CN114862411A - Identity authentication method based on non-homogeneous certificate, network equipment and terminal storage equipment - Google Patents
Identity authentication method based on non-homogeneous certificate, network equipment and terminal storage equipment Download PDFInfo
- Publication number
- CN114862411A CN114862411A CN202210581967.8A CN202210581967A CN114862411A CN 114862411 A CN114862411 A CN 114862411A CN 202210581967 A CN202210581967 A CN 202210581967A CN 114862411 A CN114862411 A CN 114862411A
- Authority
- CN
- China
- Prior art keywords
- nft
- user
- address
- service provider
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/386—Payment protocols; Details thereof using messaging services or messaging apps
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an identity authentication method based on non-homogeneous certification, network equipment and terminal storage equipment.A service provider, namely a coinage party, performs NFT (network file transfer) initialization casting by calling an intelligent contract, and specifies information such as a block chain for casting NFT, a coinage protocol, a name of the cast NFT, the number of the cast NFT, the price of the cast NFT, the validity period of the cast NFT, a collection address and the like. Secondly, the user buys the NFT corresponding to the identity rights, and then the intelligent contract or the service provider distributes the NFT for the user. The user uses the non-homogeneous certificate NFT to authenticate the corresponding identity in the validity period so as to enjoy the rights and interests. Non-homogeneous certification NFT can be freely given among users. Anyone can query the NFT validity period, but only the NFT holder can perform the destruction operation on it. The invention provides an identity authentication method based on non-homogeneous general evidence, which aims to solve the problems that the identity rights are difficult to trade independently in the traditional identity authentication management centralization mode, and meanwhile, data tampering and counterfeiting can be prevented, and the identity authentication method can be traced.
Description
Technical Field
The invention belongs to the field of block chains and digital currency, and particularly relates to an identity authentication method based on non-homogeneous certificates, network equipment and terminal storage equipment.
Background
Identity authentication is also called verification and authentication, and means that the identity of a user is confirmed by a certain means. There are many methods for identity authentication, which can be basically divided into three categories: shared key based authentication, biometric based authentication, and public key encryption algorithm based authentication. The security of different identity authentication methods is high and low respectively, and the identity information of the user is controlled by a third party, the identity owner is not owned by the user, the transaction cannot be conducted freely, and the risk of tampering exists.
Non-homogeneous Token (NFT) is a digital property ownership based on block chains that has properties of being inseparable, irreplaceable, unique, verifiable, negotiable, tradable, and tradable. NFT is a concept corresponding to a homogeneous token (FT), also referred to as a non-homogeneous token, a heterogeneous token, a non-exchangeable token, a non-interchangeable token, and the like.
In the traditional identity authentication system, the identity information of the user, especially the right information, is managed by a third-party organization, is stored in a centralized server, is easy to be leaked and attacked, and the user cannot completely master the identity right information. In addition, the user often needs to manage different identity rights in different digital scenes, which brings inconvenience to the user, and privacy information is easily leaked in the authorization process, thereby causing the use of false information.
Disclosure of Invention
Aiming at the problems that the traditional identity authentication management is centralized and the identity rights and interests are difficult to trade independently, the invention provides an identity authentication method based on non-homogeneous general certificates, which realizes identity authentication by using the non-homogeneous general certificates stored on a block chain and realizes casting, distribution, transfer, inquiry and destruction of the non-homogeneous general certificates through intelligent contracts. The method does not need a third-party mechanism to store the identity information, and can avoid the loss of the identity information of the user. Meanwhile, the method has the characteristics of data tampering prevention, counterfeiting prevention, traceability and decentralization. The users under the method can have decentralized identity authentication interest certificates, the authentication of corresponding identity interest information can be realized by holding related non-homogeneous certificates, the non-homogeneous certificates corresponding to the related identity interests can be freely traded among the users, and the circulation of the identity interests is realized without being related to other account assets. The method comprises the following steps:
1. the service provider, i.e. coinage side, calls the intelligent contract to perform the initial casting of the NFT.
2. The user purchases the NFT corresponding to the identity rights.
3. The intelligent contracts or service providers distribute NFTs for purchasing users.
4. The user uses the NFT for authentication to enjoy the corresponding benefits.
5. An NFT referral method between users.
6. NFT validity period query method.
7. An expired NFT destruction method.
Further, the specific implementation of step 1 includes:
step 1.1, intelligent contract deployment and initialization, wherein intelligent contracts used for casting non-homogeneous general evidence NFT under different protocol standards are compiled and deployed on a supported public chain, a supported alliance chain or a supported private chain respectively.
Step 1.2, the service provider, namely the coinage party, calls an NFT casting function to cast the identity rights and interests NFT, and needs to specify a block Chain, a protocol standard ERC, a cast NFT name, NFTname, a cast NFT number, NFTnum, a cast NFT valid period, a cast NFT price, NFTprice and an address paymentAddress for receiving money. This step only stores the cast NFT information onto the blockchain, and the NFT is actually cast out and distributed to the recipient when it is distributed.
Further, the specific implementation of step 2 includes:
step 2.1, a user, namely a service demander purchases the NFT through a chain pay-off mode, initiates a transfer to a service provider and provides an address for receiving the corresponding NFT, specifically as follows:
step 2.1.1 user registers wallet address of block chain corresponding to NFT, including private key SK C Public key PK C Address A C )。
Step 2.1.2 the user submits his own on-chain identity to the service provider, which confirms the authenticity of the on-chain identity by verifying the signature of the purchasing user on the message.
Step 2.1.3, a user initiates a full amount transfer to a specific address according to the price calibrated by the service provider, provides information such as a block chain where the NFT is located, an agreement standard, an NFT name and the like, needs to provide an address for receiving the corresponding NFT, and defaults to receive the NFT address as the address for initiating the transfer.
Or:
step 2.2 the user purchases NFT by a pay-under-chain approach, purchases NFT from the service provider and provides an address for receiving the corresponding NFT, as follows:
step 2.2.1 user registers the address of the blockchain wallet where the corresponding NFT is located, including (private key SK) C Public key PK C Address A C )。
Step 2.2.2 the user purchases identity rights from the service provider by means of trusted downlinked payment and provides an address for receiving the corresponding NFT.
Further, the specific implementation of step 3 includes:
step 3.1 the intelligent contract automatically distributes NFT to purchasing users, as follows:
step 3.1.1, if the intelligent contract receives the sufficient transfer of the user, calling an NFT (network file transfer) distribution function to distribute the cast money by using the information provided by the user as a parameter and sending the cast money to an address given by the user, and recording the validity time of the effective period; and if the intelligent contract does not receive the user full-amount transfer, the NFT is refused to be distributed to the user address.
And 3.1.2, inquiring the coinage party collection address corresponding to the distributed NFT by the intelligent contract, and transferring the received money to the coinage party collection address.
Or:
step 3.2, the service provider manually distributes the NFT to the purchasing user, which is as follows:
step 3.2.1 the service provider confirms receipt of the user chain down full payment.
Step 3.2.2 the service provider calls the NFT distribution function to distribute the corresponding NFT to the user.
Step 3.2.3 the intelligent contract records the newly delivered NFT validity period validityTime.
Further, the specific implementation of step 4 includes:
step 4.1 the user connects to the service provider web site using a wallet tool such as MetaMask.
Step 4.2 the user accesses a specific identity-specific service or block.
Step 4.3 user uses private Key SK C The authentication request data is signed.
Step 4.4, the service provider website calls an intelligent contract to perform identity authentication and verification, and an address to be verified and an NFT name to be verified need to be specified:
and 4.4.1, calling an NFT verification function by the intelligent contract to verify whether the specified address holds the specified NFT, if so, performing the step 4.4.2, and if not, returning a verification failure message.
Step 4.4.2 specifies that the address holds the specified NFT and the smart contract verifies that it contains the destroy token destroyed.
And 4.4.3 if the destruction mark destroyed is not included, calling an NFT validity query function by the intelligent contract to perform NFT validity query.
Step 4.4.4 the NFT validity query function queries the validity of a specific NFT, and if the NFT is not expired, returns a verification success message; and if the NFT is expired, returning a verification failure message.
Step 4.4.5, if the service provider receives the verification success message, providing a specific service or opening a specific edition block for the user; and if the authentication failure message is received, refusing to provide the specific service or opening the specific block.
Further, the specific implementation of the method 5 includes:
the method can carry out NFT transfer by calling an NFT transfer function, and comprises the following specific operations:
step 5.1 user a obtains user B NFT referral receiving address.
Step 5.2 user a transfers a particular NFT to an NFT referral receiving address using a wallet tool such as MetaMask.
Step 5.3 the smart contract calls the NFT transfer function to transfer the particular NFT from the NFT referral address to the NFT referral-receiving address.
Further, the specific implementation of the method 6 includes:
anyone can perform validity period query on a specific NFT by calling the NFT validity period query function, which specifically operates as follows:
step 6.1 the querier performs validity period query on the specific NFT:
step 6.1.1 the inquirer obtains the name of the NFT to be inquired and the number of the NFT.
And 6.1.2, initiating the NFT by the inquirer to inquire the validity period, and attaching the name of the NFT to be inquired and the number information of the NFT.
Step 6.1.3 the intelligent contract invokes the NFT validity query function to perform validity query on a particular NFT.
Step 6.1.4 the NFT validity query function returns the specific NFT validity time and the message whether it is expired.
Step 6.2 optionally, the inquirer can inquire the valid period of the NFT with the same name in batch:
and 6.2.1, the inquirer obtains the name of the NFT to be inquired.
Step 6.2.2 Inquiry person initiates NFT to inquire validity period
And 6.2.3 calling an NFT validity query function by the intelligent contract to perform validity query on the NFT with the same name in batches.
Step 6.2.4 the NFT validity query function returns all NFT validity times, holder addresses and if expired messages of the same name.
Further, the specific implementation of the method 7 includes:
the user can destroy the expired NFT and obtain a same NFT with the destruction flag.
Step 7.1, the user initiates an NFT destroying request and attaches the NFT name and the NFT number information.
Step 7.2 the smart contract receives the user request and checks if the NFT holding address is the address initiating the destruction operation.
If yes, step 7.3 checks if the NFT already contains a destroy flag. If not, returning the message of unauthorized destruction.
And 7.4, if the destruction mark is not included, calling an NFT destruction function, and inputting the user address, the NFT name and the NFT number as parameters. If the destroy mark is contained, a destroy failure message is returned.
Step 7.5 the NFT destruction function performs a destruction operation on the target NFT.
And 7.6, permanently destroying the original NFT of the user, and simultaneously obtaining the same NFT with the destruction mark.
The program code of the above method may be stored in a storage device of the peripheral terminal, or may be executed in a network device (e.g., a network server).
The invention has the beneficial effects that:
1. the invention provides an identity authentication method based on non-homogeneous general evidence, which aims to solve the problem that a user cannot really enjoy ownership of identity rights and interests in the traditional identity authentication management centralization and has the characteristics of data tampering prevention, counterfeiting prevention, traceability and the like;
2. the identity authentication is converted into the holding authentication of the corresponding non-homogeneous pass card, the free transfer of the identity rights and interests is realized, other assets do not need to be associated, and a user can freely inquire the validity period of the identity authentication NFT and destroy the held identity authentication NFT;
3. the invention meets the identity authentication requirements under different application scenes and costs by supporting the casting of non-homogeneous certificates based on different protocols on a public chain, a private chain and an alliance chain and supporting the mode of combining payment under the chain and authentication on the chain.
Drawings
FIG. 1 is a schematic diagram of character interaction
FIG. 2 identity authentication NFT casting and distribution flow diagram
FIG. 3 identity authentication NFT verification flow diagram
FIG. 4 identity authentication NFT transfer flow diagram
FIG. 5 flow chart of identity authentication NFT validity period query
FIG. 6 identity authentication NFT destruction flow diagram
Detailed Description
The present invention is further described with reference to the drawings and the detailed description, it should be noted that the specific implementation of the present invention is based on the present technology, and the detailed implementation procedures and implementation procedures are given, but the scope of the present invention is not limited by the present implementation examples.
As shown in fig. 1 and fig. 2, a casting and distribution flow chart of the identity authentication NFT, a service provider, that is, a coinage party, invokes an intelligent contract to perform initial casting of the NFT, a user purchases the NFT corresponding to the identity right, and the main steps of the intelligent contract or the service provider distributing the NFT for the purchasing user are as follows:
step 1.1, intelligent contract deployment and initialization, wherein intelligent contracts used for casting non-homogenization evidence-based NFT under different protocol standards are compiled and deployed on a supported public chain, a supported alliance chain or a supported private chain respectively, so that the intelligent contracts can inherit contract interfaces of an ERC-721 protocol, an ERC-875 protocol and an ERC-1155 protocol respectively according to different protocol standards, and various functions of casting, verifying, transferring and destroying the non-homogenization evidence-based NFT are realized.
In step 1.2, the service provider, i.e. the coinage party, calls an NFT casting function castTokens (Chain, ERC, NFTname, NFTnum, valitytime, NFTprice, paymentAddress) to cast the identity rights NFT. Wherein, Chain needs to be the block Chain specified in the block Chain list for casting the non-homogeneous certified NFT, defaulting to etherhouse; ERC is a protocol standard which is selected by a coinage party from ERC-721 protocol, ERC-875 protocol or ERC-1155 protocol and is used for specifying that the casting non-homogenization protocol NFT follows, and the ERC-721 protocol is defaulted to; NFTname is the name of the non-homogeneous certification NFT to be cast; NFTnum is the total number of non-homogeneous witness NFTs to be cast; validityTime is the expiration date of the non-homogenization certification NFT to be cast, defaulted to one year; NFTprice is the selling price of the non-homogeneous general evidence NFT chain to be cast; paymentAddress receives the money address for the coinage party.
Step 2.1, a user, namely a service demander, purchases the NFT through a chain pay-on-the-go manner, initiates a transfer to a service provider and provides an address toAddr for receiving the corresponding NFT:
step 2.1.1 user registers wallet address of block chain corresponding to NFT, including private key SK C Public key PK C Address A C )。
Step 2.1.2 the user submits his own chained identity to the service provider and uses the private key SK C Signing the message, the service provider passing the public key PK C The signature of the purchasing user on the message is verified to confirm the authenticity of the identity on the chain.
Step 2.1.3, a user initiates a full-amount transfer to a specific address according to the price NFTprice calibrated by a service provider, and takes a quadruple < Chain, ERC, NFTname, toAddr > as additional transfer information, wherein the toAddr is used for receiving a casting-successful non-homogenization general evidence NFT and defaults to be the address for initiating the transfer.
Step 2.2.2 the user purchases the identity rights from the service provider by means of a trusted downlinked payment and provides the address toAddr for receiving the corresponding NFT.
Step 3.1 the smart contract automatically distributes NFT to purchasing users:
step 3.1.1, if the intelligent contract receives the sufficient amount of money transfer of the user, the four-tuple information provided by the user is used as a parameter to call an NFT distribution function distributeTokens (Chain, ERC, NFTname, toAddr) to perform NFT casting, the NFT is sent to a toAddr address given by the user, and the effective period of the address is recorded. Wherein the meaning of parameters of Chain, ERC and NFTname is the same as that of step 1.2, and the meaning of the toAddr parameter is the address of a user receiving NFT; and if the intelligent contract does not receive the user full-amount transfer, refusing to distribute the non-homogeneous certification NFT to the user address.
And 3.1.2, the intelligent contract inquires a coinage party collection address corresponding to the distributed NFT, and transfers the received money to the coinage party collection address.
Step 3.2 optionally, the service provider may manually distribute the NFT to the user:
and 3.2.2, the service provider takes the toAddr and the related information of the band casting NFT provided by the user in the step 2.2.2 as parameters, and calls an NFT distribution function distributeTokens (Chain, ERC, NFTname, toAddr) to distribute the corresponding non-homogenization certification NFT for the user. Wherein the meaning of the parameters of Chain, ERC and NFTname is the same as that of step 1.2, and the meaning of the toAddr parameter is the address of the user receiving NFT
As shown in the flowchart of identity authentication NFT verification in fig. 3, a user can use the owned non-homogeneous certificate NFT to authenticate the corresponding identity interest information to enjoy the corresponding interest, and the main steps are as follows:
step 4.1 the user connects to the service provider web site using a wallet tool such as MetaMask.
Step 4.2 the user accesses a specific identity-specific service or section.
Step 4.3 user uses private key SK C The authentication request data is signed.
Step 4.4 the service provider website uses the user public key PK C Verifying the signature data, determining needed identity authentication NFT information according to service resources requested by a user, calling an intelligent contract to perform identity authentication, and specifying a user address validaddr to be authenticated and an NFT name NFTname to be authenticated:
step 4.4.1, the intelligent contract takes the parameters as input, calls an NFT verification function validatekeys (Chain, ERC, validateAddr, NFTname) to verify whether the specified address holds the specified NFT, if the specified NFT holds the specified NFT, performs step 4.4.2, and if the specified NFT does not hold the specified NFT, returns a verification failure message. Wherein the meaning of parameters of Chain, ERC and NFTname is the same as that of step 1.2, and the meaning of validaddr parameter is the address of the user to be verified.
Step 4.4.2 specifies that the address holds the specified NFT and the smart contract verifies that it contains the destroy token destroyed.
And 4.4.3, if the destruction mark Destored is not included, calling an NFT validity period query function valityVerification (Chain, ERC, NFTname, < NFTid >) by the intelligent contract to perform NFT validity period query, wherein the meanings of the parameters of Chain, ERC and NFTname are the same as those of the step 1.2, and the NFT number NFTid is an optional parameter.
Step 4.4.4 the NFT validity query function queries the validity of a specific NFT, and if the NFT is not expired, returns a verification success message; and if the NFT is expired, returning a verification failure message.
Step 4.4.5, if the service provider receives the verification success message, providing a specific service or opening a specific edition block for the user; and if the authentication failure message is received, refusing to provide the specific service or opening the specific block.
As shown in the flow chart of transferring identity authentication NFT in fig. 4, non-homogeneous certificates NFT held by users can be freely transferred:
step 5.1 user a obtains user B NFT donation receiving address toAddr.
Step 5.2, the user A transfers the held NFT to the NFT gifting receiving address toAddr by using a wallet tool such as MetaMask, and takes < Chain, ERC, NFTname, NFTid, toAddr > as additional information of the transfer.
Step 5.3, the intelligent contract takes the address fromacaddr of the user a and < Chain, ERC, NFTname, NFTid, toAddr > as parameter inputs and calls the NFT transfer function transferTokens (Chain, ERC, NFTname, NFTid, froaddr, toAddr) to transfer the specific NFT from the NFT to transfer to the receiving address toAddr. Wherein the meaning of the parameters of Chain, ERC and NFTname is the same as that of the step 1.2, and the meaning of the NFTid parameter is the NFT number.
As shown in the flowchart of querying the validity period of the identity authentication NFT in fig. 5, any user may query the validity period of any non-homogeneous general certificate NFT:
step 6.1 the querier performs validity period query on the specific NFT:
step 6.1.1, the inquirer obtains a block Chain Chain where the NFT to be inquired is located, a protocol standard ERC, the NFT name NFTname and the NFT number NFTid.
Step 6.1.2 the inquirer initiates NFT to carry out validity period inquiry and attaches quadruple < Chain, ERC, NFTname, NFTid > information.
Step 6.1.3, the intelligent contract calls an NFT validity period query function validyVerification (Chain, ERC, NFTname, < NFTid >) to perform validity period query on a specific NFT, query the validity period of the specific NFT, and the NFTid parameter can not be omitted, wherein the meanings of the Chain, ERC and NFTname parameters are the same as that in step 1.2.
Step 6.1.4 the NFT validity query function returns the specific NFT validity time and whether the message is expired.
Step 6.2 optionally, the inquirer can inquire the valid period of the NFT with the same name in batch:
step 6.2.1, the inquirer obtains a block Chain Chain where the NFT to be inquired is located, protocol standard ERC and NFT name NFTname.
Step 6.2.2 Inquiry person initiates NFT to inquire validity period, and attaches triple information of < Chain, ERC, NFTname >
And 6.2.3, calling an NFT validity period query function validatityvalidation (Chain, ERC, NFTname) by the intelligent contract to perform validity period query on the NFT batch with the same name, wherein the meaning of the parameters of the Chain, the ERC and the NFTname is the same as that in the step 1.2, and in addition, the NFT numbering parameter NFTid can be omitted in batch query.
Step 6.2.4 the NFT validity query function returns all NFT validity times, holder addresses and if expired messages of the same name.
As shown in the flowchart of destroying the identity authentication NFT in fig. 6, the user can freely destroy the non-homogeneous certificate NFT held by the user, and the main steps are as follows:
step 7.1 the user initiates an NFT destroy request accompanied by four-tuple information<Chain,ERC,NFTname,NFTid,fromAddr>Using the private key SK C The kill request data is signed. .
Step 7.2 Smart contracts receive user requests, use the user public Key PK C Verifying the signature data and checking whether the NFT holding address fromAddr is the address for initiating the destruction operation.
If yes, step 7.3 checks if the NFT already contains the destruction flag destroyed. If not, returning the message of unauthorized destruction.
Step 7.4, if the destroy mark destroyed is not included, calling an NFT destroy function destroyTokens (Chain, ERC, NFTname, NFTid, fromAddr) to execute NFT destroy operation, and inputting the attached < Chain, ERC, NFTname, NFTid, fromAddr > as parameters, wherein the meaning of the parameters of Chain, ERC, NFTname is the same as that in step 1.2, the meaning of the parameter of NFTid is the NFT number, and the meaning of the parameter of fromAddr is the user address holding the NFT to be destroyed. If the destroy mark is contained, a destroy failure message is returned.
Step 7.5, the NFT destruction function destroyTokens (Chain, ERC, NFTname, NFTid, fromAddr) executes the destruction operation on the target NFT, and adds a destruction flag to the NFT.
Step 7.6, sending the specific NFT with the destruction mark to the original user address fromAddr, permanently destroying the original NFT of the user, and obtaining a same NFT with the destruction mark.
The above-listed series of detailed descriptions are merely specific illustrations of possible embodiments of the present invention, and they are not intended to limit the scope of the present invention, and all equivalent means or modifications that do not depart from the technical spirit of the present invention are intended to be included within the scope of the present invention.
Claims (10)
1. An identity authentication method based on non-homogeneous general evidence is characterized by comprising the following steps:
s1, the service provider, namely the coinage provider, calls an intelligent contract to perform initial casting of NFT;
s2, the user purchases NFT corresponding to the identity rights;
s3 the smart contract or service provider distributes NFT for purchasing users;
s4 the user performs authentication using NFT to enjoy corresponding rights and interests.
2. The non-homogeneous certificate-based identity authentication method according to claim 1, wherein the implementation of S1 includes:
s1.1, deploying and initializing intelligent contracts, and compiling and deploying the intelligent contracts for casting non-homogeneous evidence of communication (NFT) based on different protocol standards on a supported public chain, a supported alliance chain or a supported private chain respectively;
s1.2, a service provider, namely a coinage party, calls an NFT casting function to cast the identity rights and interests NFT, and specifies a block Chain, protocol standard ERC, a cast NFT name, NFTname, a cast NFT number, NFTnum, a cast NFT valid period, validityTime, a cast NFT price, NFTprice and an address paymentAddress of a received money.
3. The identity authentication method based on non-homogeneous certificates according to claim 1, wherein the specific implementation of S2 includes:
s2.1 a user purchases an NFT by a chain pay-off method, initiates a transfer to a service provider, and provides an address for receiving the corresponding NFT, as follows:
s2.1.1 user registers wallet address of block chain corresponding to NFT, containing (private key SK C Public key PK C Address A C );
S2.1.2 the user submits his own on-chain identity to the service provider, which confirms the authenticity of the on-chain identity by verifying the signature of the purchasing user on the message;
s2.1.3 user initiates a full transfer to a specific address according to the price calibrated by the service provider, and provides information such as NFT located block chain, protocol standard, NFT name, etc., and needs to provide an address for receiving corresponding NFT, the default receiving NFT address is the address initiating transfer;
or
S2.2 the user purchases NFT by a pay-under-chain approach, purchases NFT from the service provider and provides an address for receiving the corresponding NFT, as follows:
s2.2.1 user registers the address of the blockchain wallet containing the private key SK C Public key PK C Address A C );
S2.2.2 the user purchases an identity benefit from the service provider by way of a trusted, linked-down payment and provides an address for receiving the corresponding NFT.
4. The identity authentication method based on non-homogeneous certificates according to claim 1, wherein the specific implementation of S3 includes:
s3.1 Smart contracts automatically distribute NFT to purchasing users as follows:
s3.1.1 if the intelligent contract receives the user's full account transfer, the information provided by the user is used as a parameter to call the NFT distribution function to distribute the coinage and send the coinage to the address given by the user, and the validity time of the valid period is recorded; if the intelligent contract does not receive the user full account transfer, the NFT is refused to be distributed to the user address;
s3.1.2 intelligent contract inquires coinage side collection address corresponding to NFT distributed, and transfers received money to coinage side collection address;
or
S3.2 the service provider manually distributes NFT to purchasing users as follows:
s3.2.1 the service provider confirming receipt of the user's chain down full payment;
s3.2.2, the service provider calls the NFT distribution function to distribute the corresponding NFT for the user;
s3.2.3 the smart contract records the newly distributed NFT validity period validityTime.
5. The identity authentication method based on non-homogeneous certificates according to claim 1, wherein the specific implementation of S4 includes:
s4.1, connecting the user with a service provider website by using a wallet tool such as MetaMask;
s4.2, the user accesses special identity exclusive service or content;
s4.3 user uses private Key SK C Signing the identity authentication request data;
s4.4, the service provider website calls an intelligent contract to perform identity authentication and verification, and an address to be verified and an NFT name to be verified need to be specified, wherein the identity authentication and verification method specifically comprises the following steps:
s4.4.1 the intelligent contract calls the NFT verification function to verify whether the specified address holds the specified NFT, if it holds the specified NFT, the step 4.4.2 is carried out, if it does not hold the specified NFT, the verification failure message is returned;
s4.4.2 specifies that the address holds a specified NFT, the smart contract verifies that it contains a destroy marker Destored;
s4.4.3, if not containing the destroy mark Destoryed, the intelligent contract calls the NFT validity period query function to perform NFT validity period query;
s4.4.4, the NFT validity period inquiry function inquires the validity period of a specific NFT, if the NFT is not expired, the verification success message is returned; if the NFT is expired, returning a verification failure message;
s4.4.5 if the service provider receives the verification success message, it provides the user with the specific service or opens the specific content; if the authentication failure message is received, providing a specific service or opening specific content is denied.
6. The identity authentication method based on non-homogeneous general certificate as claimed in claim 1, further comprising: s5 NFT referral method among users, which comprises the following steps:
s5.1, a user A obtains a NFT donation receiving address of a user B;
s5.2 user A transfers a specific NFT to the NFT gifting receiving address using a wallet tool such as MetaMask;
the S5.3 smart contract calls the NFT transfer function to transfer the particular NFT from the NFT referral address to the NFT referral-receiving address.
7. The identity authentication method based on non-homogeneous general certificate as claimed in claim 1, further comprising: the S6NFT validity period query method specifically comprises the following steps:
s6.1, the inquirer inquires the validity period of the specific NFT, which is as follows:
s6.1.1 the inquirer obtains the name and number of NFT to be inquired;
s6.1.2 inquirer initiates NFT to inquire its validity period, and attaches the name and number information of NFT to be inquired;
s6.1.3 the intelligent contract calls the NFT validity query function to query the validity of a specific NFT;
S6.1.4NFT validity query function returns specific NFT validity time and whether expired message;
or the following method is adopted:
s6.2, an inquirer can inquire the validity period of NFT with the same name in batch, which is as follows:
s6.2.1 inquirer obtains NFT name to be inquired;
s6.2.2 inquirer initiates NFT to inquire validity period;
s6.2.3 calling NFT validity query function by intelligent contract to carry out validity query on NFT batch with same name;
S6.2.4NFT validity query function returns all NFT validity times, holder addresses, and if expired messages of the same name.
8. The identity authentication method based on non-homogeneous general certificate as claimed in claim 1, further comprising: s7 method for destroying expired NFT, specifically as follows:
s7.1, the user initiates an NFT destroying request and attaches an NFT name and NFT number information;
s7.2, receiving a user request by the intelligent contract, and checking whether the NFT holding address is an address for initiating destruction operation;
s7.3, if yes, checking whether the NFT contains a destruction mark, and if not, returning an unauthorized destruction message;
s7.4, if the destruction mark is not included, calling an NFT destruction function, inputting a user address, an NFT name and an NFT number as parameters, and if the destruction mark is included, returning a destruction failure message;
s7.5, the NFT destroying function executes destroying operation on the target NFT;
s7.6, the original NFT of the user is permanently destroyed, and the same NFT with the destruction mark is obtained at the same time.
9. A terminal memory device, characterized in that the memory device has built in program code for the method of any one of claims 1 to 8.
10. A network device, characterized in that the network device, when executing the instructions, comprises the instructions of the method of any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210581967.8A CN114862411A (en) | 2022-05-26 | 2022-05-26 | Identity authentication method based on non-homogeneous certificate, network equipment and terminal storage equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210581967.8A CN114862411A (en) | 2022-05-26 | 2022-05-26 | Identity authentication method based on non-homogeneous certificate, network equipment and terminal storage equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114862411A true CN114862411A (en) | 2022-08-05 |
Family
ID=82642132
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210581967.8A Pending CN114862411A (en) | 2022-05-26 | 2022-05-26 | Identity authentication method based on non-homogeneous certificate, network equipment and terminal storage equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114862411A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115619391A (en) * | 2022-10-31 | 2023-01-17 | 安徽高山科技有限公司 | Electronic commodity transfer method and system based on block chain non-homogeneous token |
CN115796868A (en) * | 2022-11-22 | 2023-03-14 | 紫绶(上海)信息科技有限公司 | Method for realizing multi-block chain simultaneous casting launch and multi-chain NFT application |
CN115834630A (en) * | 2022-11-22 | 2023-03-21 | 紫绶(上海)信息科技有限公司 | A complete decentralized user identity creation method of management and use |
CN116436702A (en) * | 2023-06-13 | 2023-07-14 | 浙江毫微米科技有限公司 | Access method, device, computer and storage medium based on non-homogeneous pass |
WO2024065753A1 (en) * | 2022-09-30 | 2024-04-04 | Supersymmetry Pte. Ltd. | Nft minting method and apparatus with digital certificate-based role authentication and nft role verifying method and apparatus |
-
2022
- 2022-05-26 CN CN202210581967.8A patent/CN114862411A/en active Pending
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024065753A1 (en) * | 2022-09-30 | 2024-04-04 | Supersymmetry Pte. Ltd. | Nft minting method and apparatus with digital certificate-based role authentication and nft role verifying method and apparatus |
CN115619391A (en) * | 2022-10-31 | 2023-01-17 | 安徽高山科技有限公司 | Electronic commodity transfer method and system based on block chain non-homogeneous token |
CN115796868A (en) * | 2022-11-22 | 2023-03-14 | 紫绶(上海)信息科技有限公司 | Method for realizing multi-block chain simultaneous casting launch and multi-chain NFT application |
CN115834630A (en) * | 2022-11-22 | 2023-03-21 | 紫绶(上海)信息科技有限公司 | A complete decentralized user identity creation method of management and use |
CN116436702A (en) * | 2023-06-13 | 2023-07-14 | 浙江毫微米科技有限公司 | Access method, device, computer and storage medium based on non-homogeneous pass |
CN116436702B (en) * | 2023-06-13 | 2024-09-17 | 浙江毫微米科技有限公司 | Access method, device, computer and storage medium based on non-homogeneous pass |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114862411A (en) | Identity authentication method based on non-homogeneous certificate, network equipment and terminal storage equipment | |
CN110537195B (en) | Method for permitting card use and server using same | |
TW550909B (en) | Secure wireless electronic-commerce system with digital product certificates and digital license certificates | |
CN109478298B (en) | Method and system for realizing block chain | |
US10885501B2 (en) | Accredited certificate issuance system based on block chain and accredited certificate issuance method based on block chain using same, and accredited certificate authentication system based on block chain and accredited certificate authentication method based on block chain using same | |
US6463534B1 (en) | Secure wireless electronic-commerce system with wireless network domain | |
JP5051678B2 (en) | Method and system for performing electronic payments | |
KR100930457B1 (en) | Authentication and payment system and method using mobile communication terminal | |
RU2676896C2 (en) | Method and system related to authentication of users for accessing data networks | |
JP2003521078A (en) | Payment device and method for secure payment | |
JP2008501177A (en) | License management in an information distribution system that protects privacy | |
JP2003067326A (en) | Resource distribution system on network and mutual authentication system | |
RU2007138849A (en) | NETWORK COMMERCIAL TRANSACTIONS | |
KR100926153B1 (en) | System For Wireless Public Certification Service Using Electronic Signature With Mobile Terminal and Method For Providing said Service | |
CN109670825A (en) | One kind being based on the associated digital asset real name register system of certificate | |
CN109741070B (en) | Account management method and device based on network certificate | |
CN112950209B (en) | Nuclear power experience feedback information management method and system based on block chain | |
JP2003091613A (en) | Licensing method and licensing system | |
JP2004102872A (en) | Online commerce system for personal information protection | |
US20030074321A1 (en) | Method and system for distribution of digital media and conduction of electronic commerce in an un-trusted environment | |
CN113395257B (en) | Method and device for realizing tax data processing system | |
KR101309835B1 (en) | A system for total financial transaction | |
CN1954333A (en) | Electronic payment of content | |
US20070283426A1 (en) | Method for Assigning an Authentication Certificate and Infrastructure for Assigning Said Certificate | |
KR102347642B1 (en) | System and method of agent service for subscription of financial instrument and computer program for the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |