WO2021226854A1 - Blockchain machine, blockchain data access authentication method, and computer-readable storage medium - Google Patents

Blockchain machine, blockchain data access authentication method, and computer-readable storage medium Download PDF

Info

Publication number
WO2021226854A1
WO2021226854A1 PCT/CN2020/089926 CN2020089926W WO2021226854A1 WO 2021226854 A1 WO2021226854 A1 WO 2021226854A1 CN 2020089926 W CN2020089926 W CN 2020089926W WO 2021226854 A1 WO2021226854 A1 WO 2021226854A1
Authority
WO
WIPO (PCT)
Prior art keywords
blockchain
machine
node
information
access authentication
Prior art date
Application number
PCT/CN2020/089926
Other languages
French (fr)
Chinese (zh)
Inventor
徐单恒
林皓
Original Assignee
杭州安存网络科技有限公司
北京北信源软件股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州安存网络科技有限公司, 北京北信源软件股份有限公司 filed Critical 杭州安存网络科技有限公司
Publication of WO2021226854A1 publication Critical patent/WO2021226854A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • the invention belongs to the field of blockchain technology, and specifically relates to a blockchain machine, a blockchain data access authentication method and a computer-readable storage medium.
  • Blockchain is based on a P2P (Peer-to-Peer) network. It is a distributed ledger technology that integrates key technologies such as cryptography, consensus algorithms, and smart contracts. It is based on a communication network and is capable of A new generation of information technology that is deeply integrated with the Internet of Things, big data, cloud computing, artificial intelligence, etc., has the key characteristics of multi-party maintenance, non-tampering, openness and transparency, and is multi-person/multi-thing lacking trust or weak trust Between, in accordance with the established consensus rules, a system of collaboration.
  • P2P Peer-to-Peer
  • the existing blockchain use only deploys related nodes on the server, and users can connect to the node to use the blockchain.
  • blockchain technology in the field of judicial deposits, it is necessary to realize the circulation of electronic evidence based on the credibility of nodes.
  • the subject information is unknown and the data cannot be confirmed.
  • the present invention is used to provide a blockchain machine, a blockchain data access authentication method, and a computer-readable storage medium, so as to ensure the trustworthiness of the main body of the blockchain machine access node.
  • the present invention adopts the following technical solutions:
  • the first aspect of the embodiments of the present invention provides a blockchain data access authentication method, which includes the following steps:
  • S2 Bind user information with uniquely identified hardware information and write it into the chip
  • S3 Notify the hash value of the node information of the blockchain machine to other nodes of the blockchain to be connected through the blockchain machine node where the producer is located;
  • it further includes:
  • the S7 further includes:
  • S701 When the user invokes the SDK to perform the chaining operation on the blockchain node, first read the current latitude and longitude A through the GPS/Beidou chip driver and store it temporarily;
  • the current latitude and longitude A and the corresponding latitude and longitude B are matched within the range. If they are the same, the user can operate the blockchain machine node to perform an on-chain operation; if they are inconsistent, an alarm message is returned, and the blockchain machine node is inoperable.
  • it further includes:
  • the hardware information with a unique identifier includes at least a motherboard ID, a CPUID and a BIOS number.
  • the blockchain machine node information includes user information, hardware information, node ID, and node address written in the chip.
  • the step S5 further includes:
  • the node service program connects to other nodes in the corresponding blockchain according to the configuration.
  • the step S6 further includes:
  • the blockchain machine node connects to other nodes of the blockchain network according to the configuration, and informs other nodes of node information;
  • S602 After receiving the node information according to the blockchain machine, other nodes perform matching according to the node information received in S3. If they are consistent, the digital signature is returned after verification; if they are inconsistent, the verification fails and returns.
  • the second aspect of the embodiments of the present invention provides a blockchain machine.
  • the blockchain machine includes a memory, a microprocessor, an encryption module, a GPS/Beidou positioning module, and is stored on the memory and can be located in all locations.
  • a blockchain data access authentication program running on the microprocessor, and when the blockchain data access authentication program is executed by the microprocessor, the blockchain machine access authentication as described in any one of the above is realized A step of.
  • a third aspect of the embodiments of the present invention provides a computer-readable storage medium, the computer-readable storage medium stores a blockchain data access authentication program, and the blockchain data access authentication program is processed When the device is executed, the steps of blockchain data access authentication as described in any one of the above are implemented.
  • the blockchain machine is bound to user information, which can ensure the credibility of the main body of the blockchain machine;
  • the blockchain machine After the blockchain machine is started, it can connect to different types of blockchains in the form of nodes according to the user's choice, which can be adapted to connect to the domestic mainstream underlying blockchain platform, and it can be used after access;
  • the bottom layer of the blockchain adopts hardware encryption, supports multiple algorithms, and has higher security
  • Sybil Attack (Sybil Attack) was proposed by John R. Douceur in 2002. It is a form of attack that acts on P2P networks. Attackers use a single node to forge multiple identities to exist in the P2P network, thereby weakening the network. Redundancy, reduce the robustness of the network, monitor or interfere with the normal activities of the network and other purposes.
  • FIG. 1 is a flowchart of steps of a blockchain data access authentication method according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of the hardware structure of a blockchain machine according to an embodiment of the present invention.
  • FIG. 1 shows a blockchain data access authentication method disclosed in the present invention, which includes the following steps:
  • users can be natural persons, legal persons, or other organizations that have undergone other prescribed procedures for filing.
  • the user information includes information such as the name of the natural person, ID number and residential address; if the user is a legal person, the user information includes company name, legal representative, company address, organization code and other information. That is, the user information is the information that has passed the authentication record and can uniquely indicate the user's identity.
  • User information can be verified manually or by machine comparison. Through user information review, the trustworthiness of the main body of the blockchain machine can be guaranteed.
  • S2 Bind the user information with the hardware information with a unique identifier and write it into the chip.
  • the uniquely identified hardware information includes at least a motherboard ID, a CPU ID, and a BIOS number.
  • the motherboard ID is AZF241001101
  • the CPU ID is BFEBFBFF00000F27
  • the BIOS number is CN24401483.
  • the hardware information may also include a MAC address, such as the following number B0-25-AA-21-75-5E.
  • the hash value of the node information of the blockchain machine is notified to other nodes of the blockchain to be connected through the blockchain machine node where the producer is located.
  • the blockchain machine node information includes user information, hardware information, node ID, and node address written in the chip.
  • the node address refers to the address of the node body (ie the geographic location of the institution to which it belongs), not the latitude and longitude, but the latitude and longitude can be calculated according to the algorithm, and then compared with the latitude and longitude in the GPS/Beidou chip read by the CPU.
  • different types of blockchains include, but are not limited to, FISCO BCOS, Ant Blockchain, Baidu Super Chain, and Tencent Blockchain.
  • step S5 includes the following steps:
  • the node service program here refers to the program that the blockchain node must run for normal operation, and is generally provided by the underlying provider of the blockchain.
  • the node service program connects to other nodes in the corresponding blockchain according to the configuration.
  • step S6 further includes:
  • the blockchain machine node connects to other nodes of the blockchain network according to the configuration, and informs other nodes of node information;
  • S602 After receiving the node information according to the blockchain machine, other nodes perform matching according to the node information received in S3. If they are consistent, the digital signature is returned after verification; if they are inconsistent, the verification fails and returns.
  • the blockchain data access authentication method is realized, and the blockchain machine is bound to the user, and the user information is uniquely bound to the key physical equipment of the blockchain machine to ensure that the main body of the blockchain machine is trusted Spend.
  • the blockchain machine After verifying the identity of the subject and the physical information, the blockchain machine can be connected to the corresponding blockchain according to the needs of the application, which improves the security of use.
  • the blockchain data access authentication method may further include: S7, when the user uses the blockchain machine node, the blockchain machine The CPU reads the latitude and longitude in the GPS/Beidou chip to match the location information written in the chip. If they are consistent, the user uses the blockchain normally; if they are inconsistent, the blockchain machine node is not allowed to be used. This step is used to verify the physical location of the blockchain machine, which can further ensure the credibility of the blockchain machine during use.
  • S7 further includes:
  • S701 When the user invokes the SDK to perform the chaining operation on the blockchain node, first read the current latitude and longitude A through the GPS/Beidou chip driver and store it temporarily;
  • the current latitude and longitude A and the corresponding latitude and longitude B are matched within the range. If they are the same, the user can operate the blockchain machine node to perform an on-chain operation; if they are inconsistent, an alarm message is returned, and the blockchain machine node is inoperable.
  • the blockchain data access authentication method provided by another embodiment of the present invention may further include:
  • the blockchain machine includes a memory, a microprocessor, an encryption module, and a GPS/Beidou positioning module.
  • the memory may include memory, such as high-speed random access memory (Random-Access Memory, RAM), and may also include non-volatile memory (Non-Volatile Memory, NVM), such as at least one disk storage.
  • RAM random access memory
  • NVM non-Volatile Memory
  • the blockchain machine can also include hardware required by other businesses.
  • the block chain machine in the embodiment of the present invention mainly refers to a type of server, which runs a block chain network credibly, ensuring that all nodes in the entire block chain network are credible.
  • the processor and the memory can be connected to each other through an internal bus, which can be an industry standard architecture (ISA) bus, a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus, or an extended industry standard structure (Extended Industry). Standard Architecture, EISA) bus, etc.
  • ISA industry standard architecture
  • PCI peripheral component interconnect standard
  • EISA Extended Industry standard structure
  • Standard Architecture, EISA Standard Architecture
  • the bus can be divided into address bus, data bus and control bus. For ease of representation, only one double arrow is used to indicate in FIG. 2, but it does not mean that there is only one bus or one type of bus.
  • the memory is used to store a program.
  • the program may include program code, where the program code includes computer operation instructions, and the memory may include memory and non-volatile memory, and provide instructions and data to the processor.
  • the processor reads the corresponding computer program from the non-volatile memory to the memory and then runs it, forming a content recommendation device on a logical level.
  • the processor executes the program stored in the memory, and is specifically configured to execute the method operation performed when the server is the execution subject described above.
  • the foregoing blockchain data access authentication method as in the embodiment of the present invention may be applied to a processor or implemented by the processor.
  • the processor can be an integrated circuit chip with signal processing capabilities.
  • each step of the above method can be completed by an integrated logic circuit of hardware in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, including a central processing unit (CPU), a network processor (Network Processor, NP), etc., or a digital signal processor (DSP), a dedicated integrated Circuit (Application Specific Integrated Circuit, ASIC), Field Programmable Gate Array (Field Programmable Gate Array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present invention can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present invention may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in a decoder.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. For the specific execution steps, refer to the method embodiment, which will not be repeated here.
  • the embodiment of the present invention also provides a computer-readable storage medium, the computer-readable storage medium stores a blockchain machine access authentication program, when the blockchain data access authentication program is executed by a processor The steps of the method for connecting blockchain nodes as described above are realized.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

Disclosed are a blockchain machine, a blockchain data access authentication method, and a computer-readable storage medium. The method comprises: when a user purchases a blockchain machine, providing user information, and after the user information passes verification, writing the user information into a chip of the blockchain machine; binding the user information to hardware information with a unique identifier, and writing same into the chip; by means of a blockchain machine node where a manufacturer is located, giving a notification of a hash value of node information of the blockchain machine to other nodes to be connected of a blockchain; when the user starts the blockchain machine, a system testing hardware information, and matching same with hardware information written into the chip, wherein if the hardware information is inconsistent with the hardware information written into the chip, the blockchain machine cannot be started or the blockchain machine displays an error; after being started, the blockchain machine accessing blockchains of different types in the form of a node according to the selection of the user; and when the blockchain machine accesses a corresponding blockchain in the form of a node, the other nodes of the blockchain verifying the blockchain machine node, wherein if signatures of more than two thirds of the nodes pass verification, the access is allowed.

Description

区块链机、区块链数据接入认证方法及计算机可读存储介质Block chain machine, block chain data access authentication method and computer readable storage medium 技术领域Technical field
本发明属于区块链技术领域,具体涉及一种区块链机、区块链数据接入认证方法及计算机可读存储介质。The invention belongs to the field of blockchain technology, and specifically relates to a blockchain machine, a blockchain data access authentication method and a computer-readable storage medium.
背景技术Background technique
区块链是一种基于P2P(Peer-to-Peer,对等)网络,是整合了密码学、共识算法、智能合约等关键技术的分布式账本技术,是架构在通信网络之上的、能够与物联网、大数据、云计算、人工智能等进行深度融合的新一代信息技术,具有多方维护、不可篡改、开放透明三个方面的关键特点,是缺乏信任或者弱信任的多人/多物之间,按照既定的共识规则,进行协作的系统。Blockchain is based on a P2P (Peer-to-Peer) network. It is a distributed ledger technology that integrates key technologies such as cryptography, consensus algorithms, and smart contracts. It is based on a communication network and is capable of A new generation of information technology that is deeply integrated with the Internet of Things, big data, cloud computing, artificial intelligence, etc., has the key characteristics of multi-party maintenance, non-tampering, openness and transparency, and is multi-person/multi-thing lacking trust or weak trust Between, in accordance with the established consensus rules, a system of collaboration.
现有的区块链使用只是在服务器上部署相关节点,用户连接节点就可以使用区块链。随着区块链技术在司法存证领域运用越来越广泛,需要建立在节点可信的基础上实现电子证据的流转。但由于现有技术中区块链的匿名性,会产出主体信息不明,数据无法确权的问题。The existing blockchain use only deploys related nodes on the server, and users can connect to the node to use the blockchain. With the increasing use of blockchain technology in the field of judicial deposits, it is necessary to realize the circulation of electronic evidence based on the credibility of nodes. However, due to the anonymity of the blockchain in the prior art, the subject information is unknown and the data cannot be confirmed.
有鉴于此,有必要提供一种技术方案,用以确保节点主体可信。In view of this, it is necessary to provide a technical solution to ensure the trustworthiness of the node subject.
发明内容Summary of the invention
鉴于以上存在的技术问题,本发明用于提供一种区块链机、区块链数据接入认证方法及计算机可读存储介质,用以确保区块链机接入节点主体可信。In view of the above existing technical problems, the present invention is used to provide a blockchain machine, a blockchain data access authentication method, and a computer-readable storage medium, so as to ensure the trustworthiness of the main body of the blockchain machine access node.
为解决上述技术问题,本发明采用如下的技术方案:To solve the above technical problems, the present invention adopts the following technical solutions:
本发明实施例的第一方面提供一种区块链数据接入认证方法,包括以下步骤:The first aspect of the embodiments of the present invention provides a blockchain data access authentication method, which includes the following steps:
S1,用户在购买区块链机时,提供用户信息并经由审核通过后,将用户信息写入区块链机的芯片中;S1: When a user purchases a blockchain machine, he provides user information and after passing the audit, writes the user information into the chip of the blockchain machine;
S2,将用户信息与具有唯一标识的硬件信息绑定并写入芯片中;S2: Bind user information with uniquely identified hardware information and write it into the chip;
S3,将区块链机的节点信息的哈希值通过生产商所在的区块链机节点通知给即将要连接的区块链其他节点;S3: Notify the hash value of the node information of the blockchain machine to other nodes of the blockchain to be connected through the blockchain machine node where the producer is located;
S4,用户启动区块链机时,系统检测该硬件信息,并与芯片中写入的硬件信息进行匹配,若不一致,区块链机无法启动或显示错误;S4: When the user starts the blockchain machine, the system detects the hardware information and matches it with the hardware information written in the chip. If it is inconsistent, the blockchain machine cannot be started or displays an error;
S5,区块链机启动后,根据用户的选择以节点的形式接入不同类型的区块链;S5: After the blockchain machine is started, it will connect to different types of blockchains in the form of nodes according to the user's choice;
S6,当区块链机以节点形式接入对应区块链时,区块链其它节点对区块链机节点进行验证,若有超过2/3节点验证签名通过,允许接入,否则,不允许接入。S6: When the blockchain machine is connected to the corresponding blockchain in the form of a node, other nodes of the blockchain will verify the node of the blockchain machine. If more than 2/3 of the nodes pass the verification signature, the access is allowed, otherwise, no Allow access.
优选地,进一步包括:Preferably, it further includes:
S7,用户使用区块链机节点时,区块链机CPU读出GPS/北斗芯片中的经纬度与芯片中写入的位置信息进行匹配,若一致,用户正常使用区块链;不一致,该区块链机节点不允许使用。S7: When the user uses the blockchain machine node, the CPU of the blockchain machine reads the latitude and longitude in the GPS/Beidou chip to match the location information written in the chip. If they are consistent, the user uses the blockchain normally; inconsistency, this area Block chain machine nodes are not allowed to be used.
优选地,所述S7进一步包括:Preferably, the S7 further includes:
S701,用户调用SDK进行对区块链节点进行上链操作时,首先通过GPS/北斗芯片驱动程序读取当前所在经纬度A并临时存储;S701: When the user invokes the SDK to perform the chaining operation on the blockchain node, first read the current latitude and longitude A through the GPS/Beidou chip driver and store it temporarily;
S702,然后调用存储芯片中已存储的主体信息中的地理位置并根据数字地图换算成对应的经纬度B;S702, then call the geographic location in the main body information stored in the storage chip and convert it into the corresponding latitude and longitude B according to the digital map;
S703,当前所在经纬度A与对应的经纬度B进行范围内匹配,若一致,用户可操作区块链机节点进行上链操作;若不一致,返回告警信息,区块链机节点不可操作。S703, the current latitude and longitude A and the corresponding latitude and longitude B are matched within the range. If they are the same, the user can operate the blockchain machine node to perform an on-chain operation; if they are inconsistent, an alarm message is returned, and the blockchain machine node is inoperable.
优选地,进一步包括:Preferably, it further includes:
S8,区块链机节点在进行数据上链时,会将用户主体信息、地理位置作为 要素进行上链,增加数据的物理属性。S8: When the blockchain machine node is uploading data to the chain, it will upload the user's subject information and geographic location as elements to increase the physical attributes of the data.
优选地,所述步骤S2中,具有唯一标识的硬件信息至少包括主板ID、CPUID和BIOS编号。Preferably, in the step S2, the hardware information with a unique identifier includes at least a motherboard ID, a CPUID and a BIOS number.
优选地,所述步骤S3中,所述区块链机节点信息包含写入芯片中的用户信息、硬件信息、节点ID和节点地址。Preferably, in the step S3, the blockchain machine node information includes user information, hardware information, node ID, and node address written in the chip.
优选地,所述步骤S5进一步包括:Preferably, the step S5 further includes:
S501,区块链机启动后,根据配置文件,启动相应区块链的SDK和节点服务程序;S501: After the blockchain machine is started, start the SDK and node service program of the corresponding blockchain according to the configuration file;
S502,节点服务程序根据配置去连接对应区块链中的其它节点。S502: The node service program connects to other nodes in the corresponding blockchain according to the configuration.
优选地,所述步骤S6进一步包括:Preferably, the step S6 further includes:
S601,区块链机节点根据配置连接区块链网络其它节点,并将节点信息通知其他节点;S601, the blockchain machine node connects to other nodes of the blockchain network according to the configuration, and informs other nodes of node information;
S602,其他节点收到根据该区块链机节点信息后,根据S3中收到的节点信息进行匹配,若一致,验证通过后数字签名后返回;若不一致;验证失败返回。S602: After receiving the node information according to the blockchain machine, other nodes perform matching according to the node information received in S3. If they are consistent, the digital signature is returned after verification; if they are inconsistent, the verification fails and returns.
本发明实施例的第二个方面提供了一种区块链机,所述区块链机包括存储器、微处理器、加密模块、GPS/北斗定位模块和存储在所述存储器上并可在所述微处理器上运行的区块链数据接入认证程序,所述区块链数据接入认证程序被所述微处理器执行时实现如上述任一项所述的区块链机接入认证的步骤。The second aspect of the embodiments of the present invention provides a blockchain machine. The blockchain machine includes a memory, a microprocessor, an encryption module, a GPS/Beidou positioning module, and is stored on the memory and can be located in all locations. A blockchain data access authentication program running on the microprocessor, and when the blockchain data access authentication program is executed by the microprocessor, the blockchain machine access authentication as described in any one of the above is realized A step of.
本发明实施例的第三个方面提供了一种计算机可读存储介质,所述计算机可读存储介质上存储有区块链数据接入认证程序,所述区块链数据接入认证程序被处理器执行时实现如上述任一项所述的区块链数据接入认证的步骤。A third aspect of the embodiments of the present invention provides a computer-readable storage medium, the computer-readable storage medium stores a blockchain data access authentication program, and the blockchain data access authentication program is processed When the device is executed, the steps of blockchain data access authentication as described in any one of the above are implemented.
采用本发明具有如下的有益效果:The use of the present invention has the following beneficial effects:
(1)区块链机与用户信息绑定,可以保证区块链机主体可信度;(1) The blockchain machine is bound to user information, which can ensure the credibility of the main body of the blockchain machine;
(2)区块链机与物理属性绑定,增加上链数据的可信度;(2) The blockchain machine is bound to physical attributes to increase the credibility of the data on the chain;
(3)区块链机启动后,根据用户的选择以节点的形式接入不同类型的区块 链,可以适配接入国内主流的底层区块链平台,接入即可使用;(3) After the blockchain machine is started, it can connect to different types of blockchains in the form of nodes according to the user's choice, which can be adapted to connect to the domestic mainstream underlying blockchain platform, and it can be used after access;
(4)区块链底层采用硬件加密,支持多种算法,安全性更高;(4) The bottom layer of the blockchain adopts hardware encryption, supports multiple algorithms, and has higher security;
(5)解决区块链女巫攻击问题。女巫攻击(Sybil Attack)是2002年由John R.Douceur提出的,它是作用于P2P网络中的一种攻击形式,攻击者利用单个节点来伪造多个身份存在于P2P网络中,从而达到削弱网络的冗余性,降低网络健壮性,监视或干扰网络正常活动等目的。(5) Solve the problem of blockchain witch attack. Sybil Attack (Sybil Attack) was proposed by John R. Douceur in 2002. It is a form of attack that acts on P2P networks. Attackers use a single node to forge multiple identities to exist in the P2P network, thereby weakening the network. Redundancy, reduce the robustness of the network, monitor or interfere with the normal activities of the network and other purposes.
附图说明Description of the drawings
图1为本发明实施例的区块链数据接入认证方法的步骤流程图;FIG. 1 is a flowchart of steps of a blockchain data access authentication method according to an embodiment of the present invention;
图2为本发明实施例的区块链机的硬件结构示意图。FIG. 2 is a schematic diagram of the hardware structure of a blockchain machine according to an embodiment of the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.
方法实施例1Method Example 1
参照图1,所示为本发明公开的一种区块链数据接入认证方法,包括以下步骤:Referring to Figure 1, it shows a blockchain data access authentication method disclosed in the present invention, which includes the following steps:
S1,用户在购买区块链机时,提供用户信息并经由审核通过后,将用户信息写入区块链机的芯片中。S1: When a user purchases a blockchain machine, he provides user information and after passing the audit, writes the user information into the chip of the blockchain machine.
具体应用实例中,用户可以为自然人,法人或者其他经过其他规定流程备案的组织。若用户为自然人,则用户信息包含自然人姓名,身份证号码和居住地址等信息;若用户为法人,则用户信息公司名称、法定代表人、公司地址、组织机构代码等信息。即用户信息为通过认证备案,可以唯一表明用户身份的信息。In specific application examples, users can be natural persons, legal persons, or other organizations that have undergone other prescribed procedures for filing. If the user is a natural person, the user information includes information such as the name of the natural person, ID number and residential address; if the user is a legal person, the user information includes company name, legal representative, company address, organization code and other information. That is, the user information is the information that has passed the authentication record and can uniquely indicate the user's identity.
用户信息审核可以采用人工核验或者机器比对校验的方式。通过用户信息审核,可以保证区块链机使用主体可信。User information can be verified manually or by machine comparison. Through user information review, the trustworthiness of the main body of the blockchain machine can be guaranteed.
S2,将用户信息与具有唯一标识的硬件信息绑定并写入芯片中。S2: Bind the user information with the hardware information with a unique identifier and write it into the chip.
具体应用实例中,具有唯一标识的硬件信息至少包括主板ID、CPU ID和BIOS编号,例如主板ID为AZF241001101,CPU ID为BFEBFBFF00000F27,BIOS编号为CN24401483。进一步地,硬件信息也可包含MAC地址,如以下编号B0-25-AA-21-75-5E。通过区块链机上用户信息与其物理属性绑定,可增加后续步骤中上链数据的可信度。In a specific application example, the uniquely identified hardware information includes at least a motherboard ID, a CPU ID, and a BIOS number. For example, the motherboard ID is AZF241001101, the CPU ID is BFEBFBFF00000F27, and the BIOS number is CN24401483. Further, the hardware information may also include a MAC address, such as the following number B0-25-AA-21-75-5E. By binding the user information on the blockchain machine to its physical attributes, the credibility of the data on the chain in the subsequent steps can be increased.
S3,将区块链机的节点信息的哈希值通过生产商所在的区块链机节点通知给即将要连接的区块链其他节点。S3, the hash value of the node information of the blockchain machine is notified to other nodes of the blockchain to be connected through the blockchain machine node where the producer is located.
具体应用实例中,区块链机节点信息包含写入芯片中的用户信息、硬件信息、节点ID和节点地址。此处节点地址是指节点主体(即所属机构的地理位置)的地址,不是经纬度,但是根据算法可以计算出经纬度,然后与CPU读出GPS/北斗芯片中的经纬度进行比较。In a specific application example, the blockchain machine node information includes user information, hardware information, node ID, and node address written in the chip. Here, the node address refers to the address of the node body (ie the geographic location of the institution to which it belongs), not the latitude and longitude, but the latitude and longitude can be calculated according to the algorithm, and then compared with the latitude and longitude in the GPS/Beidou chip read by the CPU.
S4,用户启动区块链机时,系统检测该硬件信息,并与芯片中写入的硬件信息进行匹配,若不一致,区块链机无法启动或显示错误。S4: When the user starts the blockchain machine, the system detects the hardware information and matches it with the hardware information written in the chip. If it is inconsistent, the blockchain machine cannot be started or displays an error.
通过将绑定的硬件信息与开机启动检测到的硬件信息进行匹配,若不一致,说明区块链机的硬件系统可能被认为替换,进而其可信度不能得到保证。通过拒绝可信度没法得到保证的区块链机的启动,确认启动的区块链机都是经审核认证通过的,其可信度大大增加。By matching the bound hardware information with the hardware information detected at startup, if it is inconsistent, it means that the hardware system of the blockchain machine may be considered as a replacement, and its credibility cannot be guaranteed. By rejecting the startup of the blockchain machine whose credibility cannot be guaranteed, and confirming that all the started blockchain machines have been audited and certified, their credibility is greatly increased.
S5,区块链机启动后,根据用户的选择以节点的形式接入不同类型的区块链。S5: After the blockchain machine is started, it connects to different types of blockchains in the form of nodes according to the user's choice.
具体应用实例中,不同类型的区块链包含但不限于FISCO BCOS、蚂蚁区块链、百度超级链、腾讯区块链。In specific application examples, different types of blockchains include, but are not limited to, FISCO BCOS, Ant Blockchain, Baidu Super Chain, and Tencent Blockchain.
进一步的,步骤S5包括以下步骤:Further, step S5 includes the following steps:
S501,区块链机启动后,根据配置文件,启动相应区块链的SDK(Software  Development Kit,软件开发工具包)和节点服务程序;S501: After the blockchain machine is started, start the SDK (Software Development Kit) and node service program of the corresponding blockchain according to the configuration file;
此处节点服务程序是指区块链节点正常运行必须运行的程序,一般由区块链底层提供方提供。The node service program here refers to the program that the blockchain node must run for normal operation, and is generally provided by the underlying provider of the blockchain.
S502,节点服务程序根据配置去连接对应区块链中的其它节点。S502: The node service program connects to other nodes in the corresponding blockchain according to the configuration.
S6,当区块链机以节点形式接入对应区块链时,区块链其它节点对区块链机节点进行验证,若有超过2/3节点验证签名通过,允许接入,否则,不允许接入。S6: When the blockchain machine is connected to the corresponding blockchain in the form of a node, other nodes of the blockchain will verify the node of the blockchain machine. If more than 2/3 of the nodes pass the verification signature, the access is allowed, otherwise, no Allow access.
具体应用实例中,步骤S6进一步包括:In a specific application example, step S6 further includes:
S601,区块链机节点根据配置连接区块链网络其它节点,并将节点信息通知其他节点;S601, the blockchain machine node connects to other nodes of the blockchain network according to the configuration, and informs other nodes of node information;
S602,其他节点收到根据该区块链机节点信息后,根据S3中收到的节点信息进行匹配,若一致,验证通过后数字签名后返回;若不一致;验证失败返回。S602: After receiving the node information according to the blockchain machine, other nodes perform matching according to the node information received in S3. If they are consistent, the digital signature is returned after verification; if they are inconsistent, the verification fails and returns.
通过以上技术方案实现区块链数据接入认证方法,采用区块链机与用户绑定、用户信息又唯一与区块链机关键物理设备绑定的方式,确保区块链机的主体可信度。通过主体身份与物理信息验证后的区块链机,可以根据应用需要接入对应区块链,提高了使用的安全性。Through the above technical solutions, the blockchain data access authentication method is realized, and the blockchain machine is bound to the user, and the user information is uniquely bound to the key physical equipment of the blockchain machine to ensure that the main body of the blockchain machine is trusted Spend. After verifying the identity of the subject and the physical information, the blockchain machine can be connected to the corresponding blockchain according to the needs of the application, which improves the security of use.
方法实施例2Method Example 2
在方法实施例1的基础上,进一步参见图1,本发明又一实施例提供的区块链数据接入认证方法,可进一步包括:S7,用户使用区块链机节点时,区块链机CPU读出GPS/北斗芯片中的经纬度与芯片中写入的位置信息进行匹配,若一致,用户正常使用区块链;不一致,该区块链机节点不允许使用。此步骤用于验证区块链机的物理位置,可进一步确保区块链机使用过程中的可信度。On the basis of method embodiment 1, and further referring to Figure 1, the blockchain data access authentication method provided by another embodiment of the present invention may further include: S7, when the user uses the blockchain machine node, the blockchain machine The CPU reads the latitude and longitude in the GPS/Beidou chip to match the location information written in the chip. If they are consistent, the user uses the blockchain normally; if they are inconsistent, the blockchain machine node is not allowed to be used. This step is used to verify the physical location of the blockchain machine, which can further ensure the credibility of the blockchain machine during use.
具体应用实例中,S7进一步包括:In specific application examples, S7 further includes:
S701,用户调用SDK进行对区块链节点进行上链操作时,首先通过GPS/北斗芯片驱动程序读取当前所在经纬度A并临时存储;S701: When the user invokes the SDK to perform the chaining operation on the blockchain node, first read the current latitude and longitude A through the GPS/Beidou chip driver and store it temporarily;
S702,然后调用存储芯片中已存储的主体信息中的地理位置并根据数字地图换算成对应的经纬度B;S702, then call the geographic location in the main body information stored in the storage chip and convert it into the corresponding latitude and longitude B according to the digital map;
S703,当前所在经纬度A与对应的经纬度B进行范围内匹配,若一致,用户可操作区块链机节点进行上链操作;若不一致,返回告警信息,区块链机节点不可操作。S703, the current latitude and longitude A and the corresponding latitude and longitude B are matched within the range. If they are the same, the user can operate the blockchain machine node to perform an on-chain operation; if they are inconsistent, an alarm message is returned, and the blockchain machine node is inoperable.
通过对经纬度信息的对照匹配,确保区块链机的真实使用位置与预设的使用位置相同,增强区块链机的可信度。Through the comparison and matching of the latitude and longitude information, it is ensured that the real use position of the blockchain machine is the same as the preset use position, and the credibility of the blockchain machine is enhanced.
方法实施例3Method Example 3
在方法实施例1或方法实施例2的基础上,进一步参见图1,本发明又一实施例提供的区块链数据接入认证方法,可进一步包括:On the basis of method embodiment 1 or method embodiment 2, and further referring to FIG. 1, the blockchain data access authentication method provided by another embodiment of the present invention may further include:
S8,区块链机节点在进行数据上链时,会将用户主体信息、地理位置作为要素进行上链,增加数据的物理属性。通过对上链数据增加其物理属性上链,在区块链机作为存证设备使用时,其数据的真实性可进一步得到确认。S8: When the blockchain machine node performs data uploading, it will upload the user's subject information and geographic location as elements to increase the physical attributes of the data. By adding physical attributes to the data on the chain, the authenticity of the data can be further confirmed when the blockchain machine is used as a storage device.
以下参照图2介绍本发明实施例提供的一种区块链机,在硬件层面,该区块链机包括存储器、微处理器、加密模块、GPS/北斗定位模块。其中,存储器可能包含内存,例如高速随机存取存储器(Random-Access Memory,RAM),也可能还包括非易失性存储器(Non-Volatile Memory,NVM),例如至少一个磁盘存储器等。当然,该区块链机还可以包括其他业务所需的硬件。本发明实施例的区块链机主要是指一类服务器,其可信的运行区块链网络,保证整个区块链网络中的所有节点都是可信的。The following describes a blockchain machine provided by an embodiment of the present invention with reference to FIG. 2. At the hardware level, the blockchain machine includes a memory, a microprocessor, an encryption module, and a GPS/Beidou positioning module. Among them, the memory may include memory, such as high-speed random access memory (Random-Access Memory, RAM), and may also include non-volatile memory (Non-Volatile Memory, NVM), such as at least one disk storage. Of course, the blockchain machine can also include hardware required by other businesses. The block chain machine in the embodiment of the present invention mainly refers to a type of server, which runs a block chain network credibly, ensuring that all nodes in the entire block chain network are credible.
处理器和存储器可以通过内部总线相互连接,该内部总线可以是工业标准体系结构(Industry Standard Architecture,ISA)总线、外设部件互联标准(Peripheral Component Interconnect,PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,EISA)总线等。其中总线可以分为地址总线、数据总线和控制总线等。为了便于表示,图2中仅用一个双箭头表示,但并不表示仅有一根总线或一种类型的总线。The processor and the memory can be connected to each other through an internal bus, which can be an industry standard architecture (ISA) bus, a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus, or an extended industry standard structure (Extended Industry). Standard Architecture, EISA) bus, etc. Among them, the bus can be divided into address bus, data bus and control bus. For ease of representation, only one double arrow is used to indicate in FIG. 2, but it does not mean that there is only one bus or one type of bus.
存储器,用于存放程序,具体地,程序可以包括程序代码,所述程序代码包括计算机操作指令,存储器可以包括内存和非易失性存储器,并向处理器提供指令和数据。The memory is used to store a program. Specifically, the program may include program code, where the program code includes computer operation instructions, and the memory may include memory and non-volatile memory, and provide instructions and data to the processor.
处理器从非易失性存储器中读取对应的计算机程序到内存中然后运行,在逻辑层面上形成内容推荐装置。处理器,执行存储器所存放的程序,并具体用于执行前文所述服务器作为执行主体时所执行的方法操作。The processor reads the corresponding computer program from the non-volatile memory to the memory and then runs it, forming a content recommendation device on a logical level. The processor executes the program stored in the memory, and is specifically configured to execute the method operation performed when the server is the execution subject described above.
上述如本发明实施例区块链数据接入认证方法可以应用于处理器中,或者由处理器实现。处理器可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各个步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器,包括中央处理器(Central Processing Unit,CPU)、网络处理器(Network Processor,NP)等,还可以是数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本发明实施例中公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本发明实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤,具体执行步骤参见方法实施例,在此不再赘述。The foregoing blockchain data access authentication method as in the embodiment of the present invention may be applied to a processor or implemented by the processor. The processor can be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method can be completed by an integrated logic circuit of hardware in the processor or instructions in the form of software. The above-mentioned processor may be a general-purpose processor, including a central processing unit (CPU), a network processor (Network Processor, NP), etc., or a digital signal processor (DSP), a dedicated integrated Circuit (Application Specific Integrated Circuit, ASIC), Field Programmable Gate Array (Field Programmable Gate Array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components. The methods, steps, and logical block diagrams disclosed in the embodiments of the present invention can be implemented or executed. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like. The steps of the method disclosed in combination with the embodiments of the present invention may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in a decoder. The software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers. The storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. For the specific execution steps, refer to the method embodiment, which will not be repeated here.
此外,本发明实施例还提出一种计算机可读存储介质,所述计算机可读存储介质上存储有区块链机接入认证程序,所述区块链数据接入认证程序被处理器执行时实现如上所述的区块链节点的连接方法的步骤。In addition, the embodiment of the present invention also provides a computer-readable storage medium, the computer-readable storage medium stores a blockchain machine access authentication program, when the blockchain data access authentication program is executed by a processor The steps of the method for connecting blockchain nodes as described above are realized.
本发明计算机可读存储介质具体实施方式与上述区块链数据接入认证方法 各实施例基本相同,在此不再赘述。The specific implementation of the computer-readable storage medium of the present invention is basically the same as the foregoing embodiments of the blockchain data access authentication method, and will not be repeated here.
应当理解,本文所述的示例性实施例是说明性的而非限制性的。尽管结合附图描述了本发明的一个或多个实施例,本领域普通技术人员应当理解,在不脱离通过所附权利要求所限定的本发明的精神和范围的情况下,可以做出各种形式和细节的改变。It should be understood that the exemplary embodiments described herein are illustrative and not restrictive. Although one or more embodiments of the present invention have been described with reference to the accompanying drawings, those of ordinary skill in the art should understand that they can make various modifications without departing from the spirit and scope of the present invention as defined by the appended claims. Changes in form and details.

Claims (10)

  1. 一种区块链数据接入认证方法,其特征在于,包括以下步骤:A blockchain data access authentication method is characterized in that it comprises the following steps:
    S1,用户在购买区块链机时,提供用户信息并经由审核通过后,将用户信息写入区块链机的芯片中;S1: When a user purchases a blockchain machine, he provides user information and after passing the audit, writes the user information into the chip of the blockchain machine;
    S2,将用户信息与具有唯一标识的硬件信息绑定并写入芯片中;S2: Bind user information with uniquely identified hardware information and write it into the chip;
    S3,将区块链机的节点信息的哈希值通过生产商所在的区块链机节点通知给即将要连接的区块链其他节点;S3: Notify the hash value of the node information of the blockchain machine to other nodes of the blockchain to be connected through the blockchain machine node where the producer is located;
    S4,用户启动区块链机时,系统检测该硬件信息,并与芯片中写入的硬件信息进行匹配,若不一致,区块链机无法启动或显示错误;S4: When the user starts the blockchain machine, the system detects the hardware information and matches it with the hardware information written in the chip. If it is inconsistent, the blockchain machine cannot be started or displays an error;
    S5,区块链机启动后,根据用户的选择以节点的形式接入不同类型的区块链;S5: After the blockchain machine is started, it will connect to different types of blockchains in the form of nodes according to the user's choice;
    S6,当区块链机以节点形式接入对应区块链时,区块链其它节点对区块链机节点进行验证,若有超过2/3节点验证签名通过,允许接入,否则,不允许接入。S6: When the blockchain machine is connected to the corresponding blockchain in the form of a node, other nodes of the blockchain will verify the node of the blockchain machine. If more than 2/3 of the nodes pass the verification signature, the access is allowed, otherwise, no Allow access.
  2. 如权利要求1所述的区块链数据接入认证方法,其特征在于,进一步包括:The blockchain data access authentication method according to claim 1, further comprising:
    S7,用户使用区块链机节点时,区块链机CPU读出GPS/北斗芯片中的经纬度与芯片中写入的位置信息进行匹配,若一致,用户正常使用区块链;若不一致,该区块链机节点不允许使用。S7: When the user uses the blockchain machine node, the CPU of the blockchain machine reads the latitude and longitude in the GPS/Beidou chip to match the position information written in the chip. If they are consistent, the user uses the blockchain normally; if they are inconsistent, the Blockchain machine nodes are not allowed to be used.
  3. 如权利要求2所述的区块链数据接入认证方法,其特征在于,所述S7进一步包括:The blockchain data access authentication method according to claim 2, wherein the S7 further comprises:
    S701,用户调用SDK进行对区块链节点进行上链操作时,首先通过GPS/北斗芯片驱动程序读取当前所在经纬度A并临时存储;S701: When the user invokes the SDK to perform the chaining operation on the blockchain node, first read the current latitude and longitude A through the GPS/Beidou chip driver and store it temporarily;
    S 702,然后调用存储芯片中已存储的主体信息中的地理位置并根据数字地图换算成对应的经纬度B;S702, then call the geographic location in the main body information stored in the storage chip and convert it into the corresponding latitude and longitude B according to the digital map;
    S703,当前所在经纬度A与对应的经纬度B进行范围内匹配,若一致,用户可操作区块链机节点进行上链操作;若不一致,返回告警信息,区块链机节点不可操作。S703, the current latitude and longitude A and the corresponding latitude and longitude B are matched within the range. If they are the same, the user can operate the blockchain machine node to perform an on-chain operation; if they are inconsistent, an alarm message is returned, and the blockchain machine node is inoperable.
  4. 如权利要求1至3任一所述的区块链数据接入认证方法,其特征在于,进一步包括:The blockchain data access authentication method according to any one of claims 1 to 3, further comprising:
    S8,区块链机节点在进行数据上链时,会将用户主体信息、地理位置作为要素进行上链,增加数据的物理属性。S8: When the blockchain machine node performs data uploading, it will upload the user's subject information and geographic location as elements to increase the physical attributes of the data.
  5. 如权利要求1至3任一所述的区块链数据接入认证方法,其特征在于,所述步骤S2中,具有唯一标识的硬件信息至少包括主板ID、CPU ID和BIOS编号。The blockchain data access authentication method according to any one of claims 1 to 3, wherein, in the step S2, the hardware information with a unique identifier includes at least a motherboard ID, a CPU ID, and a BIOS number.
  6. 如权利要求1至3任一所述的区块链数据接入认证方法,其特征在于,所述步骤S3中,所述区块链机节点信息包含写入芯片中的用户信息、硬件信息、节点ID和节点地址。The blockchain data access authentication method according to any one of claims 1 to 3, wherein in the step S3, the blockchain machine node information includes user information, hardware information, and Node ID and node address.
  7. 如权利要求1至3任一所述的区块链数据接入认证方法,其特征在于,所述步骤S5进一步包括:The blockchain data access authentication method according to any one of claims 1 to 3, wherein the step S5 further comprises:
    S501,区块链机启动后,根据配置文件,启动相应区块链的SDK和节点服务程序;S501: After the blockchain machine is started, start the SDK and node service program of the corresponding blockchain according to the configuration file;
    S502,节点服务程序根据配置去连接对应区块链中的其它节点。S502: The node service program connects to other nodes in the corresponding blockchain according to the configuration.
  8. 如权利要求1至3任一所述的区块链数据接入认证方法,其特征在于,所述步骤S6进一步包括:The blockchain data access authentication method according to any one of claims 1 to 3, wherein the step S6 further comprises:
    S601,区块链机节点根据配置连接区块链网络其它节点,并将节点信息通知其他节点;S601, the blockchain machine node connects to other nodes of the blockchain network according to the configuration, and informs other nodes of node information;
    S602,其他节点收到根据该区块链机节点信息后,根据S3中收到的节点信息进行匹配,若一致,验证通过后数字签名后返回;若不一致;验证失败返回。S602: After receiving the node information according to the blockchain machine, other nodes perform matching according to the node information received in S3. If they are consistent, the digital signature is returned after verification; if they are inconsistent, the verification fails and returns.
  9. 一种区块链机,其特征在于,所述区块链机包括存储器、微处理器、加 密模块、GPS/北斗定位模块和存储在所述存储器上并可在所述微处理器上运行的区块链数据接入认证程序,所述区块链数据接入认证程序被所述微处理器执行时实现如权利要求1至8中任一项所述的区块链机接入认证的步骤。A block chain machine, characterized in that, the block chain machine includes a memory, a microprocessor, an encryption module, a GPS/Beidou positioning module, and a device that is stored in the memory and can run on the microprocessor Blockchain data access authentication program, when the blockchain data access authentication program is executed by the microprocessor, the step of implementing the blockchain machine access authentication according to any one of claims 1 to 8 .
  10. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有区块链数据接入认证程序,所述区块链数据接入认证程序被处理器执行时实现如权利要求1至8中任一项所述的区块链数据接入认证的步骤。A computer-readable storage medium, characterized in that a blockchain data access authentication program is stored on the computer-readable storage medium, and the blockchain data access authentication program is executed by a processor as claimed in the claims The steps of blockchain data access authentication described in any one of 1 to 8.
PCT/CN2020/089926 2020-05-09 2020-05-13 Blockchain machine, blockchain data access authentication method, and computer-readable storage medium WO2021226854A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010389846.4 2020-05-09
CN202010389846.4A CN111586059B (en) 2020-05-09 2020-05-09 Block chain machine, block chain data access authentication method and computer readable storage medium

Publications (1)

Publication Number Publication Date
WO2021226854A1 true WO2021226854A1 (en) 2021-11-18

Family

ID=72125475

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/089926 WO2021226854A1 (en) 2020-05-09 2020-05-13 Blockchain machine, blockchain data access authentication method, and computer-readable storage medium

Country Status (2)

Country Link
CN (1) CN111586059B (en)
WO (1) WO2021226854A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112597547A (en) * 2020-12-29 2021-04-02 广东国腾量子科技有限公司 Decentralized credible authentication system based on block chain
CN112565303B (en) * 2020-12-30 2023-03-28 北京八分量信息科技有限公司 Method and device for performing authentication connection between block chain nodes and related product

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170257358A1 (en) * 2016-03-04 2017-09-07 ShoCard, Inc. Method and System for Authenticated Login Using Static or Dynamic Codes
CN108900507A (en) * 2018-06-29 2018-11-27 全链通有限公司 Block chain real name identification method and system
US20190036680A1 (en) * 2017-07-28 2019-01-31 Trusted Key Solutions Inc. System and method for blockchain-based user authentication based on a cryptographic challenge
CN109327457A (en) * 2018-11-09 2019-02-12 广州大学 A kind of internet of things equipment identity identifying method and system based on block chain

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10346826B2 (en) * 2015-07-28 2019-07-09 Wesley John Boudville Blockchain and deep links for mobile apps
US10587628B2 (en) * 2016-09-29 2020-03-10 Microsoft Technology Licensing, Llc Verifiable outsourced ledgers
CN106548345B (en) * 2016-12-07 2020-08-21 北京信任度科技有限公司 Method and system for realizing block chain private key protection based on key partitioning
CN108573381B (en) * 2017-03-09 2020-06-05 北京京东尚科信息技术有限公司 Data processing method and device
CN107958371A (en) * 2017-11-13 2018-04-24 深圳超级区块链信息技术有限公司 A kind of distributed block chain identity card
CN108200174B (en) * 2018-01-04 2019-10-25 成都理工大学 Based on the distributed mobile phone protecting platform of block chain and its implementation
CN108416589A (en) * 2018-03-08 2018-08-17 深圳前海微众银行股份有限公司 Connection method, system and the computer readable storage medium of block chain node
CN108737418B (en) * 2018-05-22 2020-09-15 飞天诚信科技股份有限公司 Identity authentication method and system based on block chain
CN108881253B (en) * 2018-06-29 2020-11-06 全链通有限公司 Block chain real name participation method and system
CN108876374B (en) * 2018-06-29 2020-10-16 全链通有限公司 Block chain network identity document authentication method and system
CN110177124B (en) * 2019-06-20 2022-02-25 深圳市迅雷网络技术有限公司 Identity authentication method based on block chain and related equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170257358A1 (en) * 2016-03-04 2017-09-07 ShoCard, Inc. Method and System for Authenticated Login Using Static or Dynamic Codes
US20190036680A1 (en) * 2017-07-28 2019-01-31 Trusted Key Solutions Inc. System and method for blockchain-based user authentication based on a cryptographic challenge
CN108900507A (en) * 2018-06-29 2018-11-27 全链通有限公司 Block chain real name identification method and system
CN109327457A (en) * 2018-11-09 2019-02-12 广州大学 A kind of internet of things equipment identity identifying method and system based on block chain

Also Published As

Publication number Publication date
CN111586059A (en) 2020-08-25
CN111586059B (en) 2021-04-16

Similar Documents

Publication Publication Date Title
US10754989B2 (en) Runtime self-correction for blockchain ledgers
JP6853364B2 (en) Systems and methods for implementing blockchain-based digital certificates
US11334439B2 (en) Checkpointing for increasing efficiency of a blockchain
US11310234B2 (en) Securing permissioned blockchain network from pseudospoofing network attacks
WO2020134942A1 (en) Identity verification method and system therefor
US11151236B2 (en) File verification database system
JP2023179743A (en) Script-based blockchain interaction
JP6965352B2 (en) Systems and methods for generating digital marks
CN110771120B (en) System and method for blockchain based authentication
WO2018233536A1 (en) Authentication method, and authentication data processing method and device based on blockchain
AU2020414467B2 (en) Partially-ordered blockchain
AU2017423496B2 (en) Secure token passing via blockchains
US11025430B2 (en) File provenance database system
US11366932B2 (en) Consensus method and data verification method, apparatus, and system of consortium blockchain
AU2021210206B2 (en) Index structure for blockchain ledger
US11139960B2 (en) File redaction database system
CN110753944A (en) System and method for blockchain based data management
WO2021226854A1 (en) Blockchain machine, blockchain data access authentication method, and computer-readable storage medium
CN113302610B (en) Trusted platform based on blockchain
US20210109776A1 (en) Free-riding node identification for blockchain
CN116583833A (en) Self-auditing blockchain
CN113491090B (en) Trusted platform based on blockchain
US11783342B1 (en) Blockchain blacklist anti-money laundering system (BBAMLS)
CN115001707B (en) Device authentication method based on block chain and related device
US11483132B2 (en) Generating and initiating pre-signed transaction requests for flexibly and efficiently implementing secure cryptographic key management

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20934930

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20934930

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 20934930

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 12/06/2023)

122 Ep: pct application non-entry in european phase

Ref document number: 20934930

Country of ref document: EP

Kind code of ref document: A1