program is called, then face recognition operation is carried out, the recognition result is called back, and the recognition result is called back to the enterprise chain code to check whether the face recognition information is consistent with the user login information or not and whether the check is passed or not; if the mobile phone number is selected for login, the rear-end interface of the enterprise chain code is called to send a verification code short message and verification code verification, and whether the verification passes or not is judged;
if the verification fails, returning to the enterprise chain code function display page again, and performing identity authentication again: if the verification enters a common user login link, the front end of the enterprise chain code firstly calls a rear end interface of the enterprise chain code, the rear end inquires whether the user is registered or not in a database according to user information parameters transmitted by the front end, if the user is registered, the user directly logs in to generate an ecbcToken value, and then returns the ecbcToken value to the front end to judge whether the login is successful or not; if the user is not registered, the back end automatically registers the user, if the user is successfully registered, the user also logs in to generate an ecbcToken value, and then the ecbcToken value is returned to the front end to judge whether the user successfully logs in;
if the front end of the enterprise chain code judges that the login is unsuccessful, returning to the function display page of the enterprise chain code again, and performing identity authentication again; if the login is judged to be successful, caching the current user information ecbcToken value;
and entering an enterprise user login link after caching, wherein the front end of the enterprise chain code provides login information for a rear-end enterprise user to inquire all enterprise information related to the user, and finally, a correct state code is returned to the front end to prompt the user to successfully log in.
6. The enterprise legal person identity authentication management method based on the enterprise chain code as claimed in claim 1, wherein the adding of the enterprise at the front end bottom layer comprises the following steps:
prompting the user to associate the enterprise when the user is not associated with the enterprise in a login state; the front end calls the interface to obtain the electronic business license authentication token first, the back end obtains the electronic business license authentication token, the electronic business license generates the token value, the back end authentication token is called, the back end uses the authentication token to call the interface to obtain the authentication serial number, inquire the electronic business license authentication serial number, the back end calls the electronic business license interface, the back end calls the electronic business license Wechat applet, the electronic business license logs in, call back the enterprise data, the back end calls the interface to save the enterprise data, then the back end newly increases or updates the enterprise information association user-enterprise relationship: a clerk or legal; after the enterprise user logs in, the back end inquires all enterprise information related to the user, and finally the front end prompts the user that the enterprise is successfully added and transacted.
7. The enterprise legal identity authentication management method based on the enterprise chain code as claimed in claim 1, wherein the step of obtaining the authentication token by the back-end bottom layer comprises the following steps:
inquiring the token value from the electronic business platform, judging whether the response of the inquired token value is abnormal, and if the access is abnormal, finishing the execution of the back-end program; if the token value response is not abnormal, continuously judging whether the state code is normal, and if the state code is abnormal, finishing the execution of the back-end program; if the status code is normal, returning the authToken value to the front end, and finishing the execution of the back end.
8. The enterprise legal person identity authentication management method based on the enterprise chain code as claimed in claim 1, wherein the backend bottom layer common user login comprises the following steps:
the front end transmits the user login information to the back end, and the back end firstly queries the complete information of the user from a database according to the mobile phone number of the user; then judging whether a user object returned by the database is empty, if not, indicating that the user object is registered, returning the user object to the front end to prompt the user, and asking for checking whether the user identity information is real; if the mobile phone number is judged to be null, the newly added user is executed, then whether the user changes the mobile phone number or not is judged, and if the user changes the mobile phone number, the mobile phone number is stored and the user information is modified; and creating a token to generate a token value, returning the token value to the front-end user id and the token value, and ending the back-end execution.
9. The enterprise chain code-based enterprise legal identity authentication management method according to claim 1, wherein the backend bottom-layer enterprise user login comprises the following steps:
the enterprise user logs in, firstly, the database is inquired about the cached user login information, whether the login information of the user is empty is judged, if the login information is empty, the registration and the real-name authentication are not carried out, a front-end abnormal state code is returned to prompt the user to request the real-name authentication login, and the execution of a back-end program is finished; if the login information of the user is not null, inquiring the enterprise information related to the user by the database, wherein the enterprise information comprises role information; then, whether the user has the associated enterprise information or not is continuously judged, if the user does not have the associated enterprise information, the user id is returned, the enterprise id is defaulted, the associated enterprise list is sent to the front end, and the execution of the back end is finished; if the user has the associated enterprise information, caching the updated user login information; then, whether the user sets a default login enterprise or not is continuously judged, if the user sets the default login enterprise, the default enterprise id of the user id is directly returned, the enterprise list is associated to the front end, and the execution of the back-end program is finished; if the user does not set a default login enterprise, automatically setting the first default login enterprise as the default login enterprise by default, then returning the user id, the default enterprise id, the associated enterprise list, and ending the execution of the back-end program; after logging in, the enterprise information is obtained, and the data record is stored in the alliance chain for verification, so that the enterprise management by individuals is facilitated.
10. An enterprise chain code-based enterprise legal identity authentication management system for implementing the enterprise chain code-based enterprise legal identity authentication management method of any one of claims 1 to 9, characterized in that: the system comprises an enterprise legal person verification login module and an enterprise legal person identity information management module; wherein the content of the first and second substances,
the enterprise legal person verifies a login module: for an enterprise chain code account user for generating an enterprise chain code, after face recognition identity authentication, a legal person verifies and logs in;
the enterprise legal identity information management module: the enterprise information is obtained, the data records are stored in the alliance chain and can be verified, and the management of the identity information of the enterprise legal person by an individual on the alliance chain can be realized, wherein the identity information of the enterprise legal person comprises a business license, an invoice, a contract and a seal of the enterprise.
CN202110313814.0A 2021-03-24 2021-03-24 Enterprise legal identity authentication management method and system based on enterprise chain code Active CN113111330B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110313814.0A CN113111330B (en) 2021-03-24 2021-03-24 Enterprise legal identity authentication management method and system based on enterprise chain code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110313814.0A CN113111330B (en) 2021-03-24 2021-03-24 Enterprise legal identity authentication management method and system based on enterprise chain code

Publications (2)

Publication Number Publication Date
CN113111330A true CN113111330A (en) 2021-07-13
CN113111330B CN113111330B (en) 2022-06-03

Family

ID=76711024

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110313814.0A Active CN113111330B (en) 2021-03-24 2021-03-24 Enterprise legal identity authentication management method and system based on enterprise chain code

Country Status (1)

Country Link
CN (1) CN113111330B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113704734A (en) * 2021-07-14 2021-11-26 杭州溪塔科技有限公司 Distributed digital identity-based method for realizing certificate verification and related device
CN114862428A (en) * 2022-07-07 2022-08-05 天津金城银行股份有限公司 Inline enterprise authentication method, terminal device and computer-readable storage medium
CN114978783A (en) * 2022-08-02 2022-08-30 暗链科技(深圳)有限公司 Zero-knowledge identity authentication method, authentication client, user client and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108173850A (en) * 2017-12-28 2018-06-15 杭州趣链科技有限公司 A kind of identity authorization system and identity identifying method based on block chain intelligence contract
CN108989346A (en) * 2018-08-30 2018-12-11 上海同态信息科技有限责任公司 The effective identity trustship agility of third party based on account concealment authenticates access module
CN110336797A (en) * 2019-06-18 2019-10-15 阿里巴巴集团控股有限公司 Corporate authentication, certification retroactive method, device and equipment based on block chain
CN111027035A (en) * 2019-11-06 2020-04-17 香农数据有限公司 Multi-identity authentication method and system based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108173850A (en) * 2017-12-28 2018-06-15 杭州趣链科技有限公司 A kind of identity authorization system and identity identifying method based on block chain intelligence contract
CN108989346A (en) * 2018-08-30 2018-12-11 上海同态信息科技有限责任公司 The effective identity trustship agility of third party based on account concealment authenticates access module
CN110336797A (en) * 2019-06-18 2019-10-15 阿里巴巴集团控股有限公司 Corporate authentication, certification retroactive method, device and equipment based on block chain
CN112383519A (en) * 2019-06-18 2021-02-19 创新先进技术有限公司 Enterprise authentication and authentication tracing method, device and equipment based on block chain
CN111027035A (en) * 2019-11-06 2020-04-17 香农数据有限公司 Multi-identity authentication method and system based on block chain

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113704734A (en) * 2021-07-14 2021-11-26 杭州溪塔科技有限公司 Distributed digital identity-based method for realizing certificate verification and related device
CN114862428A (en) * 2022-07-07 2022-08-05 天津金城银行股份有限公司 Inline enterprise authentication method, terminal device and computer-readable storage medium
CN114862428B (en) * 2022-07-07 2022-12-16 天津金城银行股份有限公司 Inline enterprise authentication method, terminal device and computer-readable storage medium
CN114978783A (en) * 2022-08-02 2022-08-30 暗链科技(深圳)有限公司 Zero-knowledge identity authentication method, authentication client, user client and system

Also Published As

Publication number Publication date
CN113111330B (en) 2022-06-03

Similar Documents

Publication Publication Date Title
CN110741369B (en) Secure biometric authentication using electronic identity
US11240234B2 (en) Methods and systems for providing online verification and security
CN113111330B (en) Enterprise legal identity authentication management method and system based on enterprise chain code
CN101523444B (en) System and method for traceless biometric identification
US10789346B2 (en) Online identity scoring
US20190287116A1 (en) Identifying an entity
US20140279516A1 (en) Authenticating a physical device
US20100174914A1 (en) System and method for traceless biometric identification with user selection
US20120086785A1 (en) Apparatus for identifying protecting, requesting, assisting and managing information
CN107025397B (en) Identity information acquisition method and device
SA110310576B1 (en) Device, System, and Method for Registering and Authetnticating Handwritten ‎Signatures and Archiving Handwritten Information
US20230134651A1 (en) Synchronized Identity, Document, and Transaction Management
CN108140152A (en) Computer implemented tracking mechanism and data management
KR20190038938A (en) SYSTEM, METHOD, AND SERVER COMPUTER SYSTEM FOR IMPLEMENTING CONVERTING ONE entity in a heterogeneous communication network environment to a verifiably authenticated entity
US20210351927A1 (en) System, method and computer program product for mitigating customer onboarding risk
US20230177508A1 (en) Contactless Biometric Authentication Systems and Methods Thereof
CN113128950A (en) Enterprise chain code service platform
Priya et al. A novel algorithm for secure Internet Banking with finger print recognition
CA3121338A1 (en) System and method for identity creation and assertion
US11756147B1 (en) Systems and methods for verifying the authenticity of documents
WO2010140191A1 (en) Information communication network
Lott Biometrics: modernising customer authentication for financial services and payments
Ranyali Conceptual Framework for Multi-Factor Authentication for Mobile Money Systems in Lesotho
KR20170118382A (en) System and method for electronically managing certificate of real name confirmation
Sanh et al. Effective know-your-customer method for secure and trustworthy non-fungible tokens in media assets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant