CN107147652A - A kind of safety fusion authentication method of the polymorphic identity of user based on block chain - Google Patents

A kind of safety fusion authentication method of the polymorphic identity of user based on block chain Download PDF

Info

Publication number
CN107147652A
CN107147652A CN201710352678.XA CN201710352678A CN107147652A CN 107147652 A CN107147652 A CN 107147652A CN 201710352678 A CN201710352678 A CN 201710352678A CN 107147652 A CN107147652 A CN 107147652A
Authority
CN
China
Prior art keywords
identity
user
server
characteristic
identity characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710352678.XA
Other languages
Chinese (zh)
Other versions
CN107147652B (en
Inventor
黄可
张小松
夏琦
陈瑞东
刘小垒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201710352678.XA priority Critical patent/CN107147652B/en
Publication of CN107147652A publication Critical patent/CN107147652A/en
Application granted granted Critical
Publication of CN107147652B publication Critical patent/CN107147652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of safety fusion authentication method of polymorphic identity of the user based on block chain, including step:Initialization, typing identity information, identity characteristic are extracted, fusion feature matching.The invention is characterized in that:With reference to polymorphic identity fusion authentication method, block chain technology, public encryption system there is provided a set of complete mechanism, to realize safe efficient, convenient and reliable authentication.Wherein, user can carry out typing with self selective identity information, server carries out feature extraction to typing information, and by decrypting the record on block chain, fusion matching is carried out to identity information, final to judge whether user obtains logging in mandate, scheme proposed by the present invention can realize safe efficient, convenient and reliable authentication.

Description

A kind of safety fusion authentication method of the polymorphic identity of user based on block chain
Technical field
The present invention relates to the peace of identity identification technical field, more particularly to a kind of polymorphic identity of user based on block chain Full fusion authentication method.
Background technology
At present, the limitation that the identity identifying technology of single security mechanism is brought is also more and more obvious, multiple safe mechanism Integrating application turns into new trend.This is due to the authentication techniques (such as account number cipher login) based on monofactor, is held very much Easily there is the risk for being counterfeited, being stolen, the security of system is not only improved using the maltilevel security factor, certification can also be improved Reliability.Even if user lacks the key element of a certain authentication, he still can be logged in by other identity informations.This Outside, a set of perfect mechanism is lacked at present, allows user to be free to select the identity information of different shape for checking, and Above- mentioned information is integrated, analyze and matched by unified model storage and peace, intelligentized algorithm.Most of all, at present There is great potential safety hazard in a certain center that is stored in of identity characteristic information centralization.Once data center is broken, user Identity information can be compromised and destroy, this is a kind of catastrophic consequence.
The novel foundation facility that block chain is a kind of disclosure, transparent national consensus, controls and share altogether, with distributed number According to storage, decentralization, can not distort, can review, the feature such as trusted.Although the transparency and subscriber identity information of block chain The special conflict mutually of privacy, but we can combine public encryption system and block chain technology, realize subscriber identity information Safety and reliable memory.By being recorded after subscriber identity information is encrypted in block chain, AES is can search for reference to public key, We can realize the safe efficient and reliable storage of subscriber identity information and use.
The content of the invention
It is an object of the invention to:It is single for the elements of certificate of above-mentioned existing monofactor authentication techniques, it is easy to go out Now personation, user profile are stolen, so as to cause the security in user authentication, the problem of reliability is low, the present invention provides one Plant the safety fusion authentication method of the polymorphic identity of user based on block chain.
The technical solution adopted by the present invention is as follows:
A kind of safety fusion authentication method of the polymorphic identity of user based on block chain, comprises the following steps:
(1) initialize, the public key and private key of generation server and trusted node, generate open parameter and the service of server The public algorithm of device, wherein, open parameter includes:The quantity (m) of the different shape identity supported, each identity form Quantity (n), identity characteristic weights accounting, similarity threshold of characteristic component etc., public algorithm includes:Hash function, matrix become Scaling method, identity characteristic extraction algorithm, identity characteristic matching algorithm etc., concrete meaning is described during narration;
(2) inputted with user orientation server in the identity information of user account and different shape, the identity information of different shape Including user identity title;
Then the identity information for the different shape that server is inputted to user carries out feature extraction respectively, obtains identity special Levy, each identity characteristic extracted is calculated to the identity characteristic vector for obtaining uniform length by disclosed hash function, then Matrixing is carried out to identity characteristic vector by disclosed matrixing algorithm, identity characteristic matrix is obtained, calculates identity special Levy the root of matrix;
(3) typical public key encryption algorithm is based on, the identity characteristic matrix in step (2) is encrypted, identity is obtained Eigenmatrix ciphertext;
AES can search for based on typical public key, user identity name is referred to as object, the public key of server is used User identity title is encrypted and searchable cryptograph is obtained;
(4) server is respectively to user account, the root of identity characteristic matrix, eigenmatrix ciphertext and searchable cryptograph with entering Row private key signature, and it is sent to trusted node;
(5) trusted node is retrieved according to user account on block chain, if user first logs into, trusted node is user Issue public key, create original block record user's different shape identity information and by user account, client public key, timestamp, Root, eigenmatrix ciphertext and the original block of searchable cryptograph write-in of eigenmatrix, and broadcast in a network;First log into use The identity information of the different shape at family is original identity information, and original identity characteristic matrix is obtained after original identity information conversion, The ciphertext of original identity characteristic matrix is original identity characteristic matrix ciphertext;Otherwise, step (6) is performed;
(6) fusion feature matching is carried out to the identity information of user's different shape and similarity judges.
In a kind of safety fusion authentication method of the polymorphic identity of described user based on block chain, step (1), generation Open parameter include:The quantity for the different shape identity that identity characteristic weights accounting, similarity threshold, server are supported, The quantity of the characteristic component of each identity form, the public algorithm of generation includes:Disclosed hash algorithm, identity characteristic are extracted Algorithm, identity characteristic matching algorithm.
In a kind of safety fusion authentication method of the polymorphic identity of described user based on block chain, step (2), feature Extract and eigentransformation is concretely comprised the following steps:
(21) identity information for the different shape that server is inputted for user, the public algorithm generated according to step (1), Identity characteristic is extracted, each identity characteristic extracted is calculated using disclosed hash algorithm, calculated identity is obtained The corresponding characteristic vector of feature, the corresponding characteristic vector of identity characteristic calculated is made up of n component;
(22) characteristic vector for the unified form that server obtains step (21) is according to disclosed matrixing algorithm groups Into eigenmatrix.
A kind of polymorphic identity of described user based on block chain safety fusion authentication method, step (6) it is specific Step is:
(61) original identity characteristic matrix ciphertext is sent to server by trusted node, and server is with the private key solution of oneself The original identity characteristic matrix of user is obtained after close, and extracts from the original identity characteristic matrix of user the original body of user one by one Part characteristic vector A1、…、Am;Wherein, m represents the quantity of user's different shape identity information;
(62) server extracts identity characteristic vector A ' from the identity information of user's typing1、…、A′m, wherein, m is represented The quantity of user's different shape identity information;
(63) server compares each in step (62), step (63) according to disclosed Feature Correspondence Algorithm Match () The similarity of identity characteristic, obtains the alignment similarity of each identity characteristic, the alignment similarity meter of each identity characteristic Calculating formula is:
r1=Match (A1、A′1)、…、rm=Match (Am、A′m);
Wherein r1…rmFor the alignment similarity of each identity characteristic;
(64) server calculates all identity characteristic fusion matching similarities, fusion feature matching similarity calculation formula For:
R=ω1r1+…+ωnrm,
Wherein, ω1,…,ωnRepresent the weights accounting of different shape identity characteristic;
(65) server is compared R with given similarity threshold V, if R>V, then certification success, authorizes and logs in, otherwise, Return to failure identifier and terminate.
In summary, by adopting the above-described technical solution, the beneficial effects of the invention are as follows:
First, in the solution of the present invention, disclosed based on block chain, transparent national consensus, the novel foundation controlled and shared altogether Facility, with Distributed Storage, decentralization, can not distort, can review, the feature such as trusted, by by user identity Information encryption after record in block chain, can search for AES with reference to public key, realize subscriber identity information it is safe efficient and Reliably store and use.
2nd, due to being authenticated using the identity information of variform to client, therefore, without worrying a certain identity information Lack and cause the problem of can not authenticating.
3rd, due in this programme, in block chain, multiple different shape identity informations of same user can be recorded, because This user can freely select the identity information of different shape for checking, and be stored and peace, intelligence by unified model The algorithm of energyization is integrated to above- mentioned information, analyzes and matched.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the safety fusion authentication method of the polymorphic identity of user based on block chain of the invention;
Fig. 2 is that the explanation figure with eigenmatrix is extracted for identity characteristic in the present invention;
Fig. 3 is the block link composition that this is record identity characteristic information in invention;
Embodiment
All features disclosed in this specification, can be with any in addition to mutually exclusive feature and/or step Mode is combined.
The present invention is elaborated with reference to Fig. 1, Fig. 2, Fig. 3.
A kind of safety fusion authentication method of the polymorphic identity of user based on block chain, comprises the following steps:
The public key and private key of initialization, generation server and trusted node, generate the open parameter and server of server Public algorithm, parameter includes disclosed in it:Identity characteristic weights accounting, similarity threshold, the different shape identity supported Quantity, the quantity of the characteristic component of each identity form, the public algorithm of generation includes:Disclosed hash algorithm, identity Feature extraction algorithm, identity characteristic matching algorithm.Similarity threshold is used to determine that User logs in successfully needs the similarity reached Threshold value, wherein, identity characteristic weights accounting is different shape identity information percentage in verification process, can be according to reality Border application environment is freely set;
User by secure way (including:Safe lane, safe equipment, such as:POS etc.) by user account and (one Kind or variform) subscriber identity information inputs to server, subscriber identity information includes but is not limited to:Password, fingerprint, rainbow Film, face, sound source.
The identity information for the different shape that server is inputted for user, respectively according to corresponding public algorithm, to difference The identity information of form carries out identity characteristic extraction, and the identity characteristic that the identity information of every kind of different shape is extracted according to Disclosed hash algorithm unified calculation, obtains the identity characteristic vector being made up of n characteristic component;The identity information of different shape Include user identity title;
For example, being obtained for facial image identity information, the coordinate of record human face distribution, and calculating by n component Identity characteristic vector is constituted, such as:A1={ a1,1,…,a1,n, here, a1,iRepresent the feature point in a face feature vector Amount;
For example, for ordinary cryptographic, according to disclosed hash algorithm obtain from n password component constitute try feature to Amount, such as:A2={ a2,1,…,a2,n, in addition, for the identity information of other different shapes, such as iris, fingerprint, method class Seemingly;
These characteristic vectors are obtained identity characteristic matrix by server according to disclosed matrixing algorithm, and calculate current The root of identity characteristic matrix, identity characteristic matrix is a matrix being made up of the multiple identity characteristic vectors of user;
It is pointed out that we set user in advance in initialization procedure by open parameter has m different shape Identity, the identity of each form is made up of an identity characteristic vector with n characteristic component, and we can simply recognize For:Identity characteristic matrix is m × n matrix, and each of which element represents a kind of corresponding feature of form identity information Component;
Then, server is based on public key encryption algorithm, with the public key encryption user identity eigenmatrix of oneself, obtains identity Eigenmatrix ciphertext;Public key encryption algorithm includes but is not limited to famous RSA public key encryption algorithms.RSA public key encryption algorithms Feature is:Sender is encrypted using the public key of recipient, and ciphertext is transmitted in open channel, and recipient is after ciphertext is received It is decrypted using the key of oneself.
Server can search for AES based on public key again, and user identity name is referred to as into keyword, the public affairs of oneself are used Key is encrypted to it and obtains keyword searchable cryptograph;Public key can search for AES and include but is not limited to Boneh et al. The PEKS public keys of proposition can search for AES.It is that user identity name is referred to as into object that PEKS public keys, which can search for AES, User identity title is encrypted using the public key of oneself and searchable cryptograph is obtained;Here, public key can search for AES The characteristics of be:Keyword is used certainly with server storage, recipient is sent jointly to after the public key encryption of recipient with ciphertext Oneself public key and keyword generation trapdoor is sent to server, and server matches the ciphertext comprising the keyword by trapdoor, And send back recipient;
Server by user account, the root of current identity characteristic matrix, identity characteristic matrix ciphertext and can search for close respectively Text sends jointly to trusted node after carrying out private key signature, is responsible for recorded in block chain by trusted node;
It should be noted that we are recorded on block chain after being encrypted using public key algorithm to user identity eigenmatrix, It is that, in order to protect the identity information of the various forms of user to mustn't go to leakage, and can search for AES using public key is in order to using The ciphertext of family identity name as user characteristics matrix ciphertext identifier, in order to inquire about, it is obvious that by user identity title Plaintext record on block chain easily leakage privacy, and AES can search for using public key, can allow trusted node and its His all users do not know user identity title what is in plain text in the case of, safety and efficient inquiry and transmission log Identity information on block chain, thus one, subscriber identity information has obtained comprehensive secret protection, while be easy to can again Retrieval;
Then, the identity characteristic matrix ciphertext that trusted node is sent according to server, holds according to the different situations of user Row is as follows:
Trusted node is retrieved according to user account on block chain, if the user logs in first, i.e., in the absence of appoint What records the block chain of the user identity feature, and trusted node issues public key for user first, while creating original block (first Individual block), for recording the initial informations such as user account, creation time, then, trusted node is polymorphic by user user successively Identity information is recorded in a block chain, and by user account, client public key, the root of eigenmatrix, timestamp, eigenmatrix Ciphertext and the original block of searchable cryptograph write-in, and broadcast in a network;First log into the identity letter of the different shape of user Breath is original identity information, obtains original identity characteristic matrix after the conversion of original identity information, original identity characteristic matrix it is close Text is original identity characteristic matrix ciphertext;
If user is chartered user, in the presence of a block chain for recording its identity characteristic.Server AES can search for based on public key, with oneself private key and user identity title, generation can search for trapdoor, and be sent to can Node is believed, trusted node is retrieved according to trapdoor, if retrieval is created less than to the block for including the new user identity title A block is built, and user account, client public key, the root of newest eigenmatrix, timestamp, newest eigenmatrix is close Text and the searchable cryptograph of identity name are write in new block, and are broadcasted in a network;
Otherwise, trusted node is retrieved the block for including the user identity name information, and will be recorded on the block Newest identity characteristic matrix ciphertext returns to server, and server decrypts matrix ciphertext with the private key of oneself, and therefrom carries Take out the original identity characteristic vector of user's different shape:A1、…、Am, original identity characteristic is that user steps in first time here The identity characteristic of typing during land;
Server extracts identity characteristic vector A ' from the identity information of user's typing1、…、A′m, server is according to open Feature Correspondence Algorithm Match (), the identity characteristic vector A ' extracted is inputted respectively1、…、A′mWith original identity vector A1、…、Am, here m represent the quantity of different shape identity, it is final to calculate the alignment similarity for obtaining each identity characteristic, often The calculating formula of similarity of one identity characteristic is as follows:
r1=Match (A1、A′1)、…、rm=Match (Am、A m);
Wherein, r1…rmFor the alignment similarity of each identity characteristic.
Finally, server is with regard to disclosed Feature Correspondence Algorithm, and the identity that the trusted node after user and decryption is beamed back is special Levy and be compared, and calculating obtains matching similarity:
R=ω1r1+…+ωnrn,
Wherein, ω1,…,ωnRepresent the weights accounting (ω of respective identity feature1,…,ωnSet according to open parameter It is fixed), server is compared R with similarity threshold V, if R>V, then certification success, authorizes and logs in, otherwise, returns to failure identifier And terminate.
We are devised a set of by the fusion authentication method, block chain technology and public key encryption algorithm of polymorphic identity Complete system, to realize safe efficient, convenient and reliable authenticating user identification.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Belong to those skilled in the art the invention discloses technical scope in, the change or replacement that can be readily occurred in should all be covered Within protection scope of the present invention.

Claims (4)

1. the safety fusion authentication method of the polymorphic identity of a kind of user based on block chain, it is characterised in that including following step Suddenly:
(1) initialize, the public key and private key of generation server and trusted node, generate the open parameter and server of server Public algorithm;
(2) identity information of user account and different shape is inputted with user orientation server, the identity information of different shape includes User identity title;
Then the identity information for the different shape that server is inputted to user carries out feature extraction respectively, obtains identity characteristic, will The each identity characteristic extracted calculates the identity characteristic vector for obtaining uniform length by disclosed hash function, then passes through public affairs The matrixing algorithm opened carries out matrixing to identity characteristic vector, obtains identity characteristic matrix, calculates identity characteristic matrix Root;
(3) typical public key encryption algorithm is based on, the identity characteristic matrix in step (2) is encrypted, identity characteristic is obtained Matrix ciphertext;
AES can search for based on typical public key, by user identity name be referred to as object, using server public key to Family identity name is encrypted and obtains searchable cryptograph;
(4) server is respectively to user account, the root of identity characteristic matrix, eigenmatrix ciphertext and searchable cryptograph with carrying out private Key is signed, and is sent to trusted node;
(5) trusted node is retrieved according to user account on block chain, if user first logs into, trusted node is issued for user Public key, creates the identity information of original block record user's different shape and by user account, client public key, timestamp, feature Root, eigenmatrix ciphertext and the original block of searchable cryptograph write-in of matrix, and broadcast in a network;First log into user's The identity information of different shape is original identity information, and original identity characteristic matrix is obtained after original identity information conversion, original The ciphertext of identity characteristic matrix is original identity characteristic matrix ciphertext;Otherwise, step (6) is performed;
(6) fusion feature matching is carried out to the identity information of user's different shape and similarity judges.
2. a kind of safety fusion authentication method of the polymorphic identity of user based on block chain according to claim 1, its It is characterised by, in step (1), the open parameter of generation includes:Identity characteristic weights accounting, similarity threshold, server are propped up The quantity of the different shape identity held, the quantity of the characteristic component of each identity form, the public algorithm of generation includes:It is public Hash algorithm, identity characteristic extraction algorithm, the identity characteristic matching algorithm opened.
3. a kind of safety fusion authentication method of the polymorphic identity of user based on block chain as claimed in claim 2, it is special Levy and be, in step (2), feature extraction and eigentransformation are concretely comprised the following steps:
(21) identity information for the different shape that server is inputted for user, the public algorithm generated according to step (1) is extracted Go out identity characteristic, each identity characteristic extracted is calculated using disclosed hash algorithm, calculated identity characteristic is obtained Corresponding characteristic vector, the corresponding characteristic vector of identity characteristic calculated is made up of n component;
(22) characteristic vector for the unified form that server obtains step (21) constitutes special according to disclosed matrixing algorithm Levy matrix.
4. a kind of safety fusion authentication method of the polymorphic identity of user based on block chain as claimed in claim 1, it is special Levy and be, step (6) are concretely comprised the following steps:
(61) original identity characteristic matrix ciphertext is sent to server by trusted node, after server is decrypted with the private key of oneself The original identity characteristic matrix of user is obtained, and it is special to extract from the original identity characteristic matrix of user the original identity of user one by one Levy vectorial A1、…、Am;Wherein, m represents the quantity of user's different shape identity information;
(62) server extracts identity characteristic vector A ' from the identity information of user's typing1、…、A′m, wherein, m represents user The quantity of different shape identity information;
(63) server compares each identity in step (62), step (63) according to disclosed Feature Correspondence Algorithm Match () The similarity of feature, obtains the alignment similarity of each identity characteristic, and the alignment similarity of each identity characteristic calculates public Formula is:
r1=Match (A1、A′1)、…、rm=Match (Am、A′m);
Wherein r1…rmFor the alignment similarity of each identity characteristic;
(64) server calculates all identity characteristic fusion matching similarities, and fusion feature matching similarity calculation formula is:
R=ω1r1+…+ωnrm,
Wherein, ω1,…,ωnRepresent the weights accounting of different shape identity characteristic;
(65) server is compared R with given similarity threshold V, if R>V, then certification success, authorizes and logs in, otherwise, returns Failure identifier simultaneously terminates.
CN201710352678.XA 2017-05-18 2017-05-18 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain Active CN107147652B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710352678.XA CN107147652B (en) 2017-05-18 2017-05-18 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710352678.XA CN107147652B (en) 2017-05-18 2017-05-18 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain

Publications (2)

Publication Number Publication Date
CN107147652A true CN107147652A (en) 2017-09-08
CN107147652B CN107147652B (en) 2019-08-09

Family

ID=59777759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710352678.XA Active CN107147652B (en) 2017-05-18 2017-05-18 A kind of safety fusion authentication method of the polymorphic identity of user based on block chain

Country Status (1)

Country Link
CN (1) CN107147652B (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786639A (en) * 2017-09-28 2018-03-09 山东鲁能智能技术有限公司 A kind of electric automobile networked system and its method of work based on block chain technology
CN107786547A (en) * 2017-09-30 2018-03-09 厦门快商通信息技术有限公司 A kind of auth method based on block chain, device and computer-readable recording medium
CN108766509A (en) * 2018-05-16 2018-11-06 中国联合网络通信集团有限公司 Authenticating method, device, terminal based on block chain technology and storage medium
CN108805573A (en) * 2018-04-21 2018-11-13 深圳市元征科技股份有限公司 A kind of Information Authentication method, server and storage medium
CN108809952A (en) * 2018-05-22 2018-11-13 隆正信息科技有限公司 Object authentication method and system based on more mark general unique keepsake chains of sectional
CN108881287A (en) * 2018-07-18 2018-11-23 电子科技大学 A kind of Internet of things node identity identifying method based on block chain
CN108882230A (en) * 2018-06-01 2018-11-23 中国联合网络通信集团有限公司 Message registration management method, apparatus and system
CN108920908A (en) * 2018-06-28 2018-11-30 北京京东尚科信息技术有限公司 Date storage method, device and computer readable storage medium
CN108921555A (en) * 2018-06-30 2018-11-30 江苏恒宝智能***技术有限公司 A kind of auth method and device combined based on block chain and iris recognition
CN108933667A (en) * 2018-05-03 2018-12-04 深圳市京兰健康医疗大数据有限公司 A kind of management method and management system of the public key certificate based on block chain
CN109039655A (en) * 2018-09-13 2018-12-18 全链通有限公司 Real name identity identifying method and device, identity block chain based on block chain
CN109063627A (en) * 2018-07-27 2018-12-21 文志 Digital Human artificial intelligence identity unique identification control method
CN109145543A (en) * 2018-09-03 2019-01-04 湖北文理学院 A kind of identity identifying method
CN109145703A (en) * 2018-06-14 2019-01-04 北京凌云智链科技有限公司 Intelligent identification method, device, equipment and medium
CN109194487A (en) * 2018-09-13 2019-01-11 全链通有限公司 Construction method and system are traded or communicated to my real name based on block chain
CN109495478A (en) * 2018-11-20 2019-03-19 桂林电子科技大学 A kind of distributed security communication means and system based on block chain
CN110365626A (en) * 2018-04-09 2019-10-22 厦门雅迅网络股份有限公司 The user in anticollision library logs in safety certifying method, terminal device and storage medium
CN110569658A (en) * 2019-09-12 2019-12-13 腾讯科技(深圳)有限公司 User information processing method and device based on block chain network, electronic equipment and storage medium
CN110674180A (en) * 2019-09-26 2020-01-10 腾讯科技(深圳)有限公司 Business data processing method and device and readable storage medium
CN111131444A (en) * 2019-12-23 2020-05-08 广州公评科技有限公司 Network course processing system based on block chain technology
CN111353903A (en) * 2020-02-26 2020-06-30 广东工业大学 Network identity protection method and device, electronic equipment and storage medium
CN111680327A (en) * 2020-06-10 2020-09-18 中国银行股份有限公司 Block chain-based customer information integration method, device, equipment and storage medium
CN112465635A (en) * 2019-09-09 2021-03-09 上海旺链信息科技有限公司 Block chain public encryption algorithm processing method, block chain wallet and storage medium
CN113162768A (en) * 2021-02-24 2021-07-23 北京科技大学 Intelligent Internet of things equipment authentication method and system based on block chain
CN113449336A (en) * 2021-06-11 2021-09-28 电子科技大学 Shared data processing method based on safe multi-party privacy protection in block chain
CN117494221A (en) * 2024-01-03 2024-02-02 齐鲁工业大学(山东省科学院) Internet of things data sharing method for block chain assisted search

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084070B (en) * 2019-04-21 2020-12-29 中国科学院信息工程研究所 Block chain-based identity construction and source tracing method for manufacturing cross-domain heterogeneous data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794266A (en) * 2005-12-31 2006-06-28 清华大学 Biocharacteristics fusioned identity distinguishing and identification method
CN101170405A (en) * 2006-10-25 2008-04-30 富士通株式会社 Biometric authentication method
CN101931947A (en) * 2010-07-28 2010-12-29 南京航空航天大学 WSN (Wireless Sensor Network) data safety processing method based on searchable cryptograph
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
US20160330035A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. User Identification Management System and Method
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794266A (en) * 2005-12-31 2006-06-28 清华大学 Biocharacteristics fusioned identity distinguishing and identification method
CN101170405A (en) * 2006-10-25 2008-04-30 富士通株式会社 Biometric authentication method
CN101931947A (en) * 2010-07-28 2010-12-29 南京航空航天大学 WSN (Wireless Sensor Network) data safety processing method based on searchable cryptograph
US20160330035A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. User Identification Management System and Method
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
庹小忠: "区块链在身份认证中的应用", 《科技经济导刊》 *

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786639A (en) * 2017-09-28 2018-03-09 山东鲁能智能技术有限公司 A kind of electric automobile networked system and its method of work based on block chain technology
CN107786547A (en) * 2017-09-30 2018-03-09 厦门快商通信息技术有限公司 A kind of auth method based on block chain, device and computer-readable recording medium
CN110365626A (en) * 2018-04-09 2019-10-22 厦门雅迅网络股份有限公司 The user in anticollision library logs in safety certifying method, terminal device and storage medium
CN110365626B (en) * 2018-04-09 2022-12-06 厦门雅迅网络股份有限公司 User login security authentication method for anti-collision library, terminal equipment and storage medium
CN108805573A (en) * 2018-04-21 2018-11-13 深圳市元征科技股份有限公司 A kind of Information Authentication method, server and storage medium
CN108805573B (en) * 2018-04-21 2022-04-15 深圳市元征科技股份有限公司 Information verification method, server and storage medium
CN108933667B (en) * 2018-05-03 2021-08-10 深圳市京兰健康医疗大数据有限公司 Management method and management system of public key certificate based on block chain
CN108933667A (en) * 2018-05-03 2018-12-04 深圳市京兰健康医疗大数据有限公司 A kind of management method and management system of the public key certificate based on block chain
CN108766509A (en) * 2018-05-16 2018-11-06 中国联合网络通信集团有限公司 Authenticating method, device, terminal based on block chain technology and storage medium
CN108809952A (en) * 2018-05-22 2018-11-13 隆正信息科技有限公司 Object authentication method and system based on more mark general unique keepsake chains of sectional
CN108882230A (en) * 2018-06-01 2018-11-23 中国联合网络通信集团有限公司 Message registration management method, apparatus and system
CN109145703A (en) * 2018-06-14 2019-01-04 北京凌云智链科技有限公司 Intelligent identification method, device, equipment and medium
CN108920908A (en) * 2018-06-28 2018-11-30 北京京东尚科信息技术有限公司 Date storage method, device and computer readable storage medium
CN108921555A (en) * 2018-06-30 2018-11-30 江苏恒宝智能***技术有限公司 A kind of auth method and device combined based on block chain and iris recognition
CN108881287A (en) * 2018-07-18 2018-11-23 电子科技大学 A kind of Internet of things node identity identifying method based on block chain
CN109063627A (en) * 2018-07-27 2018-12-21 文志 Digital Human artificial intelligence identity unique identification control method
CN109145543A (en) * 2018-09-03 2019-01-04 湖北文理学院 A kind of identity identifying method
CN109145543B (en) * 2018-09-03 2020-12-04 湖北文理学院 Identity authentication method
CN109194487A (en) * 2018-09-13 2019-01-11 全链通有限公司 Construction method and system are traded or communicated to my real name based on block chain
CN109039655A (en) * 2018-09-13 2018-12-18 全链通有限公司 Real name identity identifying method and device, identity block chain based on block chain
CN109495478B (en) * 2018-11-20 2021-05-04 桂林电子科技大学 Block chain-based distributed secure communication method and system
CN109495478A (en) * 2018-11-20 2019-03-19 桂林电子科技大学 A kind of distributed security communication means and system based on block chain
CN112465635A (en) * 2019-09-09 2021-03-09 上海旺链信息科技有限公司 Block chain public encryption algorithm processing method, block chain wallet and storage medium
CN110569658A (en) * 2019-09-12 2019-12-13 腾讯科技(深圳)有限公司 User information processing method and device based on block chain network, electronic equipment and storage medium
CN110674180A (en) * 2019-09-26 2020-01-10 腾讯科技(深圳)有限公司 Business data processing method and device and readable storage medium
CN110674180B (en) * 2019-09-26 2021-07-27 腾讯科技(深圳)有限公司 Business data processing method and device and readable storage medium
CN111131444B (en) * 2019-12-23 2020-09-29 广州公评科技有限公司 Network course processing system based on block chain technology
CN111131444A (en) * 2019-12-23 2020-05-08 广州公评科技有限公司 Network course processing system based on block chain technology
CN111353903A (en) * 2020-02-26 2020-06-30 广东工业大学 Network identity protection method and device, electronic equipment and storage medium
CN111680327A (en) * 2020-06-10 2020-09-18 中国银行股份有限公司 Block chain-based customer information integration method, device, equipment and storage medium
CN111680327B (en) * 2020-06-10 2024-02-23 中国银行股份有限公司 Block chain-based client information integration method, device, equipment and storage medium
CN113162768A (en) * 2021-02-24 2021-07-23 北京科技大学 Intelligent Internet of things equipment authentication method and system based on block chain
CN113162768B (en) * 2021-02-24 2022-07-22 北京科技大学 Intelligent Internet of things equipment authentication method and system based on block chain
CN113449336A (en) * 2021-06-11 2021-09-28 电子科技大学 Shared data processing method based on safe multi-party privacy protection in block chain
CN117494221A (en) * 2024-01-03 2024-02-02 齐鲁工业大学(山东省科学院) Internet of things data sharing method for block chain assisted search
CN117494221B (en) * 2024-01-03 2024-04-02 齐鲁工业大学(山东省科学院) Internet of things data sharing method for block chain assisted search

Also Published As

Publication number Publication date
CN107147652B (en) 2019-08-09

Similar Documents

Publication Publication Date Title
CN107147652B (en) A kind of safety fusion authentication method of the polymorphic identity of user based on block chain
US10680808B2 (en) 1:N biometric authentication, encryption, signature system
CN109962784B (en) Data encryption, decryption and recovery method based on multiple digital envelope certificates
US20170142082A1 (en) System and method for secure deposit and recovery of secret data
CN107359998B (en) A kind of foundation and operating method of portable intelligent password management system
CN107070938A (en) Data access control system based on block chain
CN109981255B (en) Method and system for updating key pool
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
KR20000075650A (en) Administration and utilization of secret fresh random numbers in a networked environment
JP2001512654A (en) Managing and using private keys in a network environment
CN110059458A (en) A kind of user password encryption and authentication method, apparatus and system
CN110674521B (en) Privacy protection evidence management system and method
JPH10214233A (en) Information processor, information processing system, method therefor, program storage device, method for judging key and device therefor
CN110771190A (en) Controlling access to data
CN110177134A (en) A kind of security password manager and its application method based on cloudy storage
CN110336663A (en) A kind of PUFs based on block chain technology certificate scheme group to group
CN113761488A (en) Content network copyright tracing encryption system and encryption method
CN109347923A (en) Anti- quantum calculation cloud storage method and system based on unsymmetrical key pond
CN113507380B (en) Privacy protection remote unified biometric authentication method and device and electronic equipment
CN108156139A (en) No certificate can verify that multiple key cryptogram search system and method
CN110098925A (en) Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system
CN114065169A (en) Privacy protection biometric authentication method and device and electronic equipment
CN109787747A (en) Anti- quantum calculation multi-enciphering cloud storage method and system based on multiple unsymmetrical key ponds
KR101528112B1 (en) Cloud server for authenticating user to access the data server using biometric trait
CN111541708B (en) Identity authentication method based on power distribution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant