CN116644401A - Identity verification method, device, equipment and medium based on blockchain technology - Google Patents
Identity verification method, device, equipment and medium based on blockchain technology Download PDFInfo
- Publication number
- CN116644401A CN116644401A CN202310899383.XA CN202310899383A CN116644401A CN 116644401 A CN116644401 A CN 116644401A CN 202310899383 A CN202310899383 A CN 202310899383A CN 116644401 A CN116644401 A CN 116644401A
- Authority
- CN
- China
- Prior art keywords
- identity
- user
- information
- management system
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title claims abstract description 79
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000005516 engineering process Methods 0.000 title claims abstract description 28
- 238000007726 management method Methods 0.000 claims description 86
- 238000004891 communication Methods 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 5
- 238000005192 partition Methods 0.000 claims description 4
- 238000004590 computer program Methods 0.000 claims description 3
- 238000012550 audit Methods 0.000 claims description 2
- 230000006870 function Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 230000009191 jumping Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The application discloses an identity verification method, device, equipment and medium based on a blockchain technology, and relates to the technical field of blockchains, wherein the method comprises the following steps: establishing a plurality of virtual sub-management nodes, and establishing an identity management system for the virtual sub-management nodes; and uploading the electronic identity information to the blockchain by the user, and carrying out information backup on the virtual management node. According to the application, the virtual branch nodes are arranged, the identity management system is established for the virtual branch nodes, after the user fails in identity authentication, the identity management system performs secondary authentication, after confirming the operation safety of the user, the user is endowed with temporary passing operation authority, so that the storage safety of enterprise data in a blockchain can be ensured, non-incumbent staff is prevented from logging in by using original identity information of an account number, the data in the enterprise are stolen, and the incumbent staff can log in temporarily when the identity authentication fails due to forgetting a password and the like, thereby ensuring the working efficiency.
Description
Technical Field
The application relates to the technical field of blockchain, in particular to an identity verification method, device, equipment and medium based on a blockchain technology.
Background
A blockchain is a chain of blocks one by one. Each block holds certain information which is linked in a chain according to the time sequence of their respective generation. This chain is kept in all servers, and the entire blockchain is secure as long as one server in the entire system can work. These servers, referred to as nodes in the blockchain system, provide storage space and computational support for the entire blockchain system. If the information in the blockchain is to be modified, it is necessary to sign consent of more than half of the nodes and modify the information in all the nodes, which are usually held in different subject hands, so it is an extremely difficult thing to tamper with the information in the blockchain. Compared with the traditional network, the blockchain has two main core characteristics: firstly, the data is difficult to tamper, and secondly, the data is decentralised. Based on the two characteristics, the information recorded by the blockchain is more real and reliable, and can help solve the problem that people are not trusted each other.
At present, more and more importance is attached to network security work in enterprises, especially semi-public data uploaded in a blockchain, although the integrity of the data can be reliably saved through the blockchain, the data are not difficult to obtain for the enterprise away staff, some sharing terminals are usually arranged in the enterprises, terminal accounts are also usually inherited, after old staff leave, the original terminals are inherited to new staff, the original accounts are inherited to the new staff, but because the identity information of the old staff is reserved in the original terminals, account verification through the identity information is difficult to avoid, and the semi-public data in the enterprises are continuously obtained, so that the traditional enterprise data blockchain identity verification method still has the defects, and the network security firewall of the enterprises still has certain defects.
Disclosure of Invention
The application aims to provide an identity verification method, device, equipment and medium based on a blockchain technology, so as to solve the problems in the background technology.
In order to achieve the above purpose, the present application provides the following technical solutions: an identity verification method based on a blockchain technology comprises the following steps:
establishing a plurality of virtual sub-management nodes, and establishing an identity management system for the virtual sub-management nodes;
uploading electronic identity information to a blockchain by a user, and carrying out information backup on a virtual management node;
receiving an identity verification information request of a user, and confirming the identity information;
after the identity verification, the identity verification result is fed back to the identity management system of the virtual sub-management node.
Preferably, the electronic identity information includes an account number, a user name, a job number and a mobile phone number of the user.
Preferably, the user uploads the electronic identity information to the blockchain, and performs information backup at the virtual management node, and then further includes:
the identity management system records the user blockchain identity verification information in the sub-management partition, and covers the identity information in the original account according to the newly backed-up identity information.
Preferably, after the identity verification, the identity management system for feeding back the identity verification result to the virtual sub-management node includes:
receiving an identity verification information request of a user account, and confirming identity information in a blockchain;
if the identity verification is passed, allowing the account login request and the corresponding operation authority, and feeding back an identity verification processing result to an identity management system of the virtual sub-management node;
if the identity verification is not passed, the account login is refused, a verification request is sent to the identity management system of the virtual sub-management node, and the identity management system waits for verification.
Preferably, the identity management system performs auditing, including:
and checking whether the user is required by work or whether the user operation is safe or not is confirmed by an off-line or on-line mode.
Preferably, after the identity management system performs the audit, the method further includes:
after the verification of the user is passed, the identity management system confirms the operation safety of the user and can endow the user with temporary login authority, and the user can directly log in through the authority of the identity management system, so that verification is skipped;
if the user is not checked by the identity management system, the user is directly fed back to the user operation end, and the user is forbidden to log in.
The application also provides an identity verification device based on the blockchain technology, which comprises:
the node management module is used for establishing a plurality of virtual management nodes and establishing an identity management system for the virtual management nodes;
the information uploading module is used for uploading the electronic identity information to the blockchain by a user and carrying out information backup on the virtual management node;
the information verification module is used for receiving an identity verification information request of a user and confirming the identity information;
and the information feedback module is used for feeding back an identity verification result to the identity management system of the virtual sub-management node after the identity verification.
The application also provides an electronic device, which is entity equipment, comprising:
the device comprises a processor and a memory, wherein the memory is in communication connection with the processor;
the memory is configured to store executable instructions that are executed by at least one of the processors, the processor configured to execute the executable instructions to implement the blockchain technology-based authentication method as described above.
The present application also provides a computer readable storage medium having stored therein a computer program which when executed by a processor implements a blockchain technique based authentication method as described above.
Compared with the prior art, the application has the beneficial effects that:
through setting up virtual management node to set up the identity management system for virtual management node, can play the effect of backup user electronic identity information, supervision user account operation, the user can feed back the authentication result to the identity management system when carrying out the authentication, the inside administrator of enterprise is convenient for supervise, simultaneously the user is after the authentication failure, can also carry out the secondary through the identity management system and verify, confirm the operation security back that the user operated the user and pass through temporarily, can guarantee the storage security of enterprise data in the blockchain, prevent that non-incumbent personnel from utilizing account former identity information to log in, steal the inside data of enterprise, enable when the incumbent personnel to carry out the login temporarily because of forgetting reason authentication failure such as password again, guarantee work efficiency.
Drawings
FIG. 1 is a main flow chart of an authentication method based on a blockchain technique according to an embodiment of the present application;
FIG. 2 is a flowchart illustrating steps of a method for identity verification based on a blockchain technique according to an embodiment of the present application;
fig. 3 is a block diagram of an authentication device based on a blockchain technique according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The main execution body of the method in this embodiment is a terminal, and the terminal may be a device such as a mobile phone, a tablet computer, a PDA, a notebook or a desktop, but of course, may be another device with a similar function, and this embodiment is not limited thereto.
Referring to fig. 1, the present application provides an authentication method based on blockchain technology, the method is applied to user authentication of a blockchain technology enterprise, and includes:
step 101, establishing a plurality of virtual sub-management nodes, and establishing an identity management system for the virtual sub-management nodes.
Step 102, the user uploads the electronic identity information to the blockchain, and performs information backup at the virtual management node.
The electronic identity information comprises an account number, a user name, a work number and a mobile phone number of a user.
Specifically, after the user uploads the electronic identity information to the blockchain and the virtual management node performs information backup, the identity management system records the user blockchain identity verification information in the sub-management partition, and covers the identity information in the original account according to the newly backed-up identity information.
It should be noted that after the identity management system covers the identity information in the original account, the identity information of the original account in the blockchain is synchronously updated, and the login authority of the identity information of the original account is cancelled.
Step 103, receiving the authentication information request of the user and confirming the identity information.
Specifically, the user's authentication information request includes account number and password combination authentication, user name and password combination authentication, job number and password combination authentication, and mobile phone number and password combination authentication.
Step 104, after the identity verification, feeding back the identity verification result to the identity management system of the virtual sub-management node.
Specifically, the block links to receive the request of the identity verification information of the user account, confirms the identity information, confirms whether the login password, the user name, the work number and the mobile phone number are consistent with the current latest identity information data of the account, and if the login password, the user name, the work number and the mobile phone number are consistent with the latest identity information data, the verification is passed, otherwise, the verification is not passed;
if the identity verification is passed, allowing the account login request and the corresponding operation authority, and feeding back an identity verification processing result to an identity management system of the virtual sub-management node;
if the identity verification is not passed, the account login is refused, a verification request is sent to the identity management system of the virtual sub-management node, and the identity management system waits for verification.
The identity management system performs auditing, including auditing in an off-line or on-line mode, to confirm whether a user needs work or whether the user operation is safe;
the identity management system performs online auditing, namely an identity management system administrator directly confirms in an enterprise department to confirm whether an account operator is an incumbent staff in the enterprise; if the identity management system administrator or the staff is not in the enterprise at the moment, on-line auditing is carried out, if the on-line auditing is carried out, the staff to which the account belongs is directly contacted by communication, the identity authentication failure reason is confirmed, whether temporary login is needed because of work is confirmed, and whether the user operation is safe is confirmed.
After the user passes the verification, the identity management system confirms the operation safety of the user and can give the account temporary login authority, and the account temporary login authority is directly logged in through the authority of the identity management system, so that the verification is skipped;
if the user is not checked by the identity management system, the user is directly fed back to the user operation end, and the user is forbidden to log in.
In this embodiment, by setting up the virtual management node and establishing the identity management system for the virtual management node, the functions of backing up the electronic identity information of the user and supervising the operation of the user account can be played, the user can feed back the identity verification result to the identity management system when carrying out the identity verification, so that the internal administrator of the enterprise can conveniently supervise, and meanwhile, after the identity verification fails, the user can carry out the secondary verification through the identity management system, after confirming the operation safety of the user, the user is endowed with the operation authority which temporarily passes through, so that the storage safety of the enterprise data in the blockchain can be ensured, the non-incumbent personnel can be prevented from logging in by using the original identity information of the account, the internal data of the enterprise can be prevented from being stolen, and the incumbent personnel can temporarily log in when the identity verification fails due to forgetting the password and the like, and the work efficiency is ensured.
For better understanding of the foregoing embodiments, as shown in fig. 2, the present application further provides a flowchart of specific steps of a blockchain technology-based authentication method, where the method at least includes:
step 201, establishing a plurality of virtual sub-management nodes, and establishing an identity management system for the virtual sub-management nodes;
step 202, uploading electronic identity information to a blockchain by a user account, and carrying out information backup on a virtual management node;
step 203, the identity management system records the user blockchain identity verification information in the sub-management partition, and overlays the identity information in the original account according to the newly backed-up identity information;
step 204, receiving an identity verification information request of a user account, and performing identity information confirmation in a block chain, after verification, jumping to step 205, and after verification failure, jumping to step 206;
step 205, allowing the account to log in the request and the corresponding operation authority, and feeding back the authentication processing result to the identity management system of the virtual sub-management node;
step 206, rejecting account login, sending a verification request to an identity management system of the virtual sub-management node, and waiting for the identity management system to carry out auditing;
step 207, after the identity management system checks, the user operation security is confirmed, the account can be given temporary login authority, login is directly carried out through the authority of the identity management system, and verification is skipped.
On the basis of the above embodiment, as shown in fig. 3, the present application further provides a blockchain technology-based authentication device, configured to support the blockchain technology-based authentication method of the above embodiment, where the blockchain technology-based authentication device includes:
a node-in-pipe module 301, configured to establish a plurality of virtual-in-pipe nodes, and establish an identity management system for the virtual-in-pipe nodes;
the information uploading module 302 is configured to upload electronic identity information to the blockchain by a user, and perform information backup at the virtual management node;
an information verification module 303, configured to receive an authentication information request of a user, and perform identity information confirmation;
and the information feedback module 304 is used for feeding back an identity verification result to the identity management system of the virtual sub-management node after the identity verification.
Further, the identity verification device based on the blockchain technology may operate the identity verification method based on the blockchain technology, and specific implementation may refer to a method embodiment, which is not described herein.
On the basis of the embodiment, the application further provides electronic equipment, which comprises:
the device comprises a processor and a memory, wherein the processor is in communication connection with the memory;
in this embodiment, the memory may be implemented in any suitable manner, for example: the memory can be read-only memory, mechanical hard disk, solid state disk, USB flash disk or the like; the memory is used for storing executable instructions executed by at least one of the processors;
in this embodiment, the processor may be implemented in any suitable manner, e.g., the processor may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an application specific integrated circuit (ApplicationSpecificIntegratedCircuit, ASIC), a programmable logic controller, and an embedded microcontroller, etc.; the processor is configured to execute the executable instructions to implement a blockchain technology-based authentication method as described above.
On the basis of the above embodiment, the present application further provides a computer readable storage medium, in which a computer program is stored, which when executed by a processor, implements the blockchain technology-based authentication method as described above.
Those of ordinary skill in the art will appreciate that the modules and method steps of the examples described in connection with the embodiments disclosed herein can be implemented as electronic hardware, or as a combination of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, specific working procedures of the apparatus, device and module described above may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus, device and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be additional divisions when actually implemented, for example, multiple modules or units may be combined or integrated into another apparatus, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or apparatuses, which may be in electrical, mechanical or other form.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a read-only memory server, a random access memory server, a magnetic disk or an optical disk, or other various media capable of storing program instructions.
In addition, it should be noted that the combination of the technical features described in the present application is not limited to the combination described in the claims or the combination described in the specific embodiments, and all the technical features described in the present application may be freely combined or combined in any manner unless contradiction occurs between them.
It should be noted that the above-mentioned embodiments are merely examples of the present application, and it is obvious that the present application is not limited to the above-mentioned embodiments, and many similar variations are possible. All modifications attainable or obvious from the present disclosure set forth herein should be deemed to be within the scope of the present disclosure.
The foregoing is merely illustrative of the preferred embodiments of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.
Claims (9)
1. An identity verification method based on a blockchain technology is characterized by comprising the following steps:
establishing a plurality of virtual sub-management nodes, and establishing an identity management system for the virtual sub-management nodes;
uploading electronic identity information to a blockchain by a user, and carrying out information backup on a virtual management node;
receiving an identity verification information request of a user, and confirming the identity information;
after the identity verification, the identity verification result is fed back to the identity management system of the virtual sub-management node.
2. The blockchain technology based authentication method of claim 1, wherein the electronic identity information includes a user account number, a user name, a job number, and a cell phone number.
3. The blockchain technology-based authentication method of claim 1, wherein the user uploads the electronic identity information to the blockchain and performs information backup at the virtual management node, and further comprising:
the identity management system records the user blockchain identity verification information in the sub-management partition, and covers the identity information in the original account according to the newly backed-up identity information.
4. The blockchain technology-based identity verification method of claim 1, wherein after the identity verification, feeding back an identity verification result to an identity management system of the virtual management node, comprises:
receiving an identity verification information request of a user account, and confirming identity information in a blockchain;
if the identity verification is passed, allowing the account login request and the corresponding operation authority, and feeding back an identity verification processing result to an identity management system of the virtual sub-management node;
if the identity verification is not passed, the account login is refused, a verification request is sent to the identity management system of the virtual sub-management node, and the identity management system waits for verification.
5. The blockchain technology-based identity verification method of claim 1, wherein the identity management system performs an audit, comprising:
and checking whether the user is required by work or whether the user operation is safe or not is confirmed by an off-line or on-line mode.
6. The blockchain technology-based identity verification method of claim 1, wherein after the identity management system performs the auditing, further comprising:
after the verification of the user is passed, the identity management system confirms the operation safety of the user and can endow the user with temporary login authority, and the user can directly log in through the authority of the identity management system, so that verification is skipped;
if the user is not checked by the identity management system, the user is directly fed back to the user operation end, and the user is forbidden to log in.
7. An authentication device based on blockchain technology, comprising:
the node management module is used for establishing a plurality of virtual management nodes and establishing an identity management system for the virtual management nodes;
the information uploading module is used for uploading the electronic identity information to the blockchain by a user and carrying out information backup on the virtual management node;
the information verification module is used for receiving an identity verification information request of a user and confirming the identity information;
and the information feedback module is used for feeding back an identity verification result to the identity management system of the virtual sub-management node after the identity verification.
8. An electronic device, the electronic device comprising:
the device comprises a processor and a memory, wherein the memory is in communication connection with the processor;
the memory is configured to store executable instructions that are executed by at least one of the processors, the processor configured to execute the executable instructions to implement the blockchain technology-based authentication method of any of claims 1 to 6.
9. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein a computer program which, when executed by a processor, implements the blockchain technology based authentication method according to any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310899383.XA CN116644401B (en) | 2023-07-21 | 2023-07-21 | Identity verification method, device, equipment and medium based on blockchain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310899383.XA CN116644401B (en) | 2023-07-21 | 2023-07-21 | Identity verification method, device, equipment and medium based on blockchain technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116644401A true CN116644401A (en) | 2023-08-25 |
CN116644401B CN116644401B (en) | 2023-10-20 |
Family
ID=87625114
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310899383.XA Active CN116644401B (en) | 2023-07-21 | 2023-07-21 | Identity verification method, device, equipment and medium based on blockchain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116644401B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118349981A (en) * | 2024-06-18 | 2024-07-16 | 江西科技学院 | Computer startup identity authentication method and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106530083A (en) * | 2016-10-27 | 2017-03-22 | 上海亿账通区块链科技有限公司 | Multi-chain management method and system based on block chain |
CN108921555A (en) * | 2018-06-30 | 2018-11-30 | 江苏恒宝智能系统技术有限公司 | A kind of auth method and device combined based on block chain and iris recognition |
CN109145647A (en) * | 2018-09-05 | 2019-01-04 | 武汉笑脸科技有限公司 | A kind of trusted identity verifying system and method based on block chain |
CN109359601A (en) * | 2018-10-19 | 2019-02-19 | 平安科技(深圳)有限公司 | Authentication recognition methods, electronic device and computer readable storage medium |
CN109376528A (en) * | 2018-10-26 | 2019-02-22 | 上海交通大学 | A kind of trusted identity management system and method based on block chain |
WO2019104690A1 (en) * | 2017-11-30 | 2019-06-06 | 深圳前海达闼云端智能科技有限公司 | Mobile network access authentication method, device, storage medium and block chain node |
CN112528270A (en) * | 2020-12-09 | 2021-03-19 | 苏州市星际云通区块链科技有限公司 | Block chain management method and device, electronic equipment and readable storage medium |
-
2023
- 2023-07-21 CN CN202310899383.XA patent/CN116644401B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106530083A (en) * | 2016-10-27 | 2017-03-22 | 上海亿账通区块链科技有限公司 | Multi-chain management method and system based on block chain |
WO2019104690A1 (en) * | 2017-11-30 | 2019-06-06 | 深圳前海达闼云端智能科技有限公司 | Mobile network access authentication method, device, storage medium and block chain node |
CN108921555A (en) * | 2018-06-30 | 2018-11-30 | 江苏恒宝智能系统技术有限公司 | A kind of auth method and device combined based on block chain and iris recognition |
CN109145647A (en) * | 2018-09-05 | 2019-01-04 | 武汉笑脸科技有限公司 | A kind of trusted identity verifying system and method based on block chain |
CN109359601A (en) * | 2018-10-19 | 2019-02-19 | 平安科技(深圳)有限公司 | Authentication recognition methods, electronic device and computer readable storage medium |
CN109376528A (en) * | 2018-10-26 | 2019-02-22 | 上海交通大学 | A kind of trusted identity management system and method based on block chain |
CN112528270A (en) * | 2020-12-09 | 2021-03-19 | 苏州市星际云通区块链科技有限公司 | Block chain management method and device, electronic equipment and readable storage medium |
Non-Patent Citations (2)
Title |
---|
刘可心;刘婷;田亮;: "基于区块链的数字身份认证构建方法分析", 电脑知识与技术, no. 18 * |
彭永勇;张晓韬;: "基于区块链应用模式的可信身份认证关键技术研究", 网络安全技术与应用, no. 02 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118349981A (en) * | 2024-06-18 | 2024-07-16 | 江西科技学院 | Computer startup identity authentication method and system |
Also Published As
Publication number | Publication date |
---|---|
CN116644401B (en) | 2023-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8356105B2 (en) | Enterprise device policy management | |
CN111314340B (en) | Authentication method and authentication platform | |
US20190069436A1 (en) | Locking mechanism of a module of a data center | |
CN110891062B (en) | Password changing method, server and storage medium | |
CN111045855A (en) | Method, apparatus and computer program product for backing up data | |
CN116644401B (en) | Identity verification method, device, equipment and medium based on blockchain technology | |
RU2665310C1 (en) | Method of setting the network video recording device (variants) and the self-repairing video surveillance system | |
CN102195930B (en) | Security access method among equipment and communication equipment | |
CN104320389A (en) | Fusion identify protection system and fusion identify protection method based on cloud computing | |
CN112769808B (en) | Mobile fort machine for industrial local area network, operation and maintenance method thereof and computer equipment | |
CN108038384B (en) | High-safety cluster shared storage virtualization method | |
CN112313629B (en) | Backup and restore verification | |
CN115952552B (en) | Remote data destruction method, system and equipment | |
WO2014086149A1 (en) | Server account number and password management method and system, and server | |
CN110362984A (en) | Method and device for operating service system by multiple devices | |
CN110555682B (en) | Multi-channel implementation method based on alliance chain | |
CN109617929B (en) | Node and user interactive authentication method and system in block chain network mode | |
CN113556393B (en) | Multi-type intermodal data exchange system and method based on block chain | |
CN110633172A (en) | USB flash disk and data synchronization method thereof | |
CN114244568A (en) | Security access control method, device and equipment based on terminal access behavior | |
CN113259376A (en) | Control method of Internet of things equipment based on block chain | |
US12039044B2 (en) | Data security in a metaverse environment | |
US11693994B2 (en) | System and method for securing cache boards of an enterprise network data storage system | |
JP7138642B2 (en) | Method and apparatus for performing secure backup and restore | |
CN112015520B (en) | Data uploading system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |