CN116644401A - Identity verification method, device, equipment and medium based on blockchain technology - Google Patents

Identity verification method, device, equipment and medium based on blockchain technology Download PDF

Info

Publication number
CN116644401A
CN116644401A CN202310899383.XA CN202310899383A CN116644401A CN 116644401 A CN116644401 A CN 116644401A CN 202310899383 A CN202310899383 A CN 202310899383A CN 116644401 A CN116644401 A CN 116644401A
Authority
CN
China
Prior art keywords
identity
user
information
management system
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310899383.XA
Other languages
Chinese (zh)
Other versions
CN116644401B (en
Inventor
蒋辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Zhilin Information Technology Co ltd
Original Assignee
Shandong Zhilin Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Zhilin Information Technology Co ltd filed Critical Shandong Zhilin Information Technology Co ltd
Priority to CN202310899383.XA priority Critical patent/CN116644401B/en
Publication of CN116644401A publication Critical patent/CN116644401A/en
Application granted granted Critical
Publication of CN116644401B publication Critical patent/CN116644401B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses an identity verification method, device, equipment and medium based on a blockchain technology, and relates to the technical field of blockchains, wherein the method comprises the following steps: establishing a plurality of virtual sub-management nodes, and establishing an identity management system for the virtual sub-management nodes; and uploading the electronic identity information to the blockchain by the user, and carrying out information backup on the virtual management node. According to the application, the virtual branch nodes are arranged, the identity management system is established for the virtual branch nodes, after the user fails in identity authentication, the identity management system performs secondary authentication, after confirming the operation safety of the user, the user is endowed with temporary passing operation authority, so that the storage safety of enterprise data in a blockchain can be ensured, non-incumbent staff is prevented from logging in by using original identity information of an account number, the data in the enterprise are stolen, and the incumbent staff can log in temporarily when the identity authentication fails due to forgetting a password and the like, thereby ensuring the working efficiency.

Description

Identity verification method, device, equipment and medium based on blockchain technology
Technical Field
The application relates to the technical field of blockchain, in particular to an identity verification method, device, equipment and medium based on a blockchain technology.
Background
A blockchain is a chain of blocks one by one. Each block holds certain information which is linked in a chain according to the time sequence of their respective generation. This chain is kept in all servers, and the entire blockchain is secure as long as one server in the entire system can work. These servers, referred to as nodes in the blockchain system, provide storage space and computational support for the entire blockchain system. If the information in the blockchain is to be modified, it is necessary to sign consent of more than half of the nodes and modify the information in all the nodes, which are usually held in different subject hands, so it is an extremely difficult thing to tamper with the information in the blockchain. Compared with the traditional network, the blockchain has two main core characteristics: firstly, the data is difficult to tamper, and secondly, the data is decentralised. Based on the two characteristics, the information recorded by the blockchain is more real and reliable, and can help solve the problem that people are not trusted each other.
At present, more and more importance is attached to network security work in enterprises, especially semi-public data uploaded in a blockchain, although the integrity of the data can be reliably saved through the blockchain, the data are not difficult to obtain for the enterprise away staff, some sharing terminals are usually arranged in the enterprises, terminal accounts are also usually inherited, after old staff leave, the original terminals are inherited to new staff, the original accounts are inherited to the new staff, but because the identity information of the old staff is reserved in the original terminals, account verification through the identity information is difficult to avoid, and the semi-public data in the enterprises are continuously obtained, so that the traditional enterprise data blockchain identity verification method still has the defects, and the network security firewall of the enterprises still has certain defects.
Disclosure of Invention
The application aims to provide an identity verification method, device, equipment and medium based on a blockchain technology, so as to solve the problems in the background technology.
In order to achieve the above purpose, the present application provides the following technical solutions: an identity verification method based on a blockchain technology comprises the following steps:
establishing a plurality of virtual sub-management nodes, and establishing an identity management system for the virtual sub-management nodes;
uploading electronic identity information to a blockchain by a user, and carrying out information backup on a virtual management node;
receiving an identity verification information request of a user, and confirming the identity information;
after the identity verification, the identity verification result is fed back to the identity management system of the virtual sub-management node.
Preferably, the electronic identity information includes an account number, a user name, a job number and a mobile phone number of the user.
Preferably, the user uploads the electronic identity information to the blockchain, and performs information backup at the virtual management node, and then further includes:
the identity management system records the user blockchain identity verification information in the sub-management partition, and covers the identity information in the original account according to the newly backed-up identity information.
Preferably, after the identity verification, the identity management system for feeding back the identity verification result to the virtual sub-management node includes:
receiving an identity verification information request of a user account, and confirming identity information in a blockchain;
if the identity verification is passed, allowing the account login request and the corresponding operation authority, and feeding back an identity verification processing result to an identity management system of the virtual sub-management node;
if the identity verification is not passed, the account login is refused, a verification request is sent to the identity management system of the virtual sub-management node, and the identity management system waits for verification.
Preferably, the identity management system performs auditing, including:
and checking whether the user is required by work or whether the user operation is safe or not is confirmed by an off-line or on-line mode.
Preferably, after the identity management system performs the audit, the method further includes:
after the verification of the user is passed, the identity management system confirms the operation safety of the user and can endow the user with temporary login authority, and the user can directly log in through the authority of the identity management system, so that verification is skipped;
if the user is not checked by the identity management system, the user is directly fed back to the user operation end, and the user is forbidden to log in.
The application also provides an identity verification device based on the blockchain technology, which comprises:
the node management module is used for establishing a plurality of virtual management nodes and establishing an identity management system for the virtual management nodes;
the information uploading module is used for uploading the electronic identity information to the blockchain by a user and carrying out information backup on the virtual management node;
the information verification module is used for receiving an identity verification information request of a user and confirming the identity information;
and the information feedback module is used for feeding back an identity verification result to the identity management system of the virtual sub-management node after the identity verification.
The application also provides an electronic device, which is entity equipment, comprising:
the device comprises a processor and a memory, wherein the memory is in communication connection with the processor;
the memory is configured to store executable instructions that are executed by at least one of the processors, the processor configured to execute the executable instructions to implement the blockchain technology-based authentication method as described above.
The present application also provides a computer readable storage medium having stored therein a computer program which when executed by a processor implements a blockchain technique based authentication method as described above.
Compared with the prior art, the application has the beneficial effects that:
through setting up virtual management node to set up the identity management system for virtual management node, can play the effect of backup user electronic identity information, supervision user account operation, the user can feed back the authentication result to the identity management system when carrying out the authentication, the inside administrator of enterprise is convenient for supervise, simultaneously the user is after the authentication failure, can also carry out the secondary through the identity management system and verify, confirm the operation security back that the user operated the user and pass through temporarily, can guarantee the storage security of enterprise data in the blockchain, prevent that non-incumbent personnel from utilizing account former identity information to log in, steal the inside data of enterprise, enable when the incumbent personnel to carry out the login temporarily because of forgetting reason authentication failure such as password again, guarantee work efficiency.
Drawings
FIG. 1 is a main flow chart of an authentication method based on a blockchain technique according to an embodiment of the present application;
FIG. 2 is a flowchart illustrating steps of a method for identity verification based on a blockchain technique according to an embodiment of the present application;
fig. 3 is a block diagram of an authentication device based on a blockchain technique according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The main execution body of the method in this embodiment is a terminal, and the terminal may be a device such as a mobile phone, a tablet computer, a PDA, a notebook or a desktop, but of course, may be another device with a similar function, and this embodiment is not limited thereto.
Referring to fig. 1, the present application provides an authentication method based on blockchain technology, the method is applied to user authentication of a blockchain technology enterprise, and includes:
step 101, establishing a plurality of virtual sub-management nodes, and establishing an identity management system for the virtual sub-management nodes.
Step 102, the user uploads the electronic identity information to the blockchain, and performs information backup at the virtual management node.
The electronic identity information comprises an account number, a user name, a work number and a mobile phone number of a user.
Specifically, after the user uploads the electronic identity information to the blockchain and the virtual management node performs information backup, the identity management system records the user blockchain identity verification information in the sub-management partition, and covers the identity information in the original account according to the newly backed-up identity information.
It should be noted that after the identity management system covers the identity information in the original account, the identity information of the original account in the blockchain is synchronously updated, and the login authority of the identity information of the original account is cancelled.
Step 103, receiving the authentication information request of the user and confirming the identity information.
Specifically, the user's authentication information request includes account number and password combination authentication, user name and password combination authentication, job number and password combination authentication, and mobile phone number and password combination authentication.
Step 104, after the identity verification, feeding back the identity verification result to the identity management system of the virtual sub-management node.
Specifically, the block links to receive the request of the identity verification information of the user account, confirms the identity information, confirms whether the login password, the user name, the work number and the mobile phone number are consistent with the current latest identity information data of the account, and if the login password, the user name, the work number and the mobile phone number are consistent with the latest identity information data, the verification is passed, otherwise, the verification is not passed;
if the identity verification is passed, allowing the account login request and the corresponding operation authority, and feeding back an identity verification processing result to an identity management system of the virtual sub-management node;
if the identity verification is not passed, the account login is refused, a verification request is sent to the identity management system of the virtual sub-management node, and the identity management system waits for verification.
The identity management system performs auditing, including auditing in an off-line or on-line mode, to confirm whether a user needs work or whether the user operation is safe;
the identity management system performs online auditing, namely an identity management system administrator directly confirms in an enterprise department to confirm whether an account operator is an incumbent staff in the enterprise; if the identity management system administrator or the staff is not in the enterprise at the moment, on-line auditing is carried out, if the on-line auditing is carried out, the staff to which the account belongs is directly contacted by communication, the identity authentication failure reason is confirmed, whether temporary login is needed because of work is confirmed, and whether the user operation is safe is confirmed.
After the user passes the verification, the identity management system confirms the operation safety of the user and can give the account temporary login authority, and the account temporary login authority is directly logged in through the authority of the identity management system, so that the verification is skipped;
if the user is not checked by the identity management system, the user is directly fed back to the user operation end, and the user is forbidden to log in.
In this embodiment, by setting up the virtual management node and establishing the identity management system for the virtual management node, the functions of backing up the electronic identity information of the user and supervising the operation of the user account can be played, the user can feed back the identity verification result to the identity management system when carrying out the identity verification, so that the internal administrator of the enterprise can conveniently supervise, and meanwhile, after the identity verification fails, the user can carry out the secondary verification through the identity management system, after confirming the operation safety of the user, the user is endowed with the operation authority which temporarily passes through, so that the storage safety of the enterprise data in the blockchain can be ensured, the non-incumbent personnel can be prevented from logging in by using the original identity information of the account, the internal data of the enterprise can be prevented from being stolen, and the incumbent personnel can temporarily log in when the identity verification fails due to forgetting the password and the like, and the work efficiency is ensured.
For better understanding of the foregoing embodiments, as shown in fig. 2, the present application further provides a flowchart of specific steps of a blockchain technology-based authentication method, where the method at least includes:
step 201, establishing a plurality of virtual sub-management nodes, and establishing an identity management system for the virtual sub-management nodes;
step 202, uploading electronic identity information to a blockchain by a user account, and carrying out information backup on a virtual management node;
step 203, the identity management system records the user blockchain identity verification information in the sub-management partition, and overlays the identity information in the original account according to the newly backed-up identity information;
step 204, receiving an identity verification information request of a user account, and performing identity information confirmation in a block chain, after verification, jumping to step 205, and after verification failure, jumping to step 206;
step 205, allowing the account to log in the request and the corresponding operation authority, and feeding back the authentication processing result to the identity management system of the virtual sub-management node;
step 206, rejecting account login, sending a verification request to an identity management system of the virtual sub-management node, and waiting for the identity management system to carry out auditing;
step 207, after the identity management system checks, the user operation security is confirmed, the account can be given temporary login authority, login is directly carried out through the authority of the identity management system, and verification is skipped.
On the basis of the above embodiment, as shown in fig. 3, the present application further provides a blockchain technology-based authentication device, configured to support the blockchain technology-based authentication method of the above embodiment, where the blockchain technology-based authentication device includes:
a node-in-pipe module 301, configured to establish a plurality of virtual-in-pipe nodes, and establish an identity management system for the virtual-in-pipe nodes;
the information uploading module 302 is configured to upload electronic identity information to the blockchain by a user, and perform information backup at the virtual management node;
an information verification module 303, configured to receive an authentication information request of a user, and perform identity information confirmation;
and the information feedback module 304 is used for feeding back an identity verification result to the identity management system of the virtual sub-management node after the identity verification.
Further, the identity verification device based on the blockchain technology may operate the identity verification method based on the blockchain technology, and specific implementation may refer to a method embodiment, which is not described herein.
On the basis of the embodiment, the application further provides electronic equipment, which comprises:
the device comprises a processor and a memory, wherein the processor is in communication connection with the memory;
in this embodiment, the memory may be implemented in any suitable manner, for example: the memory can be read-only memory, mechanical hard disk, solid state disk, USB flash disk or the like; the memory is used for storing executable instructions executed by at least one of the processors;
in this embodiment, the processor may be implemented in any suitable manner, e.g., the processor may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an application specific integrated circuit (ApplicationSpecificIntegratedCircuit, ASIC), a programmable logic controller, and an embedded microcontroller, etc.; the processor is configured to execute the executable instructions to implement a blockchain technology-based authentication method as described above.
On the basis of the above embodiment, the present application further provides a computer readable storage medium, in which a computer program is stored, which when executed by a processor, implements the blockchain technology-based authentication method as described above.
Those of ordinary skill in the art will appreciate that the modules and method steps of the examples described in connection with the embodiments disclosed herein can be implemented as electronic hardware, or as a combination of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, specific working procedures of the apparatus, device and module described above may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus, device and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be additional divisions when actually implemented, for example, multiple modules or units may be combined or integrated into another apparatus, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or apparatuses, which may be in electrical, mechanical or other form.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a read-only memory server, a random access memory server, a magnetic disk or an optical disk, or other various media capable of storing program instructions.
In addition, it should be noted that the combination of the technical features described in the present application is not limited to the combination described in the claims or the combination described in the specific embodiments, and all the technical features described in the present application may be freely combined or combined in any manner unless contradiction occurs between them.
It should be noted that the above-mentioned embodiments are merely examples of the present application, and it is obvious that the present application is not limited to the above-mentioned embodiments, and many similar variations are possible. All modifications attainable or obvious from the present disclosure set forth herein should be deemed to be within the scope of the present disclosure.
The foregoing is merely illustrative of the preferred embodiments of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (9)

1. An identity verification method based on a blockchain technology is characterized by comprising the following steps:
establishing a plurality of virtual sub-management nodes, and establishing an identity management system for the virtual sub-management nodes;
uploading electronic identity information to a blockchain by a user, and carrying out information backup on a virtual management node;
receiving an identity verification information request of a user, and confirming the identity information;
after the identity verification, the identity verification result is fed back to the identity management system of the virtual sub-management node.
2. The blockchain technology based authentication method of claim 1, wherein the electronic identity information includes a user account number, a user name, a job number, and a cell phone number.
3. The blockchain technology-based authentication method of claim 1, wherein the user uploads the electronic identity information to the blockchain and performs information backup at the virtual management node, and further comprising:
the identity management system records the user blockchain identity verification information in the sub-management partition, and covers the identity information in the original account according to the newly backed-up identity information.
4. The blockchain technology-based identity verification method of claim 1, wherein after the identity verification, feeding back an identity verification result to an identity management system of the virtual management node, comprises:
receiving an identity verification information request of a user account, and confirming identity information in a blockchain;
if the identity verification is passed, allowing the account login request and the corresponding operation authority, and feeding back an identity verification processing result to an identity management system of the virtual sub-management node;
if the identity verification is not passed, the account login is refused, a verification request is sent to the identity management system of the virtual sub-management node, and the identity management system waits for verification.
5. The blockchain technology-based identity verification method of claim 1, wherein the identity management system performs an audit, comprising:
and checking whether the user is required by work or whether the user operation is safe or not is confirmed by an off-line or on-line mode.
6. The blockchain technology-based identity verification method of claim 1, wherein after the identity management system performs the auditing, further comprising:
after the verification of the user is passed, the identity management system confirms the operation safety of the user and can endow the user with temporary login authority, and the user can directly log in through the authority of the identity management system, so that verification is skipped;
if the user is not checked by the identity management system, the user is directly fed back to the user operation end, and the user is forbidden to log in.
7. An authentication device based on blockchain technology, comprising:
the node management module is used for establishing a plurality of virtual management nodes and establishing an identity management system for the virtual management nodes;
the information uploading module is used for uploading the electronic identity information to the blockchain by a user and carrying out information backup on the virtual management node;
the information verification module is used for receiving an identity verification information request of a user and confirming the identity information;
and the information feedback module is used for feeding back an identity verification result to the identity management system of the virtual sub-management node after the identity verification.
8. An electronic device, the electronic device comprising:
the device comprises a processor and a memory, wherein the memory is in communication connection with the processor;
the memory is configured to store executable instructions that are executed by at least one of the processors, the processor configured to execute the executable instructions to implement the blockchain technology-based authentication method of any of claims 1 to 6.
9. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein a computer program which, when executed by a processor, implements the blockchain technology based authentication method according to any of claims 1 to 6.
CN202310899383.XA 2023-07-21 2023-07-21 Identity verification method, device, equipment and medium based on blockchain technology Active CN116644401B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310899383.XA CN116644401B (en) 2023-07-21 2023-07-21 Identity verification method, device, equipment and medium based on blockchain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310899383.XA CN116644401B (en) 2023-07-21 2023-07-21 Identity verification method, device, equipment and medium based on blockchain technology

Publications (2)

Publication Number Publication Date
CN116644401A true CN116644401A (en) 2023-08-25
CN116644401B CN116644401B (en) 2023-10-20

Family

ID=87625114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310899383.XA Active CN116644401B (en) 2023-07-21 2023-07-21 Identity verification method, device, equipment and medium based on blockchain technology

Country Status (1)

Country Link
CN (1) CN116644401B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118349981A (en) * 2024-06-18 2024-07-16 江西科技学院 Computer startup identity authentication method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106530083A (en) * 2016-10-27 2017-03-22 上海亿账通区块链科技有限公司 Multi-chain management method and system based on block chain
CN108921555A (en) * 2018-06-30 2018-11-30 江苏恒宝智能系统技术有限公司 A kind of auth method and device combined based on block chain and iris recognition
CN109145647A (en) * 2018-09-05 2019-01-04 武汉笑脸科技有限公司 A kind of trusted identity verifying system and method based on block chain
CN109359601A (en) * 2018-10-19 2019-02-19 平安科技(深圳)有限公司 Authentication recognition methods, electronic device and computer readable storage medium
CN109376528A (en) * 2018-10-26 2019-02-22 上海交通大学 A kind of trusted identity management system and method based on block chain
WO2019104690A1 (en) * 2017-11-30 2019-06-06 深圳前海达闼云端智能科技有限公司 Mobile network access authentication method, device, storage medium and block chain node
CN112528270A (en) * 2020-12-09 2021-03-19 苏州市星际云通区块链科技有限公司 Block chain management method and device, electronic equipment and readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106530083A (en) * 2016-10-27 2017-03-22 上海亿账通区块链科技有限公司 Multi-chain management method and system based on block chain
WO2019104690A1 (en) * 2017-11-30 2019-06-06 深圳前海达闼云端智能科技有限公司 Mobile network access authentication method, device, storage medium and block chain node
CN108921555A (en) * 2018-06-30 2018-11-30 江苏恒宝智能系统技术有限公司 A kind of auth method and device combined based on block chain and iris recognition
CN109145647A (en) * 2018-09-05 2019-01-04 武汉笑脸科技有限公司 A kind of trusted identity verifying system and method based on block chain
CN109359601A (en) * 2018-10-19 2019-02-19 平安科技(深圳)有限公司 Authentication recognition methods, electronic device and computer readable storage medium
CN109376528A (en) * 2018-10-26 2019-02-22 上海交通大学 A kind of trusted identity management system and method based on block chain
CN112528270A (en) * 2020-12-09 2021-03-19 苏州市星际云通区块链科技有限公司 Block chain management method and device, electronic equipment and readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘可心;刘婷;田亮;: "基于区块链的数字身份认证构建方法分析", 电脑知识与技术, no. 18 *
彭永勇;张晓韬;: "基于区块链应用模式的可信身份认证关键技术研究", 网络安全技术与应用, no. 02 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118349981A (en) * 2024-06-18 2024-07-16 江西科技学院 Computer startup identity authentication method and system

Also Published As

Publication number Publication date
CN116644401B (en) 2023-10-20

Similar Documents

Publication Publication Date Title
US8356105B2 (en) Enterprise device policy management
CN111314340B (en) Authentication method and authentication platform
US20190069436A1 (en) Locking mechanism of a module of a data center
CN110891062B (en) Password changing method, server and storage medium
CN111045855A (en) Method, apparatus and computer program product for backing up data
CN116644401B (en) Identity verification method, device, equipment and medium based on blockchain technology
RU2665310C1 (en) Method of setting the network video recording device (variants) and the self-repairing video surveillance system
CN102195930B (en) Security access method among equipment and communication equipment
CN104320389A (en) Fusion identify protection system and fusion identify protection method based on cloud computing
CN112769808B (en) Mobile fort machine for industrial local area network, operation and maintenance method thereof and computer equipment
CN108038384B (en) High-safety cluster shared storage virtualization method
CN112313629B (en) Backup and restore verification
CN115952552B (en) Remote data destruction method, system and equipment
WO2014086149A1 (en) Server account number and password management method and system, and server
CN110362984A (en) Method and device for operating service system by multiple devices
CN110555682B (en) Multi-channel implementation method based on alliance chain
CN109617929B (en) Node and user interactive authentication method and system in block chain network mode
CN113556393B (en) Multi-type intermodal data exchange system and method based on block chain
CN110633172A (en) USB flash disk and data synchronization method thereof
CN114244568A (en) Security access control method, device and equipment based on terminal access behavior
CN113259376A (en) Control method of Internet of things equipment based on block chain
US12039044B2 (en) Data security in a metaverse environment
US11693994B2 (en) System and method for securing cache boards of an enterprise network data storage system
JP7138642B2 (en) Method and apparatus for performing secure backup and restore
CN112015520B (en) Data uploading system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant