CN113378240B - Synchronous calling user identity authentication method based on block chain - Google Patents

Synchronous calling user identity authentication method based on block chain Download PDF

Info

Publication number
CN113378240B
CN113378240B CN202110696725.9A CN202110696725A CN113378240B CN 113378240 B CN113378240 B CN 113378240B CN 202110696725 A CN202110696725 A CN 202110696725A CN 113378240 B CN113378240 B CN 113378240B
Authority
CN
China
Prior art keywords
user
intelligent contract
digital signature
identity authentication
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110696725.9A
Other languages
Chinese (zh)
Other versions
CN113378240A (en
Inventor
王伟兵
张晖
宋明明
杨海勇
李翔
孟奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Cloud Information Technology Co Ltd
Original Assignee
Inspur Cloud Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Cloud Information Technology Co Ltd filed Critical Inspur Cloud Information Technology Co Ltd
Priority to CN202110696725.9A priority Critical patent/CN113378240B/en
Publication of CN113378240A publication Critical patent/CN113378240A/en
Application granted granted Critical
Publication of CN113378240B publication Critical patent/CN113378240B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a synchronous calling user identity authentication method based on a block chain, relating to the field of security authentication; the method comprises the steps of registering a user registration intelligent contract based on a block chain through a user side, carrying out digital signature through the user side according to a verifiable random number generated by the block chain, calling a user authentication intelligent contract through an identity authentication server side according to the user authentication intelligent contract generated by the block chain to verify the validity of the digital signature and whether the user exists in the user registration intelligent contract or not, and obtaining a verification result through the identity authentication server side.

Description

Synchronous calling user identity authentication method based on block chain
Technical Field
The invention discloses a method, relates to the field of security authentication, and particularly relates to a method for synchronously calling user identity authentication based on a block chain.
Background
In the prior art, a user login authentication method of a block chain utilizes a block chain intelligent contract and an intelligent contract event mechanism to realize non-interactive enhanced authentication based on the block chain. However, this method relies on an event message subscription mechanism of the blockchain, that is, the event notification can be sent only after the blockchain transaction is confirmed, so that the response time of the authentication system is longer than that of the traditional "user + password" method, the authentication delay time is long, and the system architecture is also relatively complex.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a synchronous calling user identity authentication method based on a block chain, which has the characteristics of strong universality, simple and convenient implementation and the like, and has wide application prospect.
The specific scheme provided by the invention is as follows:
a synchronous calling user identity authentication method based on block chain registers user registration intelligent contract based on block chain through user terminal,
according to the verifiable random number, the digital signature is carried out by the user terminal,
according to the user authentication intelligent contract of the block chain, the user authentication intelligent contract is called by the identity authentication service end to verify the validity of the digital signature and whether the user is in the user registration intelligent contract or not,
and obtaining a verification result through the identity authentication server.
Further, in the block chain-based synchronous calling user identity authentication method, a user registered in the user registration intelligent contract is added into a white list through the block chain, and the digital signature of the user is verified by the user authentication intelligent contract by using a public key in the white list.
Further, in the block chain-based synchronous call user identity authentication method, a verifiable random number is generated by a user side, wherein the verifiable random number V = HASH (timestamp T, user public key).
Further, in the block chain-based synchronous calling user identity authentication method, digital signature is performed through a user side, wherein the digital signature S = SIG (V, user private key), and SIG () represents a digital signature algorithm.
Further, in the synchronous calling user identity authentication method based on the block chain, the identity authentication server side calls the user authentication intelligent contract by using the verifiable random number V, the timestamp T and the digital signature S as parameters, and the validity of the digital signature and the verification whether the user exists in the user registration intelligent contract are carried out.
Further, the synchronous calling user identity authentication method based on the block chain calls a user authentication intelligent contract: judging whether the user public key exists in a white list, judging whether the digital signature of the verifiable random number is effective, judging whether the time stamp in the verifiable random number is overtime, if the user public key exists in the white list, the digital signature is effective, and the time stamp is not overtime, the verification is passed, otherwise, the verification fails.
A synchronous calling user identity authentication system based on block chain, a user terminal interaction module and an identity authentication server terminal interaction module,
the user terminal interaction module registers the user registration intelligent contract based on the block chain according to the user terminal indication, generates a digital signature of the user terminal according to the verifiable random number,
according to the user authentication intelligent contract of the block chain, the identity authentication service terminal interaction module calls the user authentication intelligent contract according to the indication of the identity authentication service terminal, verifies the validity of the digital signature and whether the user exists in the user registration intelligent contract or not, and returns the verification result to the identity authentication service terminal.
A synchronous calling user identity authentication device based on a block chain comprises: at least one memory and at least one processor;
the at least one memory to store a machine readable program;
the at least one processor is configured to invoke the machine readable program to execute the block chain-based synchronous invocation user identity authentication method.
The invention has the advantages that:
the invention provides a synchronous calling user identity authentication method based on a block chain, which can verify a random number through a user side to carry out digital signature, register a user to register an intelligent contract based on the block chain, verify the validity of the digital signature and whether the user exists in the user registered intelligent contract through calling the user authentication intelligent contract through an identity authentication service end, and obtain a verification result through the identity authentication service end, namely, when the identity authentication service end calls the intelligent contract to check the validity of the digital signature and whether the user exists in the user registered intelligent contract, the verification result of the block chain transaction is not waited, but the verification result of the rule of the intelligent contract is directly adopted, so that asynchronous calling is changed into synchronous calling, delay is reduced, and implementation complexity is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic diagram of the process of the present invention.
Detailed Description
The present invention is further described below in conjunction with the following figures and specific examples so that those skilled in the art may better understand the present invention and practice it, but the examples are not intended to limit the present invention.
The invention provides a synchronous calling user identity authentication method based on a block chain, which registers a user registration intelligent contract based on the block chain through a user side,
according to the verifiable random number, the digital signature is carried out by the user terminal,
according to the user authentication intelligent contract of the block chain, the user authentication intelligent contract is called by the identity authentication service end to verify the validity of the digital signature and whether the user exists in the user registration intelligent contract or not,
and obtaining a verification result through the identity authentication server.
The method of the invention can verify the random number to carry out digital signature through the user side, registers the user to register the intelligent contract based on the block chain, calls the user authentication intelligent contract through the identity authentication service side to verify the validity of the digital signature and whether the user exists in the user registration intelligent contract, and obtains the verification result through the identity authentication service side, namely, calls the intelligent contract through the identity authentication service side to check the validity of the digital signature and whether the user exists in the user registration intelligent contract, and does not wait for the confirmation of the block chain transaction, but directly adopts the verification result of the intelligent contract to the rule, so that the asynchronous call is changed into synchronous call, the delay is reduced, and the realization complexity is reduced.
In specific application, in some embodiments of the method, the method takes the example that the user side APP synchronously calls the identity authentication server side to prove the self identity and obtain the access token, the identity authentication server directly calls an intelligent contract to verify whether the digital signature of the user side is valid or not and whether the user identity is valid or not, global sharing and unified identity authentication of the user identity are realized by using a block chain, and meanwhile, low-delay authentication response and a light user authentication framework are realized. The specific process is as follows:
step 1: and the user registration intelligent contract registered to the block chain through the user side is added to the white list on the chain. The user registers the self public key to the user registration intelligent contract, and the public key in the white list is used for verifying the digital signature of the user when the user identity is verified by using the user authentication intelligent contract subsequently.
And 2, step: the verifiable random number is generated by the user side to replace a verifier in an interactive verification mode, such as the random number generated by an identity authentication server, and the verifiable random number is used for carrying out digital signature and is sent to the verifier, namely the verifiable random number is used for applying for an access token. Where verifiable random number V = HASH (timestamp T, user public key); v is digitally signed by the user terminal, digital signature S = SIG (V, user private key), function SIG () represents a digital signature algorithm, such as SM2.
And step 3: and calling a user authentication intelligent contract through the identity authentication server to verify the identity of the user. The intelligent contract for user authentication is called by taking the 'V + timestamp T + digital signature S' as a parameter, the intelligent contract verifies the validity of the digital signature and whether the user exists in the intelligent contract for user registration, and the verification result is written into the block chain whether the verification is passed or not. The intelligent contract verification process using user authentication is as follows:
judging whether the public key of the user exists in a white list, namely whether the user registers in an intelligent contract;
judging whether the digital signature of the verifiable random number is valid;
a determination is made whether the timestamp of the verifiable random number is expired, i.e., the timeout time is less than a predetermined value.
If the three logics pass, returning to the identity authentication server end to pass the identity authentication of the user, otherwise, returning to the authentication failure.
For timestamp timeout check: whether the time stamp is overtime or not is independently checked by each blockchain consensus node according to the system time of the node. Since there may be differences in system time for each node, redundant fault tolerance is considered. As long as the time difference between the system clocks of the user side APP and each node is smaller than a threshold (i.e. timeout). For example, the threshold is set to 5 minutes, the user side APP generates a verifiable random number by using the local system time, and each node checks the difference between the own system time and the timestamp in the verifiable random number, and if the difference is less than 5 minutes, the verification is passed.
The return value of the intelligent contract which calls the user authentication is checked by the identity authentication server, and if the verification passes (true), an access token is generated locally.
And 4, step 4: and returning the generated access token to the user side APP. The common access token format is JWT, and has a field similar to a digital signature, which is related to the selected encryption method, and the encryption algorithm may be selected from asymmetric, symmetric, or hash, etc. And the authentication server generates the access token in a pre-agreed format, encrypted, e.g., by signing the JWT token with the SM2 digital signature.
The identity authentication server returns the access token to the user APP, and is a response to the application access token call. The identity authentication server shields the access to the block chain, and for the user side APP, the identity authentication server is called synchronously by using the block chain private key.
By the method, the user side APP logs in once, the synchronous calling of the identity authentication server enables the user APP to use the block chain private key to exchange the access token, and can support the chain mark in the identity authentication process and the forgery-resistant verification of the user identity and the non-repudiation of the login behavior.
The user identity authentication process does not depend on the confirmation of the blockchain transaction any more, so that the response time of the user identity authentication based on the blockchain private key is greatly shortened, and the software architecture is greatly simplified by removing an asynchronous mechanism.
Meanwhile, the invention also provides a synchronous calling user identity authentication system based on the block chain, a user side interaction module and an identity authentication server side interaction module,
the user terminal interaction module registers the user registration intelligent contract based on the block chain according to the user terminal indication, generates a digital signature of the user terminal according to the verifiable random number,
according to the user authentication intelligent contract of the block chain, the identity authentication service terminal interaction module calls the user authentication intelligent contract according to the indication of the identity authentication service terminal, verifies the validity of the digital signature and whether the user exists in the user registration intelligent contract or not, and returns the verification result to the identity authentication service terminal. The information interaction, execution process and other contents between the modules in the system are based on the same concept as the method embodiment of the present invention, and specific contents can be referred to the description in the method embodiment of the present invention, and are not described herein again. Similarly, the system can carry out digital signature according to the verifiable random number of the user end through the user end interaction module, based on the intelligent contract registered by the block chain registered user, the validity of the digital signature and whether the user exists in the intelligent contract registered by the user are verified by calling the intelligent contract authenticated by the identity authentication service end interaction module, and the verification result is returned to the identity authentication service end, namely the identity authentication service end interaction module indicates to call the intelligent contract to check the validity of the digital signature and whether the user exists in the intelligent contract registered by the user through the identity authentication service end, the confirmation of block chain transaction is not waited, but the verification result of the rule of the intelligent contract is directly adopted, so that the asynchronous call is changed into synchronous call, the delay is reduced, and the realization complexity is reduced.
The invention also provides a synchronous calling user identity authentication device based on the block chain, which comprises the following components: at least one memory and at least one processor;
the at least one memory to store a machine readable program;
the at least one processor is configured to invoke the machine readable program to execute the block chain-based synchronous invocation user identity authentication method.
The contents of information interaction, readable program process execution and the like of the processor in the device are based on the same concept as the method embodiment of the present invention, and specific contents can be referred to the description in the method embodiment of the present invention, and are not described herein again. Similarly, when the processor of the device executes the readable program, the processor can verify the random number through the user terminal to carry out digital signature, based on the block chain registered user intelligent contract, the identity authentication service terminal calls the user authentication intelligent contract to verify the validity of the digital signature and whether the user exists in the user registered intelligent contract, and the identity authentication service terminal obtains the verification result, namely when the identity authentication service terminal calls the intelligent contract to check the validity of the digital signature and whether the user exists in the user registered intelligent contract, the verification result of the block chain transaction is not waited, but the verification result of the rule of the intelligent contract is directly adopted, so that the asynchronous call is changed into synchronous call, the delay is reduced, and the realization complexity is reduced.
It should be noted that not all steps and modules in the processes and system structures in the preferred embodiments are necessary, and some steps or modules may be omitted according to actual needs. The execution order of the steps is not fixed and can be adjusted as required. The system structures described in the above embodiments may be physical structures or logical structures, that is, some modules may be implemented by the same physical entity, or some modules may be implemented by a plurality of physical entities separately, or some components may be implemented together in a plurality of independent devices.
The above-mentioned embodiments are merely preferred embodiments for fully illustrating the present invention, and the scope of the present invention is not limited thereto. The equivalent substitution or change made by the technical personnel in the technical field on the basis of the invention is all within the protection scope of the invention. The protection scope of the invention is subject to the claims.

Claims (3)

1. A synchronous calling user identity authentication method based on block chain is characterized in that a user registers an intelligent contract through a user side based on the block chain, the user registered to the intelligent contract is added into a white list through the block chain, the digital signature of the user is verified by the intelligent contract through user authentication by using a public key in the white list,
generating a verifiable random number through a user terminal, and performing digital signature through the user terminal according to the verifiable random number, wherein the verifiable random number V = HASH (time stamp T, user public key), the digital signature S = SIG (V, user private key), and SIG () represents a digital signature algorithm;
according to the user authentication intelligent contract of the block chain, calling the user authentication intelligent contract through the identity authentication server to verify the validity of the digital signature and whether the user exists in the user registration intelligent contract, wherein the identity authentication server calls the user authentication intelligent contract by using the verifiable random number V, the timestamp T and the digital signature S as parameters to verify the validity of the digital signature and whether the user exists in the user registration intelligent contract, and specifically calls the user authentication intelligent contract process: judging whether the user public key exists in a white list, judging whether a digital signature of the verifiable random number is valid, judging whether a timestamp in the verifiable random number is overtime, if the user public key exists in the white list, the digital signature is valid, and the timestamp is not overtime, passing the verification, otherwise failing the verification;
and obtaining a verification result through the identity authentication server.
2. A synchronous calling user identity authentication system based on block chain is characterized in that a user side interaction module and an identity authentication server side interaction module,
the user side interaction module registers a user to register an intelligent contract based on a block chain according to user side instructions, adds the user registered to the user to a white list through the block chain, verifies a digital signature of the user by using a public key in the white list through a user authentication intelligent contract, generates a verifiable random number through the user side, and generates a digital signature of the user side according to the verifiable random number, wherein the verifiable random number V = HASH (time stamp T, user public key), the digital signature S = SIG (V, user private key), and SIG represents a digital signature algorithm;
according to the user authentication intelligent contract of the block chain, the identity authentication service end interaction module calls the user authentication intelligent contract according to the indication of the identity authentication service end, verifies the validity of the digital signature and whether the user exists in the user registration intelligent contract, wherein the identity authentication service end calls the user authentication intelligent contract by using a verifiable random number V, a timestamp T and a digital signature S as parameters through the identity authentication service end, verifies whether the validity of the digital signature and the user exist in the user registration intelligent contract, and particularly calls the user authentication intelligent contract process: judging whether the user public key exists in a white list, judging whether a digital signature of the verifiable random number is valid, judging whether a timestamp in the verifiable random number is overtime, if the user public key exists in the white list, the digital signature is valid, and the timestamp is not overtime, passing the verification, otherwise failing the verification;
and returning the verification result to the identity authentication server side.
3. A synchronous calling user identity authentication device based on a block chain is characterized by comprising: at least one memory and at least one processor;
the at least one memory to store a machine readable program;
the at least one processor, configured to invoke the machine readable program, to perform the method for block chain based synchronization call user identity authentication of claim 1.
CN202110696725.9A 2021-06-23 2021-06-23 Synchronous calling user identity authentication method based on block chain Active CN113378240B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110696725.9A CN113378240B (en) 2021-06-23 2021-06-23 Synchronous calling user identity authentication method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110696725.9A CN113378240B (en) 2021-06-23 2021-06-23 Synchronous calling user identity authentication method based on block chain

Publications (2)

Publication Number Publication Date
CN113378240A CN113378240A (en) 2021-09-10
CN113378240B true CN113378240B (en) 2023-03-28

Family

ID=77578708

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110696725.9A Active CN113378240B (en) 2021-06-23 2021-06-23 Synchronous calling user identity authentication method based on block chain

Country Status (1)

Country Link
CN (1) CN113378240B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338665A (en) * 2021-12-01 2022-04-12 浪潮软件股份有限公司 Declaration material tamper-proofing system based on block chain
CN114491633A (en) * 2022-01-26 2022-05-13 四川巧夺天工信息安全智能设备有限公司 Offline identity authentication method based on synchronous seeds

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109936569A (en) * 2019-02-21 2019-06-25 领信智链(北京)科技有限公司 A kind of decentralization digital identity login management system based on ether mill block chain
CN109964446A (en) * 2018-06-08 2019-07-02 北京大学深圳研究生院 A kind of common recognition method based on ballot
CN109978551A (en) * 2019-03-29 2019-07-05 北京投肯科技有限公司 A kind of account information confirmation and method for retrieving and device based on block chain
CN111147494A (en) * 2019-12-27 2020-05-12 杭州趣链科技有限公司 Multi-center access management method and device for block chain light nodes
CN111262692A (en) * 2020-01-08 2020-06-09 网络通信与安全紫金山实验室 Key distribution system and method based on block chain
CN111368340A (en) * 2020-01-04 2020-07-03 链农(深圳)信息科技有限公司 Block chain-based evidence-based security verification method and device and hardware equipment
WO2020189926A1 (en) * 2019-03-15 2020-09-24 주식회사 코인플러그 Method and server for managing user identity by using blockchain network, and method and terminal for user authentication using blockchain network-based user identity
CN111767551A (en) * 2020-05-13 2020-10-13 北京信息科技大学 Browsing permission control method and system based on block chain
CN111884805A (en) * 2020-06-24 2020-11-03 易联众信息技术股份有限公司 Data hosting method and system based on block chain and distributed identity
CN112106324A (en) * 2018-06-25 2020-12-18 Auth9股份有限公司 Methods, computer program products and devices for creating, registering and verifying digitally stamped assets
US11042524B1 (en) * 2020-08-12 2021-06-22 Peking University Self-adaptive execution method of smart contract for realizing data trustworthiness

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018131004A2 (en) * 2017-01-16 2018-07-19 Enrico Maim Methods and systems for executing programs in secure environments
KR101816653B1 (en) * 2017-02-14 2018-02-21 주식회사 코인플러그 Method for providing login flow via authentication based on public key infrastructure in response to user’s login request for using service provided by service provider server in use of smart contract with blockchain database and server using the same
CN111612468B (en) * 2017-03-24 2024-03-19 创新先进技术有限公司 Method and device for transmitting transaction information and identifying consensus
CN111311254A (en) * 2018-12-12 2020-06-19 中移动信息技术有限公司 Service processing method, device and system based on block chain
CN111490968A (en) * 2019-01-29 2020-08-04 上海汉澄电子设备有限公司 Block chain technology-based alliance multi-node network identity authentication method
CN109768988B (en) * 2019-02-26 2021-11-26 安捷光通科技成都有限公司 Decentralized Internet of things security authentication system, equipment registration and identity authentication method
CN110995448A (en) * 2019-12-19 2020-04-10 杭州羿贝科技有限公司 Block chain-based Internet of things equipment identity authentication method and system
CN111539827B (en) * 2020-04-29 2021-09-14 铭数科技(青岛)有限公司 Energy internet transaction system and transaction processing method based on block chain
CN112039872B (en) * 2020-08-28 2022-07-05 武汉见邦融智科技有限公司 Cross-domain anonymous authentication method and system based on block chain
CN112039675A (en) * 2020-08-28 2020-12-04 山东爱城市网信息技术有限公司 Token generation and authentication method based on block chain intelligent contract
CN112487092B (en) * 2020-12-03 2024-06-18 深圳前海微众银行股份有限公司 Intelligent contract calling method and device based on blockchain
CN112818368A (en) * 2021-02-09 2021-05-18 南京邮电大学 Digital certificate authentication method based on block chain intelligent contract

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109964446A (en) * 2018-06-08 2019-07-02 北京大学深圳研究生院 A kind of common recognition method based on ballot
CN112106324A (en) * 2018-06-25 2020-12-18 Auth9股份有限公司 Methods, computer program products and devices for creating, registering and verifying digitally stamped assets
CN109936569A (en) * 2019-02-21 2019-06-25 领信智链(北京)科技有限公司 A kind of decentralization digital identity login management system based on ether mill block chain
WO2020189926A1 (en) * 2019-03-15 2020-09-24 주식회사 코인플러그 Method and server for managing user identity by using blockchain network, and method and terminal for user authentication using blockchain network-based user identity
CN109978551A (en) * 2019-03-29 2019-07-05 北京投肯科技有限公司 A kind of account information confirmation and method for retrieving and device based on block chain
CN111147494A (en) * 2019-12-27 2020-05-12 杭州趣链科技有限公司 Multi-center access management method and device for block chain light nodes
CN111368340A (en) * 2020-01-04 2020-07-03 链农(深圳)信息科技有限公司 Block chain-based evidence-based security verification method and device and hardware equipment
CN111262692A (en) * 2020-01-08 2020-06-09 网络通信与安全紫金山实验室 Key distribution system and method based on block chain
CN111767551A (en) * 2020-05-13 2020-10-13 北京信息科技大学 Browsing permission control method and system based on block chain
CN111884805A (en) * 2020-06-24 2020-11-03 易联众信息技术股份有限公司 Data hosting method and system based on block chain and distributed identity
US11042524B1 (en) * 2020-08-12 2021-06-22 Peking University Self-adaptive execution method of smart contract for realizing data trustworthiness

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种去中心化的身份认证模型的设计与实现;李嶒等;《辽东学院学报(自然科学版)》;20200207(第01期);全文 *

Also Published As

Publication number Publication date
CN113378240A (en) 2021-09-10

Similar Documents

Publication Publication Date Title
CN112035889B (en) Block chain privacy verification method and device for computing outsourcing and computer equipment
CN108337239B (en) Event attestation of electronic devices
US10664353B2 (en) Method and system for byzantine fault-tolerance replicating of data on a plurality of servers
US11238449B2 (en) Efficient validation of transaction policy compliance in a distributed ledger system
WO2022095244A1 (en) Cross-chain transaction method, system and apparatus, device, and storage medium
EP3540628A1 (en) Mechanism for efficient validation of finality proof in lightweight distributed ledger clients
CN113378240B (en) Synchronous calling user identity authentication method based on block chain
US20170099148A1 (en) Securely authorizing client applications on devices to hosted services
CN112508563B (en) Cross-chain transaction credibility verification method and device and computer equipment
US8630415B2 (en) Method and apparatus for authentication service application processes during service reallocation in high availability clusters
CN108876669B (en) Course notarization system and method applied to multi-platform education resource sharing
CN115001695B (en) Secure provisioning of baseboard management controller identities for platforms
WO2021031741A1 (en) Voip processing method, device, and terminal
US11374763B2 (en) Method and system for inter-DLT networks trust enhancement
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
CN112036878B (en) Data processing method and device
CN113872932A (en) Method, system, terminal and storage medium for authenticating interface between micro services
US20230259930A1 (en) Cross-chain transaction processing method and apparatus, electronic device, and storage medium
CN115021958A (en) Intelligent home identity authentication method and system based on fog calculation and block chain fusion
CN113923093A (en) Novel Byzantine fault-tolerant consensus method based on trusted execution environment
CN111241188B (en) Consensus method, node and storage medium in block chain network
CN113259350A (en) Cryptographic user authorization and authentication system based on key generation algorithm
CN114969714A (en) User login authentication method, device and equipment based on block chain
CN116055147B (en) Cloud service light-weight identity authentication method based on identification
Hosseyni et al. Formal security analysis of the OpenID FAPI 2.0 Security Profile with FAPI 2.0 Message Signing, FAPI-CIBA, Dynamic Client Registration and Management: technical report

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant