WO2022001717A1 - 基于区块链的用户信息处理方法及系统 - Google Patents

基于区块链的用户信息处理方法及系统 Download PDF

Info

Publication number
WO2022001717A1
WO2022001717A1 PCT/CN2021/101192 CN2021101192W WO2022001717A1 WO 2022001717 A1 WO2022001717 A1 WO 2022001717A1 CN 2021101192 W CN2021101192 W CN 2021101192W WO 2022001717 A1 WO2022001717 A1 WO 2022001717A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
verification
user
user information
identity information
Prior art date
Application number
PCT/CN2021/101192
Other languages
English (en)
French (fr)
Inventor
白羽
Original Assignee
京东科技信息技术有限公司
京东科技控股股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东科技信息技术有限公司, 京东科技控股股份有限公司 filed Critical 京东科技信息技术有限公司
Priority to US18/003,856 priority Critical patent/US20230269103A1/en
Priority to JP2022581689A priority patent/JP2023533250A/ja
Priority to EP21833282.3A priority patent/EP4174689A4/en
Publication of WO2022001717A1 publication Critical patent/WO2022001717A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Definitions

  • the present disclosure generally relates to the technical field of blockchain, and more particularly to a method and system for processing user information based on blockchain.
  • the user information can be account name, account password, and mobile phone number.
  • the user wants to change the user information, the user needs to change the original user information to the new user information in each registered application program, which is complicated and inconvenient to change the user information.
  • the present disclosure provides a blockchain-based user information processing method, the method is applied to any application node in the blockchain, the blockchain includes a plurality of application nodes, and the method includes :
  • the user information change request carries the user's first identity information and the new user information to be changed
  • the user information of the user stored in the blockchain is modified based on the new user information.
  • the verification of the first identity information and the new user information is performed by a plurality of verification application nodes, including:
  • the new user information is verified through the verification application node.
  • the new user information includes a mobile phone number
  • the verification of the new user information through the verification application node includes:
  • the user information modification request further carries the original user information of the user, and the method further includes:
  • the user information of the user stored in the blockchain is modified based on the new user information, including:
  • the user information is modified based on the new user information.
  • the first identity information and the new user information are determined by means of verification, including:
  • the method further comprises:
  • the identity information verification node passes the third identity information, the third identity information and the user information are stored in the blockchain.
  • the present disclosure provides a blockchain-based user information processing system, the system includes a plurality of application nodes in the blockchain, wherein,
  • the response application node in the plurality of application nodes is configured to receive the user information modification request sent by the user terminal, and send the first identity information and the to-be-modified information to the plurality of verification application nodes in the plurality of application nodes new user information, the first identity information and the new user information are carried by the user information change request;
  • each of the verification application nodes configured to verify the first identity information and the new user information
  • the response application node is further configured to modify the user information of the user stored in the blockchain based on the new user information when the first identity information and the new user information are verified .
  • the verification application node is configured to send verification information to a user terminal corresponding to the mobile phone number in the case that the new user information includes a mobile phone number, and receive the information sent by the user terminal.
  • feedback information the feedback information is input by the user based on the verification information; and when the feedback information matches the verification information, it is determined that the new user information passes the verification; when the feedback information matches the verification information When the verification information does not match, it is determined that the new user information fails the verification.
  • the verification application node is configured to send to the response application node a verification result generated by verifying the first identity information and the new user information;
  • the response application node is configured to receive the verification results generated by each of the verification application nodes, and obtain multiple verification results; and when the multiple verification results satisfy a preset consistency condition, determine the first verification result.
  • the identity information and the new user information are verified.
  • the response application node is further configured to receive a user registration request sent by the user terminal, where the user registration request carries the user's third identity information and user information, and is configured to send the user registration request to the zone
  • the identity information verification node in the block chain sends the third identity information
  • the identity information verification node configured to verify the third identity information, and send a verification result to the response application node, the verification result being verified or not verified;
  • the responding application node is further configured to store the third identity information and the user information in the blockchain when the received verification result is that the verification is passed.
  • the user terminal is configured to generate a user public key and a user private key, and use the user private key to encrypt the user information and the third identity information, and encrypt the encrypted sending user information and the third identity information to the responding application node;
  • the response application node is configured to store the encrypted user information and the third identity information in the blockchain.
  • the present disclosure provides a blockchain-based user information processing device, the device is applied to any application node in the blockchain, the blockchain includes a plurality of application nodes, and the device includes :
  • a first receiving module configured to receive a user information modification request sent by the user terminal, where the user information modification request carries the user's first identity information and the new user information to be modified;
  • a verification module configured to verify the first identity information and the new user information through a plurality of verification application nodes, which are application nodes in the blockchain;
  • a modification module configured to modify the user information of the user stored in the blockchain based on the new user information when the first identity information and the new user information are verified.
  • the verification module includes:
  • a sending submodule configured to send the first identity information and the new user information to each verification application node in the blockchain
  • an acquisition submodule configured to acquire the second identity information of the user stored in the blockchain through each of the verification application nodes;
  • the first verification submodule is configured to verify the new user information through the verification application node when the first identity information and the second identity information are the same.
  • the first verification submodule is configured to send verification information to the user terminal corresponding to the mobile phone number through the verification application node when the new user information includes a mobile phone number, and Receive feedback information sent by the user terminal, the feedback information is input by the user based on the verification information; if the feedback information matches the verification information, it is determined that the new user information passes the verification; and if If the feedback information does not match the verification information, it is determined that the new user information fails the verification.
  • the device further comprises:
  • an obtaining module configured to obtain the user information of the user stored in the blockchain through a plurality of verification application nodes respectively when the user information modification request also carries the original user information of the user ;
  • the verification module is further configured to determine that the original user information has passed the verification when the original user information is the same as the user information;
  • the modification module is configured to modify the user information based on the new user information when the first identity information, the new user information and the original user information all pass the verification.
  • the verification module includes:
  • a second obtaining sub-module configured to obtain a verification result generated by each of the verification application nodes for verifying the first identity information and the new user information, and obtain a plurality of verification results
  • the determining submodule is configured to determine that the first identity information and the new user information pass the verification when the multiple verification results satisfy a preset consistency condition.
  • the device further comprises:
  • a second receiving module configured to receive a user registration request sent by the user terminal, where the user registration request carries the user's third identity information and user information;
  • a sending module configured to send the third identity information to an identity information verification node in the blockchain, so that the identity information verification node verifies the third identity information
  • a storage module configured to store the third identity information and the user information in the blockchain when the identity information verification node verifies the third identity information passes.
  • the present disclosure provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory communicate with each other through the communication bus;
  • a memory configured to store the computer program
  • the processor is configured to implement the blockchain-based user information processing method described in the present disclosure when executing the program stored in the memory.
  • the present disclosure provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the blockchain-based user information processing described in the present disclosure is implemented method.
  • the present disclosure provides a computer program product containing instructions that, when executed on a computer, cause the computer to execute the blockchain-based user information processing method described in the present disclosure.
  • the blockchain-based user information processing method and system provided by the present disclosure solve the problem of inconvenience in changing user information.
  • the present disclosure provides a blockchain-based user information processing method and system, which can receive a user information modification request sent by a user terminal, and the user information modification request carries the user's first identity information, the user information to be modified.
  • New user information ; verify the first identity information and the new user information through multiple verification application nodes respectively, and verify that the application node is an application node in the blockchain; if the first identity information and the new user information pass the verification , the user information of the user in the blockchain is changed based on the new user information.
  • the user information of the user in each application since the user information of the user in each application only needs to be changed once in the blockchain, the user information of the user in each application can be updated. Therefore, the user does not need to change the user information in each application separately, so that the user information change can be solved. inconvenient question.
  • FIG. 1 is a schematic structural diagram of a blockchain-based user information processing system provided by an embodiment of the present disclosure
  • FIG. 2 is a flowchart of a method for processing user information based on a blockchain provided by an embodiment of the present disclosure
  • FIG. 3 is a flowchart of another blockchain-based user information processing method provided by an embodiment of the present disclosure.
  • FIG. 4 is a flowchart of another blockchain-based user information processing method provided by an embodiment of the present disclosure.
  • FIG. 5 is a schematic structural diagram of a blockchain-based user information processing apparatus provided by an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
  • Embodiments of the present disclosure provide a blockchain-based user information processing system.
  • FIG. 1 it is a schematic structural diagram of a user information processing system provided by an embodiment of the present disclosure.
  • the blockchain 100 may include multiple application nodes (101, 102, 103, 104...), and the application nodes (101, 102, 103, 104...) are peer-to-peer, numbered 101, 102, 103, and 104 are only used as markers, and do not limit the order of each node.
  • Each application node (101, 102, 103, 104%) in the blockchain can be a server of each application.
  • application node 101 may be a server for application "takeout”
  • application node 102 may be a server for application "shopping”
  • application node 103 may be a server for application "calendar”.
  • the user information of the user can be stored in the blockchain.
  • the user information may be a mobile phone number, an account name, account password, and contact address used to log in to the application.
  • user information of users who use each application can be stored in the blockchain.
  • the user terminal may be a mobile phone, a tablet computer, a smart wearable device and other devices used by the user.
  • the process of the user registering the application program may include:
  • Step 201 the user terminal 210 sends a user registration request to the application node 220;
  • Step 202 the application node 220 sends the third identity information to the identity information verification node 230 in the blockchain;
  • Step 203 the identity information verification node 230 verifies the third identity information
  • Step 204 the identity information verification node 230 sends the verification result to the application node 220;
  • Step 205 if the verification result is passed verification, the application node 220 can store the third identity information and user information in the blockchain;
  • Step 206 if the verification result is that the verification fails, the application node 220 may send a prompt message that the third identity information is incorrect to the user terminal 210 .
  • the user registration request carries the user's third identity information and user information.
  • the user when a user wants to register an application, the user may perform a preset registration operation on the user terminal 210, and the preset registration operation may be to fill in the user's first registration page on the preset registration page of the application. After three-identity information and user information, click the preset submit icon; the preset registration operation may also be to input the command code indicating submission after filling in the user's third-identity information and user information on the preset registration page of the application.
  • the user terminal 210 may generate a user registration request, and then send the user registration request to the application node 220 corresponding to the application.
  • the identity information may be the user's name, ID number, an image containing the user's facial features, and the like.
  • the identity information used by the user when changing the user information is called the first identity information
  • the user's identity information stored in the blockchain is called the second identity information
  • the identity information sent when the user registers the application is called the first identity information.
  • third-party identity information is third-party identity information.
  • the first identity information, the second identity information, and the third identity information may be the same identity information, or may be different identity information.
  • the blockchain may further include an identity information verification node 230, and the identity information verification node 230 may store the identity information of each user.
  • the identity information verification node 230 may be a server of the national resident identity information query system.
  • the application node 220 may send the third identity information to the identity information verification node 230 in the blockchain.
  • the identity information verification node 230 may use a preconfigured face comparison algorithm in the blockchain to verify the face contained in the third identity information The features are compared with the facial features stored in the blockchain to determine whether the third identity information has passed the verification.
  • the process of verifying the name by the identity information verification node 230 is similar to the process of verifying the name by any electronic device in the related art, and details are not repeated here.
  • the process of verifying the ID card number by the identity information verification node 230 is similar to the process of verifying the ID card number by any electronic device in the related art, and will not be repeated here.
  • the identity information verification node 230 sends a verification result to the application node 220, wherein the verification result is passed verification, or, failed verification.
  • the application node 220 can also initiate verification of the user information, and the application node 220 can verify the third identity information and the user information after the user information is verified.
  • User information is stored in the blockchain.
  • the application node can receive the user's third identity information and user information sent by the user terminal, and then send the third identity information to the identity information verification node in the blockchain, so that the identity information verification node Verify the third identity information. If the identity information verification node verifies the third identity information, the application node can store the third identity information and the user information in the blockchain.
  • the user terminal can generate the user's public key and user's private key.
  • the timing for the user terminal to generate the user public key and the user private key may be various.
  • the user terminal may generate the user public key and the user private key after receiving the user information and the third identity information of the user; or, the user terminal may generate the user public key after the third identity information is verified. key and user private key.
  • the user terminal may randomly generate a pair of public key and private key according to a key generation algorithm, as the user's user public key and user private key, wherein the key generation algorithm may be an MD5 algorithm (Message-Digest Algorithm). Algorithm 5, information digest algorithm), RSA algorithm (Rivest-Shamir-Adleman algorithm); or, the user terminal can generate a pair of public key and private key according to the key generation algorithm and user information, as the user's user public key and user private key.
  • MD5 algorithm Message-Digest Algorithm
  • Algorithm 5 information digest algorithm
  • RSA algorithm Rasteret-Shamir-Adleman algorithm
  • the blockchain can write private information such as identity information and user information based on the user's private key and user's public key.
  • the application node may use the user's private key to sign the third identity information and user information, and the application node may then write the signature to the blockchain.
  • the user terminal may encrypt the new user information by using the user's private key, and send the encrypted new user information and the user public key to the application node.
  • the application node can use the received user public key to decrypt the user information of the user stored in the blockchain, and use the user public key to decrypt the encrypted new user information.
  • the user After the user completes the registration of the application, the user can log in to the application through the user terminal and user information.
  • the user wants to change a certain user information, he only needs to fill in the new user information once, and the user information of the user in each application can be changed through the blockchain. Accordingly, it is not necessary for the user to change the user information in each application, and the problem of inconvenience in changing the user information can be solved.
  • the embodiments of the present disclosure also describe the process of changing user information based on the blockchain. As shown in FIG. 3 , the process includes:
  • Step 301 receiving a user information modification request sent by a user terminal
  • Step 302 respectively verifying the first identity information and the new user information through a plurality of verification application nodes.
  • Step 303 If the first identity information and the new user information are verified, modify the user information of the user stored in the blockchain based on the new user information.
  • the user information modification request carries the user's first identity information and the new user information to be modified.
  • the user can perform a user information change operation on the user terminal during the use of any application program.
  • the user information change operation may be clicking a preset user information change icon, and the user information change operation may also be issuing a voice instruction to change the user information.
  • the user terminal may acquire the user's first identity information and the new user information to be modified. Then, the user terminal may generate a user information change request carrying the first identity information and the new user information, and then the user terminal may send the user information change request to the application node corresponding to the application.
  • the user can perform a user information change operation on the user terminal during the process of "shopping" using the application, and then the user terminal can display the information entry page so that the user can log in On this page, enter the identity information "Xiao Ming", "101010202002334567” and the new mobile phone number "55612346789".
  • the user terminal can generate a user information change request carrying the first identity information "Xiao Ming", “101010202002334567” and the new user information "55612346789", and send the user information change request to the application node corresponding to the application "Shopping".
  • the user may perform user information modification operations while using any application.
  • the application node corresponding to the application currently used by the user is called the response application node.
  • the responding application node may determine a plurality of validating application nodes among the plurality of application nodes included in the blockchain. Afterwards, the responding application node can verify the first identity information and the new user information through each verification application node respectively.
  • the verification application node can verify the first identity information and the new user information in various ways. In a feasible implementation, the verification application node can verify the first identity information first, and then verify the new user information. verify. In another feasible implementation manner, the verification application node may verify the new user information first, and then verify the first identity information. The specific verification process of the verification application node for the new user information and the first identity information will be described in detail later.
  • the validating application node may be any of the plurality of application nodes except the responding application node.
  • a responding application node can use any application node other than the responding application node as a validating application node.
  • the responding application node may also use a preset number of other application nodes as validating application nodes. The number of validating application nodes can be preset by the technician.
  • each verification application node may send a verification result indicating that the verification is passed to the responding application node when both the first identity information and the new user information are verified. If the first identity information or the new user information fails the verification, the verification application node may send a verification result indicating that the verification fails to the responding application node.
  • the responding application node may, after receiving the verification results sent by each verification application node, determine whether the first identity information and the new user information pass the verification based on the multiple received verification results.
  • the responding application node may change the user information of the user stored in the blockchain based on the new user information. If the first identity information or the new user information fails the verification, the responding application program node may send a prompt message of verification failure to the user terminal.
  • the application node can receive a user information change request sent by a user terminal, and the user information change request carries the user's first identity information and the new user information to be changed;
  • the verification application node verifies the first identity information and the new user information; if the first identity information and the new user information pass the verification, the user information of the user stored in the blockchain is modified based on the new user information.
  • the present disclosure takes the first identity information to be verified first, and then the new user information is verified as an example, to illustrate the verification process of verifying the application program node, as shown in FIG. 4, including the following steps:
  • Step 401 the response application node 410 sends the first identity information and the new user information to each verification application node 420 in the blockchain;
  • each verification application node 420 obtains the second identity information of the user stored in the blockchain
  • Step 403 the verification application node 420 judges whether the first identity information and the second identity information are the same;
  • Step 404 if the first identity information is the same as the second identity information, the verification application node 420 verifies the new user information;
  • Step 405 if the verification of the new user information is passed, the verification application node 420 sends a verification result indicating that the verification is passed to the responding application node 410;
  • Step 406 If the first identity information and the new user information pass the verification, the response application node 410 modifies the user information of the user stored in the blockchain based on the new user information.
  • the response application node 410 may send the first identity information and the new user information to each verification application node 420 in the blockchain.
  • each verification application node 420 may determine the identity information of the user whose user information is to be changed from the plurality of identity information stored in the blockchain to obtain the second identity information.
  • the responding application node 410 may also send the user identification of the user whose user information is to be changed to each validating application node 420, whereby the validating application node 420 may, according to the user identification, Among the multiple pieces of identity information stored in the chain, the second identity information is determined.
  • the step of verifying the application node 420 to determine whether the first identity information and the second identity information are the same may refer to the process of verifying the third identity information of the user by the identity information verification node in the above-mentioned user registration process, It will not be repeated here.
  • the verification application node 420 may perform step 404 . If the first identity information is not the same as the second identity information, the verification application node 420 may send a verification result that fails the verification.
  • the verification application node 420 verifies the new user information, wherein the new user information may include the mobile phone number, the account name used to log in the application, At least one of information such as account password and contact address.
  • the process of verifying the new user information by the verification application node 420 is also different, and the specific verification process will be described in detail later.
  • the verification application node 420 when the new user information fails the verification, the verification application node 420 sends a verification result to the responding application node 410 indicating that the verification failed.
  • the responding application node 410 may send the first identity information and the new user information to each validating application node 420 in the blockchain. Then, each verification application node 420 can obtain the second identity information of the user stored in the blockchain, and then determine whether the first identity information and the second identity information are the same. After that, each verification application node 420 can verify the new user information under the condition that the first identity information and the second identity information are the same. Since the new user information is verified after the first identity information is verified, on the one hand, it can be ensured that the modification of the user information is initiated by the user with the modification authority, and on the other hand, the confirmation of the new user information after passing the verification can be avoided. In the case of invalid user information changes, it is possible to reduce the data processing burden on the entire blockchain.
  • the user information modification request may also carry the original user information, and the responding application node 410 may send the original user information to each verification application node 420 .
  • Each verification application node 420 may acquire the user information of the user stored in the blockchain, and then each verification application node 420 may compare the original user information with the acquired user information.
  • the verification application node 420 may send a verification result indicating that the verification is passed to the response application node 410 under the condition that the first identity information, the new user information and the original user information all pass the verification.
  • This embodiment of the present disclosure does not specifically limit the order in which the verification application node verifies the first identity information, the new user information, and the original user information.
  • the embodiments of the present disclosure provide an implementation manner of verifying the application node to verify the new user information under corresponding circumstances, including:
  • the new user information includes a mobile phone number.
  • the verification application node can send verification information to the user terminal corresponding to the mobile phone number, and receive feedback information sent by the user terminal.
  • the feedback information is input by the user based on the verification information.
  • the verification information may be a short message containing verification characters, and correspondingly, the feedback information may be verification characters.
  • the verification information may be a short message containing a preset question, and correspondingly, the feedback information may be an answer to the preset question. Preset questions can be set and answered by the user while using the application.
  • the verification application node can determine whether the feedback information matches the verification information. If the feedback information matches the verification information, the verification application node can determine that the new user information has passed the verification; if the feedback information does not match the verification information, the verification application node It can be determined that the new user information has not passed the verification.
  • the verification application node can generate verification information, and then the verification application node can send the verification information to the user terminal corresponding to the mobile phone number.
  • the user terminal can output the received verification information so that the user can input feedback information based on the verification information. Afterwards, the user terminal can send feedback information to the verification application node.
  • the verification application node can determine whether the feedback information is the same as the verification characters contained in the verification information. If the verification characters contained in the feedback information and the verification information are the same, the verification application node can determine that the new user information has passed the verification; if the verification characters contained in the feedback information and verification information are not the same, the verification application node can determine that the new user information has not passed the verification verify.
  • the verification application node can generate the verification character "123456" according to the consensus algorithm, and send a short message containing the verification character to the user terminal corresponding to the mobile phone number. After receiving the short message, the user can fill in the verification character on the preset page in the application, and then the responding application node can send the verification character to the verification application node.
  • Verification application nodes can compare the received verification characters with the generated verification characters. If the two verification characters are the same, the verification application node can determine that the new user information has passed the verification; if the two verification characters are different, the verification application node can determine that the new user information has failed verification.
  • the verification application node can determine whether the feedback information is the same as the answer to the preset question stored in advance. If the feedback information is the same as the answer, the verification application node can determine that the new user information has passed the verification; if the feedback information is different from the answer, the verification application node can determine that the new user information has not passed the verification.
  • the new user information does not contain a mobile phone number.
  • the verification application node may send prompt information to the responding application node, and then the responding application node may send the prompt information to the user terminal.
  • the user terminal may display prompt information on a preset page of the application, so that the user can input feedback information after seeing the prompt information.
  • the response application node can receive the feedback information sent by the user terminal, and send the feedback information to the verification application node.
  • the verification application node can judge whether the feedback information matches the prompt information. If the feedback information matches the prompt information, the verification application node can determine that the new user information has passed the verification; if the feedback information does not match the prompt information, verify the The application node can determine that the new user information fails validation.
  • the prompt information is to prompt the user to re-enter new user information
  • the feedback information may be the re-entered user information.
  • the authentication application node can compare the re-entered user information with the new user information previously entered by the user. If the two user information is the same, the authentication application node can determine that the new user information is authenticated. If the two user information is not the same, the validating application node can determine that the new user information fails validation.
  • the specific processing procedure of the application node 220 for verifying user information is similar to the processing procedure for verifying the application node to verify the new user information, which will not be repeated here.
  • the responding application node can implement the above steps of verifying the new user information by verifying the application node.
  • the responding application node can determine whether the received multiple verification results satisfy the preset consistency condition, and if the multiple verification results satisfy the preset consistency condition If the consistency conditions are met, the responding application node can determine that the first identity information and the new user information have passed the verification; if multiple verification results do not meet the preset consistency conditions, the responding application node can determine that the first identity information and the new user information have passed the verification. Verification failed.
  • the preset consistency condition may be: the multiple verification results are all verified; the preset consistency condition may also be: the number of the multiple verification results passing the verification is greater than half of the total number of verification results.
  • the responding application node can change the user information of the user stored in the blockchain in various ways.
  • the responding application node can change the user information of the user stored in the blockchain to the new user information.
  • the application node may store the new user information and the first identity information in the blockchain.
  • the user information update of the user in each application program since the user information update of the user in each application program only needs to be changed once in the blockchain, it is not necessary for the user to change the user information in each application program separately. , so as to solve the problem of inconvenient change of user information.
  • the user information processing method provided by the embodiment of the present disclosure can quickly, conveniently, safely and effectively change the user information.
  • the system includes multiple application program nodes (101, 102, 103, 104%) in the blockchain 100.
  • the program nodes (101, 102, 103, 104%) may be servers for each application program.
  • application node 101 may be a server for application "takeout”
  • application node 102 may be a server for application "shopping”
  • application node 103 may be a server for application "calendar”. in,
  • the response application node in the plurality of application nodes is configured to receive the user information modification request sent by the user terminal, and send the first identity information and the to-be-modified information to the plurality of verification application nodes in the plurality of application nodes new user information, the first identity information and the new user information are carried by the user information change request;
  • each of the verification application nodes configured to verify the first identity information and the new user information
  • the response application node is further configured to modify the user information of the user stored in the blockchain based on the new user information when the first identity information and the new user information are verified .
  • the user when a user wants to change a certain user information, the user can perform a user information change operation on the user terminal during the use of any application program.
  • the user information change operation may be clicking a preset user information change icon, and the user information change operation may also be issuing a voice instruction to change the user information.
  • User information can be mobile phone number, account name, account password and contact address used to log in to the application.
  • the user terminal may acquire the user's first identity information and the new user information to be changed after detecting the user information modification operation. Then, the user terminal may generate a user information change request carrying the first identity information and the new user information, and then the user terminal may send the user information change request to the application node corresponding to the application.
  • the application node corresponding to the application is the response application node.
  • the first identity information may be the user's name, ID number, an image containing the user's facial features, and the like.
  • the first identity information and the new user information carried in the user information change request can be obtained, and among the multiple application nodes included in the blockchain, multiple verification application nodes can be determined. Then, the responding application node may send the first identity information and the new user information to each of the determined verification application nodes.
  • Each verification application node can verify the received first identity information and new user information to obtain a verification result.
  • the validating application node can then send validation results to the responding application node.
  • the specific verification process for verifying the application node to verify the first identity information and the new user information can be referred to in the above-mentioned blockchain-based user information processing method, the verification application node verifies the first identity information and the new user information. The processing process will not be repeated here.
  • the verification result sent by each verification application node can be received, and multiple verification results can be obtained. If the responding application node determines based on the received verification result that both the first identity information and the new user information are verified, the responding application node may change the user information of the user stored in the blockchain based on the new user information. If the response application node determines based on the received verification result that the first identity information or the new user information has not passed the verification, the response application node may send a verification failure prompt message to the user terminal.
  • the user information of the user in each application can be changed only by changing the new user information once in the blockchain, there is no need for the user to change the user information in each application separately. , so as to solve the problem of inconvenient change of user information.
  • the verification application node is configured to send verification information to a user terminal corresponding to the mobile phone number when the new user information includes a mobile phone number, and receive the information sent by the user terminal.
  • feedback information the feedback information is input by the user based on the verification information; and when the feedback information matches the verification information, it is determined that the new user information passes the verification; when the feedback information matches the verification information When the verification information does not match, it is determined that the new user information fails the verification.
  • the verification information may be a short message containing verification characters, and correspondingly, the feedback information may be verification characters.
  • the verification information may be a short message containing a preset question, and correspondingly, the feedback information may be an answer to the preset question. Preset questions can be set and answered by the user while using the application.
  • the verification application node may send verification information to the user terminal corresponding to the mobile phone number under the condition that the new user information includes the mobile phone number.
  • the user terminal can output the verification information after receiving the verification information, so that the user can input feedback information based on the verification information. Then, the user terminal can obtain the feedback information input by the user, and send the feedback information to the verification application node.
  • the verification application node can judge whether the feedback information matches the verification information after receiving the feedback information. If the feedback information matches the verification information, the verification application node can determine that the new user information has passed the verification; if the feedback information matches the verification information If it does not match, the validating application node can determine that the new user information fails validation.
  • the user terminal corresponding to the mobile phone number can receive the verification information sent by the verification application program node, and send the feedback information input by the user based on the verification information to the verification application program node.
  • the verification application node can verify the new user information conveniently and effectively by judging whether the feedback information input by the user matches the verification information sent.
  • the verification application node is configured to send to the response application node a verification result generated by verifying the first identity information and the new user information;
  • the response application node is configured to receive the verification results generated by each of the verification application nodes, and obtain multiple verification results; and when the multiple verification results satisfy a preset consistency condition, determine the first verification result.
  • the identity information and the new user information are verified.
  • each verification application node can verify the first identity information and the new user information to obtain a verification result.
  • Each validating application node can then send validation results to the responding application node.
  • the verification result may include the following four situations: 1) the first identity information passes the verification, and the new user information fails the verification; 2) the first identity information fails the verification, and the new user information passes the verification; 3) the first identity information and The new user information has passed the verification; 4) neither the first identity information nor the new user information has passed the verification.
  • the verification result is case 3) the verification is passed.
  • the verification results sent by each verification application node can be received, and multiple verification results can be obtained. Then, the responding application node can judge whether the multiple verification results satisfy the preset consistency condition.
  • the preset consistency condition may be: the multiple verification results are all verified; the preset consistency condition may also be: the number of the multiple verification results passing the verification is greater than half of the total number of verification results.
  • the response application node can determine that the first identity information and the new user information pass the verification when multiple verification results meet the preset consistency conditions, and determine the first identity when the multiple verification results do not meet the preset consistency conditions Information and new user information failed verification.
  • the first identity information and the new user information are verified by multiple verification application nodes, and then, when the verification results of the multiple verification application nodes satisfy the preset consistency condition, the response application node: It is determined that the first identity information and the new user information pass the verification. Thereby, the validity and reliability of verifying the first identity information and the new user information can be improved.
  • the response application node is further configured to receive a user registration request sent by the user terminal, where the user registration request carries the user's third identity information and user information, and is used to send the block to the block
  • the identity information verification node in the chain sends the third identity information
  • the identity information verification node configured to verify the third identity information, and send a verification result to the response application node, where the verification result is verified or not verified;
  • the response application node is further configured to store the third identity information and the user information in the blockchain when the received verification result is that the verification is passed.
  • the user when a user wants to register an application, the user may perform a preset registration operation on the user terminal, and the preset registration operation may be to fill in the user's third After entering the identity information and user information, click the preset submit icon; the preset registration operation may also be to input the command code indicating submission after filling in the user's third identity information and user information on the preset registration page of the application.
  • the user terminal may generate a user registration request carrying the third identity information and user information in response to the preset registration operation, and then the user terminal may send the user registration request to the application node corresponding to the application.
  • the application node corresponding to the application is the response application node.
  • the third identity information can be sent to the identity information verification node in the blockchain.
  • Each identity information verification node can verify the third identity information after receiving the third identity information, and obtain the verification result of the third identity information.
  • the verification result is that the third identity information passes the verification or the third identity information fails. verify. Then, the identity verification node can send the verification result to the responding application node.
  • the application node In response to the application node, it can receive the verification results sent by multiple identity information verification nodes, and obtain multiple verification results. Then, the responding application node can determine whether the multiple verification results are all verified by the third identity information. If multiple verification results are that the third identity information passes the verification, the responding application node can store the third identity information and user information in the blockchain. If the third identity information contained in the multiple verification results fails the verification, the responding application program node may send a prompt message that the verification of the identity information fails to the user terminal.
  • the user terminal in response to the preset registration operation, may send a user registration request to the response application node, and then the response application node may send the third identity information of the user to be registered to the plurality of identity information verification nodes .
  • each identity information verification node can verify the third identity information, and send the verification result to the responding application node.
  • the responding application node can store the third identity information and user information in the blockchain when the multiple verification results are all verified, thereby completing the user registration.
  • the user terminal is configured to generate a user public key and a user private key, encrypt the user information and the third identity information by using the user private key, and encrypt the encrypted sending user information and the third identity information to the responding application node;
  • the response application node is used to store the encrypted user information and the third identity information in the blockchain.
  • the user terminal may generate a user public key and a user private key in response to a preset registration operation. Then, the user terminal can use the user private key to encrypt the user information and the third identity information, and then the user terminal can send the encrypted user information and the third identity information to the response application node.
  • the response application node can store the encrypted response application node in the blockchain when the received multiple verification results are all verified.
  • the user terminal can use the generated user public key and user private key to encrypt the user information and the third identity information, and then send the encrypted user information and the third identity information to the response application node, In order for the responding application node to store the encrypted response application node in the blockchain.
  • the storage security of the user information and the third identity information can be improved, and the user's private information can be protected.
  • the present disclosure also provides a blockchain-based user information processing device, the device is applied to any application node in the blockchain, and the blockchain includes multiple application nodes, such as As shown in Figure 5, the device includes:
  • the first receiving module 510 is configured to receive a user information change request sent by the user terminal, where the user information change request carries the user's first identity information and the new user information to be changed;
  • a verification module 520 configured to verify the first identity information and the new user information through a plurality of verification application nodes, which are application nodes in the blockchain;
  • the modification module 530 is configured to modify the user information of the user stored in the blockchain based on the new user information when the first identity information and the new user information are verified.
  • the verification module includes:
  • a sending submodule configured to send the first identity information and the new user information to each verification application node in the blockchain
  • an acquisition submodule configured to acquire the second identity information of the user stored in the blockchain through each of the verification application nodes;
  • the first verification submodule is configured to verify the new user information through the verification application node when the first identity information and the second identity information are the same.
  • the first verification sub-module is configured to send verification information to the user terminal corresponding to the mobile phone number through the verification application node when the new user information includes a mobile phone number, and Receive feedback information sent by the user terminal, where the feedback information is input by the user based on the verification information; if the feedback information matches the verification information, it is determined that the new user information passes the verification; If the feedback information does not match the verification information, it is determined that the new user information fails the verification.
  • the device further comprises:
  • an obtaining module configured to obtain the user information of the user stored in the blockchain through a plurality of verification application nodes respectively when the user information modification request also carries the original user information of the user ;
  • the verification module is further configured to determine that the original user information has passed the verification when the original user information is the same as the user information;
  • the modification module is configured to modify the user information based on the new user information when the first identity information, the new user information and the original user information all pass the verification.
  • the verification module includes:
  • a second obtaining sub-module configured to obtain a verification result generated by each of the verification application nodes for verifying the first identity information and the new user information, and obtain a plurality of verification results
  • the determining submodule is configured to determine that the first identity information and the new user information pass the verification when the multiple verification results satisfy a preset consistency condition.
  • the device further comprises:
  • a second receiving module configured to receive a user registration request sent by the user terminal, where the user registration request carries the user's third identity information and user information;
  • a sending module configured to send the third identity information to an identity information verification node in the blockchain, so that the identity information verification node verifies the third identity information
  • a storage module configured to store the third identity information and the user information in the blockchain when the identity information verification node verifies the third identity information passes.
  • the present disclosure provides a blockchain-based user information processing device that can receive a user information modification request sent by a user terminal, where the user information modification request carries the user's first identity information, the new user to be modified information; verify the first identity information and the new user information through multiple verification application nodes respectively, and verify that the application node is an application node in the blockchain; if the first identity information and the new user information pass the verification, then The user information of the user in the blockchain is changed based on the new user information.
  • the user information of the user in each application since the user information of the user in each application only needs to be changed once in the blockchain, the user information of the user in each application can be updated. Therefore, the user does not need to change the user information in each application separately, so that the user information change can be solved. inconvenient question.
  • the present disclosure also provides an electronic device, as shown in FIG. 6 , including a processor 601 , a communication interface 602 , a memory 603 and a communication bus 604 , wherein the processor 601 , the communication interface 602 , and the memory 603 communicate through The bus 604 completes the communication with each other,
  • memory 603, configured to store computer programs
  • the processor 601 is configured to implement the blockchain-based user information processing method of the present disclosure when executing the program stored in the memory 603 .
  • the communication bus mentioned in the above electronic device may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an Extended Industry Standard Architecture (Extended Industry Standard Architecture, EISA) bus or the like.
  • PCI peripheral component interconnect standard
  • EISA Extended Industry Standard Architecture
  • the communication bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in the figure, but it does not mean that there is only one bus or one type of bus.
  • the communication interface is used for communication between the above electronic device and other devices.
  • the memory may include random access memory (Random Access Memory, RAM), and may also include non-volatile memory (Non-Volatile Memory, NVM), such as at least one disk storage.
  • RAM Random Access Memory
  • NVM non-Volatile Memory
  • the memory may also be at least one storage device located remotely from the aforementioned processor.
  • the above-mentioned processor can be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; it can also be a digital signal processor (Digital Signal processor) Processing, DSP), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • CPU Central Processing Unit
  • NP Network Processor
  • DSP Digital Signal processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • the present disclosure also provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by the processor, the blockchain-based user information processing method of the present disclosure is implemented.
  • the present disclosure also provides a computer program product comprising instructions that, when executed on a computer, cause the computer to execute the blockchain-based user information processing method of the present disclosure.
  • the computer may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on a computer, the procedures or functions described in accordance with the embodiments of the present disclosure are produced in whole or in part.
  • the computer may be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server or data center Transmission to another website site, computer, server, or data center is by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media.
  • the usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Telephonic Communication Services (AREA)

Abstract

公开了基于区块链的用户信息处理方法及系统。所述方法应用于区块链中的任一应用程序节点,所述区块链包括多个应用程序节点,所述方法包括:接收用户终端发送的用户信息更改请求,所述用户信息更改请求携带有用户的第一身份信息、待更改的新用户信息;分别通过多个验证应用程序节点,对所述第一身份信息和所述新用户信息进行验证,所述验证应用程序节点为所述区块链中的应用程序节点;以及如果所述第一身份信息和所述新用户信息通过验证,则基于所述新用户信息对所述区块链中存储的所述用户的用户信息进行更改。

Description

基于区块链的用户信息处理方法及系统
相关申请的引用
本公开要求于2020年6月30日向中华人民共和国国家知识产权局提交的申请号为202010619447.2,发明名称为“一种基于区块链的用户信息处理方法及系统”的发明专利申请的全部权益,并通过引用的方式将其全部内容并入本公开中。
领域
本公开大体上涉及区块链技术领域,更具体地涉及基于区块链的用户信息处理方法及系统。
背景
随着互联网的发展,用户可以使用同一用户信息登录多个应用程序,用户信息可以是账号名称、账号密码和手机号码等。然而,当用户想要更改用户信息时,用户需要分别在每个注册过的应用程序中将原用户信息更改为新用户信息,操作复杂,导致用户信息更改不方便。
概述
第一方面,本公开提供了基于区块链的用户信息处理方法,所述方法应用于区块链中的任一应用程序节点,所述区块链包括多个应用程序节点,所述方法包括:
接收用户终端发送的用户信息更改请求,所述用户信息更改请求携带有用户的第一身份信息、待更改的新用户信息;
分别通过多个验证应用程序节点,对所述第一身份信息和所述新用户信息进行验证,所述验证应用程序节点为所述区块链中的应用程序节点;以及
如果所述第一身份信息和所述新用户信息通过验证,则基于所述新用户信息对所述区块链中存储的所述用户的用户信息进行更改。
在某些实施方案中,所述分别通过多个验证应用程序节点,对所 述第一身份信息和所述新用户信息进行验证,包括:
向所述区块链中的每个验证应用程序节点发送所述第一身份信息和所述新用户信息;
通过每个所述验证应用程序节点,获取所述区块链中存储的所述用户的第二身份信息;以及
如果所述第一身份信息和所述第二身份信息相同,则通过该验证应用程序节点对所述新用户信息进行验证。
在某些实施方案中,所述新用户信息包括手机号码,所述通过该验证应用程序节点对所述新用户信息进行验证,包括:
通过该验证应用程序节点,向所述手机号码对应的用户终端发送验证信息,并接收所述用户终端发送的反馈信息,所述反馈信息由所述用户基于所述验证信息输入;
如果所述反馈信息与所述验证信息相匹配,则确定所述新用户信息通过验证;以及
如果所述反馈信息与所述验证信息不匹配,则确定所述新用户信息未通过验证。
在某些实施方案中,所述用户信息更改请求还携带有所述用户的原用户信息,所述方法还包括:
分别通过多个验证应用程序节点,获取所述区块链中存储的所述用户的用户信息;
如果所述原用户信息与所述用户信息相同,则确定所述原用户信息通过验证;以及
所述如果所述第一身份信息和所述新用户信息通过验证,则基于所述新用户信息对所述区块链中存储的所述用户的用户信息进行更改,包括:
如果所述第一身份信息、所述新用户信息和所述原用户信息均通过验证,则基于所述新用户信息对所述用户信息进行更改。
在某些实施方案中,所述第一身份信息和所述新用户信息通过验证的确定方式,包括:
获取每个所述验证应用程序节点验证所述第一身份信息和所述新 用户信息生成的验证结果,得到多个验证结果;以及
如果所述多个验证结果满足预设一致性条件,则确定所述第一身份信息和所述新用户信息通过验证。
在某些实施方案中,所述方法还包括:
接收所述用户终端发送的用户注册请求,所述用户注册请求携带有用户的第三身份信息和用户信息;
向所述区块链中的身份信息验证节点发送所述第三身份信息,以使所述身份信息验证节点对所述第三身份信息进行验证;以及
如果所述身份信息验证节点验证通过所述第三身份信息,则将所述第三身份信息和所述用户信息存储至所述区块链中。
第二方面,本公开提供了基于区块链的用户信息处理系统,所述系统包括区块链中的多个应用程序节点,其中,
所述多个应用程序节点中的响应应用程序节点,配置为接收用户终端发送的用户信息更改请求,向所述多个应用程序节点中的多个验证应用程序节点发送第一身份信息和待更改的新用户信息,所述第一身份信息和所述新用户信息由所述用户信息更改请求携带;
每个所述验证应用程序节点,配置为对所述第一身份信息和所述新用户信息进行验证;以及
所述响应应用程序节点,还配置为在所述第一身份信息和所述新用户信息通过验证时,基于所述新用户信息对所述区块链中存储的所述用户的用户信息进行更改。
在某些实施方案中,所述验证应用程序节点,配置为在所述新用户信息包括手机号码的情况下,向所述手机号码对应的用户终端发送验证信息,并接收所述用户终端发送的反馈信息,所述反馈信息由所述用户基于所述验证信息输入;并当所述反馈信息与所述验证信息相匹配时,确定所述新用户信息通过验证;当所述反馈信息与所述验证信息不匹配时,确定所述新用户信息未通过验证。
在某些实施方案中,所述验证应用程序节点,配置为向所述响应应用程序节点发送验证所述第一身份信息和所述新用户信息生成的验证结果;以及
所述响应应用程序节点,配置为接收每个所述验证应用程序节点生成的验证结果,得到多个验证结果;并当所述多个验证结果满足预设一致性条件时,确定所述第一身份信息和所述新用户信息通过验证。
在某些实施方案中,所述响应应用程序节点,还配置为接收用户终端发送的用户注册请求,所述用户注册请求携带有用户的第三身份信息和用户信息,并配置为向所述区块链中的身份信息验证节点发送所述第三身份信息;
所述身份信息验证节点,配置为对所述第三身份信息进行验证,并向所述响应应用程序节点发送验证结果,所述验证结果为通过验证或未通过验证;以及
所述响应应用程序节点,还配置为当接收到的验证结果为通过验证时,将所述第三身份信息和所述用户信息存储至所述区块链中。
在某些实施方案中,所述用户终端,配置为生成用户公钥和用户私钥,并采用所述用户私钥对所述用户信息和所述第三身份信息进行加密,并将加密后的用户信息和所述第三身份信息发送至所述响应应用程序节点;以及
所述响应应用程序节点,配置为将加密后的用户信息和第三身份信息存储至区块链中。
第三方面,本公开提供了基于区块链的用户信息处理装置,所述装置应用于区块链中的任一应用程序节点,所述区块链包括多个应用程序节点,所述装置包括:
第一接收模块,配置为接收用户终端发送的用户信息更改请求,所述用户信息更改请求携带有用户的第一身份信息、待更改的新用户信息;
验证模块,配置为分别通过多个验证应用程序节点,对所述第一身份信息和所述新用户信息进行验证,所述验证应用程序节点为所述区块链中的应用程序节点;以及
更改模块,配置为当所述第一身份信息和所述新用户信息通过验证时,则基于所述新用户信息对所述区块链中存储的所述用户的用户信息进行更改。
在某些实施方案中,所述验证模块包括:
发送子模块,配置为向所述区块链中的每个验证应用程序节点发送所述第一身份信息和所述新用户信息;
获取子模块,配置为通过每个所述验证应用程序节点,获取所述区块链中存储的所述用户的第二身份信息;以及
第一验证子模块,配置为当所述第一身份信息和所述第二身份信息相同时,通过该验证应用程序节点对所述新用户信息进行验证。
在某些实施方案中,所述第一验证子模块配置为在所述新用户信息包括手机号码的情况下,通过该验证应用程序节点,向所述手机号码对应的用户终端发送验证信息,并接收所述用户终端发送的反馈信息,所述反馈信息由所述用户基于所述验证信息输入;如果所述反馈信息与所述验证信息相匹配,则确定所述新用户信息通过验证;以及如果所述反馈信息与所述验证信息不匹配,则确定所述新用户信息未通过验证。
在某些实施方案中,所述装置还包括:
获取模块,配置为在所述用户信息更改请求还携带有所述用户的原用户信息的情况下,分别通过多个验证应用程序节点,获取所述区块链中存储的所述用户的用户信息;
所述验证模块,还配置为当所述原用户信息与所述用户信息相同时,确定所述原用户信息通过验证;以及
所述更改模块,配置为当所述第一身份信息、所述新用户信息和所述原用户信息均通过验证时,基于所述新用户信息对所述用户信息进行更改。
在某些实施方案中,验证模块包括:
第二获取子模块,配置为获取每个所述验证应用程序节点验证所述第一身份信息和所述新用户信息生成的验证结果,得到多个验证结果;以及
确定子模块,配置为当所述多个验证结果满足预设一致性条件时,确定所述第一身份信息和所述新用户信息通过验证。
在某些实施方案中,所述装置还包括:
第二接收模块,配置为接收所述用户终端发送的用户注册请求,所述用户注册请求携带有用户的第三身份信息和用户信息;
发送模块,配置为向所述区块链中的身份信息验证节点发送所述第三身份信息,以使所述身份信息验证节点对所述第三身份信息进行验证;以及
存储模块,配置为当所述身份信息验证节点验证通过所述第三身份信息时,将所述第三身份信息和所述用户信息存储至所述区块链中。
第四方面,本公开提供了电子设备,包括处理器、通信接口、存储器和通信总线,其中,处理器、通信接口、存储器通过通信总线完成相互间的通信;
存储器,配置为存放计算机程序;
处理器,配置为执行存储器上所存放的程序时,实现本公开所述的基于区块链的用户信息处理方法。
第五方面,本公开提供了计算机可读存储介质,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现本公开所述的基于区块链的用户信息处理方法。
第六方面,本公开提供了包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行本公开所述的基于区块链的用户信息处理方法。
在某些实施方案中,本公开提供的基于区块链的用户信息处理方法及系统解决了用户信息更改不方便的问题。
在某些实施方案中,本公开提供了基于区块链的用户信息处理方法及系统,可以接收用户终端发送的用户信息更改请求,用户信息更改请求携带有用户的第一身份信息、待更改的新用户信息;分别通过多个验证应用程序节点,对第一身份信息和新用户信息进行验证,验证应用程序节点为区块链中的应用程序节点;如果第一身份信息和新用户信息通过验证,则基于新用户信息对区块链中用户的用户信息进行更改。
由于只需在区块链中更改一次新用户信息,即可实现各应用程序中该用户的用户信息更新,因此,无需用户分别在每个应用程序中进 行用户信息更改,从而能够解决用户信息更改不方便的问题。
当然,实施本公开的任一产品或方法并不一定需要同时达到以上所述的所有优点。
附图简要说明
为了更清楚地说明本公开的技术方案,下面将对本公开所需要使用的附图作简单地介绍,显而易见地,对于本领域普通技术人员而言,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本公开一实施例提供的基于区块链的用户信息处理系统的结构示意图;
图2为本公开一实施例提供的基于区块链的用户信息处理方法的流程图;
图3为本公开一实施例提供的另一基于区块链的用户信息处理方法的流程图;
图4为本公开一实施例提供的另一基于区块链的用户信息处理方法的流程图;
图5为本公开一实施例提供的基于区块链的用户信息处理装置的结构示意图;以及
图6为本公开一实施例提供的电子设备的结构示意图。
详述
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
本公开实施例提供了基于区块链的用户信息处理系统。如图1所示,为本公开实施例提供的用户信息处理系统的架构示意图。其中,区块链100可以包括多个应用程序节点(101、102、103、104……),各 应用程序节点(101、102、103、104……)之间是对等的,编号101、102、103、104仅作为标记使用,并不对各节点顺序进行限定。
区块链中的各应用程序节点(101、102、103、104……)可以是各应用程序的服务器。在某些实施方案中,应用程序节点101可以是应用程序“外卖”的服务器,应用程序节点102可以是应用程序“购物”的服务器,应用程序节点103可以是应用程序“日程”的服务器。
在用户注册某一应用程序之后,区块链中可以存储有该用户的用户信息。其中,用户信息可以是手机号码、登录应用程序所使用的账号名称、账号密码和联系地址等。由此,区块链中可以存储有使用各应用程序的用户的用户信息。后续,用户可以通过用户终端、同一用户信息,登录各应用程序。其中,用户终端可以是用户使用的手机、平板电脑和智能穿戴式设备等设备。
下面将结合具体实施方式,对用户注册应用程序的过程进行说明,如图2所示,用户注册应用程序的过程可以包括:
步骤201、用户终端210向应用程序节点220发送用户注册请求;
步骤202、应用程序节点220向区块链中的身份信息验证节点230发送第三身份信息;
步骤203、身份信息验证节点230对第三身份信息进行验证;
步骤204、身份信息验证节点230向应用程序节点220发送验证结果;
步骤205、如果验证结果为通过验证,则应用程序节点220可以将第三身份信息和用户信息存储至区块链中;以及
步骤206、如果验证结果为未通过验证,则应用程序节点220可以向用户终端210发送第三身份信息有误的提示信息。
在某些实施方案中,用户注册请求携带有用户的第三身份信息和用户信息。
在某些实施方案中,当用户想要注册某一应用程序时,该用户可以对用户终端210执行预设注册操作,预设注册操作可以是在该应用程序的预设注册页面填写用户的第三身份信息和用户信息后,点击预设的提交图标;预设注册操作也可以是在该应用程序的预设注册页面 填写用户的第三身份信息和用户信息后,输入表示提交的命令代码。
响应于预设注册操作,用户终端210可以生成用户注册请求,再向该应用程序对应的应用程序节点220发送用户注册请求。
在某些实施方案中,身份信息可以是用户的姓名、身份证号码、包含用户人脸特征的图像等。为了便于区分,将用户更改用户信息时使用的身份信息称为第一身份信息,将区块链中存储的用户的身份信息称为第二身份信息,将用户注册应用程序时发送的身份信息称为第三身份信息。第一身份信息、第二身份信息和第三身份信息可以为相同的身份信息,也可以为不同的身份信息。
在某些实施方案中,区块链还可以包含身份信息验证节点230,身份信息验证节点230可以存储有各用户的身份信息。身份信息验证节点230可以是全国居民身份信息查询系统的服务器。
应用程序节点220可以在接收到用户注册请求后,向区块链中的身份信息验证节点230发送第三身份信息。
在某些实施方案中,如果第三身份信息包括包含用户人脸特征的图像,身份信息验证节点230可以通过区块链中预先配置的人脸比对算法,对第三身份信息包含的人脸特征与区块链中存储的各人脸特征进行比对,从而判断第三身份信息是否通过验证。
如果第三身份信息包括姓名,身份信息验证节点230验证姓名的过程与相关技术中任一电子设备对姓名进行验证的过程类似,此处不再赘述。
类似的,如果第三身份信息包括身份证号码,身份信息验证节点230验证身份证号码的过程与相关技术中任一电子设备对身份证号码进行验证的过程类似,此处不再赘述。
在某些实施方案中,身份信息验证节点230向应用程序节点220发送验证结果,其中,验证结果为通过验证,或,未通过验证。
在某些实施方案中,身份信息验证节点230验证通过第三身份信息后,应用程序节点220还可以对用户信息发起验证,应用程序节点220可以在用户信息通过验证后,将第三身份信息和用户信息存储至区块链中。
应用程序节点220验证用户信息的具体处理过程后续会进行详细说明。
在某些实施方案中,应用程序节点可以接收用户终端发送的用户的第三身份信息和用户信息,然后,向区块链中的身份信息验证节点发送第三身份信息,以使身份信息验证节点对第三身份信息进行验证。如果身份信息验证节点验证通过第三身份信息,则应用程序节点可以将第三身份信息和用户信息存储至区块链中。
由此,一方面,通过将用户的第三身份信息和用户信息打包存储至区块链中,可以实现在注册区块链所包含的某一应用程序后,用户即可使用同一用户信息登录区块链包含的其他应用程序,方便用户快捷的注册和使用各应用程序。另一方面,便于后续基于区块链实现用户信息更改。
在某些实施方案中,由于涉及到在区块链中保存用户的身份信息和用户信息等用户的私密信息,因此,为进一步提高信息安全性,用户终端可以生成用户公钥和用户私钥。
在注册过程中,用户终端生成用户公钥和用户私钥的时机可以是多种多样的。在某些实施方案中,用户终端可以在接收到用户的用户信息和第三身份信息后,生成用户公钥和用户私钥;或者,用户终端可以在第三身份信息经过验证后,生成用户公钥和用户私钥。
用户终端生成用户公钥和用户私钥的方式也可以是多种多样的。在某些实施方案中,用户终端可以根据密钥生成算法随机生成一对公钥和私钥,作为用户的用户公钥和用户私钥,其中,密钥生成算法可以是MD5算法(Message-Digest Algorithm 5,信息摘要算法)、RSA算法(Rivest-Shamir-Adleman algorithm);或者,用户终端可以根据密钥生成算法和用户信息生成一对公钥和私钥,作为用户的用户公钥和用户私钥。
在用户使用应用程序的过程中,可以基于用户私钥和用户公钥进行身份信息和用户信息等私密信息的区块链写入。
在某些实施方案中,应用程序节点可以使用用户私钥对第三身份信息及用户信息进行签名,然后,应用程序节点可以将签名写入区块 链。
后续,在更改用户信息时,用户终端可以采用用户私钥对新用户信息进行加密处理,向应用程序节点发送加密后的新用户信息和用户公钥。应用程序节点可以采用接收到的用户公钥对存储于区块链中的该用户的用户信息进行解密,并且,采用用户公钥对加密后的新用户信息进行解密。
在用户完成应用程序的注册之后,用户可以通过用户终端、用户信息登录应用程序。在使用应用程序的过程中,如果用户想要更改某一用户信息,仅需填写一次新用户信息,即可通过区块链实现更改各应用程序中该用户的用户信息。由此,无需用户分别在每个应用程序中进行用户信息更改,能够解决用户信息更改不方便的问题。
本公开实施例还对基于区块链的用户信息更改过程进行了说明,如图3所示,处理过程包括:
步骤301、接收用户终端发送的用户信息更改请求;
步骤302、分别通过多个验证应用程序节点,对第一身份信息和新用户信息进行验证;以及
步骤303、如果第一身份信息和新用户信息通过验证,则基于新用户信息对区块链中存储的用户的用户信息进行更改。
在某些实施方案中,用户信息更改请求携带有用户的第一身份信息、待更改的新用户信息。
在某些实施方案中,如果用户想要更改某一用户信息,用户可以在使用任一应用程序的过程中对用户终端执行用户信息更改操作。用户信息更改操作可以是点击预设的用户信息更改图标,用户信息更改操作也可以是发出更改用户信息的语音指令。在检测到用户信息更改操作后,用户终端可以获取用户的第一身份信息和待更改的新用户信息。然后,用户终端可以生成携带有第一身份信息和新用户信息的用户信息更改请求,之后,用户终端可以向该应用程序对应的应用程序节点发送用户信息更改请求。
在某些实施方案中,如果用户想要更改手机号码,用户可以在使用应用程序“购物”的过程中,对用户终端执行用户信息更改操作, 然后,用户终端可以显示信息录入页面,以便用户在该页面中输入身份信息“小明”、“101010202002334567”和新手机号码“55612346789”。之后,用户终端可以生成携带有第一身份信息“小明”、“101010202002334567”和新用户信息“55612346789”的用户信息更改请求,向应用程序“购物”对应的应用程序节点发送用户信息更改请求。
在某些实施方案中,用户可以在使用任一应用程序的过程中,执行用户信息更改操作。为了便于区分,将用户当前使用应用程序对应的应用程序节点称为响应应用程序节点。
在某些实施方案中,接收到用户信息更改请求后,响应应用程序节点可以在区块链包含的多个应用程序节点中,确定多个验证应用程序节点。之后,响应应用程序节点可以分别通过每个验证应用程序节点,对第一身份信息和新用户信息进行验证。
验证应用程序节点可以通过多种方式对第一身份信息和新用户信息进行验证,在一种可行的实现方式中,验证应用程序节点可以先对第一身份信息进行验证,再对新用户信息进行验证。在另一种可行的实现方式中,验证应用程序节点可以先对新用户信息进行验证,再对第一身份信息进行验证。验证应用程序节点对新用户信息以及第一身份信息的具体验证过程,后续会进行详细说明。
在某些实施方案中,验证应用程序节点可以是多个应用程序节点中,除响应应用程序节点之外的任一应用程序节点。响应应用程序节点可以将响应应用程序节点之外的其他应用程序节点均作为验证应用程序节点。响应应用程序节点也可以将预设数目个其他应用程序节点作为验证应用程序节点。验证应用程序节点的数目可以由技术人员预先设置。
在某些实施方案中,每个验证应用程序节点可以在第一身份信息和新用户信息均通过验证的情况下,向响应应用程序节点发送表示验证通过的验证结果。如果第一身份信息或新用户信息未通过验证,则验证应用程序节点可以向响应应用程序节点发送表示未通过验证的验证结果。
响应应用程序节点可以在接收到各验证应用程序节点发送的验证结果后,基于接收到的多个验证结果,确定第一身份信息和新用户信息是否通过验证。
如果响应应用程序节点基于接收到的验证结果,确定第一身份信息和新用户信息均通过验证,则响应应用程序节点可以基于新用户信息更改区块链中存储的用户的用户信息。如果第一身份信息或新用户信息未通过验证,则响应应用程序节点可以向用户终端发送验证失败的提示信息。
在某些实施方案中,应用程序节点可以接收用户终端发送的用户信息更改请求,用户信息更改请求携带有用户的第一身份信息、待更改的新用户信息;分别通过区块链中的多个验证应用程序节点,对第一身份信息和新用户信息进行验证;如果第一身份信息和新用户信息通过验证,则基于新用户信息对区块链中存储的用户的用户信息进行更改。
由于只需在区块链中更改一次新用户信息,即可实现更改各应用程序中该用户的用户信息,因此,无需用户分别在每个应用程序中进行用户信息更改,从而能够解决用户信息更改不方便的问题。
在某些实施方案中,本公开以先对第一身份信息进行验证,再对新用户信息进行验证为例,对验证应用程序节点的验证过程进行说明,如图4所示,包括以下步骤:
步骤401、响应应用程序节点410向区块链中的每个验证应用程序节点420,发送第一身份信息和新用户信息;
步骤402、每个验证应用程序节点420,获取区块链中存储的用户的第二身份信息;
步骤403、验证应用程序节点420判断第一身份信息与第二身份信息是否相同;
步骤404、如果第一身份信息与第二身份信息相同,验证应用程序节点420对新用户信息进行验证;
步骤405、如果新用户信息验证通过,验证应用程序节点420向响应应用程序节点410发送表示通过验证的验证结果;以及
步骤406、如果第一身份信息和新用户信息通过验证,响应应用程序节点410基于新用户信息对区块链中存储的用户的用户信息进行更改。
在某些实施方案中,在接收到用户终端发送的用户信息更改请求后,响应应用程序节点410可以向区块链中的每个验证应用程序节点420,发送第一身份信息和新用户信息。
在某些实施方案中,每个验证应用程序节点420可以在区块链存储的多个身份信息中,确定待进行用户信息更改的用户的身份信息,得到第二身份信息。
在某些实施方案中,响应应用程序节点410还可以向每个验证应用程序节点420发送待进行用户信息更改的用户的用户标识,由此,验证应用程序节点420可以根据用户标识,在区块链存储的多个身份信息中,确定第二身份信息。
在某些实施方案中,验证应用程序节点420判断第一身份信息与第二身份信息是否相同的步骤,可以参照上述用户注册过程中身份信息验证节点对用户的第三身份信息进行验证的过程,此处不再赘述。
如果第一身份信息与第二身份信息相同,则验证应用程序节点420可以执行步骤404。如果第一身份信息与第二身份信息不相同,则验证应用程序节点420可以发送未通过验证的验证结果。
在某些实施方案中,如果第一身份信息与第二身份信息相同,验证应用程序节点420对新用户信息进行验证,其中,新用户信息可以包括手机号码、登录应用程序所使用的账号名称、账号密码和联系地址等信息的至少一种。
针对新用户信息所包含信息的种类的不同,验证应用程序节点420对新用户信息进行验证的过程也有所不同,具体验证过程后续会进行详细说明。
在某些实施方案中,当新用户信息未通过验证时,验证应用程序节点420向响应应用程序节点410发送表示未通过验证的验证结果。
在某些实施方案中,响应应用程序节点410可以向区块链中的每个验证应用程序节点420,发送第一身份信息和新用户信息。然后,每 个验证应用程序节点420可以获取区块链中存储的用户的第二身份信息,再判断第一身份信息与第二身份信息是否相同。之后,每个验证应用程序节点420可以在第一身份信息和第二身份信息相同的情况下,对新用户信息进行验证。由于在第一身份信息通过验证后再对新用户信息进行验证,一方面,能够确保用户信息的更改是由具有更改权限的用户发起的,另一方面,能够避免新用户信息验证通过后再确认用户信息更改无效的情况,从而能够减少整个区块链的数据处理负担。
在某些实施方案中,为进一步提高用户信息更改的安全性,用户信息更改请求还可以携带有原用户信息,响应应用程序节点410可以向各验证应用程序节点420发送原用户信息。每个验证应用程序节点420可以获取区块链中存储的该用户的用户信息,然后,每个验证应用程序节点420可以将原用户信息与获取到的用户信息进行比较。
之后,验证应用程序节点420可以在第一身份信息、新用户信息和原用户信息均通过验证的情况下,向响应应用程序节点410发送表示验证通过的验证结果。
本公开实施例不对验证应用程序节点验证第一身份信息、新用户信息和原用户信息的顺序作具体限定。
在某些实施方案中,针对新用户信息是否包含手机号码的两种情况,本公开实施例提供了相应情况下验证应用程序节点验证新用户信息的实现方式,包括:
情况一、新用户信息包含手机号码。
此种情况中,验证应用程序节点可以向该手机号码对应的用户终端发送验证信息,并接收该用户终端发送的反馈信息。其中,反馈信息由用户基于验证信息输入。验证信息可以是包含验证字符的短信息,相应的,反馈信息可以是验证字符。或者,验证信息可以是包含预设问题的短信息,相应的,反馈信息可以是该预设问题的答案。预设问题可以由用户在使用应用程序的过程中设置并输入答案。
验证应用程序节点可以判断反馈信息与验证信息是否匹配,如果反馈信息与验证信息相匹配,则验证应用程序节点可以判定新用户信息通过验证;如果反馈信息与验证信息不匹配,则验证应用程序节点 可以判定新用户信息未通过验证。
在某些实施方案中,验证应用程序节点可以生成验证信息,然后,验证应用程序节点可以向手机号码对应的用户终端发送验证信息。用户终端可以输出接收到的验证信息,以便用户基于验证信息输入反馈信息。之后,用户终端可以向验证应用程序节点发送反馈信息。
在验证信息为包含验证字符的短信息的情况下,验证应用程序节点可以判断反馈信息与验证信息包含的验证字符是否相同。如果反馈信息与验证信息包含的验证字符相同,则验证应用程序节点可以判定新用户信息通过验证;如果反馈信息与验证信息包含的验证字符不相同,则验证应用程序节点可以判定新用户信息未通过验证。
在某些实施方案中,验证应用程序节点可以根据共识算法,生成验证字符“123456”,向该手机号码对应的用户终端发送包含验证字符的短信息。用户在接收到短信息后,可以在应用程序中的预设页面填写验证字符,然后,响应应用程序节点可以向验证应用程序节点发送验证字符。验证应用程序节点可以比较接收到的验证字符与生成的验证字符。如果两验证字符相同,则验证应用程序节点可以确定新用户信息通过验证;如果两验证字符不相同,则验证应用程序节点可以确定新用户信息未通过验证。
在验证信息为包含预设问题的短信息的情况下,验证应用程序节点可以判断反馈信息与预先存储的预设问题的答案是否相同。如果反馈信息与该答案相同,则验证应用程序节点可以判定新用户信息通过验证;如果反馈信息与该答案不同,则验证应用程序节点可以判定新用户信息未通过验证。
情况二、新用户信息不包含手机号码。
此种情况中,验证应用程序节点可以向响应应用程序节点发送提示信息,然后,响应应用程序节点可以将提示信息发送至用户终端。用户终端可以在应用程序的预设页面中显示提示信息,以便用户在看到提示信息后输入反馈信息。然后,响应应用程序节点可以接收用户终端发送的反馈信息,并将反馈信息发送至验证应用程序节点。之后,验证应用程序节点可以判断反馈信息与提示信息是否相匹配,如果反 馈信息与提示信息相匹配,则验证应用程序节点可以确定新用户信息通过验证;如果反馈信息与提示信息不匹配,则验证应用程序节点可以确定新用户信息未通过验证。
在某些实施方案中,提示信息为提示用户重新输入新用户信息,反馈信息可以为重新输入的用户信息。验证应用程序节点可以比较重新输入的用户信息,和用户之前输入的新用户信息。如果两个用户信息相同,则验证应用程序节点可以确定新用户信息通过验证。如果两个用户信息不相同,则验证应用程序节点可以确定新用户信息未通过验证。
在某些实施方案中,应用程序节点220验证用户信息的具体处理过程,与验证应用程序节点验证新用户信息的处理过程类似,此处不再赘述。响应应用程序节点可以通过验证应用程序节点实现上述验证新用户信息步骤。
在某些实施方案中,在接收到各验证应用程序节点发送的验证结果后,响应应用程序节点可以判断接收到的多个验证结果是否满足预设一致性条件,如果多个验证结果满足预设一致性条件,则响应应用程序节点可以判定第一身份信息和新用户信息通过验证;如果多个验证结果不满足预设一致性条件,则响应应用程序节点可以判定第一身份信息和新用户信息未通过验证。
其中,预设一致性条件可以是:多个验证结果均为验证通过;预设一致性条件也可以是:多个验证结果中验证通过的数量大于验证结果总数量的一半。
在某些实施方案中,在第一身份信息和新用户信息通过验证后,响应应用程序节点可以通过多种方式,更改区块链中存储的用户的用户信息。在一种可行的实现方式中,响应应用程序节点可以将区块链中存储的用户的用户信息更改为新用户信息。在另一种可行的实现方式中,应用程序节点可以将新用户信息和第一身份信息存储至区块链中。
在某些实施方案中,由于只需在区块链中更改一次新用户信息,即可实现各应用程序中该用户的用户信息更新,因此,无需用户分别 在每个应用程序中进行用户信息更改,从而能够解决用户信息更改不方便的问题。
针对某一用户使用同一用户信息登录各应用程序的情况,采用本公开实施例提供的用户信息处理方法,可以快速、便捷、安全、有效的更改用户信息。
下面对基于区块链的用户信息处理系统进行介绍,如图1所示,所述系统包括区块链100中的多个应用程序节点(101、102、103、104……),各应用程序节点(101、102、103、104……)可以是各应用程序的服务器。在某些实施方案中,应用程序节点101可以是应用程序“外卖”的服务器,应用程序节点102可以是应用程序“购物”的服务器,应用程序节点103可以是应用程序“日程”的服务器。其中,
所述多个应用程序节点中的响应应用程序节点,配置为接收用户终端发送的用户信息更改请求,向所述多个应用程序节点中的多个验证应用程序节点发送第一身份信息和待更改的新用户信息,所述第一身份信息和所述新用户信息由所述用户信息更改请求携带;
每个所述验证应用程序节点,配置为对所述第一身份信息和所述新用户信息进行验证;以及
所述响应应用程序节点,还配置为在所述第一身份信息和所述新用户信息通过验证时,基于所述新用户信息对所述区块链中存储的所述用户的用户信息进行更改。
在某些实施方案中,当用户想要更改某一用户信息时,该用户可以在使用任一应用程序的过程中对用户终端执行用户信息更改操作。用户信息更改操作可以是点击预设的用户信息更改图标,用户信息更改操作也可以是发出更改用户信息的语音指令。用户信息可以是手机号码、登录应用程序所使用的账号名称、账号密码和联系地址等。
用户终端,可以在检测到用户信息更改操作后,获取用户的第一身份信息和待更改的新用户信息。然后,用户终端可以生成携带有第一身份信息和新用户信息的用户信息更改请求,之后,用户终端可以向该应用程序对应的应用程序节点发送用户信息更改请求。其中,该应用程序对应的应用程序节点即为响应应用程序节点。第一身份信息 可以是用户的姓名、身份证号码、包含用户人脸特征的图像等。
响应应用程序节点,可以获取用户信息更改请求携带的第一身份信息和新用户信息,并在区块链包含的多个应用程序节点中,确定多个验证应用程序节点。然后,响应应用程序节点可以向确定出的每个验证应用程序节点,发送第一身份信息和新用户信息。
每个验证应用程序节点,可以对接收到的第一身份信息和新用户信息进行验证,得到验证结果。然后,该验证应用程序节点可以向响应应用程序节点发送验证结果。验证应用程序节点验证第一身份信息和新用户信息的具体验证过程,可以参照上述一种基于区块链的用户信息处理方法中,验证应用程序节点对第一身份信息和新用户信息进行验证的处理过程,此处不再赘述。
响应应用程序节点,可以接收每个验证应用程序节点发送的验证结果,得到多个验证结果。如果响应应用程序节点基于接收到的验证结果,确定第一身份信息和新用户信息均通过验证,则响应应用程序节点可以基于新用户信息更改区块链中存储的用户的用户信息。如果响应应用程序节点基于接收到的验证结果,确定第一身份信息或新用户信息未通过验证,则响应应用程序节点可以向用户终端发送验证失败的提示信息。
在某些实施方案中,由于只需在区块链中更改一次新用户信息,即可实现更改各应用程序中该用户的用户信息,因此,无需用户分别在每个应用程序中进行用户信息更改,从而能够解决用户信息更改不方便的问题。
在某些实施方案中,所述验证应用程序节点,用于在所述新用户信息包括手机号码的情况下,向所述手机号码对应的用户终端发送验证信息,并接收所述用户终端发送的反馈信息,所述反馈信息由所述用户基于所述验证信息输入;并当所述反馈信息与所述验证信息相匹配时,确定所述新用户信息通过验证;当所述反馈信息与所述验证信息不匹配时,确定所述新用户信息未通过验证。
其中,验证信息可以是包含验证字符的短信息,相应的,反馈信息可以是验证字符。或者,验证信息可以是包含预设问题的短信息, 相应的,反馈信息可以是该预设问题的答案。预设问题可以由用户在使用应用程序的过程中设置并输入答案。
在某些实施方案中,验证应用程序节点,可以在新用户信息包括手机号码的情况下,向手机号码对应的用户终端发送验证信息。
用户终端,可以在接收到验证信息后输出验证信息,以便用户基于验证信息输入反馈信息。然后,用户终端可以获取用户输入的反馈信息,向验证应用程序节点发送该反馈信息。
验证应用程序节点,可以在接收到反馈信息后,判断反馈信息与验证信息是否匹配,如果反馈信息与验证信息相匹配,则验证应用程序节点可以判定新用户信息通过验证;如果反馈信息与验证信息不匹配,则验证应用程序节点可以判定新用户信息未通过验证。
在某些实施方案中,手机号码对应的用户终端可以接收验证应用程序节点发送的验证信息,并将用户基于验证信息输入的反馈信息发送至验证应用程序节点。验证应用程序节点可以通过判断用户输入的反馈信息与发送的验证信息是否匹配,从而便捷、有效的验证新用户信息。
在某些实施方案中,所述验证应用程序节点,配置为向所述响应应用程序节点发送验证所述第一身份信息和所述新用户信息生成的验证结果;以及
所述响应应用程序节点,配置为接收每个所述验证应用程序节点生成的验证结果,得到多个验证结果;并当所述多个验证结果满足预设一致性条件时,确定所述第一身份信息和所述新用户信息通过验证。
在某些实施方案中,每个验证应用程序节点,可以对第一身份信息和新用户信息进行验证,得到验证结果。然后,每个验证应用程序节点可以向响应应用程序节点发送验证结果。其中,验证结果可以包括以下四种情况:1)第一身份信息通过验证、新用户信息未通过验证;2)第一身份信息未通过验证、新用户信息通过验证;3)第一身份信息和新用户信息均通过验证;4)第一身份信息和新用户信息均未通过验证。当验证结果为情况3)时表示验证通过。
响应应用程序节点,可以接收每个验证应用程序节点发送的验证 结果,得到多个验证结果。然后,响应应用程序节点可以判断多个验证结果是否满足预设一致性条件。其中,预设一致性条件可以是:多个验证结果均为验证通过;预设一致性条件也可以是:多个验证结果中验证通过的数量大于验证结果总数量的一半。
响应应用程序节点,可以在多个验证结果满足预设一致性条件时,确定第一身份信息和新用户信息通过验证,并在多个验证结果不满足预设一致性条件时,确定第一身份信息和新用户信息未通过验证。
在某些实施方案中,由多个验证应用程序节点对第一身份信息和新用户信息进行验证,然后,响应应用程序节点在多个验证应用程序节点的验证结果满足预设一致性条件时,才确定第一身份信息和新用户信息通过验证。由此,能够提高验证第一身份信息和新用户信息的有效性和可信性。
在某些实施方案中,所述响应应用程序节点,还用于接收用户终端发送的用户注册请求,所述用户注册请求携带有用户的第三身份信息和用户信息,并用于向所述区块链中的身份信息验证节点发送所述第三身份信息;
所述身份信息验证节点,用于对所述第三身份信息进行验证,并向所述响应应用程序节点发送验证结果,所述验证结果为通过验证或未通过验证;
所述响应应用程序节点,还用于当接收到的验证结果为通过验证时,将所述第三身份信息和所述用户信息存储至所述区块链中。
在某些实施方案中,当用户想要注册某一应用程序时,该用户可以对用户终端执行预设注册操作,预设注册操作可以是在该应用程序的预设注册页面填写用户的第三身份信息和用户信息后,点击预设的提交图标;预设注册操作也可以是在该应用程序的预设注册页面填写用户的第三身份信息和用户信息后,输入表示提交的命令代码。
用户终端,可以响应于预设注册操作生成携带有第三身份信息和用户信息的用户注册请求,然后,用户终端可以向该应用程序对应的应用程序节点发送用户注册请求。其中,该应用程序对应的应用程序节点,即为响应应用程序节点。
响应应用程序节点,可以在接收到用户注册请求后,向区块链中的身份信息验证节点发送第三身份信息。
每个身份信息验证节点,可以在接收到第三身份信息后,对第三身份信息进行验证,得到第三身份信息的验证结果,验证结果为第三身份信息通过验证或第三身份信息未通过验证。然后,该身份信息验证节点可以向响应应用程序节点发送验证结果。
响应应用程序节点,可以接收多个身份信息验证节点发送的验证结果,得到多个验证结果。然后,响应应用程序节点可以判断多个验证结果是否均为第三身份信息通过验证。如果多个验证结果均为第三身份信息通过验证,则响应应用程序节点可以将第三身份信息和用户信息存储至区块链中。如果多个验证结果中包含第三身份信息未通过验证,则响应应用程序节点可以向用户终端发送身份信息验证失败的提示信息。
在某些实施方案中,响应于预设注册操作,用户终端可以向响应应用程序节点发送用户注册请求,然后,响应应用程序节点可以向多个身份信息验证节点发送待注册用户的第三身份信息。之后,每个身份信息验证节点可以对第三身份信息进行验证,向响应应用程序节点发送验证结果。响应应用程序节点可以在多个验证结果均为通过验证时,将第三身份信息和用户信息存储至区块链中,从而完成用户注册。
由此,通过将用户的第三身份信息和用户信息打包存储至区块链中,可以实现在注册区块链所包含的某一应用程序后,用户即可使用同一用户信息登录区块链包含的其他应用程序,方便用户快捷的注册和使用各应用程序。另一方面,便于后续基于区块链实现用户信息更改。
在某些实施方案中,所述用户终端,用于生成用户公钥和用户私钥,并采用所述用户私钥对所述用户信息和所述第三身份信息进行加密,并将加密后的用户信息和所述第三身份信息发送至所述响应应用程序节点;
所述响应应用程序节点,用于将加密后的用户信息和第三身份信息存储至区块链中。
在某些实施方案中,用户终端,可以响应于预设注册操作生成用户公钥和用户私钥。然后,用户终端可以采用用户私钥对用户信息和第三身份信息进行加密,之后,用户终端可以将加密后的用户信息和第三身份信息发送至响应应用程序节点。
响应应用程序节点,可以在接收到的多个验证结果均为通过验证时,将加密后的响应应用程序节点存储至区块链中。
在某些实施方案中,用户终端可以采用生成的用户公钥和用户私钥,对用户信息和第三身份信息进行加密,再向响应应用程序节点发送加密后的用户信息和第三身份信息,以便响应应用程序节点在区块链中存储加密后的响应应用程序节点。由此,能够提高用户信息和第三身份信息的存储安全性,保护用户私密信息。
基于相同的技术构思,本公开还提供了基于区块链的用户信息处理装置,所述装置应用于区块链中的任一应用程序节点,所述区块链包括多个应用程序节点,如图5所示,所述装置包括:
第一接收模块510,配置为接收用户终端发送的用户信息更改请求,所述用户信息更改请求携带有用户的第一身份信息、待更改的新用户信息;
验证模块520,配置为分别通过多个验证应用程序节点,对所述第一身份信息和所述新用户信息进行验证,所述验证应用程序节点为所述区块链中的应用程序节点;以及
更改模块530,配置为当所述第一身份信息和所述新用户信息通过验证时,则基于所述新用户信息对所述区块链中存储的所述用户的用户信息进行更改。
在某些实施方案中,所述验证模块包括:
发送子模块,配置为向所述区块链中的每个验证应用程序节点发送所述第一身份信息和所述新用户信息;
获取子模块,配置为通过每个所述验证应用程序节点,获取所述区块链中存储的所述用户的第二身份信息;以及
第一验证子模块,配置为当所述第一身份信息和所述第二身份信息相同时,通过该验证应用程序节点对所述新用户信息进行验证。
在某些实施方案中,所述第一验证子模块用于在所述新用户信息包括手机号码的情况下,通过该验证应用程序节点,向所述手机号码对应的用户终端发送验证信息,并接收所述用户终端发送的反馈信息,所述反馈信息由所述用户基于所述验证信息输入;如果所述反馈信息与所述验证信息相匹配,则确定所述新用户信息通过验证;如果所述反馈信息与所述验证信息不匹配,则确定所述新用户信息未通过验证。
在某些实施方案中,所述装置还包括:
获取模块,配置为在所述用户信息更改请求还携带有所述用户的原用户信息的情况下,分别通过多个验证应用程序节点,获取所述区块链中存储的所述用户的用户信息;
所述验证模块,还配置为当所述原用户信息与所述用户信息相同时,确定所述原用户信息通过验证;以及
所述更改模块,配置为当所述第一身份信息、所述新用户信息和所述原用户信息均通过验证时,基于所述新用户信息对所述用户信息进行更改。
在某些实施方案中,验证模块包括:
第二获取子模块,配置为获取每个所述验证应用程序节点验证所述第一身份信息和所述新用户信息生成的验证结果,得到多个验证结果;以及
确定子模块,配置为当所述多个验证结果满足预设一致性条件时,确定所述第一身份信息和所述新用户信息通过验证。
在某些实施方案中,所述装置还包括:
第二接收模块,配置为接收所述用户终端发送的用户注册请求,所述用户注册请求携带有用户的第三身份信息和用户信息;
发送模块,配置为向所述区块链中的身份信息验证节点发送所述第三身份信息,以使所述身份信息验证节点对所述第三身份信息进行验证;以及
存储模块,配置为当所述身份信息验证节点验证通过所述第三身份信息时,将所述第三身份信息和所述用户信息存储至所述区块链中。
在某些实施方案中,本公开提供了基于区块链的用户信息处理装 置,可以接收用户终端发送的用户信息更改请求,用户信息更改请求携带有用户的第一身份信息、待更改的新用户信息;分别通过多个验证应用程序节点,对第一身份信息和新用户信息进行验证,验证应用程序节点为区块链中的应用程序节点;如果第一身份信息和新用户信息通过验证,则基于新用户信息对区块链中用户的用户信息进行更改。
由于只需在区块链中更改一次新用户信息,即可实现各应用程序中该用户的用户信息更新,因此,无需用户分别在每个应用程序中进行用户信息更改,从而能够解决用户信息更改不方便的问题。
基于相同的技术构思,本公开还提供了电子设备,如图6所示,包括处理器601、通信接口602、存储器603和通信总线604,其中,处理器601,通信接口602,存储器603通过通信总线604完成相互间的通信,
存储器603,配置为存放计算机程序;
处理器601,配置为执行存储器603上所存放的程序时,实现本公开的基于区块链的用户信息处理方法。
在某些实施方案中,上述电子设备提到的通信总线可以是外设部件互连标准(Peripheral Component Interconnect,PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,EISA)总线等。该通信总线可以分为地址总线、数据总线、控制总线等。为便于表示,图中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
通信接口用于上述电子设备与其他设备之间的通信。
存储器可以包括随机存取存储器(Random Access Memory,RAM),也可以包括非易失性存储器(Non-Volatile Memory,NVM),例如至少一个磁盘存储器。在某些实施方案中,存储器还可以是至少一个位于远离前述处理器的存储装置。
在某些实施方案中,上述的处理器可以是通用处理器,包括中央处理器(Central Processing Unit,CPU)、网络处理器(Network Processor,NP)等;还可以是数字信号处理器(Digital Signal Processing,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器 件、分立门或者晶体管逻辑器件、分立硬件组件。
本公开还提供了计算机可读存储介质,该计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现本公开的基于区块链的用户信息处理方法。
本公开还提供了包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行本公开的基于区块链的用户信息处理方法。
在某些实施方案中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本公开实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
需要说明的是,在本文中,诸如“第一”和“第二”等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
以上所述仅是本公开的具体实施方式,使本领域技术人员能够理解或实现本公开。对这些实施例的多种修改对本领域的技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本公开的精神或范围的情况下,在其它实施例中实现。因此,本公开将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (15)

  1. 基于区块链的用户信息处理方法,其中,所述方法应用于区块链中的任一应用程序节点,所述区块链包括多个应用程序节点,所述方法包括:
    接收用户终端发送的用户信息更改请求,所述用户信息更改请求携带有用户的第一身份信息、待更改的新用户信息;
    分别通过多个验证应用程序节点,对所述第一身份信息和所述新用户信息进行验证,所述验证应用程序节点为所述区块链中的应用程序节点;以及
    如果所述第一身份信息和所述新用户信息通过验证,则基于所述新用户信息对所述区块链中存储的所述用户的用户信息进行更改。
  2. 如权利要求1所述的方法,其中,所述分别通过多个验证应用程序节点,对所述第一身份信息和所述新用户信息进行验证,包括:
    向所述区块链中的每个验证应用程序节点发送所述第一身份信息和所述新用户信息;
    通过每个所述验证应用程序节点,获取所述区块链中存储的所述用户的第二身份信息;以及
    如果所述第一身份信息和所述第二身份信息相同,则通过该验证应用程序节点对所述新用户信息进行验证。
  3. 如权利要求2所述的方法,其中,所述新用户信息包括手机号码,所述通过该验证应用程序节点对所述新用户信息进行验证,包括:
    通过该验证应用程序节点,向所述手机号码对应的用户终端发送验证信息,并接收所述用户终端发送的反馈信息,所述反馈信息由所述用户基于所述验证信息输入;
    如果所述反馈信息与所述验证信息相匹配,则确定所述新用户信息通过验证;以及
    如果所述反馈信息与所述验证信息不匹配,则确定所述新用户信息未通过验证。
  4. 如权利要求1至3中任一权利要求所述的方法,其中,所述用户信息更改请求还携带有所述用户的原用户信息,所述方法还包括:
    分别通过多个验证应用程序节点,获取所述区块链中存储的所述用户的用户信息;
    如果所述原用户信息与所述用户信息相同,则确定所述原用户信息通过验证;以及
    所述如果所述第一身份信息和所述新用户信息通过验证,则基于所述新用户信息对所述区块链中存储的所述用户的用户信息进行更改,包括:
    如果所述第一身份信息、所述新用户信息和所述原用户信息均通过验证,则基于所述新用户信息对所述用户信息进行更改。
  5. 如权利要求1至4中任一权利要求所述的方法,其中,所述第一身份信息和所述新用户信息通过验证的确定方式,包括:
    获取每个所述验证应用程序节点验证所述第一身份信息和所述新用户信息生成的验证结果,得到多个验证结果;以及
    如果所述多个验证结果满足预设一致性条件,则确定所述第一身份信息和所述新用户信息通过验证。
  6. 如权利要求1至5中任一权利要求所述的方法,其中,所述方法还包括:
    接收所述用户终端发送的用户注册请求,所述用户注册请求携带有用户的第三身份信息和用户信息;
    向所述区块链中的身份信息验证节点发送所述第三身份信息,以使所述身份信息验证节点对所述第三身份信息进行验证;以及
    如果所述身份信息验证节点验证通过所述第三身份信息,则将所述第三身份信息和所述用户信息存储至所述区块链中。
  7. 基于区块链的用户信息处理系统,其中,所述系统包括区块链 中的多个应用程序节点,其中,
    所述多个应用程序节点中的响应应用程序节点,配置为接收用户终端发送的用户信息更改请求,向所述多个应用程序节点中的多个验证应用程序节点发送第一身份信息和待更改的新用户信息,所述第一身份信息和所述新用户信息由所述用户信息更改请求携带;
    每个所述验证应用程序节点,配置为对所述第一身份信息和所述新用户信息进行验证;以及
    所述响应应用程序节点,还配置为在所述第一身份信息和所述新用户信息通过验证时,基于所述新用户信息对所述区块链中存储的所述用户的用户信息进行更改。
  8. 如权利要求7所述的系统,其中,所述验证应用程序节点,配置为在所述新用户信息包括手机号码的情况下,向所述手机号码对应的用户终端发送验证信息,并接收所述用户终端发送的反馈信息,所述反馈信息由所述用户基于所述验证信息输入;并当所述反馈信息与所述验证信息相匹配时,确定所述新用户信息通过验证;以及当所述反馈信息与所述验证信息不匹配时,确定所述新用户信息未通过验证。
  9. 如权利要求7或8所述的系统,其中,所述验证应用程序节点,配置为向所述响应应用程序节点发送验证所述第一身份信息和所述新用户信息生成的验证结果;以及
    所述响应应用程序节点,配置为接收每个所述验证应用程序节点生成的验证结果,得到多个验证结果;并当所述多个验证结果满足预设一致性条件时,确定所述第一身份信息和所述新用户信息通过验证。
  10. 如权利要求7至9中任一权利要求所述的系统,其中,所述响应应用程序节点,还配置为接收用户终端发送的用户注册请求,所述用户注册请求携带有用户的第三身份信息和用户信息,并用于向所述区块链中的身份信息验证节点发送所述第三身份信息;
    所述身份信息验证节点,配置为对所述第三身份信息进行验证, 并向所述响应应用程序节点发送验证结果,所述验证结果为通过验证或未通过验证;以及
    所述响应应用程序节点,还配置为当接收到的验证结果为通过验证时,将所述第三身份信息和所述用户信息存储至所述区块链中。
  11. 如权利要求10所述的系统,其中,所述用户终端,配置为生成用户公钥和用户私钥,并采用所述用户私钥对所述用户信息和所述第三身份信息进行加密,并将加密后的用户信息和所述第三身份信息发送至所述响应应用程序节点;以及
    所述响应应用程序节点,配置为将加密后的用户信息和第三身份信息存储至区块链中。
  12. 基于区块链的用户信息处理装置,其中,所述装置应用于区块链中的任一应用程序节点,所述区块链包括多个应用程序节点,所述装置包括:
    第一接收模块,配置为接收用户终端发送的用户信息更改请求,所述用户信息更改请求携带有用户的第一身份信息、待更改的新用户信息;
    验证模块,配置为分别通过多个验证应用程序节点,对所述第一身份信息和所述新用户信息进行验证,所述验证应用程序节点为所述区块链中的应用程序节点;以及
    更改模块,配置为当所述第一身份信息和所述新用户信息通过验证时,基于所述新用户信息对所述区块链中存储的所述用户的用户信息进行更改。
  13. 如权利要求12所述的装置,其中,所述验证模块包括:
    发送子模块,配置为向所述区块链中的每个验证应用程序节点发送所述第一身份信息和所述新用户信息;
    获取子模块,配置为通过每个所述验证应用程序节点,获取所述区块链中存储的所述用户的第二身份信息;以及
    第一验证子模块,配置为当所述第一身份信息和所述第二身份信息相同时,通过该验证应用程序节点对所述新用户信息进行验证。
  14. 电子设备,其包括处理器、通信接口、存储器和通信总线,其中,所述处理器、所述通信接口、所述存储器通过所述通信总线完成相互间的通信;
    所述存储器,配置为存放计算机程序;以及
    所述处理器,配置为执行存储器上所存放的程序时,实现权利要求1至6中任一权利要求所述的方法。
  15. 计算机可读存储介质,其中,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1至6中任一权利要求所述的方法。
PCT/CN2021/101192 2020-06-30 2021-06-21 基于区块链的用户信息处理方法及系统 WO2022001717A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US18/003,856 US20230269103A1 (en) 2020-06-30 2021-06-21 Blockchain-based user information processing method and system
JP2022581689A JP2023533250A (ja) 2020-06-30 2021-06-21 ブロックチェーンに基づくユーザー情報処理方法及びシステム
EP21833282.3A EP4174689A4 (en) 2020-06-30 2021-06-21 BLOCKCHAIN-BASED USER INFORMATION PROCESSING METHOD AND SYSTEM

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010619447.2A CN111783049A (zh) 2020-06-30 2020-06-30 一种基于区块链的用户信息处理方法及系统
CN202010619447.2 2020-06-30

Publications (1)

Publication Number Publication Date
WO2022001717A1 true WO2022001717A1 (zh) 2022-01-06

Family

ID=72760176

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/101192 WO2022001717A1 (zh) 2020-06-30 2021-06-21 基于区块链的用户信息处理方法及系统

Country Status (5)

Country Link
US (1) US20230269103A1 (zh)
EP (1) EP4174689A4 (zh)
JP (1) JP2023533250A (zh)
CN (1) CN111783049A (zh)
WO (1) WO2022001717A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115086355A (zh) * 2022-06-09 2022-09-20 中国银行股份有限公司 基于区块链的用户信息处理方法及装置

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111783049A (zh) * 2020-06-30 2020-10-16 北京海益同展信息科技有限公司 一种基于区块链的用户信息处理方法及系统
CN113282248A (zh) * 2021-06-28 2021-08-20 中国银行股份有限公司 基于区块链的个人信息处理方法及装置
CN116015966B (zh) * 2023-01-06 2023-11-10 江苏加数度科技有限公司 一种基于区块链的用户信息处理系统
CN117633848B (zh) * 2024-01-25 2024-04-12 中信证券股份有限公司 用户信息联合处理方法、装置、设备和计算机可读介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104038552A (zh) * 2014-06-20 2014-09-10 北京金山安全软件有限公司 一种信息更新方法及装置
CN108900562A (zh) * 2018-10-11 2018-11-27 北京京东尚科信息技术有限公司 登录状态的共享方法、装置、电子设备及介质
CN109359976A (zh) * 2018-09-06 2019-02-19 深圳大学 基于区块链的账号密码管理方法、装置、设备及存储介质
CN111209061A (zh) * 2019-12-27 2020-05-29 广东德诚科教有限公司 用户信息的填写方法、装置、计算机设备和存储介质
CN111783049A (zh) * 2020-06-30 2020-10-16 北京海益同展信息科技有限公司 一种基于区块链的用户信息处理方法及系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107257340B (zh) * 2017-06-19 2019-10-01 阿里巴巴集团控股有限公司 一种认证方法、基于区块链的认证数据处理方法及设备
US11100503B2 (en) * 2018-02-07 2021-08-24 Mastercard International Incorporated Systems and methods for use in managing digital identities
WO2019204794A1 (en) * 2018-04-20 2019-10-24 Infonetworks Llc System for verification of pseudonymous credentials for digital identities with managed access to personal data on trust networks
CN109088866B (zh) * 2018-08-02 2021-02-19 北京百悟科技有限公司 基于联盟链的多云平台统一身份认证方法及装置
CN109344631B (zh) * 2018-09-18 2020-11-06 百度在线网络技术(北京)有限公司 区块链的数据修改及区块验证方法、装置、设备和介质
CN109241192B (zh) * 2018-09-18 2021-06-15 百度在线网络技术(北京)有限公司 区块链的数据修改及区块验证方法、装置、设备和介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104038552A (zh) * 2014-06-20 2014-09-10 北京金山安全软件有限公司 一种信息更新方法及装置
CN109359976A (zh) * 2018-09-06 2019-02-19 深圳大学 基于区块链的账号密码管理方法、装置、设备及存储介质
CN108900562A (zh) * 2018-10-11 2018-11-27 北京京东尚科信息技术有限公司 登录状态的共享方法、装置、电子设备及介质
CN111209061A (zh) * 2019-12-27 2020-05-29 广东德诚科教有限公司 用户信息的填写方法、装置、计算机设备和存储介质
CN111783049A (zh) * 2020-06-30 2020-10-16 北京海益同展信息科技有限公司 一种基于区块链的用户信息处理方法及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4174689A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115086355A (zh) * 2022-06-09 2022-09-20 中国银行股份有限公司 基于区块链的用户信息处理方法及装置

Also Published As

Publication number Publication date
EP4174689A4 (en) 2024-07-03
CN111783049A (zh) 2020-10-16
EP4174689A1 (en) 2023-05-03
JP2023533250A (ja) 2023-08-02
US20230269103A1 (en) 2023-08-24

Similar Documents

Publication Publication Date Title
WO2022001717A1 (zh) 基于区块链的用户信息处理方法及系统
TWI635409B (zh) 判定認證能力之查詢系統、方法及非暫態機器可讀媒體
US20190140848A1 (en) Decentralized Access Control for Cloud Services
US11388194B2 (en) Identity verification and verifying device
US8225387B2 (en) Method and system for access authentication
TWI725352B (zh) 驗證及授權的方法及驗證伺服器
US10484372B1 (en) Automatic replacement of passwords with secure claims
WO2019239591A1 (ja) 認証システム、認証方法、アプリケーション提供装置、認証装置、及び認証用プログラム
CA3051066A1 (en) Dynamic implementation and management of hash-based consent and permissioning protocols
US11997210B2 (en) Protection of online applications and webpages using a blockchain
CN112738021A (zh) 单点登录方法、终端、应用服务器、认证服务器及介质
CN115695012A (zh) 一种登录请求的处理方法、装置、电子设备及存储介质
CN110445768B (zh) 一种登录方法、装置及电子设备
CN113761498A (zh) 一种第三方登录信息托管方法、系统、设备及存储介质
US20150295918A1 (en) User authentication system in web mash-up circumstance and authenticating method thereof
EP3716564B1 (en) Method for resetting password, request terminal and check terminal
WO2023202214A1 (zh) 一种通信方法、装置、系统、终端及服务器
WO2022088434A1 (zh) 程序验证方法和装置、平台和用户终端及在线服务系统
US20240289488A1 (en) System and method for data access management using auxiliary devices
TWI831577B (zh) 集中依賴單位與註冊單位以提供認證服務之系統及方法
US20240289478A1 (en) System and method for data access management using environmental validation
US20240289430A1 (en) System and method for data access management using destination-based encryption
US20240345741A1 (en) System and method for managing data storage to identify undesired data modification
WO2022197849A1 (en) Secure login security service based on a collection of user images
TW202116039A (zh) 基於代碼化技術的認證存取系統及方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21833282

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2022581689

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2021833282

Country of ref document: EP

Effective date: 20230130