CN116170801B - 5G message-based evidence-preserving and evidence-fixing application method - Google Patents

5G message-based evidence-preserving and evidence-fixing application method Download PDF

Info

Publication number
CN116170801B
CN116170801B CN202310452782.1A CN202310452782A CN116170801B CN 116170801 B CN116170801 B CN 116170801B CN 202310452782 A CN202310452782 A CN 202310452782A CN 116170801 B CN116170801 B CN 116170801B
Authority
CN
China
Prior art keywords
applicant
verification
digital certificate
blockchain
evidence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310452782.1A
Other languages
Chinese (zh)
Other versions
CN116170801A (en
Inventor
肖雄林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yitongdao Technology Co ltd
Original Assignee
Shenzhen Yitongdao Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yitongdao Technology Co ltd filed Critical Shenzhen Yitongdao Technology Co ltd
Priority to CN202310452782.1A priority Critical patent/CN116170801B/en
Publication of CN116170801A publication Critical patent/CN116170801A/en
Application granted granted Critical
Publication of CN116170801B publication Critical patent/CN116170801B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a 5G message-based evidence-preserving and evidence-securing application method, and belongs to the technical field of evidence-preserving and evidence-securing. A5G message-based evidence-preserving and evidence-fixing application method is characterized by comprising the following steps of: the method for applying the evidence-preserving and evidence-fixing based on the 5G message comprises the following steps: digital certificate generation and timestamp generation, information storage, data verification, and smart contract rights settings. The application technology introduces a biological feature recognition technology when a digital certificate generation module and data verification are performed, wherein the biological feature recognition technology comprises face recognition, voice recognition and fingerprint authentication, and is used as an identity authentication mode for digital certificate generation, so that the accuracy and the safety of the digital certificate are improved, the accuracy of timestamp generation is improved by combining an Internet of things technology and a sensor technology on timestamp generation, and in addition, an emergency contact person and an emergency password are set by using an intelligent contract system based on a block chain, so that one more security guarantee is provided for a certificate.

Description

5G message-based evidence-preserving and evidence-fixing application method
Technical Field
The invention relates to the technical field of evidence-preserving and evidence-securing, in particular to an application method of evidence-preserving and evidence-securing based on 5G information.
Background
With the continuous development of digitization and intellectualization, the amount of data generated by people in life and work is increasing, and how to protect the safety and the credibility of the data becomes an important problem. Under the background, the 5G message-based evidence-preserving and evidence-securing application is generated and used in the fields of electronic contract, electronic bill, tracing and the like. The certification-preserving and certification-securing application based on the 5G message can utilize the communication capability and the safety characteristic thereof to realize the storage, the verification and the update of the data, the safety and the credibility of the data are protected, the certification-preserving and certification-securing application has important application value in the era of digitalization and intellectualization, and along with the development of a blockchain and a modern Internet of things, a user can send the data to the blockchain network through the 5G message to carry out certification-preserving operation so as to ensure the authenticity and the integrity of the data, the generation of a digital certificate and the data verification are important components of the digital certification and the certification-securing technology, and in the aspects of the generation of the digital certificate and the data verification, hash verification and digital signature are mostly used, although the generation of the digital certificate and the data verification can be completed, but because the certification-preserving and certification-securing method of the digital signature is single and is easy to be stolen by other people, the credibility and the precision of the data are reduced, and the precision cannot be improved only by hash verification in the time stamp generation.
Disclosure of Invention
1. Technical problem to be solved
The invention aims to provide a 5G message-based evidence-preserving and evidence-securing application method for solving the problems in the background art:
the generation of the digital certificate and the data verification are important components of the digital certificate storage and the data verification technology, hash verification and digital signature are mostly used in the aspects of digital certificate generation and data verification, and although the digital certificate generation and the data verification can be completed, the digital signature verification mode is single and is easy to steal by others, so that the credibility and the accuracy of the data are reduced, the accuracy is not improved only by hash verification when the time stamp is generated, in addition, the applicant with the certificate storage and the data verification often has only one, and if unexpected data cannot be timely acquired.
2. Technical proposal
The method for applying the certificate and the solid certificate based on the 5G message comprises the following steps:
s1, digital certificate generation: the applicant operation end generates a public and private key pair, performs facial feature input, fingerprint input and voice verification, and submits the generated public and private key pair and personal information to a digital certificate issuing institution for digital certificate request;
s2, timestamp generation: recording information parameters, measuring the environment parameters by using an environment sensor, recording the change condition of the environment parameters, comparing the change condition with the known change rule of the environment parameters to obtain accurate time stamps, acquiring current satellite signal information by using a Beidou navigator, obtaining the accurate time stamps by calculating the transmission delay of satellite signals, and obtaining hash values by hash operation of the time stamps;
s3, information storage: after the digital certificate request passes, the digital certificate issuing mechanism issues the digital certificate and the data certificate to the public blockchain, and after the time stamp hash operation, the obtained hash value is uploaded to the blockchain and is broadcast and transmitted to all nodes on the blockchain through a 5G network;
s4, data verification: the applicant checks the authentication information and the data certificate through personal information verification, and the applicant carries out hash operation on the data again and compares the hash value with the hash value in the record;
s5, intelligent contract authority setting: after the applicant has authenticated, setting emergency contacts and emergency passwords based on the intelligent contract, and uploading setting information to the blockchain node.
Preferably, the step S1 further includes the following steps:
s1-1, generating a public-private key pair through a public-private key pair generation algorithm;
s1-2, a digital certificate issuing mechanism receives and verifies digital certificate request information, signs and checks a public key of an applicant and facial features, fingerprints and voice information of the applicant by using a private key, and generates a digital certificate and a data certificate;
s1-3, issuing the digital certificate and the data certificate to a public blockchain.
Preferably, the step S2 further includes the following steps:
s2-1, generating a 5G network-based support network time protocol based on the timestamp, wherein the 5G network-based support network time protocol is associated with a database;
s2-2, measuring environmental parameters including temperature, humidity, air pressure and light intensity by using an environmental sensor, wherein the temperature, the humidity, the air pressure and the light intensity change slightly along with the time, and the environmental sensor measures and records the change condition of the environmental parameters and compares the change condition with the known change rule of the environmental parameters to obtain an accurate time stamp.
Preferably, the step S3 further includes the following steps:
s3-1, after a digital certificate request, data hash and information parameter record, classifying and integrating the identity, facial features, sound and fingerprints of the applicant, and classifying and integrating timestamps of different parameter information;
and S3-2, storing the classified integrated data and the timestamp information into a blockchain.
Preferably, the step S4 further includes the following steps:
s4-1, the applicant acquires the public key again through face recognition verification, voice verification and fingerprint verification, and decrypts the authentication information and the data certificate in the digital certificate by using the public key;
and S4-2, the applicant performs hash operation on the data by using the same hash function to obtain a hash value, searches the transaction record on the blockchain, and verifies whether the hash value is the same as the hash value in the record.
Preferably, the step S5 further includes the following steps:
s5-1, after passing the digital certificate verification, the applicant modifies the personal authority on the intelligent contract based on the blockchain, and performs emergency password setting;
and S5-2, the applicant applies for the emergency contact on the blockchain, the blockchain sends a section of randomly generated digital string to the applicant, and face recognition verification, voice recognition verification and fingerprint recognition verification instructions, the applicant sends the digital string to the blockchain verification end after the face recognition, the voice recognition and the fingerprint recognition are finished, and the blockchain verification end receives the digital string and then sends a private key to the applicant, and the applicant opens the authority through the private key and inputs the emergency contact information to finish verification.
3. Advantageous effects
Compared with the prior art, the invention has the advantages that:
1) In the invention, the digital certificate can be generated by using public key infrastructure technology at the digital certificate generation module, biological characteristic recognition technology including face recognition, voice recognition and fingerprint authentication is introduced, and the digital certificate is used as an identity authentication mode for digital certificate generation, so that the accuracy of the digital certificate is improved, and in addition, the face recognition, voice recognition and fingerprint authentication are carried out during data verification to effectively ensure that a data extractor is the applicant, so that the security of the stored and verified information is improved.
2) According to the invention, the non-tamperability of the blockchain and the low-delay and high-bandwidth characteristics of the 5G network are combined on the time stamp generation, the data to be time stamp protected is subjected to hash operation by utilizing data hash to obtain a unique hash value, the environment sensor is used for measuring environment parameters by combining the Internet of things technology and the sensor technology, the environment parameters are slightly changed along with the time, the change condition of the environment parameters is recorded and compared with the known change rule of the environment parameters, the accuracy of the time stamp generation is improved, and in addition, the current satellite signal information is obtained by using the Beidou navigator, the transmission delay of satellite signals is calculated, and the accuracy of the time stamp generation is improved.
3) In the invention, an intelligent contract authority setting module is arranged, an intelligent contract system based on a blockchain is utilized, after the applicant passes through digital certificate verification, application information is sent to a blockchain setting service system, the blockchain setting service system can send a section of randomly generated digital string to the applicant, and the blockchain can send face recognition verification, voice recognition verification and fingerprint recognition verification instructions to the applicant, the applicant can send the digital string to a blockchain verification end after finishing face recognition, voice recognition and fingerprint recognition, the blockchain verification end receives the digital string and then sends a private key to the applicant, the applicant opens the authority through the private key and inputs emergency contact information to finish verification so as to modify personal authority and carry out emergency password setting, and in addition, the applicant can apply for emergency contact setting on the blockchain, and increase the functionality and store and verify one more security guarantee.
Drawings
FIG. 1 is a schematic diagram of the overall system of the present invention;
fig. 2 is a schematic diagram corresponding to each flow of the overall system of the present invention.
Detailed Description
Examples: referring to fig. 1-2, a 5G message-based certificate-holding application method includes digital certificate generation, timestamp generation, information storage, data verification and intelligent contract authority setting, in which a digital certificate can be generated by using public key infrastructure technology, including public key, private key, digital signature and other components, a biological feature recognition technology (including face recognition, voice recognition and fingerprint recognition) is introduced as an identity authentication mode for digital certificate generation, the security and accuracy of the digital certificate are improved, the non-falsification of a block chain and the low-delay and high-bandwidth characteristics of a 5G network are combined in timestamp generation, hash operation is performed on data needing to be protected by using data hash to obtain a unique hash value, and in addition, environmental parameters such as temperature, humidity, air pressure, light intensity and the like are measured by using an environmental sensor in combination with the internet of things technology and sensor technology, and the parameters change slightly along with time. The change condition of the environmental parameters is recorded and compared with the change rule of the known environmental parameters, the current satellite signal information is obtained by using the Beidou navigator, the transmission delay of the satellite signal is calculated, the accuracy of timestamp generation is improved, the personal permission can be modified by using the intelligent contract system based on the blockchain in the intelligent contract permission setting, the emergency password setting is carried out, in addition, the applicant can apply for the emergency contact person setting on the blockchain, the functionality is increased, and one more security guarantee is provided for the certificate. The method for applying the evidence-preserving and evidence-fixing based on the 5G message comprises the following steps:
s1, digital certificate generation: the applicant operation end generates a public and private key pair, performs facial feature input, fingerprint input and voice verification, and submits the generated public and private key pair and personal information to a digital certificate issuing institution for digital certificate request; s1 further comprises the following steps:
s1-1, generating a public-private key pair through a public-private key pair generation algorithm;
s1-2, a digital certificate issuing mechanism receives and verifies digital certificate request information, signs and checks a public key of an applicant and facial features, fingerprints and voice information of the applicant by using a private key, and generates a digital certificate and a data certificate;
s1-3, issuing the digital certificate and the data certificate to a public blockchain.
Specifically, the digital certificate generation includes public-private key pair generation, digital certificate request, certificate issue and digital certificate verification, the public-private key pair generation generates a public-private key pair required for generating the digital certificate, the public-private key pair generation is submitted to a digital certificate issuing organization to carry out digital certificate request, facial feature input, fingerprint input and voice verification are carried out, the applicant carries out facial feature input, fingerprint input and voice verification, the digital certificate issuing organization receives and verifies digital certificate request information, the private key is used for signing and verifying the public key of the applicant and facial features, fingerprints and voice information of the applicant, a digital certificate and a data certificate are generated, the digital certificate and the data certificate are issued to a public block chain, the applicant decrypts signature information and the data certificate in the digital certificate by using the public key, the public key of the digital certificate issuing organization is used for verifying the signature, and the public-private key pair generation is based on an RSA algorithm. The specific algorithm is as follows,
selecting a large prime number p and q, and calculating n= p q, the euler function Φ (n) = (p-1) (q-1);
selecting a positive integer e less than phi (n) such that e and phi (n) are prime relative to each other;
d is calculated such that e is d≡1 (mod phi (n)). d is the multiplication inverse of the modulo phi (n) of e, which can be obtained by extending the Euclidean algorithm;
generating a private key as (d, n), and generating a public key as (e, n);
the public-private key pair is exported and stored in a file as part of the digital certificate.
S2, timestamp generation: recording information parameters, measuring the environment parameters by using an environment sensor, recording the change condition of the environment parameters, comparing the change condition with the known change rule of the environment parameters to obtain accurate time stamps, acquiring current satellite signal information by using a Beidou navigator, obtaining the accurate time stamps by calculating the transmission delay of satellite signals, and obtaining hash values by hash operation of the time stamps; s2 further comprises the following steps:
s2-1, generating a 5G network-based support network time protocol based on the timestamp, wherein the 5G network-based support network time protocol is associated with a database;
s2-2, measuring environmental parameters including temperature, humidity, air pressure and light intensity by using an environmental sensor, wherein the temperature, the humidity, the air pressure and the light intensity change slightly along with the time, and the environmental sensor measures and records the change condition of the environmental parameters and compares the change condition with the known change rule of the environmental parameters to obtain an accurate time stamp.
Specifically, hash operation is performed on data needing to be protected by a timestamp, and the specific algorithm steps are as follows:
first, initializing SHA-256 algorithm parameters: setting an initial hash value H0 and message preprocessing parameters K and W;
second, message preprocessing: dividing message M into a plurality of 512-bit message blocks M i, expanding each message block into W512-bit sub-blocks, called message sub-blocks W i, wherein W is a fixed constant;
thirdly, hash calculation: a hash is performed on each message sub-block W i. Specifically, each message sub-block W i is iterated for 64 rounds, each round of iteration is calculated using a fixed algorithm, and the hash value H is updated. Wherein the calculation for each iteration comprises:
(1) Generating 64 temporary variables T1 and T2 from W i and K;
(2) Performing logic operation: t1=h+sigma 1 (E) +ch (E, F, G) +kt+ W i, t2=sigma 0 (a) +maj (a, B, C), wherein Ch and Maj are two fixed logical functions, respectively, sigma0, sigma1 are two fixed permutation functions;
(3) Updating the hash value H: h=g, g=f, f=e, e=d+t1, d=c, c=b, b=a, a=t1+t2;
fourth, generating hash value: after all message sub-blocks W i are calculated, the final hash value H is output as a result of the SHA-256 algorithm to obtain a unique hash value, and the unique hash value is uploaded to the blockchain, and when a new block is added to the blockchain, the 5G network can transmit the information of the block to all nodes in real time in a broadcasting mode, so that the real-time performance and reliability of the timestamp information are ensured.
S3, information storage: after the digital certificate request passes, the digital certificate issuing mechanism issues the digital certificate and the data certificate to the public blockchain, and after the time stamp hash operation, the obtained hash value is uploaded to the blockchain and is broadcast and transmitted to all nodes on the blockchain through a 5G network; s3, further comprising the following steps:
s3-1, after a digital certificate request, data hash and information parameter record, classifying and integrating the identity, facial features, sound and fingerprints of the applicant, and classifying and integrating timestamps of different parameter information;
and S3-2, storing the classified integrated data and the timestamp information into a blockchain.
S4, data verification: the applicant checks the authentication information and the data certificate through personal information verification, and the applicant carries out hash operation on the data again and compares the hash value with the hash value in the record; s4, further comprising the following steps:
s4-1, the applicant acquires the public key again through face recognition verification, voice verification and fingerprint verification, and decrypts the authentication information and the data certificate in the digital certificate by using the public key;
and S4-2, the applicant performs hash operation on the data by using the same hash function to obtain a hash value, searches the transaction record on the blockchain, and verifies whether the hash value is the same as the hash value in the record.
Specifically, when the authenticity of the digital certificate needs to be verified, the public key is used for decrypting the signature information in the digital certificate, and the public key of the digital certificate issuing institution is used for verifying the signature, so that the authenticity and the validity of the digital certificate are confirmed; in addition, the user can check the data hash value, the time stamp and other information by selecting face recognition verification or voice verification and fingerprint verification to ensure that the data is not tampered, and when the integrity of the data or the authenticity of the time stamp needs to be verified, the same hash function can be used for carrying out hash operation on the data to obtain a hash value. Then, the transaction record is searched on the blockchain, and whether the hash value is the same as the hash value in the record is verified, so that the authenticity and the credibility of the timestamp are verified.
S5, intelligent contract authority setting: after the applicant has the evidence, setting an emergency contact person and an emergency password based on the intelligent contract, and uploading setting information to the blockchain node; s5, further comprising the following steps:
s5-1, after passing the digital certificate verification, the applicant modifies the personal authority on the intelligent contract based on the blockchain, and performs emergency password setting;
and S5-2, the applicant applies for the emergency contact on the blockchain, the blockchain sends a section of randomly generated digital string to the applicant, and face recognition verification, voice recognition verification and fingerprint recognition verification instructions, the applicant sends the digital string to the blockchain verification end after the face recognition, the voice recognition and the fingerprint recognition are finished, and the blockchain verification end receives the digital string and then sends a private key to the applicant, and the applicant opens the authority through the private key and inputs the emergency contact information to finish verification.
Specifically, after the applicant passes through the digital certificate verification, personal rights are modified on a blockchain-based intelligent contract, such as whether the certification content is selected to be disclosed, whether the certification content is set to be timing data to be cleaned, and intelligent selection of a password verification form (in face recognition verification, voice recognition verification and fingerprint recognition verification) is performed, emergency password setting is performed, in addition, the applicant can apply for emergency contact person setting on the blockchain, the applicant sends application information to a blockchain setting service system, the blockchain setting service system sends a section of randomly generated digital string to the applicant, the blockchain can send face recognition verification, voice recognition verification and fingerprint recognition verification instructions to the applicant, the applicant can send the digital string to a blockchain verification end after the face recognition, the voice recognition and the fingerprint recognition are completed, the private key is sent to the applicant after the digital string is received by the blockchain verification end, and the applicant opens the rights through the private key and inputs the emergency contact person information to complete the verification.
The foregoing has shown and described the basic principles, principal features and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the above-described embodiments, and that the above-described embodiments and descriptions are only preferred embodiments of the present invention, and are not intended to limit the invention, and that various changes and modifications may be made therein without departing from the spirit and scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (6)

1. A5G message-based evidence-preserving and evidence-fixing application method is characterized by comprising the following steps of: the method for applying the evidence-preserving and evidence-fixing based on the 5G message comprises the following steps:
s1, digital certificate generation: the applicant operation end generates a public and private key pair, performs facial feature input, fingerprint input and voice verification, and submits the generated public and private key pair and personal information to a digital certificate issuing institution for digital certificate request;
s2, timestamp generation: recording information parameters, measuring the environment parameters by using an environment sensor, recording the change condition of the environment parameters, comparing the change condition with the known change rule of the environment parameters to obtain accurate time stamps, acquiring current satellite signal information by using a Beidou navigator, obtaining the accurate time stamps by calculating the transmission delay of satellite signals, and obtaining hash values by hash operation of the time stamps;
s3, information storage: after the digital certificate request passes, the digital certificate issuing mechanism issues the digital certificate and the data certificate to the public blockchain, and after the time stamp hash operation, the obtained hash value is uploaded to the blockchain and is broadcast and transmitted to all nodes on the blockchain through a 5G network;
s4, data verification: the applicant checks the authentication information and the data certificate through personal information verification, and the applicant carries out hash operation on the data again and compares the hash value with the hash value in the record;
s5, intelligent contract authority setting: after the applicant has authenticated, setting emergency contacts and emergency passwords based on the intelligent contract, and uploading setting information to the blockchain node.
2. The method for applying authentication and authorization based on 5G message as set forth in claim 1, wherein S1 further comprises the steps of:
s1-1, generating a public-private key pair through a public-private key pair generation algorithm;
s1-2, a digital certificate issuing mechanism receives and verifies digital certificate request information, signs and checks a public key of an applicant and facial features, fingerprints and voice information of the applicant by using a private key, and generates a digital certificate and a data certificate;
s1-3, issuing the digital certificate and the data certificate to a public blockchain.
3. The method for applying authentication and authorization based on 5G message as recited in claim 1, wherein S2 further comprises the steps of:
s2-1, generating a 5G network-based support network time protocol based on the timestamp, wherein the 5G network-based support network time protocol is associated with a database;
s2-2, using an environment sensor to measure environment parameters such as temperature, humidity, air pressure and light intensity, wherein the parameters change slightly along with the time, recording the change condition of the environment parameters, and comparing the change condition with the known change rule of the environment parameters to obtain an accurate time stamp.
4. The method for applying authentication and authorization based on 5G message as recited in claim 1, wherein S3 further comprises the steps of:
s3-1, after a digital certificate request, data hash and information parameter record, classifying and integrating the identity, facial features, sound and fingerprints of the applicant, and classifying and integrating timestamps of different parameter information;
and S3-2, storing the classified integrated data and the timestamp information into a blockchain.
5. The method for applying authentication and authorization based on 5G message as recited in claim 1, wherein S4 further comprises the steps of:
s4-1, the applicant acquires the public key again through face recognition verification, voice verification and fingerprint verification, and decrypts the authentication information and the data certificate in the digital certificate by using the public key;
and S4-2, the applicant performs hash operation on the data by using the same hash function to obtain a hash value, searches the transaction record on the blockchain, and verifies whether the hash value is the same as the hash value in the record.
6. The method for applying the authentication and verification based on the 5G message as set forth in claim 1, wherein the step S5 further includes the steps of: s5-1, after passing the digital certificate verification, the applicant can modify personal rights on the intelligent contract based on the blockchain and set emergency passwords;
and S5-2, the applicant applies for the emergency contact on the blockchain, the blockchain sends a section of randomly generated digital string to the applicant, and face recognition verification, voice recognition verification and fingerprint recognition verification instructions, the applicant sends the digital string to the blockchain verification end after the face recognition, the voice recognition and the fingerprint recognition are finished, and the blockchain verification end receives the digital string and then sends a private key to the applicant, and the applicant opens the authority through the private key and inputs the emergency contact information to finish verification.
CN202310452782.1A 2023-04-25 2023-04-25 5G message-based evidence-preserving and evidence-fixing application method Active CN116170801B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310452782.1A CN116170801B (en) 2023-04-25 2023-04-25 5G message-based evidence-preserving and evidence-fixing application method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310452782.1A CN116170801B (en) 2023-04-25 2023-04-25 5G message-based evidence-preserving and evidence-fixing application method

Publications (2)

Publication Number Publication Date
CN116170801A CN116170801A (en) 2023-05-26
CN116170801B true CN116170801B (en) 2023-06-20

Family

ID=86416726

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310452782.1A Active CN116170801B (en) 2023-04-25 2023-04-25 5G message-based evidence-preserving and evidence-fixing application method

Country Status (1)

Country Link
CN (1) CN116170801B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116915415B (en) * 2023-09-13 2023-12-19 哈尔滨工程大学三亚南海创新发展基地 Data verification method and system based on digital certificate

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111132167A (en) * 2019-12-30 2020-05-08 全链通有限公司 Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN111324898A (en) * 2020-01-20 2020-06-23 福州大学 Block chain-based electronic medical document dual-access control system
CN112651052A (en) * 2020-12-24 2021-04-13 江苏通付盾科技有限公司 Data right confirming method and system based on block chain technology
CN115002208A (en) * 2022-05-27 2022-09-02 琢创网络科技(上海)有限公司 High-reliability multi-layer digital delivery method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11882223B2 (en) * 2020-04-28 2024-01-23 Qualcomm Incorporated Methods of using certificate-based security with drone identity and broadcasting

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111132167A (en) * 2019-12-30 2020-05-08 全链通有限公司 Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN111324898A (en) * 2020-01-20 2020-06-23 福州大学 Block chain-based electronic medical document dual-access control system
CN112651052A (en) * 2020-12-24 2021-04-13 江苏通付盾科技有限公司 Data right confirming method and system based on block chain technology
CN115002208A (en) * 2022-05-27 2022-09-02 琢创网络科技(上海)有限公司 High-reliability multi-layer digital delivery method

Also Published As

Publication number Publication date
CN116170801A (en) 2023-05-26

Similar Documents

Publication Publication Date Title
CN109325331B (en) Big data acquisition transaction system based on block chain and trusted computing platform
CN109067801B (en) Identity authentication method, identity authentication device and computer readable medium
CN112187712B (en) Anonymous authentication method and system for trust in de-center mobile crowdsourcing
CN101331706A (en) Secure threshold decryption protocol computation
CN101022337A (en) Network identification card realizing method
US20120014520A1 (en) Biometric encryption and key generation
CN114362971B (en) Digital asset right confirming and tracing method based on Hash algorithm
CN116170801B (en) 5G message-based evidence-preserving and evidence-fixing application method
CN112291062B (en) Voting method and device based on block chain
CN113612615B (en) Audit privacy protection authentication method based on SM9 cryptographic algorithm
Matsuda et al. Fuzzy signatures: relaxing requirements and a new construction
CN109858259A (en) The data protection of community health service alliance and sharing method based on HyperLedger Fabric
CN113079140B (en) Cooperative spectrum sensing position privacy protection method based on block chain
CN112380269A (en) Identity card information inquiry and evidence fixing and obtaining method based on block chain
CN113938281B (en) Quantum security identity issuing system, issuing method and using method
CN115208628A (en) Data integrity verification method based on block chain
CN117037988B (en) Electronic medical record storage method and device based on blockchain
CN106953731A (en) The authentication method and system of a kind of terminal management person
JP4208082B2 (en) Data alteration detection method, data alteration detection device, and data alteration detection program
CN114240332A (en) Aggregated signature method for electronic voting
CN113591103A (en) Identity authentication method and system between intelligent terminals of power internet of things
CN117454442A (en) Anonymous security and traceable distributed digital evidence obtaining method and system
CN111628873A (en) Method for storing digital certificate solidified data telegraph text
CN114826607B (en) Edge computing node compression method based on block chain and lightweight storage system
CN113326527A (en) Credible digital signature system and method based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant