CN108183801A - A kind of service authentication method, system and computer readable storage medium - Google Patents

A kind of service authentication method, system and computer readable storage medium Download PDF

Info

Publication number
CN108183801A
CN108183801A CN201711480294.2A CN201711480294A CN108183801A CN 108183801 A CN108183801 A CN 108183801A CN 201711480294 A CN201711480294 A CN 201711480294A CN 108183801 A CN108183801 A CN 108183801A
Authority
CN
China
Prior art keywords
node
business
information
identity token
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711480294.2A
Other languages
Chinese (zh)
Other versions
CN108183801B (en
Inventor
卢亦斌
吴弘坤
路成业
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Lang Run Innovation Intellectual Property Operation Co ltd
Original Assignee
Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chain Technology Co Ltd filed Critical Chain Technology Co Ltd
Priority to CN201711480294.2A priority Critical patent/CN108183801B/en
Publication of CN108183801A publication Critical patent/CN108183801A/en
Application granted granted Critical
Publication of CN108183801B publication Critical patent/CN108183801B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Data Mining & Analysis (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This application discloses a kind of service authentication method, system and computer readable storage medium, the method is merchandised by the identity token based on block chain come the certification of finishing service personnel's digital identity so that business personnel is more convenient efficiently from card identity.And node where consumer can more accurately inquire the business information of the business personnel according to the identity token of business personnel in business platform node, the interference of deceptive information be avoided, so as to select best consumption plan.

Description

A kind of service authentication method, system and computer readable storage medium
Technical field
This application involves field of computer technology, and in particular, to block chain technical field, more particularly, to one kind Service authentication method, system and computer readable storage medium.
Background technology
Block chain technology is the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm New application technology set.From the point of view of data Angle, block chain is sequentially in time by data block in a manner of being sequentially connected A kind of linked data structure being combined into, the data structure ensure that it can not distort and can not forge by cryptography mode. From the technical point of view, a variety of different technologies of block chain Technology Integration, by building block chain network so that in network Each node allows to obtain a complete database copy, and calculate to safeguard based on area based on common recognition mechanism and competition The update of the database of block chain.The end to end network formed is linked up by numerous nodes as a result, and realizes what data were stored and managed It decentralization and goes to trust.
In block chain network, all operation rules and data information disclose all nodes, therefore, often One record is visible to all nodes.Simultaneously as it goes to trust between node and node, therefore without open between node Identity, the node each participated in are anonymous.Meanwhile block chain technology has splendid safety, it is single even more than section Point can not influence the modification of database the database of other nodes, unless the node in whole network more than 51% can be controlled It changes simultaneously, is likely to the data that modification block chain is recorded, and this is hardly possible generation.
At present, the professions personnel such as insurance institution, medicine, since typical behaviour repeatedly influences people to insurance, medicine Etc. industries trust, cause people trust missing.By taking insurance as an example, even very outstanding insurance business, as people The distrust of insurance business personnel is abandoned buying, equally, there are many irregular insurance business, have benefited from insurance business The long-term induction of personnel forges some success business cases, some old men is caused to firmly believe, the big price of cost is not stinted even Endowment money, will also buy.Since the phenomenon that forging business information record, information asymmetry emerges in an endless stream, consumer is caused to protecting The trust serious loss of the business personnels such as dangerous mechanism, Pharmaceutical Sales Representative, and then damage both sides' equity.
Invention content
In view of this, this application discloses a kind of service authentication method, system and computer readable storage medium, so that Business personnel is more convenient efficiently from card identity, and enables consumers to more accurately inquire the business letter of the business personnel Breath, avoids the interference of deceptive information, so as to select best consumption plan.
In a first aspect, a kind of service authentication method is provided, including:
First node and identity token transaction generation first trading card of the second node execution based on block chain, described first Trading card includes private key signature, the identity token of the first node and the address of the second node of the first node, The private key of the first node is to be calculated by the biological characteristic of the corresponding business personnel of the first node by scheduled algorithm The information of generation, the identity token include the mark of scheduled inquiry business personal information;
For other node verifications by rear, the second node obtains the identity in first trading card is by block chain Token;
The second node initiates identity token transaction the second trading card of generation based on block chain to business platform node, Second trading card includes private key signature, the identity token and the business platform address of node of second node;
Second trading card be verified by and the business platform node receive the second node and obtain After the request of business personnel's information, the business platform node inquires the corresponding industry of the first node according to the identity token Business personal information simultaneously returns to query result;
Wherein, business personnel's information includes business information record and credit record;The business information record includes Type of service and the first node address.
Further, the method further includes:
Every business information record that the corresponding business personnel of the first node completes is uploaded to the business platform The node and cryptographic Hash for recording every business information enters chain and deposits card.
Further, the method further includes:
The cryptographic Hash and the first node that the second node records the business information of the first node of acquisition Card of depositing on block chain records the authenticity compared to verify the corresponding business personnel's information of the first node.
Further, the identity token fails after by the business platform node use.
Further, the scheduled algorithm is that the biometric keys based on chaos system generate algorithm.
Further, identity token transaction the first transaction of generation based on block chain is performed in first node and second node Before list, the method further includes:
The first node establishes digital identity in third node.
Further, the first node is established digital identity in third node and is included:
The third node acquires the biological characteristic of the corresponding business personnel of the first node to generate the first segment The private key of point;
The third node initiates the identity token transaction generation third trading card based on block chain to the first node, The address of private key signature of the third trading card including the third node, the identity token and the first node;
Other nodes third trading card according to the public key verifications of the third node in block chain;
Pass through if the third trading card is verified, the digital identity of the first node is successfully established, the first segment Point obtains the identity token.
Second aspect provides a kind of service authentication system, including:
First node is configured as performing identity token transaction the first transaction of generation based on block chain with second node It is single, first trading card include the private key signature of the first node, the first node identity token and described second Address of node, the private key of the first node are to be passed through to make a reservation for by the biological characteristic of the corresponding business personnel of the first node Algorithm calculate the information of generation, the identity token includes the mark of scheduled inquiry business personal information;
Second node is configured as initiating identity token transaction the second friendship of generation based on block chain to business platform node Yi Dan, the ground of private key signature of second trading card including second node, the identity token and the business platform node Location;And
Business platform node, be configured as second trading card be verified by and the business platform node connect It receives after the second node obtains the request of business personnel's information and is corresponded to according to the identity token inquiry first node Business personnel's information and return to query result;
Wherein, business personnel's information includes business information record and credit record;The business information includes business The address of type and the first node.
Further, the system also includes:
Third node is configured as establishing the digital identity of the corresponding business personnel of the first node.
The third aspect provides a kind of computer readable storage medium, stores computer program instructions, the computer thereon Program instruction realizes as above any one of them method when being executed by processor.
In the embodiment of the present application, it is merchandised by the identity token based on block chain come finishing service personnel's digital identity Certification so that business personnel is more convenient efficiently from card identity.And node where consumer is according to the identity of business personnel Token can more accurately inquire the business information of the business personnel in business platform node, avoid the interference of deceptive information, from And select best consumption plan.
Description of the drawings
By referring to the drawings to the description of the embodiment of the present application, the above-mentioned and other purpose of the application, feature and Advantage will be apparent from, in the accompanying drawings:
Fig. 1 is the schematic diagram of the service authentication system of the embodiment of the present application;
Fig. 2 is the flow chart of the service authentication method of the embodiment of the present application;
Fig. 3 is the flow chart for establishing digital identity method of the embodiment of the present application;
Fig. 4 is the flow chart of the business information authentication method of the embodiment of the present application;
Fig. 5 is the schematic diagram of the electronic equipment of the embodiment of the present application.
Specific embodiment
The application is described below based on embodiment, but the application is not restricted to these embodiments.Under Text is detailed to describe some specific detail sections in the datail description of the application.Do not have for a person skilled in the art The description of these detail sections can also understand the application completely.In order to avoid obscuring the essence of the application, well known method, mistake There is no narrations in detail for journey, flow, element and circuit.
In addition, it should be understood by one skilled in the art that provided herein attached drawing be provided to explanation purpose, and What attached drawing was not necessarily drawn to scale.
Unless the context clearly requires otherwise, otherwise throughout the specification and claims " comprising ", "comprising" etc. are similar Word should be construed to the meaning included rather than exclusive or exhaustive meaning;That is, it is containing for " including but not limited to " Justice.
In the description of the present application, it is to be understood that term " first ", " second " etc. are only used for description purpose, without It is understood that indicate or implying relative importance.In addition, in the description of the present application, unless otherwise indicated, the meaning of " multiple " It is two or more.
Fig. 1 is the schematic diagram of the service authentication system of the embodiment of the present application.As shown in Figure 1, service authentication system includes the One node 1, second node 2, third node 3 and business platform node 4.Wherein, first node 1 is that business personnel (protect by such as medicine The business personnels such as danger) place node, second node 2 is node where consumer, and third node 3 is that digital identity establishes organ's section Point (namely public security department).First node 1, second node 2, third node 3 and business platform node 4 may be coupled to one Block chain network is attached communication by block chain.It should be understood that in the network based on block chain technology, it is mounted with predetermined The communications data processing unit of program can be freely accessible to network as one of block chain node.
In the embodiment of the present application, third node 3 (namely digital identity establishes organ's node) is configured as acquisition first The biological characteristic of the corresponding business personnel of node 1 (namely node where business personnel), according to the biological characteristic of the business personnel Generate the private key of first node 1.Wherein, the private key of first node 1 is generated according to the biometric keys based on chaos system What algorithm calculated.
Chaos system refers to that in a deterministic system there is seemingly random irregular movement, behavior expressions To be uncertain, not reproducible, unpredictable, here it is chaos phenomenons.Chaos is the inherent characteristic of nonlinear dynamic system, is The phenomenon that nonlinear system generally existing.Chaos system has two features of sensibility and randomness necessary to generation key, Therefore algorithm can be generated according to the biometric keys based on chaos system to calculate the private key of first node 1.
A series of for example, it is assumed that floating-points positioned at section [0,1] of the biological characteristic of 1 corresponding business personnel of first node Number (c1,c2..., cL) mark, TD-ERCS (tangent delay-ellipse cavity map are based on using one kind System cuts delay elliptical reflecting chamber system) the biological characteristic processing function of (type of chaos system) generates private key The step of it is as follows:
(1) initialization key:The starting point abscissa x of ray is set0And angle [alpha], delay m is cut (in order to make up discretization Caused performance degradation, the oval tangent line of m secondary reflection points before reflection tangent line takes are referred to as cutting delay m) and elliptic parameter μ;
(2) normal state iteration:Tangent slope K is setnEqual to biological characteristic ci(backward is defeated again by first sequence for biological characteristic Enter), 2L iteration is carried out to system;
(3) final iteration:It cuts delay and is set as m, make last 38 iteration to system;
(4) private key is generated:Extract the abscissa x in last 32 iterationnMinimum 8 bit, group sets the private of 256 bits Key.
Iterative formula is as follows:
Wherein, xn, yn, knThe slope of the abscissa of n-th of pip, ordinate and reflected ray is represented respectively;KnIt represents The tangent slope of n-th of pip.
It should be understood that above citing is only based on the one of which algorithm that chaos system is calculated private key by biological characteristic, Private key can be calculated by biological characteristic using other available algorithms.
The public key of block chain node is the information by the way that its private key is generated after elliptic curve encryption algorithm.It is oval bent Intractability of the safety of line Encryption Algorithm based on discrete logarithm on elliptic curve.
Elliptic curve is the Weierstrass equation there are two argument x and y by a tool:
y2+ axy+by=x3+cx2+dx+e
The set of identified all the points (x, y) composition, additional infinite point O ∞ (thinking its y-coordinate infinity).
The elliptic curve for being usually used in cryptographic system is to be defined into elliptic curve on one finite field Fp namely discrete ellipse Circular curve equation:
y2=x3+ax2+b(mod p)
The set of identified all the points (x, y) composition, additional infinite point O ∞.Wherein x, y, a, b are limited Value on the Fp of domain, and a, b meet 4a3+27b2≠ 0, p are greater than 3 prime number, and this kind of curve is represented usually using Ep (a, b).
Some point P on elliptic curve, there are a minimum number n so that nP=O ∞, then n is exactly the rank of point P.
If K, G is the point on Ep (a, b), and K=kG, k are the integer less than n (n is the rank of point G).Given k and G, According to Adding law, calculate K and be easy to, but given K and G, k is sought with regard to relatively difficult, is solved so far without effective method This problem, here it is the principles of elliptic curve encryption algorithm (Adding law includes G+G=2G namely kG and is added for k G).
Wherein, point G is the basic point of user's selection on elliptic curve Ep (a, b).K is the private key (k of user's selection<N, n Rank for basic point G), K is the public key calculated by private key k.
In the present embodiment, by the biological characteristic of business personnel calculation is generated by the biometric keys based on chaos system Method obtains the private key of first node 1, and then third node 3 selectes corresponding elliptic curve and basic point to calculate first node 1 Public key.The public key of first node 1 can obtain the address of first node 1, and this derivation by a series of Hash operations It is irreversible in theory.It should be understood that the public key of block chain node and the corresponding address of block chain node are can be to granddad It opens, therefore can be as the mark of the block chain node.The embodiment of the present application is made using node in the address of block chain network For its unique mark.
It should be understood that clear and definite spy of the biological characteristic acquired for the predetermined number of at least one biological characteristic of business personnel Information of the sign point after data processing.Biological characteristic can be iris, DNA, electrocardiogram, retina, brain wave, infrared temperature light One or more features in the information such as spectrogram, vein.
Third node 3 (namely digital identity establishes organ's node) is additionally configured to (namely the business personnel of first node 1 Place node) initiate the identity token transaction generation third trading card based on block chain.Third trading card includes third node 3 The address of private key signature, the identity token of first node 1 and first node 1.Wherein, identity token includes scheduled inquiry business The mark of personal information.The mark of scheduled inquiry business personal information can be the body of 1 corresponding business personnel of first node The cryptographic Hash of part feature or other and the relevant information of business personnel's identity information.
After first node 1 and third node 3 perform the transaction of block chain, third trading card is broadcasted in block chain.Block Other nodes in chain use the public key verifications third trading card of third node 3, if third trading card is verified by rear, first The digital identity of 1 corresponding business personnel of node is successfully established.First node 1 obtains the identity token of first node 1.
In the embodiment of the present application, building by identity token transaction finishing service personnel's digital identity based on block chain It is vertical so that the identity information of business personnel no longer concentrates on central database, can effectively prevent data leak and forged identity etc. Safety problem.
First node 1 is configured as initiating the identity based on block chain to second node 2 (namely node where consumer) Token transaction the first trading card of generation.Wherein, the first trading card includes private key signature, the identity of first node 1 of first node 1 The address of token and second node 2.
After first node 1 and second node 2 carry out block chain transaction, the first trading card is broadcasted in block chain.Block Other nodes in chain use the first trading card of public key verifications of first node 1, pass through if the first trading card is verified, first segment The digital identification authentication success of 1 corresponding business personnel of point.Second node 2 obtains the identity token of first node 1.
In the embodiment of the present application, recognizing by identity token transaction finishing service personnel's digital identity based on block chain Card so that business personnel is more convenient efficiently from card identity.
Second node 2 is configured as initiating the identity token transaction generation second based on block chain to business platform node 4 Trading card, the second trading card include the private key signature of second node 2, the identity token of first node 1 and business platform node 4 Address.
After second node 2 and business platform node 4 perform the identity token transaction based on block chain, the second trading card exists It is broadcasted in block chain.Other nodes use the second trading card of public key verifications of second node 2 in block chain.In the second trading card quilt When being verified, business platform node 4 obtains the identity token of first node 1.The identity token includes scheduled inquiry business The mark of personal information.
Business platform node 4 be configured as second trading card be verified by and the business platform node connect It receives the second node and obtains inquiry business personal information after the request of business personnel's information in above-mentioned identity token Mark inquiry 1 corresponding business personnel's information of first node, and return to query result.Wherein, business personnel's information includes industry Information of being engaged in record and credit record.Business information record includes type of service (such as insurance type, medical-type etc.) and first segment The address of point 1.Business platform node 4 calculates the corresponding business information record of business personnel to assess the business personnel by statistics Credit record.
It should be understood that second node 2 can be verified in the second trading card obtains industry by rear sent to business platform node The request for personal information of being engaged in;Can also initiated to business platform node 4 identity token based on block chain transaction while, to Business platform node sends the request for obtaining business personnel's information.
Preferably, after the identity token is used for 4 inquiry business personal information of registering service platform nodes, this is set Identity token fails with the safety of maintenance service personal information.
After the identity token for obtaining first node 1 in second node 2, it can be handed over by the identity token based on block chain The identity token of first node 1 is easily transmitted to other consumer nodes.But the identity token in first node 1 is sent To business platform node 4 and after carrying out business personnel's information inquiry, the identity token destroyed mistake at business platform node 4 Effect.That is, each identity token can only carry out one query.
Preferably, the every business information record 1 corresponding business personnel of first node completed is uploaded to business platform Node 4, while the cryptographic Hash that every business information of the business personnel is recorded enters chain and deposits card.
Further, the Hash that second node 2 records the business information of the 1 corresponding business personnel of first node of acquisition Value is compared with card record of depositing of the first node 1 on block chain.If obtain business information record cryptographic Hash with it is corresponding Block chain on deposit that card record is consistent, then the business personnel's information obtained in business platform querying node is true.If it obtains Take business information record cryptographic Hash on corresponding block chain deposit card record it is inconsistent, then in business platform querying node There may be forge phenomenon for business personnel's information of acquisition.
In conclusion it in the embodiment of the present application, merchandises to establish business personnel by the identity token based on block chain Digital identity so that the identity information of business personnel no longer concentrates on central database, can effectively prevent data leak and puppet Make the safety problems such as identity.And pass through identity token transaction the recognizing come finishing service personnel's digital identity based on block chain Card so that business personnel is more convenient efficiently from card identity.It is merchandised by the identity token based on block chain come inquiry business Personal information, the business information that consumer can more accurately inquire the business personnel can simultaneously verify business people in block chain The authenticity of member's business information, avoids the interference of deceptive information, so as to select best consumption plan.
Fig. 2 is the flow chart of the service authentication method of the embodiment of the present application.As shown in Fig. 2, in step S110, third node The corresponding business personnel's of (namely digital identity establishes organ's node) acquisition first node (namely node where business personnel) Biological characteristic is to generate the private key of first node.Wherein, algorithm is generated according to the biometric keys based on chaos system to calculate The private key of first node.The private key of first node generates the public key of first node after elliptic curve encryption algorithm.First segment The public key of point obtains the address of first node by a series of Hash operations.Wherein, the biological characteristic acquired is the business Information of the clear and definite characteristic point of the predetermined number of at least one biological characteristic of personnel after data processing.The biological characteristic Can be one or more spies in the information such as iris, DNA, electrocardiogram, retina, brain wave, infrared temperature spectrogram, vein Sign.
In step S120, third node performs the identity token transaction generation third transaction based on block chain with first node It is single.Third trading card includes private key signature, the identity token of first node and the address of first node of third node.
In step S130, third trading card is broadcasted in block chain, other nodes in block chain are according to third node Public key verifications third trading card.If third trading card by verification, the digital identity of the corresponding business personnel of first node into Work(is established.First node obtains above-mentioned identity token.
In step S140, first node (node where business personnel) performs base with second node (node where consumer) In identity token transaction the first trading card of generation of block chain.First trading card includes the private key signature of first node, first segment The identity token of point and the address of second node.
In step S150, the first trading card is broadcasted in block chain, other nodes in block chain are according to first node The first trading card of public key verifications.If the first trading card is recognized by verification, the digital identity of the corresponding business personnel of first node It demonstrate,proves successfully, second node obtains the identity token of first node.If the first trading card is not verified, second node is corresponding The digital identification authentication failure of business personnel.That is, the business personnel may forge information.
In step S160, second node initiates the identity token transaction generation second based on block chain to business platform node Trading card, the second trading card include private key signature, the identity token of first node and the ground of business platform node of second node Location.Identity token includes the mark of scheduled inquiry business personal information.
In step S170, the second trading card is broadcasted in block chain, other nodes are according to the public affairs of second node in block chain Key verifies the second trading card.The second trading card be verified by when, business platform node obtain first node identity token.
In step S180, second node sends the request for obtaining business personnel's information to business platform node.Wherein, it obtains The request of business personnel's information includes the address of first node.
In step S190, business platform node is according to the mark of the inquiry business personal information in the identity token of first node Know the corresponding business personnel's information of inquiry first node, and return to query result.Wherein, business personnel's information includes business information Record and credit record.Business information record includes the ground of type of service (such as insurance type, medical-type etc.) and first node Location.Business platform node calculates the corresponding business information record of business personnel by statistics and remembers to assess the credit of the business personnel Record.
It should be understood that second node can also initiate the same of the identity token transaction based on block chain to business platform node When, the request for obtaining business personnel's information is sent to business platform node.
Preferably, after the identity token is used for registering service platform nodes inquiry business personal information, this is set Identity token fails with the safety of maintenance service personal information.
After the identity token for obtaining first node in second node, it can be merchandised by the identity token based on block chain The identity token of first node is transmitted to other consumer nodes.But the identity token in first node is sent to industry Business platform nodes and after carrying out business personnel's information inquiry, the identity token destroyed failure at business platform node. That is each identity token can only carry out one query.
In the embodiment of the present application, it merchandises to establish the digital body of business personnel by the identity token based on block chain Part so that the identity information of business personnel no longer concentrates on central database, can effectively prevent data leak and forged identity etc. Safety problem.And merchandised by the identity token based on block chain come the certification of finishing service personnel's digital identity so that industry Business personnel are more convenient efficiently from card identity.It is merchandised by the identity token based on block chain come inquiry business personal information, Consumer can more accurately inquire the business information of the business personnel, avoid the interference of deceptive information, best so as to select Consumption plan.
Preferably, service authentication method further includes step S1A0.In step S1A0, by the corresponding business personnel of first node The every business information record completed is uploaded to business platform node, meanwhile, every business information of the business personnel is recorded Cryptographic Hash enter chain and deposit card.
Preferably, service authentication method further includes step S1B0.In step S1B0, second node is by the first node of acquisition The cryptographic Hash of the business information record of corresponding business personnel is compared with card record of depositing of the first node on block chain.If The cryptographic Hash of the business information record of acquisition deposits card record unanimously on corresponding block chain, then in business platform querying node Business personnel's information of acquisition is true.If the cryptographic Hash of business information record obtained deposits card on corresponding block chain Record it is inconsistent, then business platform querying node obtain business personnel's information there may be forge phenomenon.
Fig. 3 is the flow chart for establishing digital identity method of the embodiment of the present application.As shown in figure 3, in step S100, third Node (namely digital identity establishes organ's node) acquires the biological characteristic of the corresponding business personnel of first node to generate first The private key of node.Wherein, according to the biological characteristic of business personnel and the biometric keys based on chaos system generate algorithm meter Calculate the private key of first node.The private key of first node generates the public key of first node after elliptic curve encryption algorithm.First The public key of node obtains the address of first node by a series of Hash operations.Wherein, the biological characteristic acquired is business people Information of the clear and definite characteristic point of the predetermined number of at least one biological characteristic of member after data processing.The biological characteristic can Think one or more features in the information such as iris, DNA, electrocardiogram, retina, brain wave, infrared temperature spectrogram, vein.
In step S200, third node performs the identity token transaction generation third transaction based on block chain with first node It is single.The address of private key signature of the third trading card including third node, identity token and first node.
In step S300, third trading card is broadcasted in block chain, other nodes in block chain are according to third node Public key verifications third trading card.If third trading card by verification, the digital identity of the corresponding business personnel of first node into Work(is established.First node obtains above-mentioned identity token by decrypting third trading card.
In the embodiment of the present application, building by identity token transaction finishing service personnel's digital identity based on block chain It is vertical so that the identity information of business personnel no longer concentrates on central database, can effectively prevent data leak and forged identity etc. Safety problem.
Fig. 4 is the flow chart of the business information authentication method of the embodiment of the present application.As shown in figure 4, in step S400, second Node (namely node where consumer) performs the identity based on block chain with first node (namely node where business personnel) Token transaction the first trading card of generation.The private key signature of first trading card including first node, the identity token of first node and The address of second node.Wherein, according to the biological characteristic of business personnel and the biometric keys based on chaos system generate calculation Method calculates the private key of first node.Identity token includes the mark of scheduled inquiry business personal information.Inquiry business personnel believe The mark of breath can be the cryptographic Hash or other and business personnel's identity of the identity characteristic of 1 corresponding business personnel of first node The relevant information of information.
In step S500, the first trading card is broadcasted in block chain, other nodes in block chain are according to first node The first trading card of public key verifications.If the first trading card is recognized by verification, the digital identity of the corresponding business personnel of first node It demonstrate,proves successfully, second node obtains the identity token of first node.
If should be understood that, the first trading card is not verified, the digital identification authentication of the corresponding business personnel of second node Failure.That is, the information of the business personnel may be forgery.
In step S600, second node performs the identity token transaction generation second based on block chain with business platform node Trading card, the second trading card include private key signature, the identity token of first node and the ground of business platform node of second node Location.
Second trading card is broadcasted in block chain, other nodes in block chain are according to the public key verifications second of second node Trading card.Pass through if the second trading card is verified, business platform node obtains the identity token of first node.
In step S700, second node sends the request for obtaining business personnel's information to business platform node.Wherein, it obtains The request of business personnel's information includes the address of first node.
In step S800, the mark inquiry of inquiry business personal information of the business platform node in above-mentioned identity token The corresponding business personnel's information of first node, and return to query result.Wherein, business personnel's information include business information record and Credit record.Business information record includes the address of type of service (such as insurance type, medical-type etc.) and first node.Business Platform nodes calculate the corresponding business information record of business personnel to assess the credit record of the business personnel by statistics.
It should be understood that second node can also initiate the same of the identity token transaction based on block chain to business platform node When, the request for obtaining business personnel's information is sent to business platform node.
Preferably, after the identity token is used for registering service platform nodes inquiry business personal information, this is set Identity token fails with the safety of maintenance service personal information.
After the identity token for obtaining first node in second node, it can be merchandised by the identity token based on block chain The identity token of first node is transmitted to other consumer nodes.But the identity token in first node is sent to industry Business platform nodes and after carrying out business personnel's information inquiry, the identity token destroyed failure at business platform node. That is each identity token can only carry out one query.
In the embodiment of the present application, it is merchandised by the identity token based on block chain come finishing service personnel's digital identity Certification so that business personnel is more convenient efficiently from card identity.And information inquiry of the consumer in identity token should Business personnel's information of business personnel, it is the information forged to avoid inquired business personnel's information, avoids deceptive information Interference, so as to select best consumption plan.
Further, the method for business information inquiry further includes step 900.In step 900, by the corresponding industry of first node Every business information record that business personnel complete is uploaded to business platform node, meanwhile, every business of the business personnel is believed The cryptographic Hash of breath record enters chain and deposits card.
Further, the method for business information inquiry further includes step A00.In step A00, second node is by the of acquisition The cryptographic Hash of the business information record of the corresponding business personnel of one node is carried out with card record of depositing of the first node on block chain Comparison.If the cryptographic Hash of the business information record obtained deposits card record unanimously on corresponding block chain, in business platform Business personnel's information that querying node obtains is true.If cryptographic Hash and the corresponding block chain of the business information record obtained On deposit card record it is inconsistent, then business platform querying node obtain business personnel's information exist forge phenomenon.
Fig. 5 is the schematic diagram of the electronic equipment of the embodiment of the present application.Electronic equipment shown in fig. 5 is filled for general data processing It puts, including general computer hardware structure, includes at least processor 51 and memory 52.Processor 51 and memory 52 It is connected by bus 53.Memory 52 is suitable for the executable instruction of storage processor 51 or program.Processor 51 can be independent Microprocessor or one or more microprocessor set.Processor 51 is deposited by performing memory 52 as a result, The instruction of storage is realized so as to perform the method flow of the embodiment of the present application as described above for the processing of data and for other The control of device.Bus 53 links together above-mentioned multiple components, while said modules are connected to 54 He of display controller Display device and input/output (I/O) device 55.Input/output (I/O) device 55 can be mouse, keyboard, modulation /demodulation Device, network interface, touch-control input device, body-sensing input unit, printer and other devices well known in the art.Typically, Input/output device 55 is connected by input/output (I/O) controller 56 with system.
It will be understood by those skilled in the art that embodiments herein can be provided as method, apparatus (equipment) or computer Program product.Therefore, in terms of the application can be used complete hardware embodiment, complete software embodiment or combine software and hardware The form of embodiment.Moreover, the calculating for wherein including computer usable program code in one or more can be used in the application The computer program that machine readable storage medium storing program for executing is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Product.
The application is the flow chart with reference to method, apparatus (equipment) and computer program product according to the embodiment of the present application Come what is described.It should be understood that each flow in flow chart can be realized by computer program instructions.
These computer program instructions, which can be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction generation being stored in the computer-readable memory includes referring to The manufacture of device is enabled, which realizes the function of being specified in one flow of flow chart or multiple flows.
Also can provide these computer program instructions to all-purpose computer, special purpose computer, Embedded Processor or other The processor of programmable data processing device is to generate a machine so that is set by computer or the processing of other programmable datas The instruction that standby processor performs generates the device of function for being used to implement and being specified in one flow of flow chart or multiple flows.
The foregoing is merely the preferred embodiments of the application, are not limited to the application, for those skilled in the art For, the application can have various modifications and changes.All any modifications made within spirit herein and principle are equal Replace, improve etc., it should be included within the protection domain of the application.

Claims (10)

1. a kind of service authentication method, including:
First node performs identity token transaction the first trading card of generation based on block chain, first transaction with second node Single private key signature, the identity token of the first node and address of the second node for including the first node, it is described The private key of first node is to calculate generation by scheduled algorithm by the biological characteristic of the corresponding business personnel of the first node Information, the identity token includes the mark of scheduled inquiry business personal information;
By rear, the second node obtains the identity and enables other node verifications in first trading card is by block chain Board;
The second node initiates identity token transaction the second trading card of generation based on block chain to business platform node, described Second trading card includes private key signature, the identity token and the business platform address of node of second node;
Second trading card be verified by and the business platform node receive the second node and obtain business After the request of personal information, the business platform node inquires the corresponding business people of the first node according to the identity token Member's information simultaneously returns to query result;
Wherein, business personnel's information includes business information record and credit record;The business information record includes business Type and the first node address.
2. service authentication method according to claim 1, which is characterized in that the method further includes:
Every business information record that the corresponding business personnel of the first node completes is uploaded to the business platform node And the cryptographic Hash for recording every business information enters chain and deposits card.
3. service authentication method according to claim 2, which is characterized in that the method further includes:
The second node is by the cryptographic Hash that the business information of the first node of acquisition records with the first node in area Card of depositing on block chain records the authenticity compared to verify the corresponding business personnel's information of the first node.
4. service authentication method according to claim 1, which is characterized in that the identity token is by the business platform It fails after node use.
5. service authentication method according to claim 1, which is characterized in that the scheduled algorithm is based on chaos system Biometric keys generate algorithm.
6. service authentication method according to claim 1, which is characterized in that be based in first node and second node execution Before identity token transaction the first trading card of generation of block chain, the method further includes:
The first node establishes digital identity in third node.
7. service authentication method according to claim 6, which is characterized in that the first node establishes number in third node Body part includes:
The third node acquires the biological characteristic of the corresponding business personnel of the first node to generate the first node Private key;
The third node initiates the identity token transaction generation third trading card based on block chain to the first node, described The address of private key signature of the third trading card including the third node, the identity token and the first node;
Other nodes third trading card according to the public key verifications of the third node in block chain;
Pass through if the third trading card is verified, the digital identity of the first node is successfully established, and the first node obtains Take the identity token.
8. a kind of service authentication system, including:
First node is configured as performing identity token transaction the first trading card of generation based on block chain, institute with second node It states the first trading card and includes the private key signature of the first node, the identity token of the first node and the second node Address, the private key of the first node are to pass through scheduled algorithm by the biological characteristic of the corresponding business personnel of the first node The information of generation is calculated, the identity token includes the mark of scheduled inquiry business personal information;
Second node is configured as initiating identity token transaction the second transaction of generation based on block chain to business platform node Single, second trading card includes private key signature, the identity token and the business platform address of node of second node; And
Business platform node, be configured as second trading card be verified by and the business platform node receive The corresponding industry of the first node is inquired according to the identity token after the request of second node acquisition business personnel's information Business personal information simultaneously returns to query result;
Wherein, business personnel's information includes business information record and credit record;The business information includes type of service With the address of the first node.
9. service authentication system according to claim 8, which is characterized in that the system also includes:
Third node is configured as establishing the digital identity of the corresponding business personnel of the first node.
10. a kind of computer readable storage medium, stores computer program instructions thereon, which is characterized in that the computer journey The method as described in any one of claim 1-7 is realized in sequence instruction when being executed by processor.
CN201711480294.2A 2017-12-29 2017-12-29 Service authentication method, system and computer readable storage medium Active CN108183801B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711480294.2A CN108183801B (en) 2017-12-29 2017-12-29 Service authentication method, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711480294.2A CN108183801B (en) 2017-12-29 2017-12-29 Service authentication method, system and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108183801A true CN108183801A (en) 2018-06-19
CN108183801B CN108183801B (en) 2023-04-25

Family

ID=62549077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711480294.2A Active CN108183801B (en) 2017-12-29 2017-12-29 Service authentication method, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108183801B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108847931A (en) * 2018-06-25 2018-11-20 北京奇虎科技有限公司 Block chain key generation method and device based on biometric
CN109218012A (en) * 2018-09-11 2019-01-15 重庆邮电大学 A kind of distributed intelligence ammeter sale of electricity method and system with concentrator
CN109327312A (en) * 2018-10-26 2019-02-12 阿里巴巴集团控股有限公司 Authentication method and device, electronic equipment
CN109508521A (en) * 2018-11-12 2019-03-22 四川长虹电器股份有限公司 A kind of electric appliances service personnel's verification mechanism based on block chain
CN111340402A (en) * 2020-03-27 2020-06-26 泰康保险集团股份有限公司 Group insurance service management method, system, device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533696A (en) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 Block chain-based identity authentication methods, authentication server and user terminal
CN106789911A (en) * 2016-11-15 2017-05-31 深圳银链科技有限公司 A kind of network identity validation method and system based on block chain
WO2017112019A1 (en) * 2015-12-22 2017-06-29 Thomson Reuters Global Resources Methods and systems for identity creation, verification and management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017112019A1 (en) * 2015-12-22 2017-06-29 Thomson Reuters Global Resources Methods and systems for identity creation, verification and management
CN106789911A (en) * 2016-11-15 2017-05-31 深圳银链科技有限公司 A kind of network identity validation method and system based on block chain
CN106533696A (en) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 Block chain-based identity authentication methods, authentication server and user terminal

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108847931A (en) * 2018-06-25 2018-11-20 北京奇虎科技有限公司 Block chain key generation method and device based on biometric
CN108847931B (en) * 2018-06-25 2021-06-15 北京奇虎科技有限公司 Block chain key generation method and device based on biological identification result
CN109218012A (en) * 2018-09-11 2019-01-15 重庆邮电大学 A kind of distributed intelligence ammeter sale of electricity method and system with concentrator
CN109218012B (en) * 2018-09-11 2021-07-16 重庆邮电大学 Distributed intelligent electric meter electricity selling method and system with concentrator
CN109327312A (en) * 2018-10-26 2019-02-12 阿里巴巴集团控股有限公司 Authentication method and device, electronic equipment
CN109327312B (en) * 2018-10-26 2020-03-24 阿里巴巴集团控股有限公司 Authentication method and device and electronic equipment
CN109508521A (en) * 2018-11-12 2019-03-22 四川长虹电器股份有限公司 A kind of electric appliances service personnel's verification mechanism based on block chain
CN111340402A (en) * 2020-03-27 2020-06-26 泰康保险集团股份有限公司 Group insurance service management method, system, device and storage medium
CN111340402B (en) * 2020-03-27 2022-06-03 泰康保险集团股份有限公司 Group insurance service management method, system, device and storage medium

Also Published As

Publication number Publication date
CN108183801B (en) 2023-04-25

Similar Documents

Publication Publication Date Title
CN108183801A (en) A kind of service authentication method, system and computer readable storage medium
CN108234135A (en) A kind of service authentication method, system and computer readable storage medium
US20220191197A1 (en) Systems and methods for providing block chain-based multifactor personal identity verification
TWI703853B (en) User identity authentication method and device in network
CN108055258A (en) A kind of identity data management method, system and computer readable storage medium
CN107066893B (en) The treating method and apparatus of account information in block chain
CN108848063A (en) Data processing method, system and computer readable storage medium based on block chain
WO2012097362A2 (en) Protecting codes, keys and user credentials with identity and patterns
US20190354669A1 (en) 3d virtual interactive digital user authentication security
Godfrey-Welch et al. Blockchain in payment card systems
CN104168115B (en) The undetachable digital signatures method of forward secrecy
AU2018100477A4 (en) Systems and methods for providing block chain-based multifactor personal identity verification
Rana International identity protection
Imtiaz et al. Smart Identity Management System Using Blockchain Technology
Lee et al. A Clicks-and-Mortar Smart System
Bratli Document Verification System on iOS with Face ID/Touch ID
CN114762289A (en) Method for deriving partial signatures using partial verification
KR101454280B1 (en) Secure card with punching card and method thereof
CN116888666A (en) Method and system for implementing speaker de-identification in public audio data by utilizing resistant perturbations
CN115803763A (en) Method, terminal and banknote register for transmitting electronic banknote data sets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210125

Address after: 215163 No. 9 Xuesen Road, Science and Technology City, Suzhou High-tech Zone, Jiangsu Province

Applicant after: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Address before: 100000 4008, 4 floor, 9 building, 56 half moon street, Xicheng District, Beijing.

Applicant before: SINOCHAIN TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20180619

Assignee: Lianbang network technology service Nantong Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980045803

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231107

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20180619

Assignee: Nantong Jiaerjie Labor Care Products Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980050378

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231206

Application publication date: 20180619

Assignee: Nantong Yaocheng mechanical equipment manufacturing Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980050154

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231206

Application publication date: 20180619

Assignee: Nantong Xinxin Pharmaceutical Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980050150

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231206

Application publication date: 20180619

Assignee: Nantong Juntai motor vehicle testing Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980049477

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231205

Application publication date: 20180619

Assignee: Nantong Chujie Electronic Equipment Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980050384

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231206

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20180619

Assignee: Nantong Juguang Trading Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980050774

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231208

Application publication date: 20180619

Assignee: NANTONG YA TAI CANDLE ARTS & CRAFTS Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980050773

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231208

Application publication date: 20180619

Assignee: Nantong Weiai Home Textile Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980050668

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231208

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20180619

Assignee: Jiangsu Yichuang Packaging Materials Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051259

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231212

Application publication date: 20180619

Assignee: Nantong Jingxuan Textile Technology Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051252

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231212

Application publication date: 20180619

Assignee: Nantong Huanlian Textile Technology Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051246

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231212

Application publication date: 20180619

Assignee: Nantong Tongzhou Kangxintang Drugstore Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051234

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231212

Application publication date: 20180619

Assignee: American Antelope Home Textile (Nantong) Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051037

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231211

Application publication date: 20180619

Assignee: Nantong Tuoerpu Surveying and Mapping Information Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051034

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231211

Application publication date: 20180619

Assignee: Nantong TongZhou Jinfeng Textile Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051033

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231211

Application publication date: 20180619

Assignee: Nantong Chenghui Pharmacy Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051032

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231211

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20180619

Assignee: Nantong Yuma Electromechanical Manufacturing Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051794

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231215

Application publication date: 20180619

Assignee: Nantong Lingde Pharmaceutical Equipment Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051787

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231215

Application publication date: 20180619

Assignee: Yitong Intelligent Control Technology (Nantong) Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051745

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231215

Application publication date: 20180619

Assignee: Nantong Dongdong Steel Structure Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051732

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231215

Application publication date: 20180619

Assignee: Nantong Huaxin Price Evaluation Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051652

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231214

Application publication date: 20180619

Assignee: Nantong Jianwei Metal Technology Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051651

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231214

Application publication date: 20180619

Assignee: JIANGSU YATAI FITNESS CO.,LTD.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051650

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231214

Application publication date: 20180619

Assignee: JIANGSU KANGFEITE POWER TECHNOLOGY Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051649

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231214

Application publication date: 20180619

Assignee: Nantong Qiju Textile Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051534

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231213

Application publication date: 20180619

Assignee: Nantong Ansheng Textile Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051533

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231213

Application publication date: 20180619

Assignee: Nantong Steel Machinery Manufacturing Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051532

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231213

Application publication date: 20180619

Assignee: NANTONG FEIHAI ELECTRONIC TECHNOLOGY CO.,LTD.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980051531

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231213

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20180619

Assignee: Nantong Huase Space Textile Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052536

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231221

Application publication date: 20180619

Assignee: Jiangsu guanan electromechanical Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052527

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231221

Application publication date: 20180619

Assignee: Nantong Anergu New Material Technology Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052518

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231221

Application publication date: 20180619

Assignee: Nantong Yijialai Woolen Knitting Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052512

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231221

Application publication date: 20180619

Assignee: Nantong Laiou Electronic Technology Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052377

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231219

Application publication date: 20180619

Assignee: Nantong Ouchen Electronic Technology Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052355

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231219

Application publication date: 20180619

Assignee: Nantong Laishang Electronic Technology Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052351

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231219

Application publication date: 20180619

Assignee: NANTONG KYLIN MACHINERY LTD.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052325

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231218

Application publication date: 20180619

Assignee: Haoshi new material technology Nantong Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052125

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231218

Application publication date: 20180619

Assignee: NANTONG YUQI METAL PRODUCTS Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052111

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231218

Application publication date: 20180619

Assignee: Nantong Runyuan structural parts Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052101

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231218

Application publication date: 20180619

Assignee: NANTONG LILIAN MACHINE TOOL MANUFACTURING CO.,LTD.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052076

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231218

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20180619

Assignee: Nantong Zhili Machinery Technology Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052928

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231222

Application publication date: 20180619

Assignee: Nantong Nongchaoer Food Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052927

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231222

Application publication date: 20180619

Assignee: Nantong Bairun Catering Management Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052926

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231222

Application publication date: 20180619

Assignee: Nantong Jinbao Machinery Manufacturing Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052778

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231222

Application publication date: 20180619

Assignee: Nantong Tuoda Machinery Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052749

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231222

Application publication date: 20180619

Assignee: Weizhi New Material Technology (Nantong) Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052740

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231222

Application publication date: 20180619

Assignee: Honglei mechanical equipment (Nantong) Co.,Ltd.

Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd.

Contract record no.: X2023980052729

Denomination of invention: A business authentication method, system, and computer-readable storage medium

Granted publication date: 20230425

License type: Common License

Record date: 20231222

EE01 Entry into force of recordation of patent licensing contract