CN117294447A - Trusted authentication method and device based on blockchain, terminal equipment and storage medium - Google Patents

Trusted authentication method and device based on blockchain, terminal equipment and storage medium Download PDF

Info

Publication number
CN117294447A
CN117294447A CN202311350890.4A CN202311350890A CN117294447A CN 117294447 A CN117294447 A CN 117294447A CN 202311350890 A CN202311350890 A CN 202311350890A CN 117294447 A CN117294447 A CN 117294447A
Authority
CN
China
Prior art keywords
chain
information
authentication
public
public chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311350890.4A
Other languages
Chinese (zh)
Other versions
CN117294447B (en
Inventor
王程
成彬
周云飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute Of Applied Mathematics Hebei Academy Of Sciences
Original Assignee
Institute Of Applied Mathematics Hebei Academy Of Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute Of Applied Mathematics Hebei Academy Of Sciences filed Critical Institute Of Applied Mathematics Hebei Academy Of Sciences
Priority to CN202311350890.4A priority Critical patent/CN117294447B/en
Publication of CN117294447A publication Critical patent/CN117294447A/en
Application granted granted Critical
Publication of CN117294447B publication Critical patent/CN117294447B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The disclosure provides a trusted authentication method and device based on a blockchain, terminal equipment and a storage medium, wherein the method is applied to a first public chain in a target blockchain architecture; the target blockchain architecture comprises a first alliance chain built on a target organization intranet and a first public chain capable of cross-chain interaction with the first alliance chain; the block chain-based trusted authentication method comprises the following steps: responding to a first information authentication request sent by a user node, and sending a second information authentication request corresponding to the first information authentication request to the first alliance chain; and responding to a first authentication result corresponding to the second information authentication request returned by the first alliance chain, and returning the first authentication result to the user node. The block chain-based trusted authentication method and device, the terminal equipment and the storage medium can improve the reliability of internet user information authentication.

Description

Trusted authentication method and device based on blockchain, terminal equipment and storage medium
Technical Field
The disclosure belongs to the technical field of blockchain, and more particularly relates to a trusted authentication method and device based on blockchain, terminal equipment and storage medium.
Background
With the development of internet technology, informatization is more popular, people are more and more communicated, various online or offline transactions are more and more, and more opportunities are brought to people. At present, when users communicate, a reasonable and effective authentication mechanism is not available, so that some trust disputes are caused, and how to realize information authentication becomes a problem to be solved by those skilled in the art.
Disclosure of Invention
The disclosure aims to provide a trusted authentication method and device based on a blockchain, terminal equipment and a storage medium, so as to solve the problem of information authentication.
In a first aspect of embodiments of the present disclosure, a trusted authentication method based on a blockchain is provided, the trusted authentication method being applied to a first public chain in a target blockchain architecture; the target blockchain architecture comprises a first alliance chain built on a target organization intranet and a first public chain capable of cross-chain interaction with the first alliance chain;
the block chain-based trusted authentication method comprises the following steps:
responding to a first information authentication request sent by a user node, and sending a second information authentication request corresponding to the first information authentication request to the first alliance chain;
and responding to a first authentication result corresponding to the second information authentication request returned by the first alliance chain, and returning the first authentication result to the user node.
In a second aspect of embodiments of the present disclosure, a trusted authentication device based on a blockchain is provided, applied to a first public chain in a target blockchain architecture; the target blockchain architecture comprises a first alliance chain built on a target organization intranet and a first public chain capable of cross-chain interaction with the first alliance chain;
the block chain based trusted authentication device comprises:
a first authentication request unit, which responds to a first information authentication request sent by a user node and sends a second information authentication request corresponding to the first information authentication request to the first alliance chain;
and the first authentication return unit is used for responding to a first authentication result corresponding to the second information authentication request returned by the first alliance chain and returning the first authentication result to the user node.
In a third aspect of the disclosed embodiments, a terminal device is provided, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the blockchain-based trusted authentication method described above when the computer program is executed.
In a fourth aspect of the disclosed embodiments, a computer storage medium is provided, where a computer program is stored, which when executed by a processor, implements the steps of the blockchain-based trusted authentication method described above.
The block chain-based trusted authentication method and device, the terminal equipment and the storage medium provided by the embodiment of the disclosure have the beneficial effects that:
according to the embodiment of the disclosure, the alliance chain is built on the target organization intranet, the public chain is built on the extranet, and the trusted authentication of the information can be realized while the information security is ensured through the cross-chain interaction of the alliance chain and the public chain.
Specifically, when information authentication is required, a user node on a public chain may send a first information authentication request to the public chain, the public chain may send a second information authentication request corresponding to the first information authentication request to a federation chain of a target organization intranet, the federation chain realizes information authentication, and returns a corresponding first authentication result, that is, the user node/public chain does not need to access the intranet of the target organization, so that the embodiment of the disclosure can realize trusted authentication of information.
That is, the embodiment of the disclosure establishes a bridge for interaction between the internal network and the external network through the combination of the public chain and the alliance chain, and realizes the trusted authentication of information.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings that are required for the embodiments or the description of the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is a schematic diagram of a target blockchain architecture provided in an embodiment of the present disclosure;
FIG. 2 is a flow chart of a trusted authentication method based on blockchain according to an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of a target blockchain architecture provided by another embodiment of the present disclosure;
FIG. 4 is a block diagram of a block chain based trusted authentication device according to one embodiment of the present disclosure;
fig. 5 is a schematic block diagram of a terminal device according to an embodiment of the present disclosure.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system configurations, techniques, etc. in order to provide a thorough understanding of the disclosed embodiments. However, it will be apparent to one skilled in the art that the present disclosure may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present disclosure with unnecessary detail.
For the purposes of promoting an understanding of the principles and advantages of the disclosure, reference will now be made to the embodiments illustrated in the drawings.
Referring to fig. 1, fig. 1 is a schematic diagram of a target blockchain architecture according to an embodiment of the present disclosure, including a first federation chain built on a target organization intranet (abbreviated as intranet) and a plurality of first public chains that cross-link interact with the first federation chain. The target organization intranet may include a government intranet, a hospital intranet, or a credit system intranet, etc., where the first alliance chain on the target organization intranet stores trusted information, e.g., personnel identity information is stored in the government intranet, personnel medical information is stored in the hospital intranet, and personnel credit information is stored in the credit system. The first public chains are built on the external network, and each first public chain comprises a plurality of user nodes, and data are shared among the user nodes.
Referring to fig. 2, fig. 2 is a flowchart of a trusted authentication method based on a blockchain according to an embodiment of the present disclosure, where the trusted authentication method based on a blockchain includes:
s101: and responding to the first information authentication request sent by the user node, and sending a second information authentication request corresponding to the first information authentication request to the first alliance chain.
In the embodiment of the disclosure, when user authentication is required, the corresponding user node may send a first information authentication request, where the first information authentication request includes user identity information, an encryption contract in a first public chain encrypts the user identity information to obtain a second information authentication request, and a data sending contract sends the second information authentication request to a first federation chain of a target organization intranet.
For example, in scenario 1, a first public chain is used for community group purchase, and the first federation chain stores identity information of residents of the community. In this embodiment, the first public chain is referred to as a group purchase chain, and on this basis, when a user wants to join in community group purchase, a node on the group purchase chain (i.e., a user node) may send a first information authentication request to the group purchase chain, and the group purchase chain sends a second information authentication request to the first federation chain according to the first information authentication request, so as to perform user authentication according to trusted information stored in the first federation chain.
S102: and responding to a first authentication result corresponding to the second information authentication request returned by the first alliance chain, and returning the first authentication result to the user node.
And sending a second information authentication request to the first alliance through the first public chain to realize data intercommunication between the intranet and the extranet, so that the information can be trusted authenticated according to the trusted information stored by the first alliance chain. Meanwhile, the trusted information is stored in the first alliance chain, the first public chain does not need to know the specific content of the trusted information, and only needs to know the information authentication result, the confidentiality of the trusted information of the first alliance chain is not affected, and the security of the trusted information is improved.
From the above, the embodiment of the disclosure builds a alliance chain on the target organization intranet, builds a public chain on the extranet, and can realize the trusted authentication of information while guaranteeing the information security through the cross-chain interaction of the alliance chain and the public chain.
Specifically, when information authentication is required, a user node on a public chain may send a first information authentication request to the public chain, the public chain may send a second information authentication request corresponding to the first information authentication request to a federation chain of a target organization intranet, the federation chain realizes information authentication, and returns a corresponding first authentication result, that is, the user node/public chain does not need to access the intranet of the target organization, so that the embodiment of the disclosure can realize trusted authentication of information.
That is, the embodiment of the disclosure establishes a bridge for interaction between the internal network and the external network through the combination of the public chain and the alliance chain, and realizes the trusted authentication of information.
In one embodiment of the disclosure, the first public chain includes a plurality of first public chains, and cross-chain interactions between the plurality of first public chains are possible, and the trusted block chain-based authentication method further includes:
determining whether to provide first data corresponding to a first transaction request to a first target public chain based on a preset consensus mechanism in response to the first transaction request sent by the first target public chain; the first target public chain is a public chain which is except the public chain and can cross-chain interact with the first alliance chain;
and if the first data is provided for the first target public chain, returning the first data to the first target public chain.
In the embodiment of the disclosure, other first public chains which cross-link interact with the first alliance chain can be built on the external network besides the public chains, namely the first target public chains described in the embodiment of the disclosure, and the first target public chains can request the public chains for transaction according to the needs of user nodes, wherein the transaction content can be data of the public chains or goods transaction with the user nodes of the public chains.
In the embodiments of the present disclosure, the different first public chains may correspond to different user node attributes. User node attributes include, but are not limited to, user area, user occupation, the organization to which the user belongs, and the like. For example, the first public chain may be a public chain corresponding to a user in the area a, the second public chain may be a public chain corresponding to a user in the area B, the third public chain may be a public chain corresponding to a group purchase user, the fourth public chain may be a public chain corresponding to a merchant user, the fifth public chain may be a public chain corresponding to a property company, the sixth public chain may be a public chain corresponding to an electric company, and so on. In a specific scenario, for example, in scenario 2, the public chain is a public chain corresponding to a community group purchase user, hereinafter referred to as a group purchase chain, the first target public chain is a public chain corresponding to a community merchant user, hereinafter referred to as a merchant chain, both the merchant chain and the group purchase chain cross-link interact with the first alliance chain, the first alliance chain stores personnel information of a community, and the merchant chain and the group purchase chain can cross-link interact.
On the basis, the merchant chain can send a first transaction request to the group purchase chain, inquire the group purchase information stored by the group purchase chain, and know the demand condition of community personnel for commodities. When the group purchase link receives the first transaction request, based on a preset consensus mechanism, a user node voting on the group purchase chain decides whether to provide group purchase information for the merchant chain, if the user node voting decides to provide the group purchase information for the merchant chain, the group purchase information is sent to the merchant chain, otherwise, if the user node voting is opposite to the group purchase information provided for the merchant chain, the information that the transaction request does not pass is sent to the merchant chain.
It should be noted that, those skilled in the art may flexibly design a preset consensus mechanism, for example, more than 50% of user nodes agree to consider that consensus is achieved.
In one embodiment of the present disclosure, the trusted authentication method may further include:
in response to the second transaction request sent by the user node, a third transaction request corresponding to the second transaction request is sent to the first target public chain.
And returning the second data to the user node in response to the second data returned by the first target public chain and corresponding to the third transaction request.
In the embodiment of the disclosure, the public chain can request data from the first target public chain according to the requirement of the user node, so that data intercommunication among different user groups is further promoted.
Still taking scenario 2 as an example, the group purchase chain may send a second transaction request to the merchant chain to query the merchant chain for stored merchandise offer information, including merchandise names, merchandise quantities, and the like. And when the merchant link receives the second transaction request, commodity supply information is sent to the group-buying chain, so that a user of the group-buying chain can know commodity supply conditions in real time.
In one embodiment of the present disclosure, the blockchain-based trusted authentication method further includes:
and counting the transaction information of the public chain according to a preset time interval to obtain a transaction information counting result.
And sending the transaction information statistical result to the user node.
In the embodiment of the disclosure, the transaction information of the public chain can be counted regularly, so that each user node can intuitively know the transaction information in the last period of time.
Still taking scene 2 as an example, the group purchase chain can count transaction information according to months, wherein the transaction information of the present month comprises the release amount of the group purchase information of the present month and the corresponding purchase amount, so that a user of the group purchase chain can conveniently know commodity information in real time and find good objects.
In another example, in the first public chain corresponding to the property management, the repair information, the consultation information or the complaint information and the like of each user node are counted monthly, so that the common problems in the community management can be found out in time, the common problems are handled or solved in a centralized manner, and the efficiency of the community management can be improved.
In one embodiment of the present disclosure, the blockchain-based trusted authentication method further includes:
and carrying out data analysis on the transaction information statistical result to obtain a data analysis result.
And generating first transaction demand information according to the data analysis result.
And determining whether to send the first transaction requirement information to the first target public chain or not based on a preset consensus mechanism.
And if the first transaction demand information is determined to be sent to the first public chain, sending second transaction demand information corresponding to the first transaction demand information to the first public chain.
In the embodiment of the disclosure, the data analysis can be further performed on the transaction information statistics result of the public chain, and the first transaction requirement information is sent to other public chains according to the data analysis result, namely the first target public chain described in the embodiment of the disclosure, so that the data intercommunication among a plurality of first public chains is further realized. The content of the first transaction requirement information may be an item name and a corresponding number of items that the user node of the first target public chain wishes to transact.
Taking the scenario 2 as an example, the data analysis may be performed on the transaction information statistics result in the group purchase chain, if the data analysis result indicates that the group purchase information release amount of a certain commodity is smaller than the corresponding purchase amount, and the commodity supply and the demand of the present month are not met, the commodity empty and shortage is calculated, the first transaction demand information is generated according to the commodity empty and shortage, the first transaction demand information is determined by voting by the user node based on a preset consensus mechanism, if the first transaction demand information is determined by voting by the user, the first transaction demand information is encrypted to obtain the second transaction demand information, and the second transaction demand information is sent to the merchant chain. And when the merchant chain receives the second transaction demand information, providing commodity supply for users in the group purchase chain, and realizing supply-demand matching.
In one embodiment of the present disclosure, the blockchain-based trusted authentication method further includes:
receiving third data corresponding to the second transaction demand information returned by the first target public chain; the third data comprises a plurality of supply records, and each supply record comprises a free commodity name, a free commodity supply amount, a merchant ID and merchant filling time which are in one-to-one correspondence;
screening the third data according to the filling time of the merchant to obtain fourth data;
and returning the fourth data to each user node.
Taking the scenario 2 as an example, when the merchant link receives the second transaction requirement information, each user node fills in the available empty commodity names and the available empty commodity supply quantity to obtain third data, and the merchant link sends the third data to the group purchase chain; the screening contracts on the group purchase chain determine the merchant providing the supply service of the vacant goods according to the filling time, namely, the merchant with the first filled information is screened first. For example, if the empty amount of a commodity is 1000, the first merchant can provide 500, the second merchant can provide 300, and the third merchant can provide 200, then the third data is determined according to the order of 500, 300, and 200 of the first merchant, the second merchant, and the third merchant.
In an embodiment of the present disclosure, the second transaction requirement information may include a plurality of blank records, each blank record including a blank commodity name, a blank commodity amount, a buyer ID, and a merchant score table corresponding one to one, and taking the above scenario 2 as an example, the blockchain-based trusted authentication method further includes:
receiving third data corresponding to the second transaction demand information returned by the first target public chain; the third data comprises a plurality of supply records, and each supply record comprises a free commodity name, a free commodity supply amount, a merchant ID and merchant filling time which are in one-to-one correspondence;
determining a first score for each merchant according to the merchant score table;
determining a second score for each merchant based on the merchant fill-in time;
calculating a weighted average of the first score and the second score to obtain a comprehensive score of each merchant;
screening the third data according to the comprehensive scores to obtain fourth data;
and returning the fourth data to each user node.
In the embodiment of the disclosure, the merchant scoring and merchant filling time are comprehensively considered, the merchant providing the vacant commodity supply service is determined, the time of the buyer in the commodity ratio is saved, the buyer can buy high-quality commodities in the least time, meanwhile, the merchant service behavior is restrained, and a good mutual trust mechanism is established.
Referring to fig. 3, in one embodiment of the present disclosure, the target blockchain architecture further includes a second federated chain built on a target organization intranet, and a second public chain that can cross-chain interact with the second federated chain; the first public chain and the second public chain can cross-chain interaction, and the trusted authentication method based on the blockchain further comprises the following steps:
in response to a third information authentication request sent by the second public chain, determining whether to provide a second authentication result corresponding to the third information authentication request to the second public chain based on a preset consensus mechanism.
And if the second authentication result is provided for the second public chain, sending a fourth information authentication request corresponding to the third information authentication request to the first alliance chain, and returning the second authentication result to the second public chain when the second authentication result returned by the first alliance chain is received.
In the embodiment of the disclosure, the public chain can also help other public chains, namely the second public chain described in the embodiment of the disclosure, to perform user information authentication, which is beneficial to improving the convenience of user information authentication. The specific process is as follows:
for example, in scenario 3, the second public chain is the merchant chain corresponding to the user in zone a, and is used for merchant communications in zone a, and the second public chain is the merchant chain corresponding to the user in zone B, and is used for merchant communications in zone B. And when the public link receives the third information authentication request, the user node votes on the basis of a preset consensus mechanism to determine whether to provide a second authentication result for the second public link. If the user votes to provide a second authentication result for the second public chain, the identity information in the third information authentication request is extracted, the identity information is encrypted to obtain a fourth information authentication request, the fourth information authentication request is sent to the first alliance chain, the identity information of the user C is authenticated according to the trusted information stored by the first alliance chain to obtain a second authentication result, and the second authentication result is sent to the second public chain. And if the second authentication result shows that the identity information authentication of the user C is passed, allowing the user C to join the merchant communication group in the area A, otherwise, if the second authentication result shows that the identity information authentication of the user C is not passed, not allowing the user C to join the merchant communication group in the area A.
In one embodiment of the present disclosure, the blockchain-based trusted authentication method further includes:
and responding to the fifth information authentication request sent by the user node, and sending a sixth information authentication request corresponding to the fifth information authentication request to the second public chain.
Responding to a third authentication result returned by the second public chain and corresponding to the sixth information authentication request, and returning the third authentication result to the user node; the sixth information authentication request is used for indicating a second public chain to send a seventh information authentication request corresponding to the sixth information authentication request to a second federation chain, and receiving and returning a third authentication result corresponding to the seventh information authentication request.
In the embodiment of the disclosure, the public chain can request other public chains, for example, the second public chain helps the public chain to perform user information authentication, so that the convenience of user information authentication is further improved.
Taking the scenario 3 as an example, a user D in the area B wants to join a merchant communication group in the area a, and the corresponding user node sends a fifth information authentication request to the public link, and after the public link receives the fifth information authentication request, extracts user identity information in the fifth information authentication request, encrypts the user identity information to obtain a sixth information authentication request, sends the sixth information authentication request to the second public link, requests authentication from the second public link to the second federation link, obtains a third authentication result, and sends the third authentication result to the public link. And if the third authentication result shows that the identity information authentication of the user D is passed, allowing the user D to join the merchant communication group in the area A, otherwise, if the third authentication result shows that the identity information authentication of the user D is not passed, not allowing the user D to join the merchant communication group in the area A.
From the above, the embodiment of the disclosure can realize data intercommunication between the first public chain and the first alliance chain, and data intercommunication between a plurality of first public chains and data intercommunication between the first public chain and the second public chain, thereby enhancing data communication between different user groups. Meanwhile, on the basis of data intercommunication, reliable authentication of the user information of the first public chain and mutual authentication between the first public chain and the second public chain are realized, and convenience of user information authentication is improved.
Corresponding to the blockchain-based trusted authentication method of the above embodiments, fig. 4 is a block diagram of a blockchain-based trusted authentication device according to an embodiment of the present disclosure. For ease of illustration, only portions relevant to embodiments of the present disclosure are shown. Referring to fig. 4, the blockchain-based trusted authentication device 20 includes: a first authentication request unit 21 and a first authentication return unit 22.
Wherein the first authentication request unit 21 is configured to send, in response to a first information authentication request sent by a user node, a second information authentication request corresponding to the first information authentication request to the first federation chain.
A first authentication return unit 22, configured to return, to the user node, a first authentication result corresponding to the second information authentication request, in response to the first authentication result returned by the first federation chain.
In one embodiment of the present disclosure, the blockchain-based trusted authentication device further includes a transaction request unit 23 for:
determining whether to provide first data corresponding to a first transaction request to a first target public chain based on a preset consensus mechanism in response to the first transaction request sent by the first target public chain; the first target public chain is a public chain which can cross-chain interaction with the first alliance chain except the public chain.
And if the first data is provided for the first target public chain, returning the first data to the first target public chain.
In one embodiment of the present disclosure, the transaction request unit 23 is further configured to:
and responding to a second transaction request sent by a user node, and sending a third transaction request corresponding to the second transaction request to the first target public chain.
And returning second data corresponding to the third transaction request and returned by the first target public chain to the user node.
In one embodiment of the present disclosure, the transaction request unit 23 is further configured to:
and counting the transaction information of the public chain according to a preset time interval to obtain a transaction information counting result.
And sending the transaction information statistical result to the user node.
In one embodiment of the present disclosure, the transaction request unit 23 is further configured to:
and carrying out data analysis on the transaction information statistical result to obtain a data analysis result.
And generating first transaction demand information according to the data analysis result.
And determining whether to send the first transaction requirement information to the first target public chain or not based on a preset consensus mechanism.
And if the first transaction demand information is determined to be sent to the first target public chain, sending the second transaction demand information corresponding to the first transaction demand information to the first target public chain.
In one embodiment of the present disclosure, the blockchain-based trusted authentication device further includes:
the second authentication request unit 24 is configured to determine, in response to the third information authentication request sent by the second public chain, whether to provide the second public chain with a second authentication result corresponding to the third information authentication request based on a preset consensus mechanism.
The second authentication return unit 25, if determining to provide the second public chain with the second authentication result, transmits a fourth information authentication request corresponding to the third information authentication request to the first federation chain, and returns the second authentication result to the second public chain upon receiving the second authentication result returned by the first federation chain.
In one embodiment of the present disclosure, the blockchain-based trusted authentication device further includes:
the third authentication request unit 26 transmits a sixth information authentication request corresponding to the fifth information authentication request to the second public chain in response to the fifth information authentication request transmitted by the user node.
The third authentication return unit 27 returns a third authentication result to the user node in response to the third authentication result corresponding to the sixth information authentication request returned by the second public chain.
Referring to fig. 5, fig. 5 is a schematic block diagram of a terminal device according to an embodiment of the present disclosure. The terminal 300 in the present embodiment as shown in fig. 5 may include: one or more processors 301, one or more input devices 302, one or more output devices 303, and one or more memories 304. The processor 301, the input device 302, the output device 303, and the memory 304 communicate with each other via a communication bus 305. The memory 304 is used to store a computer program comprising program instructions. The processor 301 is configured to execute program instructions stored in the memory 304. Wherein the processor 301 is configured to invoke program instructions to perform the following functions of the modules/units in the above described device embodiments, such as the functions of the modules 21 to 22 shown in fig. 4.
It should be appreciated that in the disclosed embodiments, the processor 301 may be a central processing unit (Central Processing Unit, CPU), which may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input device 302 may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of a fingerprint), a microphone, etc., and the output device 303 may include a display (LCD, etc.), a speaker, etc.
The memory 304 may include read only memory and random access memory and provides instructions and data to the processor 301. A portion of memory 304 may also include non-volatile random access memory. For example, the memory 304 may also store information of device type.
In a specific implementation, the processor 301, the input device 302, and the output device 303 described in the embodiments of the present disclosure may perform the implementation described in the first embodiment and the second embodiment of the blockchain-based trusted authentication method provided in the embodiments of the present disclosure, and may also perform the implementation of the terminal described in the embodiments of the present disclosure, which is not described herein again.
In another embodiment of the present disclosure, a computer storage medium is provided, where the computer storage medium stores a computer program, where the computer program includes program instructions, where the program instructions, when executed by a processor, implement all or part of the procedures in the method embodiments described above, or may be implemented by instructing related hardware by the computer program, where the computer program may be stored in a computer storage medium, where the computer program, when executed by the processor, implements the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, executable files or in some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the content of the computer readable medium can be appropriately increased or decreased according to the requirements of the jurisdiction's jurisdiction and the patent practice, for example, in some jurisdictions, the computer readable medium does not include electrical carrier signals and telecommunication signals according to the jurisdiction and the patent practice.
The computer storage medium may be an internal storage unit of the terminal of any of the foregoing embodiments, for example, a hard disk or a memory of the terminal. The computer storage medium may also be an external storage device of the terminal, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the terminal. Further, the computer storage medium may also include both an internal storage unit and an external storage device of the terminal. The computer storage medium is used for storing computer programs and other programs and data required by the terminal. The computer storage medium may also be used for temporarily storing data that has been output or is to be output.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working procedures of the terminal and the unit described above may refer to the corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In several embodiments provided in the present application, it should be understood that the disclosed terminal and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. In addition, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via some interfaces or units, or may be an electrical, mechanical, or other form of connection.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purposes of the embodiments of the present disclosure.
In addition, each functional unit in each embodiment of the present disclosure may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The foregoing is merely a specific embodiment of the present disclosure, but the protection scope of the present disclosure is not limited thereto, and any equivalent modifications or substitutions will be apparent to those skilled in the art within the scope of the present disclosure, and these modifications or substitutions should be covered in the scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (10)

1. The trusted authentication method based on the blockchain is characterized by being applied to a first public chain in a target blockchain architecture; the target blockchain architecture comprises a first alliance chain built on a target organization intranet and a first public chain capable of cross-chain interaction with the first alliance chain;
the block chain-based trusted authentication method comprises the following steps:
responding to a first information authentication request sent by a user node, and sending a second information authentication request corresponding to the first information authentication request to the first alliance chain;
and responding to a first authentication result corresponding to the second information authentication request returned by the first alliance chain, and returning the first authentication result to the user node.
2. The blockchain-based trusted authentication method of claim 1, wherein the first public chain includes a plurality of first public chains and cross-chain interactions between the plurality of first public chains, the blockchain-based trusted authentication method further comprising:
determining whether to provide first data corresponding to a first transaction request to a first target public chain based on a preset consensus mechanism in response to the first transaction request sent by the first target public chain; the first target public chain is a public chain which is except the public chain and can cross-chain interact with the first alliance chain;
and if the first data is provided for the first target public chain, returning the first data to the first target public chain.
3. The blockchain-based trusted authentication method of claim 2, further comprising:
transmitting a third transaction request corresponding to the second transaction request to the first target public chain in response to the second transaction request transmitted by the user node;
and returning second data corresponding to the third transaction request and returned by the first target public chain to the user node.
4. The blockchain-based trusted authentication method of claim 2, further comprising:
counting the transaction information of the public chain according to a preset time interval to obtain a transaction information counting result;
and sending the transaction information statistical result to a user node.
5. The blockchain-based trusted authentication method of claim 4, further comprising:
carrying out data analysis on the transaction information statistical result to obtain a data analysis result;
generating first transaction demand information according to the data analysis result;
determining whether to send the first transaction demand information to a first target public chain based on a preset consensus mechanism;
and if the first transaction demand information is determined to be sent to the first target public chain, sending second transaction demand information corresponding to the first transaction demand information to the first target public chain.
6. The blockchain-based trusted authentication method of claim 1, wherein the target blockchain architecture further includes a second federation chain built on a target organization intranet, and a second public chain that can cross-link interact with the second federation chain; the first public chain and the second public chain may interact across chains;
the block chain-based trusted authentication method further comprises the following steps:
responding to a third information authentication request sent by a second public chain, and determining whether to provide a second authentication result corresponding to the third information authentication request for the second public chain based on a preset consensus mechanism;
if the second authentication result is provided for the second public chain, a fourth information authentication request corresponding to the third information authentication request is sent to the first alliance chain;
and responding to a second authentication result returned by the first alliance chain, and returning the second authentication result to the second public chain.
7. The blockchain-based trusted authentication method of claim 6, further comprising:
responding to a fifth information authentication request sent by a user node, and sending a sixth information authentication request corresponding to the fifth information authentication request to a second public chain;
and responding to a third authentication result returned by the second public chain and corresponding to the sixth information authentication request, and returning the third authentication result to the user node.
8. The trusted authentication device based on the blockchain is characterized by being applied to a first public chain in a target blockchain architecture; the target blockchain architecture comprises a first alliance chain built on a target organization intranet and a first public chain capable of cross-chain interaction with the first alliance chain;
the block chain based trusted authentication device comprises:
a first authentication request unit, which responds to a first information authentication request sent by a user node and sends a second information authentication request corresponding to the first information authentication request to the first alliance chain;
and the first authentication return unit is used for responding to a first authentication result corresponding to the second information authentication request returned by the first alliance chain and returning the first authentication result to the user node.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 7 when the computer program is executed.
10. A computer storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the method according to any one of claims 1 to 7.
CN202311350890.4A 2023-10-18 2023-10-18 Trusted authentication method and device based on blockchain, terminal equipment and storage medium Active CN117294447B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311350890.4A CN117294447B (en) 2023-10-18 2023-10-18 Trusted authentication method and device based on blockchain, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311350890.4A CN117294447B (en) 2023-10-18 2023-10-18 Trusted authentication method and device based on blockchain, terminal equipment and storage medium

Publications (2)

Publication Number Publication Date
CN117294447A true CN117294447A (en) 2023-12-26
CN117294447B CN117294447B (en) 2024-03-19

Family

ID=89253431

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311350890.4A Active CN117294447B (en) 2023-10-18 2023-10-18 Trusted authentication method and device based on blockchain, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117294447B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111275554A (en) * 2020-01-22 2020-06-12 北京瑞卓喜投科技发展有限公司 Securities type general certificate trading method and system and storage medium
CN112508560A (en) * 2020-12-01 2021-03-16 浙商银行股份有限公司 Block chain cross-chain identity authentication and authority control method and device and computer equipment
CN112529706A (en) * 2020-12-10 2021-03-19 浙商银行股份有限公司 Decentralized heterogeneous public chain asset exchange method
US20210216651A1 (en) * 2020-01-13 2021-07-15 Mettler-Toledo (Changzhou) Precision Instruments Ltd. Method and apparatus for managing information about measurement device
CN114826766A (en) * 2022-05-18 2022-07-29 北京交通大学 Block chain cross-chain based security verifiable service providing method and system
CN114978635A (en) * 2022-05-11 2022-08-30 中国电信股份有限公司 Cross-domain authentication method and device, and user registration method and device
CN115150178A (en) * 2022-07-11 2022-10-04 中国银行股份有限公司 Cross-platform unified login authentication method and device based on block chain
CN115829572A (en) * 2022-12-06 2023-03-21 中移动信息技术有限公司 Cross-chain data interaction method, device, equipment, medium and product

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210216651A1 (en) * 2020-01-13 2021-07-15 Mettler-Toledo (Changzhou) Precision Instruments Ltd. Method and apparatus for managing information about measurement device
CN111275554A (en) * 2020-01-22 2020-06-12 北京瑞卓喜投科技发展有限公司 Securities type general certificate trading method and system and storage medium
CN112508560A (en) * 2020-12-01 2021-03-16 浙商银行股份有限公司 Block chain cross-chain identity authentication and authority control method and device and computer equipment
CN112529706A (en) * 2020-12-10 2021-03-19 浙商银行股份有限公司 Decentralized heterogeneous public chain asset exchange method
CN114978635A (en) * 2022-05-11 2022-08-30 中国电信股份有限公司 Cross-domain authentication method and device, and user registration method and device
CN114826766A (en) * 2022-05-18 2022-07-29 北京交通大学 Block chain cross-chain based security verifiable service providing method and system
CN115150178A (en) * 2022-07-11 2022-10-04 中国银行股份有限公司 Cross-platform unified login authentication method and device based on block chain
CN115829572A (en) * 2022-12-06 2023-03-21 中移动信息技术有限公司 Cross-chain data interaction method, device, equipment, medium and product

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李芳;李卓然;赵赫;: "区块链跨链技术进展研究", 软件学报, no. 06, 27 March 2019 (2019-03-27), pages 1649 - 1660 *

Also Published As

Publication number Publication date
CN117294447B (en) 2024-03-19

Similar Documents

Publication Publication Date Title
CN107180350B (en) Method, device and system for multi-party sharing transaction metadata based on block chain
CN109829824B (en) Commodity transaction information sharing method based on block chain technology
CN105956923B (en) Asset transaction system and digital authentication and transaction method of assets
US20210273810A1 (en) Debt Recordation to Blockchains
CN110009337B (en) Data processing method and device based on block chain
US20190266597A1 (en) Healthcare Syndicate Electronic Token
KR20190019004A (en) The trading system and the method based on a blockchain
TW202026909A (en) Blockchain certificate storage method and apparatus, and computer device
CN1233804A (en) Distributed network based electronic wallet
CN112804218B (en) Block chain-based data processing method, device, equipment and storage medium
CN109493047A (en) A kind of commission settlement method, device and terminal device based on block chain
CN111444209A (en) Data processing method, device, equipment and medium based on block chain
CN111414434B (en) Block chain-based data transaction management network, transaction device and storage medium
CN112561407B (en) Asset management method, system and device based on block chain
CN112163954A (en) Transaction method and device based on block chain
US20200364709A1 (en) Networked Computer System for Multi-Party Payment Distribution and Pricing
CN109165319B (en) Accounting method, device and system based on block chain
CN110689348A (en) Income verification method, device, terminal and medium based on alliance chain
CN108073699B (en) Big data aggregation analysis method and device
CN113034275B (en) Management system and method based on block chain network and terminal equipment
CN117294447B (en) Trusted authentication method and device based on blockchain, terminal equipment and storage medium
KR102329779B1 (en) System for investing contents using crypto-currency based on blockchain and method thereof
JP7257172B2 (en) COMMUNICATION PROGRAM, COMMUNICATION DEVICE, AND COMMUNICATION METHOD
CN115689693A (en) House rental matching method, system, device and computer readable medium
CN114331460A (en) Method, device, equipment and storage medium for confirming fund transaction based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant