WO2021226854A1 - Blockchain machine, blockchain data access authentication method, and computer-readable storage medium - Google Patents
Blockchain machine, blockchain data access authentication method, and computer-readable storage medium Download PDFInfo
- Publication number
- WO2021226854A1 WO2021226854A1 PCT/CN2020/089926 CN2020089926W WO2021226854A1 WO 2021226854 A1 WO2021226854 A1 WO 2021226854A1 CN 2020089926 W CN2020089926 W CN 2020089926W WO 2021226854 A1 WO2021226854 A1 WO 2021226854A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- blockchain
- machine
- node
- information
- access authentication
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012795 verification Methods 0.000 claims abstract description 11
- 238000012550 audit Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 241001481828 Glyptocephalus cynoglossus Species 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000003313 weakening effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- the invention belongs to the field of blockchain technology, and specifically relates to a blockchain machine, a blockchain data access authentication method and a computer-readable storage medium.
- Blockchain is based on a P2P (Peer-to-Peer) network. It is a distributed ledger technology that integrates key technologies such as cryptography, consensus algorithms, and smart contracts. It is based on a communication network and is capable of A new generation of information technology that is deeply integrated with the Internet of Things, big data, cloud computing, artificial intelligence, etc., has the key characteristics of multi-party maintenance, non-tampering, openness and transparency, and is multi-person/multi-thing lacking trust or weak trust Between, in accordance with the established consensus rules, a system of collaboration.
- P2P Peer-to-Peer
- the existing blockchain use only deploys related nodes on the server, and users can connect to the node to use the blockchain.
- blockchain technology in the field of judicial deposits, it is necessary to realize the circulation of electronic evidence based on the credibility of nodes.
- the subject information is unknown and the data cannot be confirmed.
- the present invention is used to provide a blockchain machine, a blockchain data access authentication method, and a computer-readable storage medium, so as to ensure the trustworthiness of the main body of the blockchain machine access node.
- the present invention adopts the following technical solutions:
- the first aspect of the embodiments of the present invention provides a blockchain data access authentication method, which includes the following steps:
- S2 Bind user information with uniquely identified hardware information and write it into the chip
- S3 Notify the hash value of the node information of the blockchain machine to other nodes of the blockchain to be connected through the blockchain machine node where the producer is located;
- it further includes:
- the S7 further includes:
- S701 When the user invokes the SDK to perform the chaining operation on the blockchain node, first read the current latitude and longitude A through the GPS/Beidou chip driver and store it temporarily;
- the current latitude and longitude A and the corresponding latitude and longitude B are matched within the range. If they are the same, the user can operate the blockchain machine node to perform an on-chain operation; if they are inconsistent, an alarm message is returned, and the blockchain machine node is inoperable.
- it further includes:
- the hardware information with a unique identifier includes at least a motherboard ID, a CPUID and a BIOS number.
- the blockchain machine node information includes user information, hardware information, node ID, and node address written in the chip.
- the step S5 further includes:
- the node service program connects to other nodes in the corresponding blockchain according to the configuration.
- the step S6 further includes:
- the blockchain machine node connects to other nodes of the blockchain network according to the configuration, and informs other nodes of node information;
- S602 After receiving the node information according to the blockchain machine, other nodes perform matching according to the node information received in S3. If they are consistent, the digital signature is returned after verification; if they are inconsistent, the verification fails and returns.
- the second aspect of the embodiments of the present invention provides a blockchain machine.
- the blockchain machine includes a memory, a microprocessor, an encryption module, a GPS/Beidou positioning module, and is stored on the memory and can be located in all locations.
- a blockchain data access authentication program running on the microprocessor, and when the blockchain data access authentication program is executed by the microprocessor, the blockchain machine access authentication as described in any one of the above is realized A step of.
- a third aspect of the embodiments of the present invention provides a computer-readable storage medium, the computer-readable storage medium stores a blockchain data access authentication program, and the blockchain data access authentication program is processed When the device is executed, the steps of blockchain data access authentication as described in any one of the above are implemented.
- the blockchain machine is bound to user information, which can ensure the credibility of the main body of the blockchain machine;
- the blockchain machine After the blockchain machine is started, it can connect to different types of blockchains in the form of nodes according to the user's choice, which can be adapted to connect to the domestic mainstream underlying blockchain platform, and it can be used after access;
- the bottom layer of the blockchain adopts hardware encryption, supports multiple algorithms, and has higher security
- Sybil Attack (Sybil Attack) was proposed by John R. Douceur in 2002. It is a form of attack that acts on P2P networks. Attackers use a single node to forge multiple identities to exist in the P2P network, thereby weakening the network. Redundancy, reduce the robustness of the network, monitor or interfere with the normal activities of the network and other purposes.
- FIG. 1 is a flowchart of steps of a blockchain data access authentication method according to an embodiment of the present invention
- FIG. 2 is a schematic diagram of the hardware structure of a blockchain machine according to an embodiment of the present invention.
- FIG. 1 shows a blockchain data access authentication method disclosed in the present invention, which includes the following steps:
- users can be natural persons, legal persons, or other organizations that have undergone other prescribed procedures for filing.
- the user information includes information such as the name of the natural person, ID number and residential address; if the user is a legal person, the user information includes company name, legal representative, company address, organization code and other information. That is, the user information is the information that has passed the authentication record and can uniquely indicate the user's identity.
- User information can be verified manually or by machine comparison. Through user information review, the trustworthiness of the main body of the blockchain machine can be guaranteed.
- S2 Bind the user information with the hardware information with a unique identifier and write it into the chip.
- the uniquely identified hardware information includes at least a motherboard ID, a CPU ID, and a BIOS number.
- the motherboard ID is AZF241001101
- the CPU ID is BFEBFBFF00000F27
- the BIOS number is CN24401483.
- the hardware information may also include a MAC address, such as the following number B0-25-AA-21-75-5E.
- the hash value of the node information of the blockchain machine is notified to other nodes of the blockchain to be connected through the blockchain machine node where the producer is located.
- the blockchain machine node information includes user information, hardware information, node ID, and node address written in the chip.
- the node address refers to the address of the node body (ie the geographic location of the institution to which it belongs), not the latitude and longitude, but the latitude and longitude can be calculated according to the algorithm, and then compared with the latitude and longitude in the GPS/Beidou chip read by the CPU.
- different types of blockchains include, but are not limited to, FISCO BCOS, Ant Blockchain, Baidu Super Chain, and Tencent Blockchain.
- step S5 includes the following steps:
- the node service program here refers to the program that the blockchain node must run for normal operation, and is generally provided by the underlying provider of the blockchain.
- the node service program connects to other nodes in the corresponding blockchain according to the configuration.
- step S6 further includes:
- the blockchain machine node connects to other nodes of the blockchain network according to the configuration, and informs other nodes of node information;
- S602 After receiving the node information according to the blockchain machine, other nodes perform matching according to the node information received in S3. If they are consistent, the digital signature is returned after verification; if they are inconsistent, the verification fails and returns.
- the blockchain data access authentication method is realized, and the blockchain machine is bound to the user, and the user information is uniquely bound to the key physical equipment of the blockchain machine to ensure that the main body of the blockchain machine is trusted Spend.
- the blockchain machine After verifying the identity of the subject and the physical information, the blockchain machine can be connected to the corresponding blockchain according to the needs of the application, which improves the security of use.
- the blockchain data access authentication method may further include: S7, when the user uses the blockchain machine node, the blockchain machine The CPU reads the latitude and longitude in the GPS/Beidou chip to match the location information written in the chip. If they are consistent, the user uses the blockchain normally; if they are inconsistent, the blockchain machine node is not allowed to be used. This step is used to verify the physical location of the blockchain machine, which can further ensure the credibility of the blockchain machine during use.
- S7 further includes:
- S701 When the user invokes the SDK to perform the chaining operation on the blockchain node, first read the current latitude and longitude A through the GPS/Beidou chip driver and store it temporarily;
- the current latitude and longitude A and the corresponding latitude and longitude B are matched within the range. If they are the same, the user can operate the blockchain machine node to perform an on-chain operation; if they are inconsistent, an alarm message is returned, and the blockchain machine node is inoperable.
- the blockchain data access authentication method provided by another embodiment of the present invention may further include:
- the blockchain machine includes a memory, a microprocessor, an encryption module, and a GPS/Beidou positioning module.
- the memory may include memory, such as high-speed random access memory (Random-Access Memory, RAM), and may also include non-volatile memory (Non-Volatile Memory, NVM), such as at least one disk storage.
- RAM random access memory
- NVM non-Volatile Memory
- the blockchain machine can also include hardware required by other businesses.
- the block chain machine in the embodiment of the present invention mainly refers to a type of server, which runs a block chain network credibly, ensuring that all nodes in the entire block chain network are credible.
- the processor and the memory can be connected to each other through an internal bus, which can be an industry standard architecture (ISA) bus, a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus, or an extended industry standard structure (Extended Industry). Standard Architecture, EISA) bus, etc.
- ISA industry standard architecture
- PCI peripheral component interconnect standard
- EISA Extended Industry standard structure
- Standard Architecture, EISA Standard Architecture
- the bus can be divided into address bus, data bus and control bus. For ease of representation, only one double arrow is used to indicate in FIG. 2, but it does not mean that there is only one bus or one type of bus.
- the memory is used to store a program.
- the program may include program code, where the program code includes computer operation instructions, and the memory may include memory and non-volatile memory, and provide instructions and data to the processor.
- the processor reads the corresponding computer program from the non-volatile memory to the memory and then runs it, forming a content recommendation device on a logical level.
- the processor executes the program stored in the memory, and is specifically configured to execute the method operation performed when the server is the execution subject described above.
- the foregoing blockchain data access authentication method as in the embodiment of the present invention may be applied to a processor or implemented by the processor.
- the processor can be an integrated circuit chip with signal processing capabilities.
- each step of the above method can be completed by an integrated logic circuit of hardware in the processor or instructions in the form of software.
- the above-mentioned processor may be a general-purpose processor, including a central processing unit (CPU), a network processor (Network Processor, NP), etc., or a digital signal processor (DSP), a dedicated integrated Circuit (Application Specific Integrated Circuit, ASIC), Field Programmable Gate Array (Field Programmable Gate Array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present invention can be implemented or executed.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the steps of the method disclosed in combination with the embodiments of the present invention may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in a decoder.
- the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
- the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. For the specific execution steps, refer to the method embodiment, which will not be repeated here.
- the embodiment of the present invention also provides a computer-readable storage medium, the computer-readable storage medium stores a blockchain machine access authentication program, when the blockchain data access authentication program is executed by a processor The steps of the method for connecting blockchain nodes as described above are realized.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (10)
- 一种区块链数据接入认证方法,其特征在于,包括以下步骤:A blockchain data access authentication method is characterized in that it comprises the following steps:S1,用户在购买区块链机时,提供用户信息并经由审核通过后,将用户信息写入区块链机的芯片中;S1: When a user purchases a blockchain machine, he provides user information and after passing the audit, writes the user information into the chip of the blockchain machine;S2,将用户信息与具有唯一标识的硬件信息绑定并写入芯片中;S2: Bind user information with uniquely identified hardware information and write it into the chip;S3,将区块链机的节点信息的哈希值通过生产商所在的区块链机节点通知给即将要连接的区块链其他节点;S3: Notify the hash value of the node information of the blockchain machine to other nodes of the blockchain to be connected through the blockchain machine node where the producer is located;S4,用户启动区块链机时,系统检测该硬件信息,并与芯片中写入的硬件信息进行匹配,若不一致,区块链机无法启动或显示错误;S4: When the user starts the blockchain machine, the system detects the hardware information and matches it with the hardware information written in the chip. If it is inconsistent, the blockchain machine cannot be started or displays an error;S5,区块链机启动后,根据用户的选择以节点的形式接入不同类型的区块链;S5: After the blockchain machine is started, it will connect to different types of blockchains in the form of nodes according to the user's choice;S6,当区块链机以节点形式接入对应区块链时,区块链其它节点对区块链机节点进行验证,若有超过2/3节点验证签名通过,允许接入,否则,不允许接入。S6: When the blockchain machine is connected to the corresponding blockchain in the form of a node, other nodes of the blockchain will verify the node of the blockchain machine. If more than 2/3 of the nodes pass the verification signature, the access is allowed, otherwise, no Allow access.
- 如权利要求1所述的区块链数据接入认证方法,其特征在于,进一步包括:The blockchain data access authentication method according to claim 1, further comprising:S7,用户使用区块链机节点时,区块链机CPU读出GPS/北斗芯片中的经纬度与芯片中写入的位置信息进行匹配,若一致,用户正常使用区块链;若不一致,该区块链机节点不允许使用。S7: When the user uses the blockchain machine node, the CPU of the blockchain machine reads the latitude and longitude in the GPS/Beidou chip to match the position information written in the chip. If they are consistent, the user uses the blockchain normally; if they are inconsistent, the Blockchain machine nodes are not allowed to be used.
- 如权利要求2所述的区块链数据接入认证方法,其特征在于,所述S7进一步包括:The blockchain data access authentication method according to claim 2, wherein the S7 further comprises:S701,用户调用SDK进行对区块链节点进行上链操作时,首先通过GPS/北斗芯片驱动程序读取当前所在经纬度A并临时存储;S701: When the user invokes the SDK to perform the chaining operation on the blockchain node, first read the current latitude and longitude A through the GPS/Beidou chip driver and store it temporarily;S 702,然后调用存储芯片中已存储的主体信息中的地理位置并根据数字地图换算成对应的经纬度B;S702, then call the geographic location in the main body information stored in the storage chip and convert it into the corresponding latitude and longitude B according to the digital map;S703,当前所在经纬度A与对应的经纬度B进行范围内匹配,若一致,用户可操作区块链机节点进行上链操作;若不一致,返回告警信息,区块链机节点不可操作。S703, the current latitude and longitude A and the corresponding latitude and longitude B are matched within the range. If they are the same, the user can operate the blockchain machine node to perform an on-chain operation; if they are inconsistent, an alarm message is returned, and the blockchain machine node is inoperable.
- 如权利要求1至3任一所述的区块链数据接入认证方法,其特征在于,进一步包括:The blockchain data access authentication method according to any one of claims 1 to 3, further comprising:S8,区块链机节点在进行数据上链时,会将用户主体信息、地理位置作为要素进行上链,增加数据的物理属性。S8: When the blockchain machine node performs data uploading, it will upload the user's subject information and geographic location as elements to increase the physical attributes of the data.
- 如权利要求1至3任一所述的区块链数据接入认证方法,其特征在于,所述步骤S2中,具有唯一标识的硬件信息至少包括主板ID、CPU ID和BIOS编号。The blockchain data access authentication method according to any one of claims 1 to 3, wherein, in the step S2, the hardware information with a unique identifier includes at least a motherboard ID, a CPU ID, and a BIOS number.
- 如权利要求1至3任一所述的区块链数据接入认证方法,其特征在于,所述步骤S3中,所述区块链机节点信息包含写入芯片中的用户信息、硬件信息、节点ID和节点地址。The blockchain data access authentication method according to any one of claims 1 to 3, wherein in the step S3, the blockchain machine node information includes user information, hardware information, and Node ID and node address.
- 如权利要求1至3任一所述的区块链数据接入认证方法,其特征在于,所述步骤S5进一步包括:The blockchain data access authentication method according to any one of claims 1 to 3, wherein the step S5 further comprises:S501,区块链机启动后,根据配置文件,启动相应区块链的SDK和节点服务程序;S501: After the blockchain machine is started, start the SDK and node service program of the corresponding blockchain according to the configuration file;S502,节点服务程序根据配置去连接对应区块链中的其它节点。S502: The node service program connects to other nodes in the corresponding blockchain according to the configuration.
- 如权利要求1至3任一所述的区块链数据接入认证方法,其特征在于,所述步骤S6进一步包括:The blockchain data access authentication method according to any one of claims 1 to 3, wherein the step S6 further comprises:S601,区块链机节点根据配置连接区块链网络其它节点,并将节点信息通知其他节点;S601, the blockchain machine node connects to other nodes of the blockchain network according to the configuration, and informs other nodes of node information;S602,其他节点收到根据该区块链机节点信息后,根据S3中收到的节点信息进行匹配,若一致,验证通过后数字签名后返回;若不一致;验证失败返回。S602: After receiving the node information according to the blockchain machine, other nodes perform matching according to the node information received in S3. If they are consistent, the digital signature is returned after verification; if they are inconsistent, the verification fails and returns.
- 一种区块链机,其特征在于,所述区块链机包括存储器、微处理器、加 密模块、GPS/北斗定位模块和存储在所述存储器上并可在所述微处理器上运行的区块链数据接入认证程序,所述区块链数据接入认证程序被所述微处理器执行时实现如权利要求1至8中任一项所述的区块链机接入认证的步骤。A block chain machine, characterized in that, the block chain machine includes a memory, a microprocessor, an encryption module, a GPS/Beidou positioning module, and a device that is stored in the memory and can run on the microprocessor Blockchain data access authentication program, when the blockchain data access authentication program is executed by the microprocessor, the step of implementing the blockchain machine access authentication according to any one of claims 1 to 8 .
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有区块链数据接入认证程序,所述区块链数据接入认证程序被处理器执行时实现如权利要求1至8中任一项所述的区块链数据接入认证的步骤。A computer-readable storage medium, characterized in that a blockchain data access authentication program is stored on the computer-readable storage medium, and the blockchain data access authentication program is executed by a processor as claimed in the claims The steps of blockchain data access authentication described in any one of 1 to 8.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010389846.4 | 2020-05-09 | ||
CN202010389846.4A CN111586059B (en) | 2020-05-09 | 2020-05-09 | Block chain machine, block chain data access authentication method and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021226854A1 true WO2021226854A1 (en) | 2021-11-18 |
Family
ID=72125475
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/089926 WO2021226854A1 (en) | 2020-05-09 | 2020-05-13 | Blockchain machine, blockchain data access authentication method, and computer-readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111586059B (en) |
WO (1) | WO2021226854A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112597547A (en) * | 2020-12-29 | 2021-04-02 | 广东国腾量子科技有限公司 | Decentralized credible authentication system based on block chain |
CN112565303B (en) * | 2020-12-30 | 2023-03-28 | 北京八分量信息科技有限公司 | Method and device for performing authentication connection between block chain nodes and related product |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170257358A1 (en) * | 2016-03-04 | 2017-09-07 | ShoCard, Inc. | Method and System for Authenticated Login Using Static or Dynamic Codes |
CN108900507A (en) * | 2018-06-29 | 2018-11-27 | 全链通有限公司 | Block chain real name identification method and system |
US20190036680A1 (en) * | 2017-07-28 | 2019-01-31 | Trusted Key Solutions Inc. | System and method for blockchain-based user authentication based on a cryptographic challenge |
CN109327457A (en) * | 2018-11-09 | 2019-02-12 | 广州大学 | A kind of internet of things equipment identity identifying method and system based on block chain |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10346826B2 (en) * | 2015-07-28 | 2019-07-09 | Wesley John Boudville | Blockchain and deep links for mobile apps |
US10587628B2 (en) * | 2016-09-29 | 2020-03-10 | Microsoft Technology Licensing, Llc | Verifiable outsourced ledgers |
CN106548345B (en) * | 2016-12-07 | 2020-08-21 | 北京信任度科技有限公司 | Method and system for realizing block chain private key protection based on key partitioning |
CN108573381B (en) * | 2017-03-09 | 2020-06-05 | 北京京东尚科信息技术有限公司 | Data processing method and device |
CN107958371A (en) * | 2017-11-13 | 2018-04-24 | 深圳超级区块链信息技术有限公司 | A kind of distributed block chain identity card |
CN108200174B (en) * | 2018-01-04 | 2019-10-25 | 成都理工大学 | Based on the distributed mobile phone protecting platform of block chain and its implementation |
CN108416589A (en) * | 2018-03-08 | 2018-08-17 | 深圳前海微众银行股份有限公司 | Connection method, system and the computer readable storage medium of block chain node |
CN108737418B (en) * | 2018-05-22 | 2020-09-15 | 飞天诚信科技股份有限公司 | Identity authentication method and system based on block chain |
CN108881253B (en) * | 2018-06-29 | 2020-11-06 | 全链通有限公司 | Block chain real name participation method and system |
CN108876374B (en) * | 2018-06-29 | 2020-10-16 | 全链通有限公司 | Block chain network identity document authentication method and system |
CN110177124B (en) * | 2019-06-20 | 2022-02-25 | 深圳市迅雷网络技术有限公司 | Identity authentication method based on block chain and related equipment |
-
2020
- 2020-05-09 CN CN202010389846.4A patent/CN111586059B/en active Active
- 2020-05-13 WO PCT/CN2020/089926 patent/WO2021226854A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170257358A1 (en) * | 2016-03-04 | 2017-09-07 | ShoCard, Inc. | Method and System for Authenticated Login Using Static or Dynamic Codes |
US20190036680A1 (en) * | 2017-07-28 | 2019-01-31 | Trusted Key Solutions Inc. | System and method for blockchain-based user authentication based on a cryptographic challenge |
CN108900507A (en) * | 2018-06-29 | 2018-11-27 | 全链通有限公司 | Block chain real name identification method and system |
CN109327457A (en) * | 2018-11-09 | 2019-02-12 | 广州大学 | A kind of internet of things equipment identity identifying method and system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN111586059A (en) | 2020-08-25 |
CN111586059B (en) | 2021-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10754989B2 (en) | Runtime self-correction for blockchain ledgers | |
JP6853364B2 (en) | Systems and methods for implementing blockchain-based digital certificates | |
US11334439B2 (en) | Checkpointing for increasing efficiency of a blockchain | |
US11310234B2 (en) | Securing permissioned blockchain network from pseudospoofing network attacks | |
WO2020134942A1 (en) | Identity verification method and system therefor | |
US11151236B2 (en) | File verification database system | |
JP2023179743A (en) | Script-based blockchain interaction | |
JP6965352B2 (en) | Systems and methods for generating digital marks | |
CN110771120B (en) | System and method for blockchain based authentication | |
WO2018233536A1 (en) | Authentication method, and authentication data processing method and device based on blockchain | |
AU2020414467B2 (en) | Partially-ordered blockchain | |
AU2017423496B2 (en) | Secure token passing via blockchains | |
US11025430B2 (en) | File provenance database system | |
US11366932B2 (en) | Consensus method and data verification method, apparatus, and system of consortium blockchain | |
AU2021210206B2 (en) | Index structure for blockchain ledger | |
US11139960B2 (en) | File redaction database system | |
CN110753944A (en) | System and method for blockchain based data management | |
WO2021226854A1 (en) | Blockchain machine, blockchain data access authentication method, and computer-readable storage medium | |
CN113302610B (en) | Trusted platform based on blockchain | |
US20210109776A1 (en) | Free-riding node identification for blockchain | |
CN116583833A (en) | Self-auditing blockchain | |
CN113491090B (en) | Trusted platform based on blockchain | |
US11783342B1 (en) | Blockchain blacklist anti-money laundering system (BBAMLS) | |
CN115001707B (en) | Device authentication method based on block chain and related device | |
US11483132B2 (en) | Generating and initiating pre-signed transaction requests for flexibly and efficiently implementing secure cryptographic key management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20934930 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20934930 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20934930 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 12/06/2023) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20934930 Country of ref document: EP Kind code of ref document: A1 |