WO2019232880A1 - 一种基于生物特征标记认证的区块链安全交易方法及装置 - Google Patents

一种基于生物特征标记认证的区块链安全交易方法及装置 Download PDF

Info

Publication number
WO2019232880A1
WO2019232880A1 PCT/CN2018/094769 CN2018094769W WO2019232880A1 WO 2019232880 A1 WO2019232880 A1 WO 2019232880A1 CN 2018094769 W CN2018094769 W CN 2018094769W WO 2019232880 A1 WO2019232880 A1 WO 2019232880A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
information
target
biometric
user
Prior art date
Application number
PCT/CN2018/094769
Other languages
English (en)
French (fr)
Inventor
孙卫涛
Original Assignee
清华大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 清华大学 filed Critical 清华大学
Priority to US17/253,061 priority Critical patent/US20210279736A1/en
Publication of WO2019232880A1 publication Critical patent/WO2019232880A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography

Definitions

  • Embodiments of the present invention relate to the technical field of secure transactions, and in particular, to a method and device for secure transaction on a blockchain based on biometric mark authentication.
  • Blockchain technology is a method of concatenating data blocks containing transaction information into a linear linked list structure using the hash encryption method and publishing it on the network.
  • the formation of each data block (block) needs to be formed by joint encryption using the tail block data information of the current blockchain, the current time stamp information, and a temporarily generated random number (nonce).
  • This random number must be able to make the generated encrypted block meet the so-called "partial hash collision" requirement, that is, the string generated by SHA-256 encryption from the secure hash algorithm (algorithm), k characters from left to right, and all Is 0. It is generally believed that brute force using massive computing power is the fastest way to find this random number.
  • each node has the right to generate new blocks.
  • the blockchain will be broadcast to the network every time Nodes to ensure that each node holds the latest block transaction information.
  • the essential characteristic of the blockchain is the end-to-end distributed block generation capability in the network.
  • the generation of each new block represents a new transaction.
  • the process of generating a new block has a distributed feature, without having to go through a single central node server, any two nodes in the network can complete the transaction and generate a new block. Therefore, blockchain technology has greatly improved the processing capacity of transactions between massive nodes.
  • the operation of the blockchain itself has high reliability. Since the blockchain runs on every node in the network, the stopping of a single node will not affect transactions between other remaining nodes. After the transaction, the blockchain information is shared by the network nodes. Therefore, the operation of the database and the entire system is open and transparent, and a “public ledger” is implemented, which avoids deception and tampering with transaction data between nodes.
  • a block on the blockchain contains all the previous block data information. If you attempt to tamper with a block and make the block recognized by most nodes in the network, you need to break the association with the block. Encrypted information on all other blocks, which requires massive computing power, and such attempts are generally unachievable.
  • the encrypted block is the only certificate to prove the legitimacy of the transaction between the two parties, so the encrypted digital certificate needs to be tamper-proof.
  • the payer of a transaction encrypts the transaction information of the last block on the blockchain to form a new block, and adds the new block to the blockchain to achieve a digital certificate for a transaction.
  • This voucher is broadcast to all blockchain network nodes as part of the blockchain and is stored in the network as a "public ledger.”
  • it takes a period of time from the generation of a new block representing a transaction to the approval of most network nodes.
  • the receiver of the transaction cannot check whether the payer has used this new block.
  • the payer can use the block in his hand as a digital voucher to pay to multiple parties. Recipients. It's like the user has a blank check that can be arbitrarily paid to multiple recipients before the bank cashes it.
  • the security mechanism of blockchain technology often refers to the reliability and stability mechanism of the blockchain itself, but for traders of digital credentials, the system architecture does not provide sufficient legal identity verification and prevent account theft.
  • Trading stop loss mechanism For ordinary users, the so-called "reliability" of the blockchain only provides a 24x7x365 full-time trading platform, and does not mean that the security of digital credentials and assets of a single user in a transaction is reliably guaranteed.
  • the individual's digital assets will be permanently lost, and the system itself does not provide a mechanism to restore legal assets. This is an unacceptable security risk for most average users. Therefore, although blockchain technology provides a convenient trading platform, it still cannot provide a personal asset security guarantee mechanism similar to traditional centralized trading venues (such as banks).
  • blockchain technology that lacks a legal identity authentication mechanism also faces serious information security issues.
  • private key is leaked, misappropriated, or even the network is paralyzed due to hardware problems, the full recovery of transaction data and digital currencies will be very difficult. Therefore, it is urgent to establish a guarantee mechanism to ensure the security of individual user transactions and digital assets.
  • the inventors discovered that the existing method for conducting secure transactions through the blockchain does not include receiver information in the digital voucher for the transaction, so before the transaction information is broadcast to each node, You can use this digital voucher to conduct transactions with multiple recipients, and only one of these transactions is a legitimate transaction, and the others are false transactions.
  • the user's personal information is not recorded in the public ledger, when the user's key is lost, the user's digital assets cannot be recovered.
  • the technical problem to be solved by the present invention is how to solve the existing method for conducting secure transactions through the blockchain. Because the digital certificate of the transaction does not contain the information of the receiver, the transaction information can be used before it is broadcast to each node. Digital vouchers are traded with multiple recipients, and only one of these transactions is a legitimate transaction, and the others are fake transactions. On the other hand, since the user's personal information is not recorded in the public ledger, when the user's key is lost, the user's digital assets cannot be recovered.
  • an embodiment of the present invention provides a blockchain secure transaction method based on biometric mark authentication, including:
  • the first biometric encryption information corresponding to the user of the target receiver is obtained, and the encryption is generated based on the first biometric encryption information.
  • the first biometric encryption information is encoding information obtained by performing an encryption operation on the biometric information of the target receiver user;
  • the biometric information includes a fingerprint, an iris, a palm print, or a facial feature.
  • This embodiment provides a blockchain secure transaction method based on biometric mark authentication, including:
  • the fourth biometric encryption information is encoding information obtained by performing an encryption operation on the biometric information of the user corresponding to the current terminal.
  • the biometric information includes fingerprints, iris, palm print, or facial features.
  • This embodiment provides a server, including:
  • a first obtaining module configured to obtain the first biometric encryption information corresponding to the user of the target receiver after receiving the first request information from the target payer for the target transaction with the target receiver, and according to the first A biometric encryption information is encrypted to generate a transaction key;
  • a judging module configured to judge whether a prompt message for successfully verifying the transaction key is received, and if yes, acquire the transaction information of the target transaction after the target transaction is successful;
  • a recording module configured to publish the transaction information of the target transaction to each network node of the blockchain, so as to record the transaction information of the target transaction at each network node;
  • the first biometric encryption information is encoded information obtained by performing an encryption operation on the biometric information of the target receiver user.
  • the biometric information includes a fingerprint, an iris, a palm print, or a facial feature.
  • This embodiment provides a terminal, including:
  • a second obtaining module configured to obtain, after receiving the first request information for the target transaction sent by the target payer, the transaction key generated based on the first biometric encryption information of the receiver and the identity code of the current terminal corresponding user;
  • the identity code includes the fourth biometric encryption information of the user corresponding to the current terminal;
  • a verification module configured to verify the transaction key according to the fourth biometric encryption information; if the transaction key is successfully verified, sending a prompt message indicating that the transaction key is successfully verified, and receiving a message sent by the server The transaction information of the target transaction has been recorded, and the information of the target transaction success;
  • the fourth biometric encryption information is encoding information obtained by performing an encryption operation on the biometric information of the user corresponding to the current terminal; the biometric information includes a fingerprint, an iris, a palm print, or a facial feature.
  • This embodiment provides an electronic device, including:
  • At least one processor at least one memory, a communication interface, and a bus; wherein,
  • the processor, the memory, and the communication interface complete communication with each other through the bus;
  • the communication interface is used for information transmission between the electronic device and the communication device of the terminal device;
  • the memory stores program instructions that can be executed by the processor, and the processor calls the program instructions to be able to perform the methods described above.
  • This embodiment provides a non-transitory computer-readable storage medium, which is characterized in that the non-transitory computer-readable storage medium stores computer instructions, and the computer instructions cause the computer to execute the method described above.
  • This embodiment provides an electronic device, including:
  • At least one processor at least one memory, a communication interface, and a bus; wherein,
  • the processor, the memory, and the communication interface complete communication with each other through the bus;
  • the communication interface is used for information transmission between the electronic device and the communication device of the server;
  • the memory stores program instructions that can be executed by the processor, and the processor calls the program instructions to be able to perform the methods described above.
  • This embodiment provides a non-transitory computer-readable storage medium, which is characterized in that the non-transitory computer-readable storage medium stores computer instructions, and the computer instructions cause the computer to execute the method described above.
  • Embodiments of the present invention provide a method and device for secure transaction on a blockchain based on biometric mark authentication.
  • the method performs a transaction between a payer and a receiver and generates a digital transaction voucher as a transaction between the two parties
  • the method no longer only uses random Digitally verify the validity of the transaction, but instead use the transaction key generated based on the biometric encrypted information of the recipient user as the digital transaction voucher for the transaction. Due to the uniqueness of the biometric encrypted information, it can be guaranteed that the transaction will only occur between the payer and the receiver designated by the payer.
  • This method realizes the authentication of the legal identity information of both parties in the transaction from the perspective of the underlying blockchain information encryption, guarantees that a digital transaction voucher can only be used once in a transaction, and avoids the double payment problem.
  • identity verification can be performed through the uniqueness of the biometric encrypted information to restore the user's digital assets.
  • FIG. 1 is a schematic flowchart of a blockchain-based secure transaction method based on biometric mark authentication provided by an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a transaction method for legally verifying only by random numbers according to another embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a transaction method for legally verifying a random number and biometric encrypted information together according to another embodiment of the present invention
  • FIG. 4 is a schematic diagram of biometric encryption and verification based on a blockchain account according to another embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a LIB format of a data block based on a legal identity biometric signature according to another embodiment of the present invention.
  • FIG. 6 is a schematic flowchart of a blockchain secure transaction method based on biometric mark authentication provided by another embodiment of the present invention.
  • FIG. 7 is a structural block diagram of a server according to another embodiment of the present invention.
  • FIG. 8 is a structural block diagram of a terminal according to another embodiment of the present invention.
  • FIG. 9 is a structural block diagram of an electronic device according to another embodiment of the present invention.
  • FIG. 10 is a structural block diagram of an electronic device according to another embodiment of the present invention.
  • FIG. 1 is a schematic flowchart of a blockchain-based secure transaction method based on biometric markup authentication provided in this embodiment. Referring to FIG. 1, the method includes:
  • the first biometric encryption information is encoded information obtained by performing an encryption operation on the biometric information of the target receiver user.
  • the biometric information includes a fingerprint, an iris, a palm print, or a facial feature.
  • the method provided by this embodiment is usually executed by a server.
  • This method aims to solve the problem of verifying the legitimacy of a transaction through random numbers in traditional blockchain transactions, which easily leads to false transactions.
  • the users of the target payer and target receiver complete the transaction through the terminal (computer or mobile phone).
  • the first biometric encryption information is information corresponding to the fingerprint, iris, palm print, or facial features of the target recipient user. It is understandable that as long as the biometrics that can uniquely characterize the target recipient user belong to the first biometric feature , Not limited to the ones mentioned above.
  • the transaction key is a key generated based on the first biometric.
  • the transaction key may be generated by a secure hash encryption algorithm (SHA-512).
  • a transaction key is obtained by performing an encryption operation on the biometric encrypted information and a random number.
  • the encryption algorithm may be a secure hash encryption algorithm, which is not specifically limited in this embodiment.
  • the user's biometric information is first encrypted to obtain the biometric encrypted information, and the biometric encrypted information is used in the subsequent transaction process, which avoids the problem of information leakage caused by directly using the user's biometric information for transactions.
  • the receiver and the payer's terminal can also directly exchange information, and only record the transaction information through the server, eliminating the role of the server as a transaction medium and achieving Centralize and improve transaction efficiency.
  • each terminal After the transaction key is generated, during the transaction process, each terminal will verify whether it is the legitimate receiver of the transaction according to the biometric encryption information of its corresponding user. If so, the transaction is performed, otherwise, it is not performed. transaction. It guarantees that the transaction process only occurs on the payer and the receiver corresponding to the first biometric encrypted information, so that before the transaction information is recorded to each node of the blockchain, only one legal transaction can occur, and there is no false transaction .
  • This embodiment provides a blockchain secure transaction method based on biometric mark authentication.
  • the method of performing a transaction between a payer and a receiver uses the biometric encrypted information of the receiver's user to generate a transaction key, and uses the key as a digital transaction credential for both parties' transactions. Due to the uniqueness of the biometric encrypted information, it can be guaranteed that the transaction will only occur between the payer and the receiver designated by the payer.
  • This method realizes the authentication of the legal identity information of both parties in the transaction from the perspective of the underlying blockchain information encryption, guarantees that a digital transaction voucher can only be used once in a transaction, and avoids the double payment problem.
  • identity verification can be performed through the uniqueness of the biometric encrypted information to restore the user's digital assets.
  • the first biometric encryption information corresponding to the target receiver is obtained, and Encrypting the first biometric encryption information to generate a transaction key includes:
  • the target payer is authenticated by using the second biometric encrypted information corresponding to the target payer. If the target payer is authenticated, the target payer and the target receiver are received. Obtaining the first biometric encryption information corresponding to the target receiver after performing the request information of the target transaction;
  • the second biometric encryption information is encoding information obtained by performing an encryption operation on the biometric information of the target sender user.
  • biometric encrypted information all users who conduct transactions through the blockchain have registered biometric encrypted information in advance. When users need to conduct transactions, they can first enter the biometric encrypted information for identity verification to ensure the security of the assets of the payer.
  • the random number is a number generated according to the timestamp information so that the encrypted block satisfies the requirement of “partial hash collision”.
  • This embodiment provides a blockchain secure transaction method based on biometric mark authentication. This method performs identity verification based on biometric encrypted information on the payer before the transaction, thereby ensuring the asset security of the payer.
  • FIG. 2 provides a schematic diagram of a transaction method for legal verification using only random numbers
  • FIG. 3 is a schematic diagram of a transaction method for legal verification through random numbers and biometric encrypted information.
  • the method provided by this embodiment of the city is to integrate the biometric authentication information of both parties in the transaction into the underlying block and publish it on the blockchain to ensure that users can establish legal transactions in a timely and accurate manner.
  • Traditional blockchain technology implements a distributed time stamp server mechanism through Proof-of-Work.
  • the generator of the new block needs to solve a "partial hash collision" problem.
  • the mechanism that can solve this problem through computing power can
  • the guarantee block generation time is a time series that is not easy to overlap, so that the time stamp function is distributed.
  • the number may be used multiple times (see Figure 2), which is a defect of current blockchain technology.
  • user A can use this block for transactions between A and B, while at the same time, user can use this block for transactions between A and C.
  • the random number nonce is the only sign that represents the legitimacy of the block, as long as the nonce is valid, the transaction parties B and C can only determine that the block is legal, and it is impossible to determine whether the block has been used multiple times, that is, "double payment ".
  • the bad result is that when the blocks representing two transactions are loaded on the blockchain, only the first block B is recognized ( Figure 2), and the other transaction party C can only bear the losses of the false transaction.
  • Digital voucher generation technology for secure transactions based on biometric encrypted information can fundamentally eliminate double transactions. This part is the focus of the entire patented technical solution, which is the final realization of the secure transaction digital certificate on the blockchain based on the previous steps. The condition required in this step is to establish a contract between the payer and receiver on a legal account on the blockchain, and generate a unique block for the transaction. This block contains biometric encrypted information of both parties. This information guarantees that the block can only be used once in subsequent legal payments and cannot be double-paid.
  • the blockchain data block LIB format based on transaction biometric encryption information is an important method invention of this patent.
  • the block contains the biometric encryption information verification mechanism of the payer and receiver.
  • the verification of a new block only needs to meet the "partial hash collision" requirement.
  • the user finds a random number (nonce) to satisfy the hash string k, the first character is 0, they have The right to use the block for "bookkeeping" without requiring verification of who the block will be delivered to.
  • the potential risk of this mechanism is that the block may be used for multiple transaction payments ( Figure 2), but the blockchain can only recognize the first legal transaction among them, and other transactions are not recognized.
  • the block format with encrypted biometrics specifies that the block can only be used between the two parties in this transaction (see Figure 3).
  • the receiver can easily verify the payer based on its "legal identity biometric mark" LIB encryption code.
  • the digital voucher generation technology for secure transactions includes the following points:
  • user A For example, user A's biometric encryption code LIB-B for transaction party B, through “mining”, he obtained a "random number + biometric encryption code” (ie, nonce1 + LIB-B) that meets the "partial hash collision" ( Figure 3), and notify B of the transaction digital certificate containing the digital signature; if user A tries to use the block to establish a transaction with user C again, then when user C receives a digital certificate representing the legitimacy of the block (nonce1 + LIB-B hash code), the user can use his own encrypted biometric code LIB-C and nonce1 to quickly and easily generate a hash code, and check whether the digital credential provided by user A is hash coded. It is for this transaction.
  • a "random number + biometric encryption code” ie, nonce1 + LIB-B
  • Figure 3 "partial hash collision”
  • the method further includes:
  • the third biometric encryption information of the target user is obtained, and according to the record recorded by any node on the blockchain corresponding to the target.
  • the user's transaction information determines the digital assets currently belonging to the target user, and recovers the digital assets corresponding to the target user.
  • the biometric encryption information of both parties to the transaction is also recorded. Therefore, when the user needs to recover digital assets, only the user's third biometric encryption information for recovering the asset need to be obtained. Go to the "public ledger" to find the user's transaction record corresponding to the third biometric encrypted information, and obtain the user's remaining digital assets according to the transaction record, and then restore it.
  • This embodiment provides a blockchain secure transaction method based on biometric token authentication.
  • the biometric encrypted information can quickly find the user's transaction records from the "public ledger”, determine the digital assets belonging to the user, and realize the digital assets of the user. Recovery.
  • the determining whether to receive prompt information that the transaction key is successfully verified includes:
  • a prompt message indicating that the transaction key verification fails is received, a prompt message indicating that the user currently performing verification of the transaction key is not the target receiver and the transaction is illegal.
  • the server fails the verification of the transaction key, and the prompt message for disallowing the transaction is not sent to the terminal.
  • This embodiment provides a blockchain secure transaction method based on biometric mark authentication.
  • the server sends prompt information to the terminal so that the user can understand the reason for the transaction failure in time.
  • the second aspect specifically, the biometric encryption integrated technology of the blockchain account, its role is to establish a unique legal account on the blockchain to ensure the security of user transactions.
  • This is the initial module of the entire system and the basis of subsequent modules.
  • the module technology has the following characteristics:
  • Biomarkers of the fingerprint, iris, and facial features of the account owner are unique, and it is difficult for illegal thieves to use the account without the user's knowledge to ensure the credibility of the transaction object and the authenticity of the transaction results. .
  • Encrypted digital biological features facilitate information preservation, authentication, and transmission.
  • Traditional physical documents often take the form of photocopies and photos, which makes it difficult to achieve fast, real-time, and automatic verification in digital transactions.
  • Biometrics can be quickly digitized, and encrypted codes are used as legal account identification.
  • the account identification code is a unique identity generated by using the SHA-512 secure hashing algorithm.
  • the user's biometric encrypted information cannot be reversely obtained from this identification, and has extremely high security.
  • the blockchain system verifies the legality of the block.
  • the function of this technology is to verify the legitimacy of the digital certificate of the transaction, guarantee the "one certificate, one use" of each transaction, and prevent double payment.
  • This invention proposes a "legal identity biometric mark" secure transaction digital credential technology system applied to the blockchain.
  • the system has the characteristics of preventing double payment false transactions, user digital asset authentication, and high confidentiality of user personal information.
  • this technology is particularly advantageous for ensuring the security of personal transactions and assets. It can prevent asset losses caused by problems such as network attacks and account theft, and improve resistance to malicious damage.
  • the ability of the blockchain network At the same time, this technology retains the characteristics of blockchain distributed accounting and decentralized transactions. Compared with the previous block legality authentication mechanism based on a single random number (nonce), this patented technology for the first time realizes a real-name block chain secure transaction system that is truly associated with personal biometric encrypted information.
  • the method provided by this embodiment includes: first, a biometric encryption integrated technology of a blockchain account.
  • This technology helps blockchain users to establish an encrypted account identification number that contains their own unique biometrics. This identification number guarantees the legitimacy of the user's use of the blockchain account, and can be authenticated by fingerprints and other information when the user conducts transactions. Accounts cannot be stolen.
  • the SHA-512 encryption algorithm is used to encrypt biometric features, which strengthens the security of personal information.
  • secure transaction digital credential generation technology helps users with block generation tasks to initiate transactions, and is building blocks that contain the biometric (encrypted) features of both parties to the transaction.
  • the blockchain system validates the validity of the block. This technology helps both parties to establish a unique and legal transaction and verify whether the transaction digital certificate has been used to ensure that a complete and legal contract is established between the payer and the receiver on the blockchain transaction, and is realized according to the transaction progress Blockchain update.
  • FIG. 6 when a terminal is used as a receiver of a transaction, a method for secure blockchain transaction based on biometric authentication is shown in FIG. 6 and includes:
  • the encoding includes the fourth biometric encryption information of the user corresponding to the current terminal;
  • 602 Validate the transaction key according to the fourth biometric encryption information. If the transaction key is successfully verified, send a prompt message indicating that the transaction key is successfully verified, and receive the recorded information sent by the server. The transaction information of the target transaction, and the information of the target transaction success;
  • the fourth biometric encryption information is encoding information obtained by performing an encryption operation on the biometric information of the user corresponding to the current terminal; the biometric information includes a fingerprint, an iris, a palm print, or a facial feature.
  • This embodiment provides a blockchain secure transaction method based on biometric mark authentication.
  • the method of performing a transaction between a payer and a receiver uses the transaction key generated based on the biometric encrypted information of the recipient user as the digital transaction certificate of the transaction. Due to the uniqueness of the biometric encrypted information, it can be guaranteed that the transaction will only occur between the payer and the receiver designated by the payer.
  • This method realizes the authentication of the legal identity information of both parties in the transaction from the perspective of the underlying blockchain information encryption, guarantees that a digital transaction voucher can only be used once in a transaction, and avoids the double payment problem.
  • identity verification can be performed through the uniqueness of the biometric encrypted information to restore the user's digital assets.
  • the verifying the transaction key based on the fourth biometric encryption information includes:
  • the encryption algorithm used by the terminal to encrypt the biometric and random numbers to generate the transaction key is the same as that of the server.
  • the obtained biometric encryption information of the user corresponding to the current terminal is not the original biometric encryption information, but the information obtained by performing an encryption operation on the biometric information of the user corresponding to the current terminal.
  • the purpose of this setting is to prevent irreparable losses caused by the leakage of personal information of users.
  • the method provided by this embodiment is aimed at the problems of double payment and user digital asset security in the blockchain technology. Considering the challenges of the current complexities of the two parties on the blockchain platform, the untrustworthiness of the transaction, and the authenticity of the transaction cannot be guaranteed, etc.
  • the technical solution provided by this embodiment can achieve the following purposes:
  • the method provided by this embodiment is aimed at a series of problems existing in the current blockchain technology. From the perspective of the underlying blockchain information encryption, the legal identity information of the two parties in the transaction is authenticated, and a digital transaction voucher can only be used once in a transaction. , To avoid the problem of double payment, at the same time, the technology can avoid false transactions, so that digital vouchers are reliable and cannot be tampered with. When the user key is lost or the account is stolen, a user identity authentication mechanism through biometrics (such as fingerprints) is also provided to help users recover digital assets.
  • biometrics such as fingerprints
  • the legal identity authentication mechanism is the security technology of the traditional centralized transaction platform, but this does not mean that the identity authentication is the centralized transaction system itself, it is only a means to protect the account security used in the centralized transaction process.
  • identity authentication mechanisms can also be used.
  • biometric identity authentication mechanism proposed in this patent user digital asset security guarantees compatible with end-to-end transactions can be achieved.
  • the method provided by this embodiment is conducive to the development of the legal identity authentication technology of the decentralized trading platform, and can use the blockchain technology to form efficient, reliable, massive, and transparent integrity cloud data. This is of great significance for establishing new payment and consumption models based on the credibility of enterprises and individuals. It is one of the hot applications of blockchain technology in the social and economic fields.
  • the method provided by this embodiment can further expand the application, and has the characteristics of user identity legality authentication, high account security, standardized and reliable transaction process, and strong user digital asset security.
  • This method is an important development of the existing blockchain technology, and its beneficial effects are mainly reflected in the following aspects:
  • a blockchain-based transaction system based on a portable mobile terminal can be developed.
  • the terminal can realize rapid authentication of biometric features such as fingerprint scanning and facial recognition, making the blockchain application system faster and more convenient.
  • the historical record of user transaction data on the blockchain can help establish cloud data on corporate and personal creditworthiness, which can be used as a basis for user credibility requirements in related industries.
  • FIG. 7 is a structural block diagram of a server provided in this embodiment.
  • the server includes a first obtaining module 701, a determining module 702, and a recording module 703.
  • a first obtaining module 701 configured to obtain first biometric encryption information corresponding to a user of the target receiver after receiving the first request information sent by the target payer for a target transaction with the target receiver; Encrypt the first biometric encryption information to generate a transaction key;
  • a judging module 702 configured to judge whether a prompt message for successfully verifying the transaction key is received, and if yes, obtain the transaction information of the target transaction after the target transaction is successful;
  • a recording module 703, configured to publish the transaction information of the target transaction to each network node of the blockchain, so as to record the transaction information of the target transaction at each network node;
  • the first biometric encryption information is information corresponding to a fingerprint, an iris, a palm print, or a facial feature of the target recipient user.
  • the server provided in this embodiment is applicable to the blockchain secure transaction method based on biometric mark authentication performed by the server and provided by the above embodiment, and is not repeated here.
  • the server provided in this embodiment may be a distributed time stamp server.
  • This embodiment provides a server.
  • the legality of the transaction is no longer verified only by random numbers, but based on the biological characteristics of the user of the receiver
  • the transaction key generated by the encrypted information is used as the digital transaction certificate for the transaction. Due to the uniqueness of the biometric encrypted information, it can be guaranteed that the transaction will only occur between the payer and the receiver designated by the payer.
  • This method realizes the authentication of the legal identity information of both parties in the transaction from the perspective of the underlying blockchain information encryption, guarantees that a digital transaction voucher can only be used once in a transaction, and avoids the double payment problem.
  • identity verification can be performed through the uniqueness of the biometric encrypted information to restore the user's digital assets.
  • FIG. 8 is a structural block diagram of a terminal provided in this embodiment.
  • the server includes a second obtaining module 801 and a verification module 802, where:
  • the second obtaining module 801 is configured to obtain a transaction key generated according to the first biometric encryption information of the receiver and the identity code of the current terminal corresponding user after receiving the first request information for the target transaction sent by the target payer. ; Wherein the identity code includes the fourth biometric encryption information of the user corresponding to the current terminal;
  • the verification module 802 is configured to verify the transaction key according to the fourth biometric encryption information, and if the transaction key is successfully verified, send a prompt message indicating that the transaction key is successfully verified, and receive the message sent by the server.
  • the transaction information of the target transaction has been recorded, and the information of the target transaction success;
  • the fourth biometric encryption information is encoding information obtained by performing an encryption operation on the biometric information of the user corresponding to the current terminal; the biometric information includes a fingerprint, an iris, a palm print, or a facial feature.
  • the terminal provided in this embodiment is applicable to the blockchain-based secure transaction method based on biometric mark authentication performed by the terminal and provided by the foregoing embodiment, and details are not described herein again.
  • This embodiment provides a terminal.
  • the legality of the transaction is no longer verified only by random numbers, but based on the biological characteristics of the user of the receiver.
  • the transaction key generated by the encrypted information is used as the digital transaction certificate for the transaction. Due to the uniqueness of the biometric encrypted information, it can be guaranteed that the transaction will only occur between the payer and the receiver designated by the payer.
  • This method realizes the authentication of the legal identity information of both parties in the transaction from the perspective of the underlying blockchain information encryption, guarantees that a digital transaction voucher can only be used once in a transaction, and avoids the double payment problem.
  • identity verification can be performed through the uniqueness of the biometric encrypted information to restore the user's digital assets.
  • FIG. 9 is a block diagram illustrating a structure of an electronic device according to this embodiment.
  • the electronic device includes: a processor 901, a memory 902, a communications interface 903, and a bus 904;
  • the processor 901, the memory 902, and the communication interface 903 complete communication with each other through the bus 904;
  • the communication interface 903 is used for information transmission between the electronic device and the communication device of the terminal;
  • the processor 901 is configured to call program instructions in the memory 902 to execute the methods provided in the foregoing method embodiments, for example, including: upon receiving a first sent by a target payer to perform a target transaction with the target receiver; After requesting the information, obtain first biometric encryption information corresponding to the target recipient user, and generate a transaction key based on the first biometric encryption information; determine whether a prompt for successful verification of the transaction key is received Information, if yes, obtain the transaction information of the target transaction after the target transaction is successful; publish the transaction information of the target transaction to each network node of the blockchain to record the network node at each network node Target transaction transaction information; wherein the first biometric encryption information is encoded information after the biometric information of the target receiver user is encrypted; the biometric information includes a fingerprint, an iris, a palm print, or a face feature.
  • This embodiment provides a non-transitory computer-readable storage medium, where the non-transitory computer-readable storage medium stores computer instructions, and the computer instructions cause the computer to execute the methods provided by the foregoing method embodiments, for example, including : After receiving the first request information from the target payer for the target transaction with the target receiver, obtain first biometric encryption information corresponding to the user of the target receiver, and encrypt based on the first biometric encryption information Generate a transaction key; determine whether a prompt message indicating that the transaction key is successfully verified is received, and if yes, obtain the transaction information of the target transaction after the target transaction is successful; and publish the transaction information of the target transaction To each network node of the blockchain to record the transaction information of the target transaction at each network node; wherein the first biometric encryption information is an encryption operation for the biometric information of the target receiver user Encoded information; the biometric information includes fingerprint, iris, palm print or facial features.
  • the computer program product includes a computer program stored on a non-transitory computer-readable storage medium.
  • the computer program includes program instructions.
  • the program instructions When the program instructions are executed by a computer, the computer Capable of executing the methods provided by the foregoing method embodiments, for example, after receiving the first request information from the target payer for the target transaction with the target receiver, obtaining the first request corresponding to the user of the target receiver.
  • the biometric encryption information is encrypted to generate a transaction key according to the first biometric encryption information. It is determined whether a prompt message indicating that the transaction key is successfully verified is received, and if yes, the target transaction is acquired after the target transaction is successfully obtained.
  • Transaction information of the target transaction publishing the transaction information of the target transaction to each network node of the blockchain to record the transaction information of the target transaction at each network node; wherein the first biometric encrypted information
  • a program for encrypting the biometric information of the target receiver user Information includes fingerprints, iris, or facial features palmprint.
  • FIG. 10 is a block diagram illustrating a structure of an electronic device according to this embodiment.
  • the electronic device includes a processor 1001, a memory 1002, a communication interface 1003, and a bus 1004;
  • the processor 1001, the memory 1002, and the communication interface 1003 complete communication with each other through the bus 1004;
  • the communication interface 1003 is used for information transmission between the electronic device and the communication device of the server;
  • the processor 1001 is configured to call program instructions in the memory 1002 to execute the methods provided by the foregoing method embodiments, for example, after receiving the first request information for the target transaction sent by the target payer, Acquiring the transaction key generated according to the first biometric encryption information of the receiver and the identity code of the user corresponding to the current terminal; wherein the identity code includes fourth biometric encryption information of the user corresponding to the current terminal; Four biometric encryption information verifies the transaction key, and if the transaction key verification is successful, sends a prompt message that the transaction key verification is successful, and receives transaction information from the server that has recorded the target transaction The target transaction success information; wherein the fourth biometric encryption information is encoding information obtained by encrypting the biometric information of the user corresponding to the current terminal; the biometric information includes a fingerprint, an iris, and a palm print Or facial features.
  • This embodiment provides a non-transitory computer-readable storage medium, where the non-transitory computer-readable storage medium stores computer instructions, and the computer instructions cause the computer to execute the methods provided by the foregoing method embodiments, for example, including : After receiving the first request information for the target transaction sent by the target payer, obtaining a transaction key generated based on the first biometric encryption information of the receiver and an identity code of the current terminal corresponding user; wherein the identity code The fourth biometric encryption information of the user corresponding to the current terminal is included; the transaction key is verified according to the fourth biometric encryption information; if the transaction key is successfully verified, the transaction key verification is sent Successful prompt information, and receiving the transaction information from the server that has recorded the target transaction and the target transaction success information; wherein the fourth biometric encryption information is the biometric information of the user corresponding to the current terminal Encoded information after encryption operation; the biometric information includes fingerprint, iris, Pattern or facial features.
  • the computer program product includes a computer program stored on a non-transitory computer-readable storage medium.
  • the computer program includes program instructions.
  • the program instructions When the program instructions are executed by a computer, the computer
  • the method provided by each of the above method embodiments can, for example, include: after receiving the first request information for the target transaction sent by the target payer, obtaining a transaction key generated according to the receiver's first biometric encryption information The identity code of the user corresponding to the current terminal; wherein the identity code includes the fourth biometric encryption information of the user corresponding to the current terminal; and verifying the transaction key based on the fourth biometric encryption information, If the transaction key verification is successful, sending a prompt message indicating that the transaction key verification is successful, and receiving transaction information from the server that has recorded the target transaction and the target transaction success information; wherein the fourth biological
  • the feature encryption information is the biometric information of the user corresponding to the current terminal.
  • the foregoing program may be stored in a computer-readable storage medium.
  • the program is executed, the program is executed.
  • the method includes the steps of the foregoing method embodiment.
  • the foregoing storage medium includes: a ROM, a RAM, a magnetic disk, or an optical disk, and other media that can store program codes.
  • the embodiments can be implemented by means of software plus a necessary universal hardware platform, and of course, they can also be implemented by hardware.
  • the above-mentioned technical solution essentially or part that contributes to the existing technology can be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as ROM / RAM, magnetic A disc, an optical disc, and the like include instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in various embodiments or certain parts of the embodiments.

Abstract

本发明的实施例公开了一种基于生物特征标记认证的区块链安全交易方法及装置,在进行支付方和接收方的交易生成作为双方交易的数字交易凭证时,不再仅通过随机数字进行交易合法性认证,而是通过根据接收方用户的生物特征加密信息生成的交易密钥作为交易的数字交易凭证。由于生物特征加密信息的唯一性,能够保证该笔交易仅在支付方和支付方指定的接收方之间发生。该方法从底层区块链信息加密角度实现对交易双方合法身份信息的认证,保证一个数字交易凭证只能在一笔交易中使用一次,避免了双重支付问题。此外,当发生用户密钥丢失或者账户被盗用时,还能够通过生物特征加密信息的唯一性进行身份认证,恢复用户数字资产。

Description

一种基于生物特征标记认证的区块链安全交易方法及装置
交叉引用
本申请引用于2018年06月04日提交的专利名称为“一种基于生物特征标记认证的区块链安全交易方法及装置”的第2018105655296号中国专利申请,其通过引用被全部并入本申请。
技术领域
本发明实施例涉及安全交易技术领域,尤其是涉及一种基于生物特征标记认证的区块链安全交易方法及装置。
背景技术
区块链技术是利用哈希加密手段把包含交易信息的数据块串联成线性链表结构并在网络中公布的方法。每一个数据块(区块)的形成需要利用当前区块链的尾部区块数据信息、当前时间戳信息和一个临时生成的随机数字(nonce)共同加密形成。这个随机数字必须能够使生成的加密区块满足所谓的“部分哈希碰撞”要求,即经过安全散列算法(Secure Hash Algorithm)SHA-256加密生成的字符串从左往右前面k个字符全为0。一般认为,利用海量计算能力强力破解(brute force)是找到这个随机数字的最快方法。区块链网络中,每个节点都有生成新区块的权利。同时,新生成的区块交易信息在经过确认并被记录进入区块链后(一般要求被记录进区块链而且后面还有其它5个区块),区块链会被广播到网络中每个节点,以保证每个节点都持有当前最新的区块交易信息。区块链的本质特点是网络中端对端的分布式区块生成能力。每个新区块的生成代表一笔新的交易,生成新区块的过程具有分布式特征,无需经过单一中心节点服务器,网络中任意两个节点之间都可以完成交易并生成新区块。因此,区块链技术大大提升了海量节点之间交易的处理能力。
区块链本身的运行具有较高可靠性。由于区块链运行在网络中每一个节点上,单个节点的停止工作并不会影响其他剩余节点之间的交易。完成交易后的区块链信息被网络节点共享,因此数据库和整个系统的运作是公 开透明的,实现了“公共账本”,节点之间避免了欺骗和篡改交易数据。通过哈希加密算法,区块链上的区块包含所有前面区块数据信息,如果企图篡改某个区块并使该区块被网络中多数节点认可,那就需要破解与该区块所关联的其他所有区块上的加密信息,这需要海量计算能力,一般情况下这样的企图是无法实现的。
虽然目前的区块链具有众多优点,但是也存在很多缺点,例如,双重支付(Double spending)的问题。在区块链电子交易系统中,经过加密的区块是证明双方交易合法性的唯一凭证,因此需要使加密的数字凭证无法被篡改。一笔交易的支付方将区块链上最后一个区块的交易信息加密后形成一个新区块,并将新区块加到区块链上,实现一笔交易的数字凭证。该凭证作为区块链的一部分,被广播到所有区块链网络节点,作为“公共账本”被保存在网络中。但是,由于网络通信存在延迟,代表一笔交易的新区块从生成到被大多数网络节点认可需要一个时间段。在这个时间段内,交易的接收方拿到数字凭证(新区块)后,并不能检验支付方是否已经使用过这个新区块。也就是说,在新区块被区块链确认合法性之前(一般要求被记录进区块链而且后面还有其它5个区块),支付方可以任意使用手中的区块作为数字凭证支付给多个接收方。这就像是用户拥有一本空白支票,在银行兑现之前可以任意支付给多个接收方。
其次,区块链技术的安全机制往往是指区块链自身的可靠性和稳定性机制,但是对于数字凭证的交易者来说,系统架构中并没有提供足够的合法身份验证和防止账户盗用的交易止损机制。对于普通用户来说,区块链所谓的“可靠性”只是提供了一个24x7x365的全时交易平台,并不代表单个用户在交易中数字凭证和资产的安全性得到了可靠保证。相反,一旦用户的密钥丢失,则将永久性丧失个人的数字资产,系统本身并没有提供恢复合法性资产的机制。这对于大多数普通用户来说是难以接受的安全风险。因此,尽管区块链技术提供了便捷的交易平台,但是仍然无法提供类似传统中心化交易场所(比如银行)的个人资产安全保证机制。
最后,缺乏合法身份认证机制的区块链技术还面临着严重的信息安全问题。当区块链网络遭受到网络攻击、私钥遭泄露、盗用,甚至网络因硬件问题瘫痪时,交易数据和数字货币的完全恢复将非常困难。因此,急需 建立一种保证个人用户交易和数字资产安全的保障机制。
在实现本发明实施例的过程中,发明人发现现有的通过区块链进行安全交易的方法,由于进行交易数字凭证中不包含接收方的信息,因此在交易信息被广播到各节点之前,可以使用该数字凭证和多个接收方进行交易,而这多笔交易中只有一笔交易为合法交易,其它均为虚假交易。另一方面,由于公共账本中并没有记录用户的个人信息,当用户的密钥丢失后,无法对用户的数字资产进行恢复。
发明内容
本发明所要解决的技术问题是如何解决现有的通过区块链进行安全交易的方法,由于进行交易数字凭证中不包含接收方的信息,因此在交易信息被广播到各节点之前,可以使用该数字凭证和多个接收方进行交易,而这多笔交易中只有一笔交易为合法交易,其它均为虚假交易。另一方面,由于公共账本中并没有记录用户的个人信息,当用户的密钥丢失后,无法对用户的数字资产进行恢复的问题。
针对以上技术问题,本发明的实施例提供了一种基于生物特征标记认证的区块链安全交易方法,包括:
在接收到目标支付方发出的与目标接收方进行目标交易的第一请求信息后,获取对应于所述目标接收方用户的第一生物特征加密信息,根据所述第一生物特征加密信息加密生成交易密钥;
判断是否接收到对所述交易密钥验证成功的提示信息,若是,则在所述目标交易成功后,获取所述目标交易的交易信息;
将所述目标交易的交易信息公布到区块链的各个网络节点,以在每一网络节点均记录所述目标交易的交易信息;
其中,其中,所述第一生物特征加密信息为对所述目标接收方用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
本实施例提供了一种基于生物特征标记认证的区块链安全交易方法,包括:
在接收到目标支付方发出的进行目标交易的第一请求信息后,获取根据接收方的第一生物特征加密信息生成的交易密钥和当前终端对应用户 的身份编码;其中,所述身份编码中包括了当前终端对应用户的第四生物特征加密信息;
根据所述第四生物特征加密信息验证所述交易密钥,若对所述交易密钥验证成功,则发送对所述交易密钥验证成功的提示信息,并接收服务器发送的已经记录所述目标交易的交易信息,所述目标交易成功的信息;
其中,所述第四生物特征加密信息为对当前终端对应的用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
本实施例提供了一种服务器,包括:
第一获取模块,用于在接收到目标支付方发出的与目标接收方进行目标交易的第一请求信息后,获取对应于所述目标接收方用户的第一生物特征加密信息,根据所述第一生物特征加密信息加密生成交易密钥;
判断模块,用于判断是否接收到对所述交易密钥验证成功的提示信息,若是,则在所述目标交易成功后,获取所述目标交易的交易信息;
记录模块,用于将所述目标交易的交易信息公布到区块链的各个网络节点,以在每一网络节点均记录所述目标交易的交易信息;
其中,所述第一生物特征加密信息为对所述目标接收方用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
本实施例提供了一种终端,包括:
第二获取模块,用于在接收到目标支付方发出的进行目标交易的第一请求信息后,获取根据接收方的第一生物特征加密信息生成的交易密钥和当前终端对应用户的身份编码;其中,所述身份编码中包括了当前终端对应用户的第四生物特征加密信息;
验证模块,用于根据所述第四生物特征加密信息验证所述交易密钥,若对所述交易密钥验证成功,则发送对所述交易密钥验证成功的提示信息,并接收服务器发送的已经记录所述目标交易的交易信息,所述目标交易成功的信息;
其中,所述第四生物特征加密信息为对当前终端对应的用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、 掌纹或者面部特征。
本实施例提供了一种电子设备,包括:
至少一个处理器、至少一个存储器、通信接口和总线;其中,
所述处理器、存储器、通信接口通过所述总线完成相互间的通信;
所述通信接口用于该电子设备和终端设备的通信设备之间的信息传输;
所述存储器存储有可被所述处理器执行的程序指令,所述处理器调用所述程序指令能够执行以上所述的方法。
本实施例提供了一种非暂态计算机可读存储介质,其特征在于,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行以上所述的方法。
本实施例提供了一种电子设备,包括:
至少一个处理器、至少一个存储器、通信接口和总线;其中,
所述处理器、存储器、通信接口通过所述总线完成相互间的通信;
所述通信接口用于该电子设备和服务器的通信设备之间的信息传输;
所述存储器存储有可被所述处理器执行的程序指令,所述处理器调用所述程序指令能够执行以上所述的方法。
本实施例提供了一种非暂态计算机可读存储介质,其特征在于,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行以上所述的方法。
本发明的实施例提供了一种基于生物特征标记认证的区块链安全交易方法及装置,该方法在进行支付方和接收方的交易生成作为双方交易的数字交易凭证时,不再仅通过随机数字进行交易合法性认证,而是通过根据接收方用户的生物特征加密信息生成的交易密钥作为交易的数字交易凭证。由于生物特征加密信息的唯一性,能够保证进行该笔交易仅在支付方和支付方指定的接收方之间发生。该方法从底层区块链信息加密角度实现对交易双方合法身份信息的认证,保证一个数字交易凭证只能在一笔交易中使用一次,避免了双重支付问题。此外,当发生用户密钥丢失或者账户被盗用时,还能够通过生物特征加密信息的唯一性进行身份认证,恢复用户数字资产。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明一个实施例提供的基于生物特征标记认证的区块链安全交易方法的流程示意图;
图2是本发明另一个实施例提供的仅通过随机数字进行合法验证的交易方法示意图;
图3是本发明另一个实施例提供的通过随机数字和生物特征加密信息共同进行合法验证的交易方法示意图;
图4是本发明另一个实施例提供的基于区块链账户的生物特征加密和验证示意图;
图5是本发明另一个实施例提供的基于合法身份生物特征标记的数据块LIB格式示意图;
图6是本发明另一个实施例提供的基于生物特征标记认证的区块链安全交易方法的流程示意图;
图7是本发明另一个实施例提供的服务器的结构框图;
图8是本发明另一个实施例提供的终端的结构框图;
图9是本发明另一个实施例提供的电子设备的结构框图;
图10是本发明另一个实施例提供的电子设备的结构框图。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
图1是本实施例提供的基于生物特征标记认证的区块链安全交易方法 的流程示意图,参见图1,该方法包括:
101:在接收到目标支付方发出的与目标接收方进行目标交易的第一请求信息后,获取对应于所述目标接收方用户的第一生物特征加密信息,根据所述第一生物特征加密信息加密生成交易密钥;
102:判断是否接收到对所述交易密钥验证成功的提示信息,若是,则在所述目标交易成功后,获取所述目标交易的交易信息;
103:将所述目标交易的交易信息公布到区块链的各个网络节点,以在每一网络节点均记录所述目标交易的交易信息;
其中,所述第一生物特征加密信息为对所述目标接收方用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
本实施例提供的方法通常由服务器执行,该方法旨在解决传统的区块链交易中通过随机数字验证交易的合法性,容易导致虚假交易发生的问题。目标支付方和目标接收方的用户均通过终端(电脑或者手机)完成交易。第一生物特征加密信息为对应于所述目标接收方用户的指纹、虹膜、掌纹或者面部特征的信息,可理解的是,只要能够唯一表征目标接收方用户的生物特征均属于第一生物特征,而不限于以上说的几种。交易密钥是根据第一生物特征生成的密钥,例如,可以通过安全散列加密算法(SHA-512)生成交易密钥。
本实施例中通过生物特征加密信息和随机数字进行加密运算得到交易密钥。该加密算法可以是安全散列加密算法,本实施例对此不做具体限制。本实施例中先对用户的生物特征信息进行加密得到生物特征加密信息,将生物特征加密信息运用于后续的交易过程中,避免了直接使用用户生物特征信息进行交易带来的信息泄露的问题。
本实施例提供的方法在接收方和支付方进行信息交易时,也可以直接是接收方和支付方的终端进行信息交互,仅通过服务器记录交易信息,省去服务器作为交易媒介的作用,实现去中心化,提高交易效率。
交易密钥生成后,在进行交易的过程中,每一终端均会根据自身对应的用户的生物特征加密信息验证自身是否是该笔交易的合法接收方,若是,则进行交易,否则,不进行交易。保证了交易过程仅发生在支付方和 与第一生物特征加密信息对应的接收方上,使得在交易信息被记录到区块链的各节点之前,仅能发生一次合法交易,而不存在虚假交易。
本实施例提供了一种基于生物特征标记认证的区块链安全交易方法,该方法在进行支付方和接收方的交易生成作为双方交易的数字交易凭证时,不再仅通过随机数字进行交易合法性认证,而是通过接收方用户的生物特征加密信息生成交易密钥,并以该密钥作为双方交易的数字交易凭证。由于生物特征加密信息的唯一性,能够保证该笔交易仅在支付方和支付方指定的接收方之间发生。该方法从底层区块链信息加密角度实现对交易双方合法身份信息的认证,保证一个数字交易凭证只能在一笔交易中使用一次,避免了双重支付问题。此外,当发生用户密钥丢失或者账户被盗用时,还能够通过生物特征加密信息的唯一性进行身份认证,恢复用户数字资产。
进一步地,在上述实施例的基础上,所述在接收到目标支付方发出的与目标接收方进行目标交易的请求信息后,获取对应于所述目标接收方的第一生物特征加密信息,根据所述第一生物特征加密信息加密生成交易密钥,包括:
通过对应于所述目标支付方的第二生物特征加密信息对所述目标支付方进行身份验证,若对所述目标支付方进行身份验证通过,则在接收到目标支付方发出的与目标接收方进行目标交易的请求信息后,获取对应于所述目标接收方的第一生物特征加密信息;
对生成的随机数字和所述第一生物特征加密信息进行加密计算,得到所述交易密钥;
其中,所述第二生物特征加密信息为对所述目标发送方用户的生物特征信息进行加密运算后的编码信息。
需要说明的是,通过区块链进行交易的用户,均预先注册了生物特征加密信息,当用户需要进行交易时,则可以先输入生物特征加密信息进行身份验证,保证支付方的资产安全。
进一步,随机数字为根据时间戳信息生成的使得加密区块满足“部分哈希碰撞”要求的数字。
本实施例提供了一种基于生物特征标记认证的区块链安全交易方法, 该方法在交易前对支付方进行基于生物特征加密信息的身份验证,保证了支付方的资产安全。
作为对比,第一方面,图2中提供了一种仅通过随机数字进行合法验证的交易方法示意图,图3是通过随机数字和生物特征加密信息共同进行合法验证的交易方法示意图,参见图2和图3,本市实施例提供的方法的作用是将交易双方生物特征认证信息集成到底层区块中并在区块链上发布,以此保障用户可以及时准确建立合法交易。传统区块链技术通过工作量证明(Proof-of-Work)实现分布式时间戳服务器机制,新区块的生成者需要解决一个“部分哈希碰撞”问题,通过计算能力破解这个问题的机制,能够保障区块的产生时间是一条不易重合的时间序列,从而分布式实现时间戳功能。但是,当用户找到一个有效随机数字(nonce)满足“部分哈希碰撞”要求后,该数字存在被多次使用的可能性(如图2),这是目前区块链技术的缺陷。例如,用户A可以把这个区块用于A和B之间的交易,与此同时,用户把这个区块用于A和C之间的交易。由于随机数字nonce是代表区块合法性的唯一标志,只要nonce有效,交易方B和C就只能认定该区块是合法的,无法判断区块是否已经被多次使用过,即“双重支付”。造成的不良后果就是代表两个交易的区块被加载到区块链上时,只有首次出现的区块B被承认(如图2),另一个交易方C只能承担虚假交易的损失。
基于生物特征加密信息的安全交易数字凭证生成技术可以从根本上杜绝双重交易。这部分是整个专利技术方案的重点,是前面步骤基础上安全交易数字凭证在区块链上的最终实现。这一步要求的条件是在区块链上合法账户建立支付方和接受方之间的合约,并为该次交易生成具有唯一性的区块。该区块中包含双方生物特征加密信息,此信息在后续合法支付中保证该区块只能使用一次,不能被双重支付。以上技术方案中,基于交易生物特征加密信息的区块链数据块LIB格式是本项专利的重要方法发明。
该模块技术具有以下特点:
(1)区块包含支付方和接收方生物特征加密信息验证机制。传统区块链技术中,对新区块的验证仅仅需要满足“部分哈希碰撞”要求即可,用户只要找到一个随机数字(nonce)使之满足哈希字符串k个首字符为0, 就拥有者使用该区块“记账”的权利,而不会要求验证该区块将交付给谁。这种机制的潜在风险是该区块可能会被用于多次交易支付(如图2),但是区块链只能承认其中第一次合法的交易,其他交易不被承认。含有加密生物特征的区块格式指定了该区块只能用于本次交易双方之间(如图3),接收方根据自身“合法身份生物特征标记”LIB加密编码能够十分方便地验证支付方提供的“nonce+LIB”交易数字凭证是否已经被多次支付使用,这是一种特别指明支付双方之间明确权利关系的记名数字凭证技术,该技术保障“一证一用”,使其无法在第三方之间使用。这样可以从根本上避免一个区块的多次使用问题。
(2)重新定义的分布式时间戳技术可以有效避免区块链分叉。由于加入了生物特征加密信息,同一个区块不会被支付到两个网络地址,因此杜绝了双重支付导致的恶意区块链分叉。
(3)包含交易双方生物特征加密信息的数字凭证技术可以实现交易查询和数字凭证归属认证。根据本项专利提出的“合法身份生物特征标记”(LIB)技术,提出了LIB数据头专用格式(如图5所示),数据块内容包括基于生物特征的交易双方唯一编号ID。通过网络中保有的完整可信区块链数据,用户可以查询并验证与自己账户生物特征编码相匹配的区块,利用nonce+LIB哈希编码,可以找到区块链中被合法接受的位置,定位到与账户相关的交易数字凭证,并利用自己的合法唯一生物特征身份认证该数字凭证。
安全交易数字凭证生成技术包括以下要点:
(1)含生物特征加密数据的分布式时间戳服务器技术。传统区块链的工作量证明机制是求解一个随机数字使之满足“部分哈希碰撞”问题,该随机数字代表新生成区块的合法性,但是却不要求验证交易双方的信息,这是存在双重支付问题的根源所在。在本专利提出的区块链分布式时间戳技术中,我们引入了求解“随机数字+生物特征加密编码”的“部分哈希碰撞”问题,使代表新生成区块合法性的标识能够反映出本次交易的双方合法身份,因此可以通过身份验证机制实现区块合法性识别,避免一个区块被匿名用于多次交易。比如,用户A针对交易方B的生物特征加密编码LIB-B,通过“挖矿”得到了满足“部分哈希碰撞”的“随机数字 +生物特征加密编码”(即nonce1+LIB-B)(如图3),并将包含数字签名的交易数字凭证通知B;如果用户A试图再次使用该区块建立与用户C之间的交易,那么当用户C接收到代表该区块合法性的数字凭证(nonce1+LIB-B的哈希编码)时,该用户可以利用自己的加密生物特征编码LIB-C和nonce1十分方便地快速生成一个哈希编码,并核对用户A提供的数字凭证哈希编码是否是针对本次交易的。显然,这里用户A提供的nonce1+LIB-B的哈希编码不可能与用户C的nonce1+LIB-C哈希编码一致。因此,A无法双重使用手中的数字凭证,也不会出现该区块的多次使用,从根本上避免了传统区块链技术的“双重支付”问题。
(2)采用SHA-512生物特征加密技术。在本项专利中,通过使用SHA-512安全散列算法来实现随机数字+生物特征的加密编码。该项技术的优势在于:(a)提高了数据的保密性,避免个人生物特征被破解;(b)突破传统区块链数字凭证2100万个的上限限制,大大提高了交易凭证的数量。
进一步地,在上述各实施例的基础上,还包括:
在接收到任一终端发送的恢复目标用户的数字资产的第二请求信息后,获取所述目标用户的第三生物特征加密信息,根据所述区块链上任一节点记录的对应于所述目标用户的交易信息,确定当前属于所述目标用户的数字资产,恢复对应于所述目标用户的数字资产。
由于在记录交易信息时,同时记录了交易双方的生物特征加密信息,因此当用户需要恢复数字资产时,只需要获取用于恢复资产的用户第三生物特征加密信息,通过第三生物特征加密信息去“公共账本”中查找第三生物特征加密信息对应的用户的交易记录,根据交易记录得到用户剩余的数字资产,进而进行恢复。
本实施例提供了一种基于生物特征标记认证的区块链安全交易方法,通过生物特征加密信息能够快速从“公共账本”找到用户的交易记录,确定属于用户的数字资产,实现对用户数字资产的恢复。
进一步地,在上述各实施例的基础上,所述判断是否接收到对所述交易密钥验证成功的提示信息,包括:
若接收到对所述交易密钥验证失败的提示信息,则发出当前进行验证所述交易密钥的用户不是所述目标接收方,交易不合法的提示信息。
可理解的是,若某一终端对交易密钥验证失败,则服务器将对交易密钥验证失败,不允许进行本次交易的提示信息发送到终端。
本实施例提供了一种基于生物特征标记认证的区块链安全交易方法,服务器向终端发送提示信息,以使得用户及时了解交易失败的原因。
第二方面,具体来说,区块链账户的生物特征加密集成技术,其作用是在区块链上建立具有唯一性的合法账户,保证用户交易安全。这是整个系统的初始模块,是后续模块的基础。该模块技术具有以下特点:
(1)生物特征具有唯一性。账户拥有者的指纹、虹膜、面部特征的生物标记是独有的,非法盗用者很难在用户不知情的情况下使用账户,以此保证交易对象的可信度,保证交易结果的真实可靠性。
(2)加密的数字化生物特征便于信息保存、认证和传递。传统实物证件往往采用复印、照片的形式,难以在数字交易中实现快速、实时、自动查证。生物特征可以实现快速数字化,经过加密的编码作为合法账户身份识别。
这一部分技术要点包括:
(1)高效安全的生物特征采集和数字加密技术。本项专利提出“合法身份生物特征标记”(Legal identity biomarker或LIB)加密技术,以指纹输入为例,用户通过硬件设备扫描输入指纹信息,利用SHA-512安全散列算法,系统自动将指纹信息离散并加密生成具有唯一性的识别码(如图4所示)。
(2)交易过程的合法身份认证技术。在每笔交易进行时,要求账户使用者输入指纹并生成加密数据,通过对比账户使用者的加密身份识别码和账户注册用户的识别码,实现“合法身份生物特征标记”认证,只有满足识别码身份认证的交易才能够具有合法性。
(3)个人信息安全性保障技术。账户识别码是利用SHA-512安全散列算法生成的唯一的身份标识,无法从该标识中反向得到用户生物特征加密信息,具有极高安全性。
第三方面,区块链系统对区块合法性认证技术。该技术的作用在于验证交易数字凭证的合法性,保证每次交易的“一证一用”,防止双重支付的。包括以下技术要点:
(1)交易数字凭证的合法性识别技术。在支付方得到合法区块后,根据区块中包含的交易双方生物特征加密编码、随机数字(nonce)和哈希编码,验证实际交易双方生物信息的哈希编码是否相符合。只有数字凭证中登记的交易双方信息和实际交易双方信息吻合时,才认证为合法交易,并追加在当前区块链尾部。
(2)区块链上数字凭证的快速认领技术。由于交易数量庞大,交易双方在识别属于本次交易的数字凭证结果时需要访问大量数据。利用LIB数据块头部唯一编码信息,可以快速识别交易结果,因此交易方不需要下载全部区块数据,只需要下载少量字节的区块头,就可以实现对交易信息的快速识别访问。
本项发明提出了应用于区块链的“合法身份生物特征标记”安全交易数字凭证技术系统,该系统具有防止双重支付虚假交易、用户数字资产认证、用户个人信息保密性高的特征。在区块链用户数量大、分布范围广、背景复杂的情况下,该技术对于保障个人交易和资产安全尤其具有优势,能够防止因网络攻击、账户盗用等问题引起的资产损失,提高抵抗恶意破坏区块链网络的能力。同时,该技术保留了区块链分布式记账和去中心化交易的特点。与以往基于单一随机数字(nonce)的区块合法性认证机制相比,本项专利技术首次实现了真正的与个人生物特征加密信息相关联的实名制区块链安全交易系统。
总之,本实施例提供的方法包括:首先,区块链账户的生物特征加密集成技术。该技术帮助区块链用户建立一个包含自身特有生物特征的加密账户身份识别号,该识别号保证用户使用区块链账户的合法性,在用户进行交易操作时可以通过指纹等信息进行认证,保障账户不会被盗用。同时,采用SHA-512加密算法对生物特征加密,强化了个人信息的安全性。其次,安全交易数字凭证生成技术。该技术帮助具有生成区块的用户实现发起交易的任务,并在建立含有交易双方生物特征(经过加密)的区块。最后,区块链系统对区块合法性认证技术。该技术帮助交易双方建立唯一、合法的交易,并验证交易数字凭证是否曾经被使用过,以保证在区块链上交易支付方-接收方之间建立完整合法的合约,并根据交易进行情况实现区块链更新。
本实施例提供的方法中,当终端作为交易的接收方,其执行的基于生物特征标记认证的区块链安全交易方法如图6所示,包括:
601:在接收到目标支付方发出的进行目标交易的第一请求信息后,获取根据接收方的第一生物特征加密信息生成的交易密钥和当前终端对应用户的身份编码;其中,所述身份编码中包括了当前终端对应用户的第四生物特征加密信息;
602:根据所述第四生物特征加密信息验证所述交易密钥,若对所述交易密钥验证成功,则发送对所述交易密钥验证成功的提示信息,并接收服务器发送的已经记录所述目标交易的交易信息,所述目标交易成功的信息;
其中,所述第四生物特征加密信息为对当前终端对应的用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
本实施例提供了一种基于生物特征标记认证的区块链安全交易方法,该方法在进行支付方和接收方的交易生成作为双方交易的数字交易凭证时,不再仅通过随机数字进行交易合法性认证,而是通过根据接收方用户的生物特征加密信息生成的交易密钥作为交易的数字交易凭证。由于生物特征加密信息的唯一性,能够保证进行该笔交易仅在支付方和支付方指定的接收方之间发生。该方法从底层区块链信息加密角度实现对交易双方合法身份信息的认证,保证一个数字交易凭证只能在一笔交易中使用一次,避免了双重支付问题。此外,当发生用户密钥丢失或者账户被盗用时,还能够通过生物特征加密信息的唯一性进行身份认证,恢复用户数字资产。
进一步地,在上述实施例的基础上,所述根据所述第四生物特征加密信息验证所述交易密钥,包括:
获取服务器生成所述交易密钥时生成的随机数字,对所述随机数字和所述第四生物特征加密信息进行加密运算,得到待验证码,若所述待验证码与所述交易密钥相同,则对所述交易密钥验证成功,否则,对所述交易密钥验证失败,发送对所述交易密钥验证失败的提示信息。
需要说明的是,终端对生物特征和随机数字进行进行加密生成交易密钥的加密算法和服务器相同。获取的当前终端对应的用户的生物特征加密 信息,不是原始生物特征加密信息,而是对当前终端对应的用户的生物特征信息进行加密运算后得到的信息。这样设置的目的是为了防止用户个人信息泄漏造成不可挽回的损失。
本实施例提供的方法针对区块链技术中存在的双重支付、用户数字资产安全等问题,考虑到目前区块链平台交易双方范围复杂、可信度不可控和交易真实合法性无法保证等挑战,本实施例提供的技术方案能够达到以下几个目的:
(1)建立区块链平台上交易的数字凭证合法身份安全认证技术。通过在底层数据块中加入交易双方的生物特征加密信息,保证一个数字凭证只能用于一笔交易,防止不法用户恶意双重支付。通过加密技术,保证交易双发合法身份可信,同时,应用SHA-512安全散列加密算法,从技术上保护受访对象的私密信息,满足匿名交易的要求。这也会促进交易结果更加可信、可靠。因此,本技术具备保护交易双发可信度记录和保护个人信息安全的能力。
(2)建立防止交易账户被盗用的机制。在目前区块链技术中,有时会出现密钥丢失、被盗用的情况,导致用户数字资产丢失。通过引入与用户个人生物特征相关联的数字凭证,可以强化账户使用的安全性,在每笔交易中要求账户使用者提供指纹等生物特征认证,避免用户不知情的情况下账户被盗用。
(3)建立用户生物特征加密信息的高度保密机制。通过在底层区块数据中引入加密的生物特征,任何网络攻击企图获得用户生物特征加密信息,都会面对经过安全散列算法加密后的数据,无法查看原始身份特征信息,保证交易双方、任何第三方都无法拥有对用户生物信息的获取和查看权利。
本实施例提供的方法针对目前区块链技术存在的一系列问题,从底层区块链信息加密角度实现对交易双方合法身份信息的认证,保证一个数字交易凭证只能在一笔交易中使用一次,避免了双重支付问题,同时,该技术能够避免虚假交易,使数字凭证具有可靠,不可篡改等功能。当发生用户密钥丢失或者账户被盗用时,还提供了一种用户通过生物特征(比如指纹)身份认证机制,帮助用户恢复数字资产。
在该系统基础上,可以方便开发出基于便携式移动终端的生物特征身份认证系统客户端,实现用户友好的区块链技术快速普及。同时,基于该系统的端对端数字交易平台可以快速推动企业发展,帮助企业建立信誉。值得指出的是,合法身份认证机制和中心化/去中心化机制是两个独立的概念,可以实现相互支持。传统中心化交易平台(如银行)提供完善的身份认证机制,要求用户提供合法身份认证文件(如身份证、护照),同时通过身份认证机制保证用户的资产安全。合法身份认证机制是传统中心化交易平台的安全技术,但是这不意味着身份认证就是中心化交易系统本身,它只是中心化交易过程采用的一种保护账户安全的手段。在去中心化的区块链技术中,同样也可以使用身份认证机制。通过本专利提出的生物特征身份认证机制,可以实现与端对端交易相适应的用户数字资产安全保障。本实施例提供的方法有利于实现去中心化交易平台的合法身份认证技术发展,并可以借助区块链技术形成高效、可靠、海量、透明的诚信度云数据。这对于根据企业、个人信誉度建立新型支付和消费模式意义非凡,是区块链技术在社会经济领域热点应用之一。
最后,本实施例提供的方法还可以进一步拓展应用,具有用户身份合法性认证、账户安全性高、交易过程规范可信、用户数字资产保障性强等特点。该方法是对现有区块链技术的重要发展,其有益效果主要体现在如下方面:
(1)在该技术系统基础上,可以开发基于便携式移动终端的区块链交易系统,通过终端实现指纹扫描、面部识别等生物特征的快速认证,使区块链应用系统更加快捷、方便。
(2)在该技术系统基础上,可以建立方便实用的区块链支付体系,通过个人之间直接交易支付系统,可以使结算更为快捷,形成稳定的、具有高信誉度的区块链使用群体。
(3)企业通过该技术系统可以实现高效便捷的资金管理和流动,有利于促进企业的积极健康发展。
(4)区块链上用户交易数据的历史记录可以帮助建立企业、个人信誉度云数据,可以作为相关行业对用户信誉度要求的依据。
图7为本实施例提供的服务器的结构框图,参见图7,该服务器包括 第一获取模块701、判断模块702和记录模块703,其中,
第一获取模块701,用于在接收到目标支付方发出的与目标接收方进行目标交易的第一请求信息后,获取对应于所述目标接收方用户的第一生物特征加密信息,根据所述第一生物特征加密信息加密生成交易密钥;
判断模块702,用于判断是否接收到对所述交易密钥验证成功的提示信息,若是,则在所述目标交易成功后,获取所述目标交易的交易信息;
记录模块703,用于将所述目标交易的交易信息公布到区块链的各个网络节点,以在每一网络节点均记录所述目标交易的交易信息;
其中,所述第一生物特征加密信息为对应于所述目标接收方用户的指纹、虹膜、掌纹或者面部特征的信息。
本实施例提供的服务器适用于上述实施例提供的由服务器执行的基于生物特征标记认证的区块链安全交易方法,在此不再赘述。
本实施例提供的服务器可以是分布式时间戳服务器。
本实施例提供了一种服务器,在进行支付方和接收方的交易生成作为双方交易的数字交易凭证时,不再仅通过随机数字进行交易合法性认证,而是通过根据接收方用户的生物特征加密信息生成的交易密钥作为交易的数字交易凭证。由于生物特征加密信息的唯一性,能够保证进行该笔交易仅在支付方和支付方指定的接收方之间发生。该方法从底层区块链信息加密角度实现对交易双方合法身份信息的认证,保证一个数字交易凭证只能在一笔交易中使用一次,避免了双重支付问题。此外,当发生用户密钥丢失或者账户被盗用时,还能够通过生物特征加密信息的唯一性进行身份认证,恢复用户数字资产。
图8为本实施例提供的终端的结构框图,参见图8,该服务器包括第二获取模块801和验证模块802,其中,
第二获取模块801,用于在接收到目标支付方发出的进行目标交易的第一请求信息后,获取根据接收方的第一生物特征加密信息生成的交易密钥和当前终端对应用户的身份编码;其中,所述身份编码中包括了当前终端对应用户的第四生物特征加密信息;
验证模块802,用于根据所述第四生物特征加密信息验证所述交易密钥,若对所述交易密钥验证成功,则发送对所述交易密钥验证成功的提示 信息,并接收服务器发送的已经记录所述目标交易的交易信息,所述目标交易成功的信息;
其中,所述第四生物特征加密信息为对当前终端对应的用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
本实施例提供的终端适用于上述实施例提供的由终端执行的基于生物特征标记认证的区块链安全交易方法,在此不再赘述。
本实施例提供了一种终端,在进行支付方和接收方的交易生成作为双方交易的数字交易凭证时,不再仅通过随机数字进行交易合法性认证,而是通过根据接收方用户的生物特征加密信息生成的交易密钥作为交易的数字交易凭证。由于生物特征加密信息的唯一性,能够保证进行该笔交易仅在支付方和支付方指定的接收方之间发生。该方法从底层区块链信息加密角度实现对交易双方合法身份信息的认证,保证一个数字交易凭证只能在一笔交易中使用一次,避免了双重支付问题。此外,当发生用户密钥丢失或者账户被盗用时,还能够通过生物特征加密信息的唯一性进行身份认证,恢复用户数字资产。
图9是示出本实施例提供的电子设备的结构框图。
参照图9,所述电子设备包括:处理器(processor)901、存储器(memory)902、通信接口(Communications Interface)903和总线904;
其中,
所述处理器901、存储器902、通信接口903通过所述总线904完成相互间的通信;
所述通信接口903用于该电子设备和终端的通信设备之间的信息传输;
所述处理器901用于调用所述存储器902中的程序指令,以执行上述各方法实施例所提供的方法,例如包括:在接收到目标支付方发出的与目标接收方进行目标交易的第一请求信息后,获取对应于所述目标接收方用户的第一生物特征加密信息,根据所述第一生物特征加密信息加密生成交易密钥;判断是否接收到对所述交易密钥验证成功的提示信息,若是,则在所述目标交易成功后,获取所述目标交易的交易信息;将所述目标交易 的交易信息公布到区块链的各个网络节点,以在每一网络节点均记录所述目标交易的交易信息;其中,所述第一生物特征加密信息为对所述目标接收方用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
本实施例提供一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行上述各方法实施例所提供的方法,例如包括:在接收到目标支付方发出的与目标接收方进行目标交易的第一请求信息后,获取对应于所述目标接收方用户的第一生物特征加密信息,根据所述第一生物特征加密信息加密生成交易密钥;判断是否接收到对所述交易密钥验证成功的提示信息,若是,则在所述目标交易成功后,获取所述目标交易的交易信息;将所述目标交易的交易信息公布到区块链的各个网络节点,以在每一网络节点均记录所述目标交易的交易信息;其中,所述第一生物特征加密信息为对所述目标接收方用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
本实施例公开一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,计算机能够执行上述各方法实施例所提供的方法,例如,包括:在接收到目标支付方发出的与目标接收方进行目标交易的第一请求信息后,获取对应于所述目标接收方用户的第一生物特征加密信息,根据所述第一生物特征加密信息加密生成交易密钥;判断是否接收到对所述交易密钥验证成功的提示信息,若是,则在所述目标交易成功后,获取所述目标交易的交易信息;将所述目标交易的交易信息公布到区块链的各个网络节点,以在每一网络节点均记录所述目标交易的交易信息;其中,所述第一生物特征加密信息为对所述目标接收方用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
图10是示出本实施例提供的电子设备的结构框图。
参照图10,所述电子设备包括:处理器(processor)1001、存储器(memory)1002、通信接口(Communications Interface)1003和总线1004;
其中,
所述处理器1001、存储器1002、通信接口1003通过所述总线1004完成相互间的通信;
所述通信接口1003用于该电子设备和服务器的通信设备之间的信息传输;
所述处理器1001用于调用所述存储器1002中的程序指令,以执行上述各方法实施例所提供的方法,例如包括:在接收到目标支付方发出的进行目标交易的第一请求信息后,获取根据接收方的第一生物特征加密信息生成的交易密钥和当前终端对应用户的身份编码;其中,所述身份编码中包括了当前终端对应用户的第四生物特征加密信息;根据所述第四生物特征加密信息验证所述交易密钥,若对所述交易密钥验证成功,则发送对所述交易密钥验证成功的提示信息,并接收服务器发送的已经记录所述目标交易的交易信息,所述目标交易成功的信息;其中,所述第四生物特征加密信息为对当前终端对应的用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
本实施例提供一种非暂态计算机可读存储介质,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行上述各方法实施例所提供的方法,例如包括:在接收到目标支付方发出的进行目标交易的第一请求信息后,获取根据接收方的第一生物特征加密信息生成的交易密钥和当前终端对应用户的身份编码;其中,所述身份编码中包括了当前终端对应用户的第四生物特征加密信息;根据所述第四生物特征加密信息验证所述交易密钥,若对所述交易密钥验证成功,则发送对所述交易密钥验证成功的提示信息,并接收服务器发送的已经记录所述目标交易的交易信息,所述目标交易成功的信息;其中,所述第四生物特征加密信息为对当前终端对应的用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
本实施例公开一种计算机程序产品,所述计算机程序产品包括存储在非暂态计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,计算机能够执行上述各方法实施例所提供的方法,例如,包括:在接收到目标支付方发出的进行目标交易的 第一请求信息后,获取根据接收方的第一生物特征加密信息生成的交易密钥和当前终端对应用户的身份编码;其中,所述身份编码中包括了当前终端对应用户的第四生物特征加密信息;根据所述第四生物特征加密信息验证所述交易密钥,若对所述交易密钥验证成功,则发送对所述交易密钥验证成功的提示信息,并接收服务器发送的已经记录所述目标交易的交易信息,所述目标交易成功的信息;其中,所述第四生物特征加密信息为对当前终端对应的用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所描述的电子设备等实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性的劳动的情况下,即可以理解并实施。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。
最后应说明的是:以上各实施例仅用以说明本发明的实施例的技术方案,而非对其限制;尽管参照前述各实施例对本发明的实施例进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替 换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明的实施例各实施例技术方案的范围。

Claims (10)

  1. 一种基于生物特征标记认证的区块链安全交易方法,其特征在于,包括:
    在接收到目标支付方发出的与目标接收方进行目标交易的第一请求信息后,获取对应于所述目标接收方用户的第一生物特征加密信息,根据所述第一生物特征加密信息加密生成交易密钥;
    判断是否接收到对所述交易密钥验证成功的提示信息,若是,则在所述目标交易成功后,获取所述目标交易的交易信息;
    将所述目标交易的交易信息公布到区块链的各个网络节点,以在每一网络节点均记录所述目标交易的交易信息;
    其中,所述第一生物特征加密信息为对所述目标接收方用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
  2. 根据权利要求1所述的方法,其特征在于,所述在接收到目标支付方发出的与目标接收方进行目标交易的请求信息后,获取对应于所述目标接收方的第一生物特征加密信息,根据所述第一生物特征加密信息加密生成交易密钥,包括:
    通过对应于所述目标支付方的第二生物特征加密信息对所述目标支付方进行身份验证,若对所述目标支付方进行身份验证通过,则在接收到目标支付方发出的与目标接收方进行目标交易的请求信息后,获取对应于所述目标接收方的第一生物特征加密信息;
    对生成的随机数字和所述第一生物特征加密信息进行加密计算,得到所述交易密钥;
    其中,所述第二生物特征加密信息为对所述目标发送方用户的生物特征信息进行加密运算后的编码信息。
  3. 根据权利要求1所述的方法,其特征在于,还包括:
    在接收到任一终端发送的恢复目标用户的数字资产的第二请求信息后,获取所述目标用户的第三生物特征加密信息,根据所述区块链上任一节点记录的对应于所述目标用户的交易信息,确定当前属于所述目标用户的数字资产,恢复对应于所述目标用户的数字资产。
  4. 根据权利要求1所述的方法,其特征在于,所述判断是否接收到对所述交易密钥验证成功的提示信息,包括:
    若接收到对所述交易密钥验证失败的提示信息,则发出当前进行验证所述交易密钥的用户不是所述目标接收方,交易不合法的提示信息。
  5. 一种基于生物特征标记认证的区块链安全交易方法,其特征在于,包括:
    在接收到目标支付方发出的进行目标交易的第一请求信息后,获取根据接收方的第一生物特征加密信息生成的交易密钥和当前终端对应用户的身份编码;其中,所述身份编码中包括了当前终端对应用户的第四生物特征加密信息;
    根据所述第四生物特征加密信息验证所述交易密钥,若对所述交易密钥验证成功,则发送对所述交易密钥验证成功的提示信息,并接收服务器发送的已经记录所述目标交易的交易信息,所述目标交易成功的信息;
    其中,所述第四生物特征加密信息为对当前终端对应的用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
  6. 根据权利要求5所述的方法,其特征在于,所述根据所述第四生物特征加密信息验证所述交易密钥,包括:
    获取服务器生成所述交易密钥时生成的随机数字,对所述随机数字和所述第四生物特征加密信息进行加密运算,得到待验证码,若所述待验证码与所述交易密钥相同,则对所述交易密钥验证成功,否则,对所述交易密钥验证失败,发送对所述交易密钥验证失败的提示信息。
  7. 一种服务器,其特征在于,包括:
    第一获取模块,用于在接收到目标支付方发出的与目标接收方进行目标交易的第一请求信息后,获取对应于所述目标接收方用户的第一生物特征加密信息,根据所述第一生物特征加密信息加密生成交易密钥;
    判断模块,用于判断是否接收到对所述交易密钥验证成功的提示信息,若是,则在所述目标交易成功后,获取所述目标交易的交易信息;
    记录模块,用于将所述目标交易的交易信息公布到区块链的各个网络节点,以在每一网络节点均记录所述目标交易的交易信息;
    其中,所述第一生物特征加密信息为对所述目标接收方用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
  8. 一种终端,其特征在于,包括:
    第二获取模块,用于在接收到目标支付方发出的进行目标交易的第一请求信息后,获取根据接收方的第一生物特征加密信息生成的交易密钥和当前终端对应用户的身份编码;其中,所述身份编码中包括了当前终端对应用户的第四生物特征加密信息;
    验证模块,用于根据所述第四生物特征加密信息验证所述交易密钥,若对所述交易密钥验证成功,则发送对所述交易密钥验证成功的提示信息,并接收服务器发送的已经记录所述目标交易的交易信息,所述目标交易成功的信息;
    其中,所述第四生物特征加密信息为对当前终端对应的用户的生物特征信息进行加密运算后的编码信息;所述生物特征信息包括指纹、虹膜、掌纹或者面部特征。
  9. 一种电子设备,其特征在于,包括:
    至少一个处理器、至少一个存储器、通信接口和总线;其中,
    所述处理器、存储器、通信接口通过所述总线完成相互间的通信;
    所述通信接口用于该电子设备和终端的通信设备之间的信息传输;
    所述存储器存储有可被所述处理器执行的程序指令,所述处理器调用所述程序指令能够执行如权利要求1至4中任一项所述的方法。
  10. 一种非暂态计算机可读存储介质,其特征在于,所述非暂态计算机可读存储介质存储计算机指令,所述计算机指令使所述计算机执行如权利要求1至4中任一项所述的方法。
PCT/CN2018/094769 2018-06-04 2018-07-06 一种基于生物特征标记认证的区块链安全交易方法及装置 WO2019232880A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/253,061 US20210279736A1 (en) 2018-06-04 2018-07-06 Blockchain secure transaction method and device based on biomarker authentication

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810565529.6A CN108876332B (zh) 2018-06-04 2018-06-04 一种基于生物特征标记认证的区块链安全交易方法及装置
CN201810565529.6 2018-06-04

Publications (1)

Publication Number Publication Date
WO2019232880A1 true WO2019232880A1 (zh) 2019-12-12

Family

ID=64336469

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/094769 WO2019232880A1 (zh) 2018-06-04 2018-07-06 一种基于生物特征标记认证的区块链安全交易方法及装置

Country Status (3)

Country Link
US (1) US20210279736A1 (zh)
CN (1) CN108876332B (zh)
WO (1) WO2019232880A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112308551A (zh) * 2020-04-30 2021-02-02 唐阳 数字资产采集装置及数字资产信息采集方法
CN112632639A (zh) * 2020-12-29 2021-04-09 航天科工网络信息发展有限公司 一种基于区块链的分布式可信日志管理方法
US11074661B2 (en) 2018-10-25 2021-07-27 Advanced New Technologies Co., Ltd. Transaction processing method, apparatus, and electronic device using a blockchain having nonce records
CN113420974A (zh) * 2021-06-17 2021-09-21 首钢集团有限公司 一种钢铁生产数据录入方法、电子设备及介质
CN113596036A (zh) * 2021-07-30 2021-11-02 上海旷沃科技有限公司 基于区块链的云边协同打印系统及双向认证方法

Families Citing this family (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111768304A (zh) 2018-08-06 2020-10-13 阿里巴巴集团控股有限公司 区块链交易方法及装置、电子设备
US10700850B2 (en) 2018-11-27 2020-06-30 Alibaba Group Holding Limited System and method for information protection
KR102248154B1 (ko) 2018-11-27 2021-05-06 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. 정보 보호를 위한 시스템 및 방법
CN110419053B (zh) 2018-11-27 2023-12-01 创新先进技术有限公司 用于信息保护的系统和方法
WO2019072276A2 (en) 2018-11-27 2019-04-18 Alibaba Group Holding Limited INFORMATION PROTECTION SYSTEM AND METHOD
SG11201902773VA (en) 2018-11-27 2019-05-30 Alibaba Group Holding Ltd System and method for information protection
RU2735439C2 (ru) 2018-11-27 2020-11-02 Алибаба Груп Холдинг Лимитед Система и способ для защиты информации
CN111275411B (zh) * 2018-12-05 2023-07-04 中国电信股份有限公司 数字货币钱包离线交易方法和系统、用户身份识别卡
US11882214B2 (en) * 2018-12-06 2024-01-23 Telefonaktiebolaget Lm Ericsson (Publ) Technique for cryptographic document protection and verification
CN109903043B (zh) * 2019-01-17 2023-01-10 平安科技(深圳)有限公司 基于区块链的安全交易方法、装置、设备及存储介质
CN109936448A (zh) * 2019-02-26 2019-06-25 北京钰安信息科技有限公司 一种数据传输方法及装置
CN110070363B (zh) * 2019-03-13 2021-08-06 咪咕文化科技有限公司 区块链网络中的账户管理方法、验证方法及终端设备
CN113077254A (zh) * 2019-03-29 2021-07-06 创新先进技术有限公司 基于生物特征重置区块链账户密钥的方法和装置
EP3716570B1 (en) * 2019-03-29 2022-07-27 Mitsubishi Electric R&D Centre Europe B.V. Computational puzzles against dos attacks
CN110400223B (zh) * 2019-07-26 2022-05-17 中国工商银行股份有限公司 基于区块链的交互日志加密、调取、防窃取方法、装置
CN112418850A (zh) * 2019-08-21 2021-02-26 中国移动通信有限公司研究院 一种基于区块链的交易方法、装置及电子设备
CN110648138B (zh) * 2019-09-30 2021-04-30 支付宝(杭州)信息技术有限公司 基于区块链的交易查询、交易数据处理方法、装置及设备
JP7322961B2 (ja) * 2019-10-16 2023-08-08 日本電気株式会社 データ記録装置および方法
CN110969529A (zh) * 2019-11-08 2020-04-07 海南新软软件有限公司 数字资产交易的通信方法、装置及系统
WO2021100831A1 (ja) * 2019-11-21 2021-05-27 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ 制御方法、装置、及び、プログラム
CN110992053B (zh) * 2019-12-31 2023-04-28 国科火炼(杭州)数字科技有限公司 一种基于指静脉识别及区块链技术的安全支付系统及方法
CN111401869B (zh) * 2020-03-25 2022-10-28 福建慧捷通科技有限公司 一种数字货币流通系统及流通方法
CN111695096B (zh) * 2020-05-29 2023-11-21 拉卡拉支付股份有限公司 一种身份验证的方法及装置
CN112084509A (zh) * 2020-08-19 2020-12-15 喻婷婷 一种基于生物识别技术的区块链密钥生成方法及系统
CN112613885A (zh) * 2020-12-31 2021-04-06 深圳市辰宝信息服务有限公司 大宗商品的交易结算交收方法、系统和可读存储介质
US11856095B2 (en) * 2022-02-09 2023-12-26 My Job Matcher, Inc. Apparatus and methods for validating user data by using cryptography
CN114826653B (zh) * 2022-03-10 2024-04-16 蚂蚁区块链科技(上海)有限公司 一种基于区块链网络的凭证验证方法、系统、装置、设备及存储介质
CN116051278A (zh) * 2022-12-01 2023-05-02 北京中科深智科技有限公司 一种基于区块链数字人捏造和鉴权使用与交易的方法
CN116151979A (zh) * 2023-02-20 2023-05-23 湖北联合美景数字传媒科技有限公司 一种数字藏品交易系统及方法
CN115860037B (zh) * 2023-02-24 2023-06-06 中国(上海)宝玉石交易中心有限公司 宝玉石的防伪方法、防伪系统及防伪组件

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100847A (zh) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 非对称加密区块链身份信息验证方法及装置
CN107888384A (zh) * 2017-11-30 2018-04-06 中链科技有限公司 一种身份数据管理方法、系统和计算机可读存储介质
CN107993066A (zh) * 2017-12-20 2018-05-04 国民认证科技(北京)有限公司 一种资源交易方法及电子钱包系统
CN107993069A (zh) * 2017-12-13 2018-05-04 清华大学 一种基于区块链网络的在线交易方法及系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9858401B2 (en) * 2011-08-09 2018-01-02 Biogy, Inc. Securing transactions against cyberattacks
US20150170112A1 (en) * 2013-10-04 2015-06-18 Erly Dalvo DeCastro Systems and methods for providing multi-currency platforms comprising means for exchanging and interconverting tangible and virtual currencies in various transactions, banking operations, and wealth management scenarios
CN106934624B (zh) * 2017-01-04 2021-05-04 毛德操 在输入前端采用见证式指纹的区块链的方法
CN107038638A (zh) * 2017-02-24 2017-08-11 杭州象链网络技术有限公司 一种基于联盟链的股权登记交易系统构建方法
CN107330694A (zh) * 2017-07-03 2017-11-07 重庆小犀智能科技有限公司 基于区块链的版权交易系统以及交易方法
CN107480988A (zh) * 2017-07-28 2017-12-15 贵州眯果创意科技有限公司 一种区块链来实现股票交易的监管系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100847A (zh) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 非对称加密区块链身份信息验证方法及装置
CN107888384A (zh) * 2017-11-30 2018-04-06 中链科技有限公司 一种身份数据管理方法、系统和计算机可读存储介质
CN107993069A (zh) * 2017-12-13 2018-05-04 清华大学 一种基于区块链网络的在线交易方法及系统
CN107993066A (zh) * 2017-12-20 2018-05-04 国民认证科技(北京)有限公司 一种资源交易方法及电子钱包系统

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11074661B2 (en) 2018-10-25 2021-07-27 Advanced New Technologies Co., Ltd. Transaction processing method, apparatus, and electronic device using a blockchain having nonce records
US11521275B2 (en) 2018-10-25 2022-12-06 Advanced New Technologies Co., Ltd. Blockchain-based transaction processing method, apparatus, and electronic device
CN112308551A (zh) * 2020-04-30 2021-02-02 唐阳 数字资产采集装置及数字资产信息采集方法
CN112308551B (zh) * 2020-04-30 2023-08-18 唐阳 数字资产信息采集装置及数字资产信息采集方法
CN112632639A (zh) * 2020-12-29 2021-04-09 航天科工网络信息发展有限公司 一种基于区块链的分布式可信日志管理方法
CN112632639B (zh) * 2020-12-29 2024-04-12 航天科工网络信息发展有限公司 一种基于区块链的分布式可信日志管理方法
CN113420974A (zh) * 2021-06-17 2021-09-21 首钢集团有限公司 一种钢铁生产数据录入方法、电子设备及介质
CN113596036A (zh) * 2021-07-30 2021-11-02 上海旷沃科技有限公司 基于区块链的云边协同打印系统及双向认证方法
CN113596036B (zh) * 2021-07-30 2023-05-12 上海旷沃科技有限公司 基于区块链的云边协同打印系统及双向认证方法

Also Published As

Publication number Publication date
CN108876332A (zh) 2018-11-23
CN108876332B (zh) 2020-09-22
US20210279736A1 (en) 2021-09-09

Similar Documents

Publication Publication Date Title
WO2019232880A1 (zh) 一种基于生物特征标记认证的区块链安全交易方法及装置
US11496310B2 (en) Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication
US20190296904A1 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
CN108696358B (zh) 数字证书的管理方法、装置、可读存储介质及服务终端
US20210385219A1 (en) Method and system for data security within independent computer systems and digital networks
CN112437938A (zh) 用于区块链地址和所有者验证的系统和方法
US11558201B2 (en) Self-authenticating digital identity
CN111027036B (zh) 一种基于区块链的身份关联方法
CN111046352A (zh) 一种基于区块链的身份信息安全授权系统与方法
CN109040139A (zh) 一种基于区块链与智能合约的身份认证系统及方法
KR102332226B1 (ko) 블록체인 원장에 대한 검증 가능한 블록체인 네트워크 시스템 및 상기 블록체인 네트워크에서의 블록체인 원장 검증 방법
JPH10336169A (ja) 認証方法、認証装置、記憶媒体、認証サーバ及び認証端末装置
WO2018088475A1 (ja) 電子認証方法及びプログラム
US7739500B2 (en) Method and system for consistent recognition of ongoing digital relationships
CN114969786A (zh) 基于区块链的保函数据处理方法、节点及系统
CN110634072A (zh) 一种基于多签和硬件加密的区块链交易系统及其运行机制
CN117216740A (zh) 一种基于区块链技术的数字身份认证方法
US20100153274A1 (en) Method and apparatus for mutual authentication using small payments
US11729159B2 (en) System security infrastructure facilitating protecting against fraudulent use of individual identity credentials
CN113347183A (zh) 一种区块链金融大数据处理方法
KR102628944B1 (ko) 블록체인 기반 리걸 아카이브의 진정성립 인증 시스템 및 이를 이용한 방법
Arun et al. Authentication and Identity Validation Blockchain Application
Srivastava et al. Blockchain Risk and Uncertainty in Automated Applications
CN117892364A (zh) 一种数字资产的管理方法及系统
KR20200048691A (ko) 비트코인 교환기의 침입탐지를 위한 블록체인 분석장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18921455

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18921455

Country of ref document: EP

Kind code of ref document: A1