CN115442123A - Real-name system authentication method and device, electronic equipment and computer readable medium - Google Patents

Real-name system authentication method and device, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN115442123A
CN115442123A CN202211062795.XA CN202211062795A CN115442123A CN 115442123 A CN115442123 A CN 115442123A CN 202211062795 A CN202211062795 A CN 202211062795A CN 115442123 A CN115442123 A CN 115442123A
Authority
CN
China
Prior art keywords
node
information
real
verification
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211062795.XA
Other languages
Chinese (zh)
Other versions
CN115442123B (en
Inventor
田新雪
李朝霞
肖征荣
马书惠
杨子文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202211062795.XA priority Critical patent/CN115442123B/en
Publication of CN115442123A publication Critical patent/CN115442123A/en
Application granted granted Critical
Publication of CN115442123B publication Critical patent/CN115442123B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a real-name system authentication method, a real-name system authentication device, electronic equipment and a computer readable medium, which are applied to a first server in a meta universe and comprise the following steps: receiving an inquiry request sent by a first node, wherein the inquiry request is used for requesting to inquire whether a second node is subjected to real-name system verification, and the first node and the second node are different user nodes in a meta-universe; responding to the query request, and querying in preset real-name node data to obtain target verification information; the target verification record corresponding to the second node in the real-name node data is sent to the first server by the second server, the target verification record is obtained by the second server based on first broadcast information which is provided by the bank node and corresponds to the second node, and the second server and the bank node are nodes in the blockchain network corresponding to the metasma; providing target authentication information to the first node. The method can conveniently and accurately carry out real-name authentication on the user nodes in the meta universe.

Description

Real-name authentication method and device, electronic equipment and computer readable medium
Technical Field
The invention relates to the technical field of computers, in particular to a real-name authentication method and device, electronic equipment and a computer readable medium. The invention also relates to a method for providing the real-name system verification record and an information broadcasting method.
Background
The metauniverse (Metaverse) is a virtual world which is linked and created by using a scientific and technological means and is mapped and interacted with the real world, and is provided with a digital living space of a novel social system.
Currently, in the meta universe, when resource data interaction is performed between different user nodes, the interaction is usually performed directly. For example, in the meta universe, when a user node a and a user node need to perform a financial transaction, the financial transaction can be completed by using the transaction system provided by the meta universe directly.
However, due to the virtual property of the meta-space, the identity of the user existing in the meta-space is usually unreliable, which makes it possible for one party to bring safety hazards to the other party's private data and the terminal device used if the identity of the other party is unreliable in the case of directly performing resource data interaction without performing identity verification on the interacting party in the meta-space.
Disclosure of Invention
Therefore, the invention provides a real-name system authentication method to solve the problem that potential safety hazards may be brought to user privacy data and terminal equipment used by a user due to direct resource interaction of user nodes in a meta universe in the related technology.
In order to achieve the above object, a first aspect of the present invention provides a real-name authentication method applied to a first server in a meta universe, the method including:
receiving a query request sent by a first node, wherein the query request is used for requesting whether a second node is subjected to real-name system verification or not, and the first node and the second node are different user nodes in the meta universe;
responding to the query request, querying in preset real-name node data to obtain target verification information;
the target verification information represents a real-name verification result of the second node, a target verification record corresponding to the second node in the real-name node data is sent to the first server by the second server, the target verification record is obtained by the second server based on first broadcast information which is provided by a bank node and corresponds to the second node, and the second server and the bank node are nodes in a block chain network corresponding to the metasma;
providing the target authentication information to the first node.
Optionally, the querying, in response to the query request, in preset real-name node data to obtain target verification information, includes:
obtaining a target node identification of the second node from the query request;
and inquiring in the real-name system node data based on the target node identification to obtain the target verification information.
Optionally, after providing the target verification information to the first node, the method further comprises:
and storing real-name authentication information corresponding to the second node in the blockchain network.
Optionally, the query request includes a request sent by the first node when the first node desires to perform resource interaction with the second node.
In order to achieve the above object, a second aspect of the present invention further provides a real-name system verification record providing method applied to a second server in a blockchain network, the method including:
receiving first broadcast information which is sent by a bank node in the block chain network and corresponds to a second node;
verifying a first private key signature corresponding to the first broadcast information, and obtaining a target node identifier of the second node and a verification result corresponding to the second node from the first broadcast information under the condition that the verification is passed;
obtaining a target verification record according to the target node identification and the verification result;
providing the target verification record to a first server in a metasame, wherein the metasame corresponds to the blockchain network.
In order to achieve the above object, a third aspect of the present invention further provides an information broadcasting method applied to a bank node in a blockchain network, where the method includes:
receiving second broadcast information sent by a third node in the block chain network;
the third node is a user node corresponding to a second node in the block chain network, the second broadcast information includes a bank identifier of the bank node, a target node identifier of the second node and a target encryption result, the target encryption result is obtained by encrypting preset identity information and password information of the third node, and the password information includes a query password of a bank card held by the third node in a bank corresponding to the bank node;
verifying a second private key signature corresponding to the second broadcast information, and matching and verifying the target encryption result and real-name system information corresponding to the third node in a preset database under the condition that the verification is passed so as to obtain a verification result, wherein the preset database is used for storing user real-name system information in a bank corresponding to the bank node;
generating first broadcast information according to the target node identification and the verification result;
broadcasting the first broadcast information in the blockchain network to trigger a second server in the blockchain network to generate a target verification record corresponding to the second node based on the first broadcast information, providing the target verification record to a first server in a metas, so that the first server obtains target verification information for responding to a query request sent by a first node after receiving the query request for requesting whether the second node is subjected to real-name verification according to the target verification record, and providing the target verification information to the first node to finish real-name authentication of the second node;
the target verification information represents a real-name system verification result of the second node, the metasma corresponds to the blockchain network, and the first node is a user node different from the second node in the metasma.
Optionally, the target encryption result comprises at least one of a first encryption result and a second encryption result; the first encryption result is obtained by encrypting first preset identity information of the third node and the password information, the second encryption result is obtained by encrypting second preset identity information of the third node and the password information, the first preset identity information comprises a name of the third node, and the second preset identity information comprises identity identification information of the third node.
In order to achieve the above object, a fourth aspect of the present invention provides a real-name authentication apparatus applied to a first server in a meta universe, the apparatus comprising:
a request receiving module, configured to receive an inquiry request sent by a first node, where the inquiry request is used to request to inquire whether a second node has undergone real-name system verification, and the first node and the second node are different user nodes in the metasma;
the verification information obtaining module is used for responding to the query request and querying in preset real-name node data to obtain target verification information;
the target verification information represents a real-name system verification result of the second node, a target verification record corresponding to the second node in the real-name system node data is sent to the first server by the second server, the target verification record is obtained by the second server based on first broadcast information which is provided by a bank node and corresponds to the second node, and the second server and the bank node are nodes in a block chain network;
a verification information providing module for providing the target verification information to the first node.
In order to achieve the above object, a fifth aspect of the present invention also provides an electronic device, comprising:
one or more processors;
memory having one or more programs stored thereon which, when executed by the one or more processors, cause the one or more processors to implement the method according to any one of the first, second and third aspects of the present invention;
one or more I/O interfaces connected between the processor and the memory and configured to enable information interaction between the processor and the memory.
To achieve the above object, a sixth aspect of the present invention also provides a computer readable medium on which a computer program is stored, which program, when executed by a processor, implements the method according to any one of the first, second and third aspects of the present invention.
The invention has the following advantages: according to the embodiment of the invention, after receiving a query request which is sent by a first node and used for requesting to query whether a second node is subjected to real-name system verification, a first server in the meta universe can obtain target verification information representing a real-name system verification result of the second node by querying in preset real-name system node data; because the target verification record corresponding to the second node in the real-name system node data is provided to the second server in the blockchain network after the user identity is verified by the bank node having the user real-name system information in the blockchain network corresponding to the meta universe, and is provided to the first server by the second server, after the first server provides the target verification information to the first node, the first node can conveniently and accurately obtain the real-name system verification result aiming at the second node when expecting to perform resource interaction with the second node, so that the resource interaction with the second node can be safely and reliably performed, and potential safety hazards caused to the private data of the first node and the used terminal equipment when performing resource interaction with the user node with an unreliable identity can be avoided.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
Fig. 1 is a schematic flowchart of a real-name authentication method according to an embodiment of the present invention.
Fig. 2 is a schematic flow chart of a method for providing a real-name verification record according to an embodiment of the present invention.
Fig. 3 is a flowchart illustrating an information broadcasting method according to an embodiment of the present invention.
Fig. 4 is a schematic diagram of a real-name authentication process according to an embodiment of the present invention.
Fig. 5 is a block diagram of a real-name authentication apparatus according to an embodiment of the present invention.
Fig. 6 is a block diagram illustrating a real-name verification record providing apparatus according to an embodiment of the present invention.
Fig. 7 is a block diagram of an information broadcasting apparatus according to an embodiment of the present invention.
Fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present invention, are given by way of illustration and explanation only, not limitation.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order; furthermore, the embodiments and features of the embodiments of the present invention may be arbitrarily combined with each other without conflict.
As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
When used herein, the terms "comprises," comprising, "and/or" comprising, "" 8230, "" made from 8230, "" specifying the presence of stated features, integers, steps, operations, elements, and/or components, do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present invention and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
With the gradual development of the meta universe, the simulation degree of the meta universe to the real world is gradually enhanced, so that a set of trusted system is established in the meta universe to solve the technical problem that potential safety hazards can be brought to private data of one party and used terminal equipment due to unreliable identity of the other party when resource interaction is carried out among different user nodes. Please refer to fig. 1, which is a flowchart illustrating a real-name authentication method according to an embodiment of the present invention. The method may be implemented by an electronic device, and in particular may be implemented by a first server in the metasphere.
As shown in fig. 1, the real-name authentication method provided by the embodiment of the present invention may include the following steps S101 to S103, which are described in detail below.
Step S101, receiving an inquiry request sent by a first node, wherein the inquiry request is used for requesting to inquire whether a second node is subjected to real-name system verification, and the first node and the second node are different user nodes in the meta universe.
In the embodiment of the present invention, the first node may be a virtual user node corresponding to a real user in the real world in the meta space; in correspondence, the second node may be a virtual user node in the metasphere corresponding to a real user of the real world, different from the first node. For example, the first node may be a node corresponding to user B in the real world in the metasphere, and the second node may be a node corresponding to user a in the real world in the metasphere.
In some embodiments, the query request may be a request issued by the first node when the first node desires to perform a resource interaction with the second node, for requesting a query whether the second node is authenticated by a real name system.
In some embodiments, the resource interaction that the first node desires to perform with the second node may be data interaction processing in different scenarios such as financial transaction, virtual friend making, virtual office, and the like, which is not limited by the present invention.
In the embodiment of the present invention, unless otherwise specified, the resource interaction that the first node desires to perform with the second node is taken as an example of a financial transaction, that is, the first node desires to perform a financial transaction with the second node in the metasma.
After the step S101, executing a step S102, responding to the query request, querying in preset real-name node data, and obtaining target verification information; the target verification information represents a real-name verification result of the second node, a target verification record corresponding to the second node in the real-name node data is sent to the first server by the second server, the target verification record is obtained by the second server based on first broadcast information corresponding to the second node and provided by a bank node, and the second server and the bank node are nodes in a block chain network corresponding to the metasma.
In the embodiment of the invention, the real-name system node data is data for representing whether the user node in the meta universe is subjected to real-name system verification or not. The real-name node data may include at least one verification record, wherein each verification record corresponds to a user node in the meta-universe, and the data format of the real-name node data may be, for example, as shown in table 1 below.
User node identification Whether it is a real-name system user
Node aa Is that
Node bb Whether or not
TABLE 1
That is, in the embodiment of the present invention, the verification record in the real-name node data may be a data record shown in table 1, the verification record may include a data field for representing a real-name verification result of the corresponding node, the data field may be, for example, a field "whether the corresponding node is a real-name user" in table 1, and the content in the data field is used to indicate whether the corresponding node is a real-name user.
That is, in some embodiments, the querying in the preset real-name node data in response to the query request to obtain the target verification information includes: obtaining a target node identification of the second node from the query request; and inquiring in the real-name node data based on the target node identification to obtain target verification information.
Taking the real-name node data stored in the first server as the data shown in table 1 as an example, if the target node identifier of the second node included in the query request received by the first server is "node aa", the first server may obtain that the target verification information corresponding to the second node is "yes" based on the data shown in table 1.
In the above description, the node is indicated as the real-name user when the verification information corresponding to the node is "yes", and the node is indicated as not the real-name user when the verification information corresponding to the node is "no"; in particular implementation, other ways may also be used, for example, using "1" and "0" to respectively indicate whether a node is a real-name user; furthermore, "0" may be used to indicate that the node has not been verified by the real name system, "1" may be used to indicate that the node has been verified by the real name system and the verification is successful, and "-1" may be used to indicate that the node has failed to be verified by the real name system, so as to more accurately indicate the real name system verification status of the node.
The second server can be a server which exists in the real world and is in the block chain network corresponding to the meta universe, receives first broadcast information which is broadcasted by the bank nodes in the block chain network and represents identity real-name information of the second nodes, and generates target verification records corresponding to the second nodes on the basis of the first broadcast information; then, the second server provides the target verification record to the corresponding first server in the meta universe, so that the first server can conveniently and accurately determine whether the second node is subjected to real-name verification or not in the meta universe based on real-name verification information provided in the real world and aiming at the identity of the second node.
The bank node can be a node corresponding to an entity bank in the real world, the bank node is an originator node in a block chain network corresponding to the metasma, and a public key and an identity of the bank node are stored in an originator block of the block chain network; and the bank contains the bank card of the real user represented by the third node, that is, the real user represented by the third node holds the bank card of the bank, so that the real identity information of the third node can be stored in the preset database corresponding to the bank node.
The third node may be a user node corresponding to a real user in the real world in the blockchain network, and the third node corresponds to the second node in the metas. For ease of understanding, taking a user in the real world as user a as an example, the user node of user a in the blockchain network may be denoted as node a, and the user node of user a in the blockchain network may be denoted as node aa, then in this embodiment, node a is a third node, and node aa is a second node corresponding to node a in the metasphere.
In the embodiment of the invention, based on the characteristics that banks in the real world have user real-name system information and the characteristics that a block chain network is decentralized and information cannot be tampered and traced, after a bank node verifies a real-name system of a user corresponding to a virtual user node in a metas by using the stored user real-name system information, the bank node broadcasts first broadcast information which is obtained after verification and contains a real-name system verification result of the corresponding virtual user node in the metas to the block chain network, and then a second server generates a verification record of the corresponding virtual user node based on the first broadcast information and sends the verification record to the first server in the corresponding metas for storage, so that the first server in the metas can conveniently and accurately respond to a query request which is sent by the first node and is directed to the second node, and the identity of the second node is authenticated in a real-name system mode.
For the convenience of understanding, the following description is provided on how the bank node performs real-name authentication on the second node and broadcasts the first broadcast information, which is obtained after the authentication and contains the real-name authentication result of the second node, to the blockchain network.
In an embodiment of the present invention, the bank node may obtain the first broadcast information and broadcast the first broadcast information to the blockchain network by: receiving second broadcast information sent by a third node in the block chain network; the third node is a user node corresponding to the second node in the block chain network, the second broadcast information comprises a bank identifier of the bank node, a target node identifier of the second node and a target encryption result, the target encryption result is obtained by encrypting preset identity information and password information of the third node, and the password information comprises an inquiry password of a bank card held in a bank corresponding to the bank node by the third node; verifying a second private key signature corresponding to the second broadcast information, and matching and verifying a target encryption result and real-name system information corresponding to a third node in a preset database under the condition that the second private key signature passes verification to obtain a verification result, wherein the preset database is used for storing user real-name system information in a bank corresponding to the bank node; generating first broadcast information according to the target node identification and the verification result; broadcasting first broadcast information in a blockchain network to trigger a second server in the blockchain network to generate a target verification record corresponding to a second node based on the first broadcast information, providing the target verification record to a first server in a metasma so that the first server obtains target verification information for responding to a query request sent by the first node after receiving the query request for requesting whether the second node is subjected to real-name verification or not according to the target verification record, and providing the target verification information to the first node to finish real-name authentication of the second node; the target verification information represents a real-name system verification result of the second node, the metasma corresponds to the blockchain network, and the first node is a user node different from the second node in the metasma.
In this embodiment, the target encryption result includes at least one of a first encryption result and a second encryption result, where the first encryption result is obtained by encrypting first preset identity information and password information of the third node, the second encryption result is obtained by encrypting second preset identity information and password information of the third node, the first preset identity information includes a name of the third node, and the second preset identity information includes identity information of the third node.
Taking the second node as the "node aa" and the third node as the "node a", for example, a bank of a bank card held by a user usually stores real-name information of the user, such as a name, identification information, a phone number, and the like, so the "node a" may perform a preset encryption process on preset identification information of the "node a", such as a name and password information of the "node a corresponding to the" node a ", such as a phone bank inquiry password, to generate an encryption result 1, perform a preset encryption process on the identification information of the" node a "and the password information to generate an encryption result 2, and broadcast the second broadcast information to the block chain network in a manner of using a broadcast message signed by a private key to generate a second private key signature on the second broadcast information by using the private key to sign the second broadcast information.
In order to avoid unnecessary processing after the second broadcast information is sent to the blockchain network at the third node, and after the bank node in the blockchain network receives the second broadcast information, the bank node may first perform bank identification verification, that is, first confirm whether the bank identification in the second broadcast information is a self identification, if so, verify a second private key signature corresponding to the second broadcast information, and in case of passing verification, perform matching verification on the encryption result 1 and the encryption result 2 in the second broadcast information and real-name information corresponding to the third node in a preset database corresponding to the bank node, if matching verification is successful, indicate that the user is a real-name user of the bank, so that the first broadcast information may be generated according to a target node identification "aa" of the second node and a verification result for the second node, and sign the first broadcast information based on a private key of the bank node, generate a first private key signature, so as to send the first broadcast information to the blockchain network by using the broadcast information signed by the private key.
In the above description, the target encryption result is described as an example including both the first encryption result and the second encryption result, but in the specific implementation, of course, either one of the two encryption results may be used as the target encryption result, or the target encryption result may be generated according to other preset identity information of the user, and the present invention is not limited in particular. In the embodiment of the present invention, the preset encryption process may be the same process as that used when the bank node encrypts the real-name system information of the user, or may be a corresponding encryption process that is agreed with the bank node in advance.
In the above detailed description of how the bank node performs the real-name system verification on the second node and broadcasts the first broadcast information, which is obtained after the verification and contains the real-name system verification result of the second node, to the blockchain network, the following detailed description of how the second server in the blockchain network generates and provides the real-name system verification record corresponding to the third node to the first server based on the first broadcast information after the bank node sends the first broadcast information to the blockchain network includes the following steps: receiving first broadcast information which is sent by a bank node in a block chain network and corresponds to a second node; verifying a first private key signature corresponding to the first broadcast information, and obtaining a target node identifier of the second node and a verification result corresponding to the second node from the first broadcast information under the condition that the first private key signature passes the verification; obtaining a target verification record according to the target node identification and the verification result; the target-validation record is provided to a first server in the meta universe.
As can be seen from the above description, in the embodiment of the present invention, after receiving the query request sent by the first node, the target verification record relied on by the first server in the meta universe to determine whether the second node is subjected to real-name verification is generated by the bank node existing in the blockchain network in the real world after performing matching verification on the real user information sent by the third node corresponding to the real user in the blockchain network and the user real-name information stored in the bank node.
After the target authentication information for the second node is obtained through the above step S102, step S103 may be performed to provide the target authentication information to the first node.
That is, after the first server responds to the query request sent by the first node and queries the real-name node data stored in the first server to obtain the target verification information corresponding to the second node, the target verification information can be provided to the first node, so that the first node determines whether the second node is safe and reliable based on the target verification information, and further determines whether to perform resource interaction with the second node.
For example, when a first node desires to perform a financial transaction with a second node, an inquiry request may be sent to a first server, and when the target verification information provided by the first server is that a user corresponding to the second node is a real-name user, the first node performs a financial transaction with the second node; and if the target verification information indicates that the user corresponding to the second node is not a real-name user, the first node can give up financial transactions with the second node to ensure the security of the private data and the terminal equipment.
For another example, when the first node desires to make a friend with the second node, the first node may send a query request to the first server, and send an add-friend application to the second node and perform a conversation with the friend when the target verification information provided by the first server is that the user corresponding to the second node is a real-name user.
In addition, after the first server provides the target verification information to the first node, the first server may further generate real-name authentication information for an authentication process of the second node, where the real-name authentication information may specifically include contents such as a requester identifier, a querier identifier, and verification result information, and the first server sends the authentication information to the second server, so as to record the authentication information in a new block of the blockchain network, and further record the authentication information in a blockchain ledger, thereby facilitating subsequent tracing and verification.
In summary, in the real-name authentication method provided in the embodiment of the present invention, after receiving a query request sent by a first node and used for requesting to query whether a second node is subjected to real-name verification, a first server in the meta universe queries preset real-name node data to obtain target verification information representing a real-name verification result of the second node; because the target verification record corresponding to the second node in the real-name system node data is provided to the second server in the blockchain network after the user identity is verified by the bank node having the user real-name system information in the blockchain network corresponding to the meta universe, and is provided to the first server by the second server, after the first server provides the target verification information to the first node, the first node can conveniently and accurately obtain the real-name system verification result aiming at the second node when expecting to perform resource interaction with the second node, so that the resource interaction with the second node can be safely and reliably performed, and potential safety hazards caused to the private data of the first node and the used terminal equipment when performing resource interaction with the user node with an unreliable identity can be avoided.
An embodiment of the present invention further provides a method for providing a real-name verification record, where the method may be applied to a second server in a blockchain network, where the blockchain network corresponds to a meta-universe including the first server, and the second server corresponds to the first server.
Please refer to fig. 2, which is a flowchart illustrating a method for providing a real-name verification record according to an embodiment of the present invention. As shown in fig. 2, the method for providing a real-name verification record according to an embodiment of the present invention may include the following steps S201 to S204, which are described in detail below.
Step S201, receiving first broadcast information corresponding to the second node and sent by the bank node in the blockchain network.
Step S202, verifying the first private key signature corresponding to the first broadcast information, and obtaining the target node identifier of the second node and a verification result corresponding to the second node from the first broadcast information when the verification is passed.
And step S203, obtaining a target verification record according to the target node identification and the verification result.
Step S204, providing the target verification record to a first server in a metasma, wherein the metasma corresponds to the blockchain network.
The embodiment of the invention also provides an information broadcasting method which can be applied to the bank nodes in the block chain network, wherein the block chain network corresponds to the metaspace comprising the first server.
Please refer to fig. 3, which is a flowchart illustrating an information broadcasting method according to an embodiment of the present invention. As shown in fig. 3, the information broadcasting method according to the embodiment of the present invention may include the following steps S301 to S304, which are described in detail below.
Step S301, receiving second broadcast information sent by a third node in the block chain network; the third node is a user node corresponding to a second node in the block chain network, the second broadcast information includes a bank identifier of the bank node, a target node identifier of the second node and a target encryption result, the target encryption result is obtained by encrypting preset identity information and password information of the third node, and the password information includes a query password of a bank card held by the third node in a bank corresponding to the bank node.
In some embodiments, the target encryption result comprises at least one of a first encryption result and a second encryption result; the first encryption result is obtained by encrypting first preset identity information and the password information of the third node, the second encryption result is obtained by encrypting second preset identity information and the password information of the third node, the first preset identity information comprises a name of the third node, and the second preset identity information comprises identity identification information of the third node.
Step S302, verifying the second private key signature corresponding to the second broadcast information, and performing matching verification on the target encryption result and real-name system information corresponding to the third node in a preset database to obtain a verification result when the verification is passed, where the preset database is used to store user real-name system information in a bank corresponding to the bank node.
Step S303, generating first broadcast information according to the target node identification and the verification result.
Step S304, sending the first broadcast information to the blockchain network to trigger a second server in the blockchain network to generate a target verification record corresponding to the second node based on the first broadcast information, and providing the target verification record to a first server in the metasma, so that the first server obtains target verification information for responding to a query request sent by a first node after receiving the query request for requesting whether the second node is subjected to real-name verification according to the target verification record, and completes real-name authentication of the second node by providing the target verification information to the first node; the target verification information represents a real-name system verification result of the second node, the metasma corresponds to the blockchain network, and the first node is a user node different from the second node in the metasma.
For convenience of understanding, in the following, with reference to fig. 4, a real-name authentication method provided in an embodiment of the present invention is described, where in fig. 4, a user node corresponding to a real user "user a" in the real world in a blockchain network is taken as a third node, a user node corresponding to a real user "user B" in the real world in the metastacle is taken as a second node, and a user node corresponding to a real user "user B" in the real world in the metastacle is taken as a first node.
As shown in fig. 4, in the real world, the third node encrypts the name of "user a" and the telephone password of the bank card held by "user a" in the bank to obtain an encrypted result 1, and encrypts the identification information of "user a" and the telephone password to obtain an encrypted result 2 by performing step S401; then, step S402 is executed, broadcast information 1 is generated according to the encryption result 1, the encryption result 2, the node identifier of the second node, and the bank identifier "bank identifier 1" of the bank, and the broadcast information 1 is signed by using its own private key 1 to obtain a private key signature 1; after that, step S403 is performed to transmit the broadcast information 1 to the blockchain network.
Continuing to refer to fig. 4, after the bank node receives the broadcast message 1; step S404 may be executed to obtain "bank identifier 1" in the broadcast information 1, and perform bank identifier verification to determine whether the identifier is a self identifier; and under the condition that the identification is determined as the self identification, executing the step S405, carrying out private key signature verification on the private key signature 1 corresponding to the broadcast information 1, under the condition that the verification is passed, acquiring an encryption result 1 and an encryption result 2 from the broadcast information 1, and carrying out matching verification on the encryption result 1 and the encryption result 2 and the real-name information of the user A in the preset database 1 corresponding to the encryption result 1 and the encryption result 2 to obtain a verification result 1; then, step S406 is executed, broadcast information 2 is generated according to the verification result 1 of the node identifier of the second node, and the broadcast information 2 is signed by using its own private key 2 to obtain a private key signature 2; after that, step S407 is performed to transmit the broadcast information 2 to the blockchain network.
Continuing to refer to fig. 4, after the second server receives the broadcast information 2 sent by the bank node, step S408 is executed to perform private key signature verification on the private key signature 2 corresponding to the broadcast information 2, and in a case that the verification is passed, obtain a node identifier and a verification result 1 of the second node from the broadcast information 2 to generate a verification record 1; thereafter, step S409 is executed to provide the verification record 1 to the first server.
With continued reference to fig. 4, after the first server receives the verification record 1, step S410 may be executed to store the verification record 1 in the real-name node data.
Then, when the first node in the meta universe desires to perform resource interaction with the second node, for example, financial interaction is performed, in order to ensure the authenticity and reliability of the second node, step S411 is performed to send an inquiry request to the first server to inquire whether the second node is subjected to real-name system verification.
After receiving the query request, the first server executes step S412 to respond to the query request and query the real-name node data, so as to obtain target verification information according to the verification record 1; and performing step S413 of providing the target authentication information to the first node.
After receiving the target verification information, the first node executes step S414 to perform resource interaction with the second node when the target verification information indicates that the second node is a real-name user; alternatively, if the target authentication information indicates that the second node is not a real-name user, step S415 is executed to discard the resource interaction with the second node.
It should be noted that, in the embodiment shown in fig. 4, there is no precedence order between the execution timing of step S411 and the previous steps S401 to S410, and the first node may send the query request to the first server at any time.
In addition, it should be further noted that, the steps of the various methods in the foregoing method embodiments are divided for clarity of description, and may be combined into one step or split into some steps during implementation, and the steps are decomposed into multiple steps, so long as the steps include the same logical relationship, and the steps are within the protection scope of the patent; it is within the scope of this patent to add insignificant modifications or introduce insignificant designs to the algorithms or processes, but not to change the core designs of the algorithms and processes.
An embodiment of the present invention further provides an authentication apparatus 500 for real-name system, which can be applied to a first server in a meta universe, as shown in fig. 5, and includes: a request receiving module 501, an authentication information obtaining module 502, and an authentication information providing module 503.
The request receiving module 501 is configured to receive an inquiry request sent by a first node, where the inquiry request is used to request to inquire whether a second node is subjected to real-name system verification, and the first node and the second node are different user nodes in the meta universe.
The verification information obtaining module 502 is configured to respond to the query request, and query in preset real-name node data to obtain target verification information; the target verification information represents a real-name system verification result of the second node, a target verification record corresponding to the second node in real-name system node data is sent to the first server by the second server, the target verification record is obtained by the second server based on first broadcast information which is provided by a bank node and corresponds to the second node, and the second server and the bank node are nodes in a block chain network.
In some embodiments, the verification information obtaining module 502, when querying in the preset real-name node data in response to the query request to obtain the target verification information, may be configured to: obtaining a target node identification of the second node from the query request; and inquiring in the real-name system node data based on the target node identification to obtain the target verification information.
The verification information providing module 503 is configured to provide the target verification information to the first node.
In some embodiments, the apparatus further comprises an authentication information storage module configured to store real-name authentication information corresponding to the second node in the blockchain network.
An embodiment of the present invention further provides a device for providing a real-name verification record, which can be applied to a second server in a blockchain network, as shown in fig. 6, where the device 600 for providing a real-name verification record includes: a first broadcast information receiving module 601, an information obtaining module 602, an authentication record obtaining module 603, and an authentication record providing module 604.
The first broadcast information receiving module 601 is configured to receive first broadcast information corresponding to a second node, where the first broadcast information is sent by a bank node in the blockchain network.
The information obtaining module 602 is configured to verify a first private key signature corresponding to the first broadcast information, and obtain, from the first broadcast information, a target node identifier of the second node and a verification result corresponding to the second node when the first private key signature passes the verification.
The verification record obtaining module 603 is configured to obtain a target verification record according to the target node identifier and the verification result.
The validation record providing module 604 is configured to provide the target validation record to a first server in a metasma, wherein the metasma corresponds to the blockchain network.
An embodiment of the present invention further provides an information broadcasting apparatus, which may be applied to a bank node in a block chain network, as shown in fig. 7, where the information broadcasting apparatus 700 includes: a second broadcast information receiving module 701, a verification result obtaining module 702, a first broadcast information generating module 703 and an information broadcasting module 704.
The second broadcast information receiving module 701 is configured to receive second broadcast information sent by a third node in the blockchain network; the third node is a user node corresponding to a second node in the block chain network, the second broadcast information includes a bank identifier of the bank node, a target node identifier of the second node and a target encryption result, the target encryption result is obtained by encrypting preset identity information and password information of the third node, and the password information includes an inquiry password of a bank card held by the third node in a bank corresponding to the bank node.
The verification result obtaining module 702 is configured to verify the second private key signature corresponding to the second broadcast information, and perform matching verification on the target encryption result and the real-name information corresponding to the third node in a preset database to obtain a verification result when the verification is passed, where the preset database is used to store the user real-name information in the bank corresponding to the bank node.
The first broadcast information generating module 703 is configured to generate first broadcast information according to the target node identifier and the verification result.
The information broadcasting module 704 is configured to send the first broadcast information to the blockchain network, so as to trigger a second server in the blockchain network to generate a target verification record corresponding to the second node based on the first broadcast information, and by providing the target verification record to a first server in the metas, after receiving a query request sent by the first node to request that whether the second node is subjected to real-name verification, the first server obtains target verification information for responding to the query request according to the target verification record, and by providing the target verification information to the first node, completes real-name authentication of the second node; the target verification information represents a real-name system verification result of the second node, the metasma corresponds to the blockchain network, and the first node is a user node different from the second node in the metasma.
The functions or included modules of the apparatus provided in the embodiment of the present invention may be used to execute the method described in the above corresponding method embodiment, and for concrete implementation and technical effects, reference may be made to the description of the above method embodiment, and for brevity, details are not described here again.
Each module in the present embodiment is a logical module, and in practical applications, one logical unit may be one physical unit, may be a part of one physical unit, or may be implemented by a combination of a plurality of physical units. In addition, in order to highlight the innovative part of the present invention, elements that are not so closely related to solving the technical problems proposed by the present invention are not introduced in the present embodiment, but this does not indicate that other elements are not present in the present embodiment.
An embodiment of the present invention provides an electronic device, including:
one or more processors 801;
a memory 802 on which one or more programs are stored which, when executed by the one or more processors, cause the one or more processors to implement the method of any of the above embodiments;
one or more I/O interfaces 803 coupled between the processor and the memory are configured to enable information interaction between the processor and the memory.
The processor 801 is a device with data processing capability, which includes but is not limited to a Central Processing Unit (CPU), etc.; memory 802 is a device having data storage capabilities including, but not limited to, random access memory (RAM, more specifically SDRAM, DDR, etc.), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), FLASH memory (FLASH); an I/O interface (read/write interface) 803 is connected between the processor 801 and the memory 802, and can realize information interaction between the processor 801 and the memory 802, which includes but is not limited to a data Bus (Bus) and the like.
In some embodiments, the processor 801, memory 802, and I/O interface 803 are interconnected via a bus, which in turn connects with other components of the computing device.
An embodiment of the present invention further provides a computer-readable medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method in any one of the above embodiments, and for avoiding repeated descriptions, specific steps are not repeated herein.
It will be understood by those of ordinary skill in the art that all or some of the steps of the above inventive method, systems, functional modules/units in the apparatus may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a component of' 8230; \8230;" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element.
Those skilled in the art will appreciate that although some embodiments described herein include some features included in other embodiments, not others, combinations of features of different embodiments are meant to be within the scope of embodiments of the invention and form different embodiments.
It will be understood that the above embodiments are merely exemplary embodiments adopted to illustrate the principles of the present invention, and the present invention is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (10)

1. A real-name authentication method applied to a first server in a metasphere, the method comprising:
receiving a query request sent by a first node, wherein the query request is used for requesting whether a second node is subjected to real-name system verification or not, and the first node and the second node are different user nodes in the meta universe;
responding to the query request, querying in preset real-name node data to obtain target verification information;
the target verification information represents a real-name verification result of the second node, a target verification record corresponding to the second node in the real-name node data is sent to the first server by the second server, the target verification record is obtained by the second server based on first broadcast information which is provided by a bank node and corresponds to the second node, and the second server and the bank node are nodes in a block chain network corresponding to the metasma;
providing the target authentication information to the first node.
2. The method according to claim 1, wherein the querying in the preset real-name system node data in response to the query request to obtain the target verification information comprises:
obtaining a target node identification of the second node from the query request;
and inquiring in the real-name system node data based on the target node identification to obtain the target verification information.
3. The method of claim 1, wherein after providing the target authentication information to the first node, the method further comprises:
and storing real-name authentication information corresponding to the second node in the block chain network.
4. The method of claim 1, wherein the query request comprises a request issued by the first node when the first node desires to interact with a resource of a second node.
5. A method for providing a real-name authentication record, applied to a second server in a blockchain network, the method comprising:
receiving first broadcast information which is sent by a bank node in the block chain network and corresponds to a second node;
verifying a first private key signature corresponding to the first broadcast information, and obtaining a target node identifier of the second node and a verification result corresponding to the second node from the first broadcast information under the condition that the first private key signature passes verification;
obtaining a target verification record according to the target node identification and the verification result;
providing the target verification record to a first server in a metasame, wherein the metasame corresponds to the blockchain network.
6. An information broadcasting method, applied to a bank node in a blockchain network, the method comprising:
receiving second broadcast information sent by a third node in the block chain network;
the third node is a user node corresponding to a second node in the block chain network, the second broadcast information includes a bank identifier of the bank node, a target node identifier of the second node and a target encryption result, the target encryption result is obtained by encrypting preset identity information and password information of the third node, and the password information includes an inquiry password of a bank card held by the third node in a bank corresponding to the bank node;
verifying a second private key signature corresponding to the second broadcast information, and matching and verifying the target encryption result and real-name system information corresponding to the third node in a preset database under the condition that the verification is passed so as to obtain a verification result, wherein the preset database is used for storing user real-name system information in a bank corresponding to the bank node;
generating first broadcast information according to the target node identification and the verification result;
sending the first broadcast information to the blockchain network to trigger a second server in the blockchain network to generate a target verification record corresponding to the second node based on the first broadcast information, providing the target verification record to a first server in a metas, so that the first server obtains target verification information for responding to a query request sent by a first node after receiving the query request sent by the first node for requesting whether the second node is subjected to real-name system verification according to the target verification record, and completing real-name system authentication on the second node by providing the target verification information to the first node;
the target verification information represents a real-name system verification result of the second node, the metasma corresponds to the blockchain network, and the first node is a user node different from the second node in the metasma.
7. The method of claim 6, wherein the target encryption result comprises at least one of a first encryption result and a second encryption result;
the first encryption result is obtained by encrypting first preset identity information of the third node and the password information, the second encryption result is obtained by encrypting second preset identity information of the third node and the password information, the first preset identity information comprises a name of the third node, and the second preset identity information comprises identity identification information of the third node.
8. A real-name authentication apparatus applied to a first server in a meta universe, the apparatus comprising:
a request receiving module, configured to receive an inquiry request sent by a first node, where the inquiry request is used to request to inquire whether a second node has undergone real-name system verification, and the first node and the second node are different user nodes in the metasma;
the verification information obtaining module is used for responding to the query request and querying in preset real-name node data to obtain target verification information;
the target verification information represents a real-name verification result of the second node, a target verification record corresponding to the second node in the real-name node data is sent to the first server by the second server, the target verification record is obtained by the second server based on first broadcast information which is provided by a bank node and corresponds to the second node, and the second server and the bank node are nodes in a block chain network;
a verification information providing module for providing the target verification information to the first node.
9. An electronic device, comprising:
one or more processors;
memory having one or more programs stored thereon that, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-7;
one or more I/O interfaces connected between the processor and the memory and configured to enable information interaction between the processor and the memory.
10. A computer-readable medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202211062795.XA 2022-09-01 2022-09-01 Real-name authentication method, device, electronic equipment and computer readable medium Active CN115442123B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211062795.XA CN115442123B (en) 2022-09-01 2022-09-01 Real-name authentication method, device, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211062795.XA CN115442123B (en) 2022-09-01 2022-09-01 Real-name authentication method, device, electronic equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN115442123A true CN115442123A (en) 2022-12-06
CN115442123B CN115442123B (en) 2024-04-30

Family

ID=84243775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211062795.XA Active CN115442123B (en) 2022-09-01 2022-09-01 Real-name authentication method, device, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN115442123B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110874464A (en) * 2018-09-03 2020-03-10 巍乾全球技术有限责任公司 Method and equipment for managing user identity authentication data
WO2020192773A1 (en) * 2019-03-27 2020-10-01 深圳市网心科技有限公司 Digital identity authentication method, device, apparatus and system, and storage medium
US20210152357A1 (en) * 2018-12-25 2021-05-20 Advanced New Technologies Co., Ltd. Method and device for identity verification
KR20210132526A (en) * 2020-04-27 2021-11-04 주식회사 시큐어링크 Authentication and Policy Management Methods Using Layer Blockchain
CN114760346A (en) * 2022-03-14 2022-07-15 浙江毫微米科技有限公司 Equipment switching method, device and system and electronic equipment
CN114780868A (en) * 2022-06-17 2022-07-22 深圳市标签数据有限公司 Method and system for generating virtual avatar by user tag of metauniverse
CN114861227A (en) * 2022-05-18 2022-08-05 华侨大学 Intelligent tourism data processing method and system based on metauniverse

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110874464A (en) * 2018-09-03 2020-03-10 巍乾全球技术有限责任公司 Method and equipment for managing user identity authentication data
US20210152357A1 (en) * 2018-12-25 2021-05-20 Advanced New Technologies Co., Ltd. Method and device for identity verification
WO2020192773A1 (en) * 2019-03-27 2020-10-01 深圳市网心科技有限公司 Digital identity authentication method, device, apparatus and system, and storage medium
KR20210132526A (en) * 2020-04-27 2021-11-04 주식회사 시큐어링크 Authentication and Policy Management Methods Using Layer Blockchain
CN114760346A (en) * 2022-03-14 2022-07-15 浙江毫微米科技有限公司 Equipment switching method, device and system and electronic equipment
CN114861227A (en) * 2022-05-18 2022-08-05 华侨大学 Intelligent tourism data processing method and system based on metauniverse
CN114780868A (en) * 2022-06-17 2022-07-22 深圳市标签数据有限公司 Method and system for generating virtual avatar by user tag of metauniverse

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
梁峥;刘豪;: "区块链业务创新:数字身份认证", 通信企业管理, no. 11, 10 November 2018 (2018-11-10) *

Also Published As

Publication number Publication date
CN115442123B (en) 2024-04-30

Similar Documents

Publication Publication Date Title
US11196572B2 (en) Blockchain-based content verification
US10958438B2 (en) Method, apparatus, and electronic device for blockchain-based recordkeeping
CN107396360B (en) Block verification method and device
CN108681965B (en) Block chain network transaction processing method and device for offline node
EP3905078A1 (en) Identity verification method and system therefor
CN112307455B (en) Identity authentication method and device based on block chain and electronic equipment
TWI703853B (en) User identity authentication method and device in network
CN108769230B (en) Transaction data storage method, device, server and storage medium
CN112492006A (en) Node management method and device based on block chain
CN110633963B (en) Electronic bill processing method, electronic bill processing device, computer readable storage medium and computer readable storage device
CN110177124B (en) Identity authentication method based on block chain and related equipment
CN109614813B (en) Privacy transaction method and device based on block chain and application method and device thereof
CN113472720B (en) Digital certificate key processing method, device, terminal equipment and storage medium
CN113255014B (en) Data processing method based on block chain and related equipment
CN111178840A (en) Service processing method, device, system, electronic equipment and storage medium
CN113474804A (en) Transaction and account verification method, device and storage medium of digital currency
TWI812366B (en) A data sharing method, device, equipment and storage medium
CN113704775A (en) Service processing method based on distributed digital identity and related device
US20230325521A1 (en) Data processing method and apparatus based on blockchain network, device, and storage medium
CN115442123B (en) Real-name authentication method, device, electronic equipment and computer readable medium
CN115967508A (en) Data access control method and device, equipment, storage medium and program product
CN111027992A (en) Asset transaction method and device based on blockchain system and hardware equipment
CN117040930B (en) Resource processing method, device, product, equipment and medium of block chain network
CN116975936B (en) Finance qualification proving method and finance qualification verifying method
CN115632794A (en) Distributed digital identity verification system, method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant