CN108683646A - A kind of authentication method and computing device - Google Patents

A kind of authentication method and computing device Download PDF

Info

Publication number
CN108683646A
CN108683646A CN201810402434.2A CN201810402434A CN108683646A CN 108683646 A CN108683646 A CN 108683646A CN 201810402434 A CN201810402434 A CN 201810402434A CN 108683646 A CN108683646 A CN 108683646A
Authority
CN
China
Prior art keywords
user
facial image
key
authentication
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810402434.2A
Other languages
Chinese (zh)
Other versions
CN108683646B (en
Inventor
林添毅
黄霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meitu Technology Co Ltd
Original Assignee
Xiamen Meitu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meitu Technology Co Ltd filed Critical Xiamen Meitu Technology Co Ltd
Priority to CN201810402434.2A priority Critical patent/CN108683646B/en
Publication of CN108683646A publication Critical patent/CN108683646A/en
Application granted granted Critical
Publication of CN108683646B publication Critical patent/CN108683646B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of authentication method and its computing device, computing device is connected as an inserting knot in block chain network, and at least one user terminal, and the method comprising the steps of:Request in response to the registration block chain account for carrying out user terminal, the facial image and social relationships for obtaining user generate the intelligent contract of the user, and the intelligence contract is sent to block chain network;In response to carrying out the certification request of user terminal, the default authentication mode of the certification request is determined;When the default authentication mode of the certification request is the first authentication mode, the facial image of user is acquired from user terminal;The facial image acquired is matched according to the facial image in intelligent contract;The first signature authentication is carried out if matching is consistent;If the first signature authentication the second signature authentication is carried out according to the social relationships in intelligent contract if;And if the second signature authentication passes through, and confirms certification success.

Description

A kind of authentication method and computing device
Technical field
The present invention relates to identity identifying technology field, especially a kind of authentication method and computing device.
Background technology
Authentication refers to the process of confirmation operation person's identity in computer network system, is with the determining operator It is no that there is access to certain resource and access right, and then enable that the access strategy of computer and networks system is reliable, has Effect ground executes, and prevents attacker from palming off the access rights that validated user obtains resource, ensures the safety of system and data, Yi Jishou Weigh the legitimate interests of visitor.
A kind of common identification authentication mode is to complete certification by third-party certificate server.One kind is simply recognized It is as follows to demonstrate,prove scene:Assuming that user A will access application server B, then, user A sends certification to third-party certificate server C Request, third-party certificate server C verify the certification request received, are verified, and the access for transmitting user A is asked It asks and gives application server B, in this way, user A can access the data on application server B.Above-mentioned authentication mode exists such as Lower drawback:(1) authentication information (such as key) of user A is stored on third-party certificate server C, and safety can not obtain To guarantee, once leaking data occurs for third-party certificate server, it will great wind is caused to user A and application server B Danger;(2) user data not exclusively belongs to user, has part to belong to application and third party, and the privacy of user data is incited somebody to action Less than guarantee;(3) user data can not generate connection between each service provider, and data value fails to reach most on user experience Bigization.
In consideration of it, there is an urgent need for a kind of effective certificate scheme, to solve above-mentioned drawback.
Invention content
For this purpose, the present invention provides a kind of authentication method and computing device, to try hard to solve or at least alleviate deposit above At least one problem.
According to an aspect of the invention, there is provided a kind of authentication method, this method is suitable for carrying out in computing device, counts It calculates equipment as an inserting knot to be connected in block chain network, and at least one user terminal, including step:In response to The request for carrying out the registration block chain account of user terminal, obtains the facial image of user and social relationships generate the intelligence of the user Energy contract, and the intelligence contract is sent to block chain network;In response to carrying out the certification request of user terminal, the certification is determined The default authentication mode of request;When the default authentication mode of the certification request is the first authentication mode, acquired from user terminal The facial image of user;The facial image acquired is matched according to the facial image in intelligent contract;If matching is consistent Then carry out the first signature authentication;The second signature is carried out if the first signature authentication according to the social relationships in intelligent contract if to recognize Card;And if the second signature authentication passes through, and confirms certification success.
Optionally, further include step in authentication method according to the present invention:When the default authentication mode of the certification request For the second authentication mode when, from user terminal acquire user facial image;According to the facial image in intelligent contract to being adopted The facial image of collection is matched;The first signature authentication is carried out if matching is consistent;And it is true if if the first signature authentication Certification success.
Optionally, further include step in authentication method according to the present invention:When the default authentication mode of the certification request For third authentication mode when, from user terminal acquire user facial image;According to the facial image in intelligent contract to being adopted The facial image of collection is matched;Certification success is confirmed if matching is consistent.
Optionally, in authentication method according to the present invention, in response to carrying out the registration block chain user of user terminal Request, obtains the facial image of user and the step of social relationships generate the intelligent contract of the user includes:In response to using by oneself The request of the registration block chain user of family terminal, obtains the first key of the user, is wherein stored with and is somebody's turn to do on the user terminal Corresponding second key of first key;It obtains the facial image of user and generates face characteristic;The social relationships of user are obtained, Middle social relationships include at least one trust good friend;It is obtained according to the social relationships of user and at least one trusts the first close of good friend Key, wherein being stored with the second key corresponding with its first key on the user terminal of trust good friend;And according to the of user One key, face characteristic and at least one first key for trusting good friend generate the intelligent contract of the user.
Optionally, in authentication method according to the present invention, in response to carrying out the certification request of user terminal, determine that this is recognized Demonstrate,prove request default authentication mode the step of include:In response to carrying out the certification request of user terminal, the certification request pair is obtained The security level answered;Corresponding default authentication mode is determined according to security level, wherein default authentication mode includes and high safety Associated first authentication mode of rank, with associated second authentication mode of medium security level and with the associated third of low security level Authentication mode.
Optionally, in authentication method according to the present invention, the facial image of user is acquired and according in intelligent contract The step of facial image matches acquired facial image include:It obtains the facial image of user and generates face spy Sign;Calculate the similarity of generated face characteristic and the face characteristic in intelligent contract;If similarity is not less than first threshold, Then confirm that matching is consistent.
Optionally, in authentication method according to the present invention, the step of carrying out the first signature authentication if matching is consistent, wraps It includes:When facial image matching is consistent, the second key progress signature verification for storing to first key and on the user terminal.
Optionally, in authentication method according to the present invention, if the first signature authentication according in intelligent contract if Social relationships carry out the second signature authentication the step of include:When the first signature authentication by when, obtain at least one in intelligent contract A first key for trusting good friend;It is whole at least one first key for trusting good friend and the corresponding user for being stored in trust good friend The second key on end carries out signature authentication.
Optionally, in authentication method according to the present invention, the first key of user and the second key pass through random algorithm It generates on the subscriber terminal.
Optionally, it in authentication method according to the present invention, obtains the facial image of user and generates the step of face characteristic Suddenly include:It obtains the facial image of user and the facial image is divided into multiple images block;Calculate each picture in each image block The gradient of vegetarian refreshments or the direction histogram at edge;And it combines the direction histogram of each image block to obtain face characteristic.
Optionally, further include step after the intelligent contract for generating the user in authentication method according to the present invention Suddenly:When meeting the trigger condition of intelligent contract, the intelligent contract of user is changed, and the intelligent contract after change is sent to area Block chain network.
According to another aspect of the invention, a kind of computing device is provided, including:One or more processors;And storage Device;One or more programs, wherein one or more of programs are stored in the memory and are configured as by described one A or multiple processors execute, and one or more of programs include the finger for executing the either method in method as described above It enables.
In accordance with a further aspect of the present invention, a kind of computer-readable storage medium of the one or more programs of storage is provided Matter, one or more of programs include instruction, and described instruction is when computing device executes so that the computing device executes such as Either method in the upper method.
Certificate scheme according to the present invention determines authentication mode according to certification level, when certification scene is related to privacy of user When the high user data of equal security levels, by using face recognition technology, from the facial information of user extracts characteristic value and come Generate the unique pass, and using the social relationships of face characteristic and user on block chain as traditional secrete key to (that is, First key and the second key) authentication mode strength supplement, to carry out triple cross-certification, further ensured in high safety The safety of user data under rank.Simultaneously, it is contemplated that all have camera on general user terminal, therefore facial image is convenient for It obtains, compared to traditional private key access way, certificate scheme according to the present invention can be really achieved ease for use and safety Dual guarantee.
Description of the drawings
To the accomplishment of the foregoing and related purposes, certain illustrative sides are described herein in conjunction with following description and drawings Face, these aspects indicate the various modes that can put into practice principles disclosed herein, and all aspects and its equivalent aspect It is intended to fall in the range of theme claimed.Read following detailed description in conjunction with the accompanying drawings, the disclosure it is above-mentioned And other purposes, feature and advantage will be apparent.Throughout the disclosure, identical reference numeral generally refers to identical Component or element.
Fig. 1 shows the organigram of computing device 100 according to an embodiment of the invention;
Fig. 2 shows the schematic diagram of a scenario of block chain network 200 according to an embodiment of the invention;
Fig. 3 shows the flow chart of authentication method 300 according to an embodiment of the invention;
Fig. 4 shows the schematic diagram of intelligent contract block chain according to an embodiment of the invention;
Fig. 5 shows the flow chart of authentication method 300 in accordance with another embodiment of the present invention;And
Fig. 6 shows the flow chart of the authentication method 300 according to further embodiment of the present invention.
Specific implementation mode
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
Fig. 1 is the block diagram of Example Computing Device 100.In basic configuration 102, computing device 100, which typically comprises, is System memory 106 and one or more processor 104.Memory bus 108 can be used for storing in processor 104 and system Communication between device 106.
Depending on desired configuration, processor 104 can be any kind of processor, including but not limited to:Microprocessor Device (μ P), microcontroller (μ C), digital information processor (DSP) or any combination of them.Processor 104 may include all Cache, processor core such as one or more rank of on-chip cache 110 and second level cache 112 etc 114 and register 116.Exemplary processor core 114 may include arithmetic and logical unit (ALU), floating-point unit (FPU), Digital signal processing core (DSP core) or any combination of them.Exemplary Memory Controller 118 can be with processor 104 are used together, or in some implementations, and Memory Controller 118 can be an interior section of processor 104.
Depending on desired configuration, system storage 106 can be any type of memory, including but not limited to:Easily The property lost memory (RAM), nonvolatile memory (ROM, flash memory etc.) or any combination of them.System stores Device 106 may include operating system 120, one or more apply 122 and program data 124.In some embodiments, It may be arranged to be operated using program data 124 on an operating system using 122.In some embodiments, computing device 100 are configured as executing authentication method 300, and the instruction for executing this method 300 is just contained in program data 124.
Computing device 100 can also include contributing to from various interface equipments (for example, output equipment 142, Peripheral Interface 144 and communication equipment 146) to basic configuration 102 via the communication of bus/interface controller 130 interface bus 140.Example Output equipment 142 include graphics processing unit 148 and audio treatment unit 150.They can be configured as contribute to via One or more port A/V 152 is communicated with the various external equipments of such as display or loud speaker etc.Outside example If interface 144 may include serial interface controller 154 and parallel interface controller 156, they, which can be configured as, contributes to Via one or more port I/O 158 and such as input equipment (for example, keyboard, mouse, pen, voice-input device, image Input equipment) or the external equipment of other peripheral hardwares (such as printer, scanner etc.) etc communicated.Exemplary communication is set Standby 146 may include network controller 160, can be arranged to convenient for via one or more communication port 164 and one The communication that other a or multiple computing devices 162 pass through network communication link.
Network communication link can be an example of communication media.Communication media can be usually presented as in such as carrier wave Or the computer-readable instruction in the modulated data signal of other transmission mechanisms etc, data structure, program module, and can To include any information delivery media." modulated data signal " can be such signal, one in its data set or It is multiple or it change can the mode of coding information in the signal carry out.As unrestricted example, communication media can To include the wire medium of such as cable network or private line network etc, and it is such as sound, radio frequency (RF), microwave, infrared (IR) the various wireless mediums or including other wireless mediums.Term computer-readable medium used herein may include depositing Both storage media and communication media.
Computing device 100 can be implemented as including desktop computer and the personal computer of notebook computer configuration, or Person is the server for having above-mentioned configuration.Certainly, computing device 100 is also implemented as portable (or mobile) electronics of small size A part for equipment, these electronic equipments can be such as cellular phone, digital camera, personal digital assistant (PDA), individual Media player device, wireless network browsing apparatus, personal helmet, application specific equipment or may include appointing above The mixing apparatus of what function.The embodiment of the present invention is not restricted this.
In one embodiment according to the present invention, computing device 100 is implemented as being arranged in block chain network 200 Server, and be connected at least one user terminal by network.Block chain according to the ... of the embodiment of the present invention as shown in Figure 2 The schematic diagram of a scenario of network 200.Include multiple computing devices 100,100 conduct of each computing device in block chain network 200 A node in the network 200, the information such as memory block chain account.Meanwhile computing device 100 is further through wirelessly or non-wirelessly net Network (such as LTE, 3G, GSM network, GPRS network, EDGE network, Wi-Fi or WiMax network and BlueboothTMNetwork) and it is more A user terminal 210 is connected, in order to provide the application clothes such as social activity, finance, medical treatment by block chain network 200 for real world Business.
It should be noted that about the quantity of computing device 100 and user terminal 210 only as an example, this hair in Fig. 2 It is bright that this is not restricted.
In practical applications, the system of account of block chain network is weak, lacks and the corresponding identity of real world.Because of nothing The assets that method verifies its digital world belong to individual in reality, it is difficult to be docked with the community service network of reality, this is just At obstruction block chain landing to the key in practical application.Especially strong identity authentication is needed in finance, education, medical treatment etc. Industry, authentication, which just seems, to be even more important.Therefore, the block chain of digital world will get through the application scenarios of real world, just It needs to introduce subscriber authentication (KYC), with proof " the block chain account a in block chain network belongs to user A ".According to this The realization method of invention is provided a kind of authentication method 300 based on block chain network 200, can not be usurped using block chain network The characteristic changed realizes the authenticating user identification in block chain network 200, is then reality by the block chain network 200 The world provides various applications.
The execution flow of authentication method 300 according to an embodiment of the invention will hereafter be discussed in detail around Fig. 3.
Method 300 starts from step S310, and the request of the registration block chain account in response to carrying out user terminal 210 obtains The facial image of user and social relationships generate the intelligent contract of the user, and the intelligence contract is sent to block chain network 200。
According to one embodiment of present invention, when registering block chain account a on user terminal 210 as user A, in user The first key and the second key of the user A are generated in terminal 210 by random algorithm, and sends asking for Acceditation Area block chain account It asks to computing device 100, the first key of user A is may include in the request.It should be noted that the second key is as user's Private key is merely stored on the user terminal of user.Optionally, a pair of secret keys of user A is generated (that is, first is close using RSA Algorithm Key and the second key).The algorithm of RSA is related to three parameters:n、e1、e2.Wherein, n is the product of prime number p, q two big, n two into Tabulation occupied digit when showing, is exactly so-called key length, and e1 and e2 are a pair of relevant values, it is first determined e1, e1's As long as it is relatively prime that value meets e1 and (p-1) * (q-1);Then e2 is determined again, it is desirable that (the mod (p-1) × (q- of (e2 × e1) ≡ 1 1)).Finally, (n, e1), (n, e2) is exactly a pair of secret keys, and (n, e1) is public key (that is, first key), and (n, e2) is private key (that is, second key).It is generated using RSA Algorithm it should be noted that the technical staff in technical field should know The method of a pair of secret keys, no longer further spreads out herein.And the embodiment of the present invention is to generating first key and the second key Random algorithm be not restricted, in another embodiment, the first key of user A can be generated by elliptic curve cipher With the second key (that is, public key and private key).Encryption Algorithm known to any of or future can be with the implementation of the present invention Example is combined, to execute method 300.
After computing device 100 in block chain network 200 gets the first key of user A, then to user's end End 210 sends instruction, obtains the facial image of user A, and it is special to generate the corresponding face of the facial image on computing device 100 Sign.A kind of realization method according to the present invention, realizes extract face characteristic from facial image in the following way.First, will The facial image of user is divided into multiple small connected regions, that is, facial image is divided into multiple images block.For example, by people Face image is laterally divided into several image blocks, and each image block just represents a feature.Then, it calculates each in each image block The gradient of pixel or the direction histogram at edge.General differential mode can be used in the method for calculating image gradient or edge, The operators such as Sobel, Laplce, the embodiment of the present invention can also be directly selected not to be restricted this.Finally, by each image The direction histogram of block combines to obtain the face characteristic that can characterize the multiple dimensional characteristics of face.
It is of course also possible to which the feature of extraction facial image is such as logical as its corresponding face characteristic by other means Cross depth learning method, training face Feature Selection Model, to extract the feature of different facial images.The embodiment of the present invention pair This is not restricted.
Computing device 100 in block chain network 200 can also obtain the social relationships of user A.Optionally, society closes System includes at least one trust good friend or relatives of user A.It, can be by being arranged in user terminal 210 according to a kind of realization method On input interface, (or selection) at least one trust good friend or relatives of oneself is inputted on user terminal 210 by user A. According to another realization method, can by acquire the user behaviors log of user A analyze user A strong social networks (such as relatives, Good friend etc.).Depending on desired realization method, the embodiment of the present invention is not restricted this.
After the trust good friend for obtaining user A, computing device 100 needs to obtain the first key for trusting good friend.Trust The user terminal of friend generates first key and the second key according to random algorithm as described above, wherein the second key is as letter The private key for appointing good friend is merely stored on the user terminal for trusting good friend.Optionally, computing device 100 continues to user terminal 210 Instruction is sent, indicating user terminal 210 asks for the first key for trusting good friend to computing device 100.Alternatively, computing device 100 Can also request directly be sent to the user terminal for trusting good friend, obtain the first key for trusting good friend.Or computing device 100 can also obtain the block chain account for trusting good friend, and the block chain account for trusting good friend is then inquired in block chain network 200 The first key at family.
Finally, computing device 100 by the first key of the user A got, the face characteristic of user A and user A extremely The intelligent contract of user A is written in the first key of few trust good friend together.
The schematic diagram of intelligence contract block chain according to an embodiment of the invention is as shown in Figure 4.2 are shown in Fig. 4 The intelligent contract of block, wherein " intelligent contract record 1 " means that the intelligence that user is generated when registering block chain account is closed About.As described above, storage content is expressed as:" first key+trust of first key+face characteristic+trust good friend 1 is well The first key ... of first key+trust good friend 3 of friend 2 ".
It knows together the period every one, the node (that is, computing device 100) of block chain network 200 generated in this period Contract collection, and calculate the cryptographic Hash (HASH values) of contract collection, such as Fig. 4 institute be assembled into according to the HASH values of this contract collection The block structure shown is sent to other nodes of the whole network.Intelligent contract is by way of point-to-point (P2P) in block chain network It is spread in 200.
In addition, another kind realization method according to the present invention, when meeting the trigger condition of intelligent contract, computing device 100 can change the intelligent contract of user, and the intelligent contract after change is again sent to block chain network 200.Intelligent contract Trigger condition by " transaction " generate, for example, user will change or enhance trust, good friend or user will resurvey face figure Picture or modification first key can be used as trigger condition, and triggering computing device 100 changes the intelligent contract of user, after change The intelligent contract transaction record new as one is stored in intelligent contract record as shown in Figure 4.
Then in step s 320, in response to carrying out the certification request of user terminal, determine that the default of the certification request is recognized Card mode.
When user will use service from block chain network 200 or in application, be sent out firstly the need of by user terminal 210 Send certification request to computing device 100, according to one embodiment, in addition to including user name, block chain account in the certification request Name is outer, can also include the corresponding security level of the certification request.Computing device 100 therefrom obtains after receiving certification request The corresponding security level of the certification request is taken, corresponding default authentication mode is determined further according to security level.Wherein, pre- setting authentication Mode include with associated first authentication mode of high security level, with associated second authentication mode of medium security level and with low peace The associated third authentication mode of full rank.As table 1 shows corresponding certification scene under several different security levels.
The corresponding certification scene of the different security levels of table 1
Security level Certification scene
High security level Large funds transaction, more people's public properties ...
Medium security level General payment authentication ...
Low security level Reservation is registered, restaurant order entry, social activity are shared ...
Such as table 1 as it can be seen that in an embodiment according to the present invention, high security level is usually directed to extremely sensitive to privacy of user Certification scene, such as pay relevant operation with a large sum of amount of money;Medium security level (or be Generally Recognized as safe rank) be related to The general sensitive certification scene of family privacy, as inputted payment cipher when daily payment authentication;And low security level only relate to Privacy insensitive user's general information in family when having dinner such as user to restaurant, is recommended by obtaining personal preference's information for user Recipe.
In other embodiments according to the present invention, high security level may relate to the scene of more people's joint accounts, Such as the intelligence of other side can be mutually written under this certification scene in these users by the common bit coin account of several users In energy contract, as a kind of social relationships of user, then, when being related to operating common bit coin account, hold The corresponding verification process of row high security level.
When judging the default authentication mode of the certification request for the first authentication mode, then in step S332, from Family terminal 210 acquires the facial image of user in real time.According to the embodiment of the present invention, pass through the camera shooting on user terminal 210 Head acquires the facial image of user in real time, and sends computing device 100 to.
Then in step S342, the facial image acquired is matched according to the facial image in intelligent contract. According to one embodiment of present invention, first according to the face characteristic of the obtained Face image synthesis users of step S332;Then, The similarity for calculating generated face characteristic and the face characteristic stored in intelligent contract, when similarity is not less than first threshold (according to one embodiment of present invention, when first threshold is set as 0.9), confirm that matching is consistent.About characteristic similarity Computational methods, those skilled in the art can choose suitable algorithm according to actual scene, not be restricted herein.It is of course also possible to The similarity of generated face characteristic and the face characteristic stored in intelligent contract is measured by similarity distance, at this point, When distance value is less than second threshold, confirm that matching is consistent.
The first signature authentication is then carried out in step S352.Specifically, when face characteristic matching is consistent, to first Key and the second key stored on the user terminal 210 carry out signature verification, that is, computing device 100 and user terminal 210 The signing messages of first key and the second key is calculated separately by signature algorithm, then, user terminal 210 is by the second key Signing messages is sent to computing device 100, checks whether the signing messages of first key and the second key closes by computing device 100 Method, if verification is legal, the first signature authentication passes through.
Then the second signature authentication is carried out according to the social relationships in intelligent contract in step S362.Specifically, it obtains At least one first key for trusting good friend in intelligent contract, is stored at least one first key for trusting good friend and correspondence The second key trusted on the user terminal of good friend carries out signature authentication.The detailed process of second signature authentication is the same as in step S352 The process of first signature authentication, it will not go into details herein.
When the second signature authentication by when, in step S372, confirm certification success.User can pass through block chain network 200 use respective service or application.
In current block chain application, authentication is mainly carried out by using the form of private key.By mathematical proof The string number for being difficult to crack ensure the safety of number assets, once losing substantially can not give for change.According to the present invention Certificate scheme, authentication mode is determined according to certification level, when certification scene is related to the high user of the security levels such as privacy of user When data, by using face recognition technology, characteristic value is extracted from the facial information of user to generate unique passage Card, and using the social relationships of face characteristic and user on block chain as traditional secrete key to (that is, first key and second close Key) authentication mode strength supplement, to carry out triple cross-certification, further ensured the user data under high security level Safety.Simultaneously, it is contemplated that all have camera on general user terminal, therefore facial image is convenient for obtaining, compared to tradition Private key access way, certificate scheme according to the present invention can be really achieved the dual guarantee of ease for use and safety.
Another embodiment according to the present invention, authentication method 300 further include the certification stream under the second authentication mode Journey, as shown in Figure 5.After step S320, when judging the default authentication mode of certification request for the second authentication mode, execute Step S334 acquires the facial image of user from user terminal 210 in real time.According to the embodiment of the present invention, pass through user's end Camera on end 210 acquires the facial image of user in real time, and sends computing device 100 to.
Then in step S344, the facial image acquired is matched according to the facial image in intelligent contract. As it was noted above, first according to the face characteristic of the obtained Face image synthesis users of step S334;Then, calculating is generated The similarity of face characteristic and the face characteristic stored in intelligent contract, when similarity is not less than first threshold (according to this hair In bright one embodiment, when first threshold is set as 0.9), confirm that matching is consistent.About the computational methods of characteristic similarity, originally Field technology personnel can choose suitable algorithm according to actual scene, not be restricted herein.It is of course also possible to by similarity away from From the similarity of generated face characteristic and the face characteristic stored in intelligent contract is measured, at this point, when distance value is less than When second threshold, confirm that matching is consistent.
The first signature authentication is then carried out in step S354.Specifically, when face characteristic matching is consistent, to first Key and the second key stored on the user terminal 210 carry out signature verification, that is, computing device 100 and user terminal 210 The signing messages of first key and the second key is calculated separately by signature algorithm, then, user terminal 210 is by the second key Signing messages is sent to computing device 100, checks whether the signing messages of first key and the second key closes by computing device 100 Method, if verification is legal, the first signature authentication passes through.
Then in step S364, certification success is confirmed.
Certificate scheme according to the present invention determines authentication mode according to certification level, when certification scene is to privacy of user one As it is sensitive when, it is believed that user's operation belongs to medium security level, at this point, by using face recognition technology, believes from the face of user Characteristic value is extracted in breath to generate the unique pass, for carrying out authentication.And after authentication passes through, re-recognize The traditional secrete key of card user is according to the present invention compared to traditional identification authentication mode to (first key and the second key) Scheme has ensured the safety of the user data under medium security level.Meanwhile in view of this certification scene not being ten to privacy of user Divide sensitivity, therefore only need to carry out double authentication, does not have to social relationships the second signature authentication of progress for user, to save flow Cost.
Another embodiment according to the present invention, authentication method 300 further include the certification stream under third authentication mode Journey, as shown in Figure 6.After step S320, when the default authentication mode for judging certification request is third authentication mode, execute Step S336 acquires the facial image of user from user terminal 210 in real time.According to the embodiment of the present invention, pass through user's end Camera on end 210 acquires the facial image of user in real time, and sends computing device 100 to.
Then in step S346, the facial image acquired is matched according to the facial image in intelligent contract. As it was noted above, first according to the face characteristic of the obtained Face image synthesis users of step S336;Then, calculating is generated The similarity of face characteristic and the face characteristic stored in intelligent contract, when similarity is not less than first threshold (according to this hair In bright one embodiment, when first threshold is set as 0.9), confirm that matching is consistent.About the computational methods of characteristic similarity, originally Field technology personnel can choose suitable algorithm according to actual scene, not be restricted herein.It is of course also possible to by similarity away from From the similarity of generated face characteristic and the face characteristic stored in intelligent contract is measured, at this point, when distance value is less than When second threshold, confirm that matching is consistent.
Certification success is then confirmed in step S356.
Certificate scheme according to the present invention determines authentication mode according to certification level, when not to be related to user quick for certification scene When sense operation (e.g., pay) and privacy of user, it is believed that it is low that user's operation belongs to low security level, at this point, being known by using face Other technology extracts characteristic value to generate the unique pass, for carrying out authentication from the facial information of user.Phase Compared with traditional identification authentication mode, scheme according to the present invention realizes the verification the verifying results for covering different security levels.
It should be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, it is right above In the description of exemplary embodiment of the present invention, each feature of the invention be grouped together into sometimes single embodiment, figure or In person's descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. claimed hair The bright feature more features required than being expressly recited in each claim.More precisely, as the following claims As book reflects, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows specific real Thus the claims for applying mode are expressly incorporated in the specific implementation mode, wherein each claim itself is used as this hair Bright separate embodiments.
Those skilled in the art should understand that the module of the equipment in example disclosed herein or unit or groups Part can be arranged in equipment as depicted in this embodiment, or alternatively can be positioned at and the equipment in the example In different one or more equipment.Module in aforementioned exemplary can be combined into a module or be segmented into addition multiple Submodule.
Those skilled in the art, which are appreciated that, to carry out adaptively the module in the equipment in embodiment Change and they are arranged in the one or more equipment different from the embodiment.It can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it may be used any Combination is disclosed to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit requires, abstract and attached drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed One of meaning mode can use in any combination.
Various technologies described herein are realized together in combination with hardware or software or combination thereof.To the present invention Method and apparatus or the process and apparatus of the present invention some aspects or part can take embedded tangible media, such as it is soft The form of program code (instructing) in disk, CD-ROM, hard disk drive or other arbitrary machine readable storage mediums, Wherein when program is loaded into the machine of such as computer etc, and is executed by the machine, the machine becomes to put into practice this hair Bright equipment.
In the case where program code executes on programmable computers, computing device generally comprises processor, processor Readable storage medium (including volatile and non-volatile memory and or memory element), at least one input unit, and extremely A few output device.Wherein, memory is configured for storage program code;Processor is configured for according to the memory Instruction in the said program code of middle storage executes method of the present invention.
By way of example and not limitation, computer-readable medium includes computer storage media and communication media.It calculates Machine readable medium includes computer storage media and communication media.Computer storage media storage such as computer-readable instruction, The information such as data structure, program module or other data.Communication media is generally modulated with carrier wave or other transmission mechanisms etc. Data-signal processed embodies computer-readable instruction, data structure, program module or other data, and includes that any information passes Pass medium.Above any combination is also included within the scope of computer-readable medium.
The present invention discloses together:
A9, the method as described in A4, wherein the first key of user and the second key are by random algorithm in user terminal Upper generation.
A10, the method as described in A4 or 6, wherein obtain the facial image of user and wrapped the step of generating face characteristic It includes:It obtains the facial image of user and the facial image is divided into multiple images block;Calculate each pixel in each image block Gradient or edge direction histogram;And it combines the direction histogram of each image block to obtain face characteristic.
A11, the method as described in any one of A1-10 further include step after the intelligent contract for generating the user: When meeting the trigger condition of intelligent contract, the intelligent contract of user is changed, and the intelligent contract after change is sent to block Chain network.
In addition, be described as herein can be by the processor of computer system or by executing for some in the embodiment The combination of method or method element that other devices of the function are implemented.Therefore, have for implementing the method or method The processor of the necessary instruction of element forms the device for implementing this method or method element.In addition, device embodiment Element described in this is the example of following device:The device is used to implement performed by the element by the purpose in order to implement the invention Function.
As used in this, unless specifically stated, come using ordinal number " first ", " second ", " third " etc. Description plain objects are merely representative of the different instances for being related to similar object, and are not intended to imply that the object being described in this way must Must have the time it is upper, spatially, in terms of sequence or given sequence in any other manner.
Although the embodiment according to limited quantity describes the present invention, above description, the art are benefited from It is interior it is clear for the skilled person that in the scope of the present invention thus described, it can be envisaged that other embodiments.Additionally, it should be noted that The language that is used in this specification primarily to readable and introduction purpose and select, rather than in order to explain or limit Determine subject of the present invention and selects.Therefore, without departing from the scope and spirit of the appended claims, for this Many modifications and changes will be apparent from for the those of ordinary skill of technical field.For the scope of the present invention, to this The done disclosure of invention is illustrative and not restrictive, and it is intended that the scope of the present invention be defined by the claims appended hereto.

Claims (10)

1. a kind of authentication method, the method is suitable for carrying out in computing device, and the computing device is as an inserting knot It is connected in block chain network, and at least one user terminal, the method includes the steps:
Request in response to the registration block chain account for carrying out user terminal, the facial image and social relationships for obtaining user generate The intelligent contract of the user, and the intelligence contract is sent to block chain network;
In response to carrying out the certification request of user terminal, the default authentication mode of the certification request is determined;
When the default authentication mode of the certification request is the first authentication mode, the facial image of user is acquired from user terminal;
The facial image acquired is matched according to the facial image in the intelligent contract;
The first signature authentication is carried out if matching is consistent;
If the first signature authentication the second signature authentication is carried out according to the social relationships in the intelligent contract if;And
If the second signature authentication passes through, certification success is confirmed.
2. the method as described in claim 1 further includes step:
When the default authentication mode of the certification request is the second authentication mode, the facial image of user is acquired from user terminal;
The facial image acquired is matched according to the facial image in the intelligent contract;
The first signature authentication is carried out if matching is consistent;And
Certification success is confirmed if if the first signature authentication.
3. method as claimed in claim 1 or 2 further includes step:
When the default authentication mode of the certification request is third authentication mode, the facial image of user is acquired from user terminal;
The facial image acquired is matched according to the facial image in the intelligent contract;And
Certification success is confirmed if matching is consistent.
4. method as claimed in any one of claims 1-3, wherein the registration block chain in response to carrying out user terminal The request of user, obtains the facial image of user and the step of social relationships generate the intelligent contract of the user includes:
Request in response to the registration block chain user for carrying out user terminal, obtains the first key of the user, wherein the user The second key corresponding with the first key is stored in terminal;
It obtains the facial image of user and generates face characteristic;
The social relationships of user are obtained, wherein the social relationships include at least one trust good friend;
At least one first key for trusting good friend is obtained according to the social relationships of user, wherein trusting on the user terminal of good friend It is stored with the second key corresponding with its first key;And
The intelligence of the user is generated according to the first key of the user, face characteristic and at least one first key for trusting good friend It can contract.
5. the method as described in any one of claim 1-4, wherein the certification request in response to carrying out user terminal, The step of default authentication mode for determining the certification request includes:
In response to carrying out the certification request of user terminal, the corresponding security level of the certification request is obtained;
Corresponding default authentication mode is determined according to the security level, wherein the default authentication mode includes and high safety grade Not associated first authentication mode is recognized with associated second authentication mode of medium security level and with the associated third of low security level Card mode.
6. method as claimed in claim 4, wherein acquire the facial image of user and according to the facial image in intelligent contract The step of being matched to acquired facial image include:
It obtains the facial image of user and generates face characteristic;
Calculate the similarity of generated face characteristic and the face characteristic in the intelligent contract;
If similarity is not less than first threshold, confirm that matching is consistent.
7. method as claimed in claim 4, wherein described the step of carrying out the first signature authentication if matching is consistent includes:
When facial image matching is consistent, sign to the first key and the second key stored on the user terminal Verification.
8. method as claimed in claim 4, wherein it is described if the first signature authentication if according in the intelligent contract Social relationships carry out the second signature authentication the step of include:
When the first signature authentication by when, obtain at least one first key for trusting good friend in intelligent contract;
To at least one first key for trusting good friend and corresponding the second key being stored on the user terminal for trusting good friend into Row signature authentication.
9. a kind of computing device, including:
One or more processors;With
Memory;
One or more programs, wherein one or more of programs are stored in the memory and are configured as by described one A or multiple processors execute, and one or more of programs include for executing according in claim 1-8 the methods The instruction of either method.
10. a kind of computer readable storage medium of the one or more programs of storage, one or more of programs include instruction, Described instruction is when computing device executes so that the computing device executes appointing in the method according to claim 1-8 One method.
CN201810402434.2A 2018-04-28 2018-04-28 Authentication method and computing device Active CN108683646B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810402434.2A CN108683646B (en) 2018-04-28 2018-04-28 Authentication method and computing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810402434.2A CN108683646B (en) 2018-04-28 2018-04-28 Authentication method and computing device

Publications (2)

Publication Number Publication Date
CN108683646A true CN108683646A (en) 2018-10-19
CN108683646B CN108683646B (en) 2021-03-16

Family

ID=63802776

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810402434.2A Active CN108683646B (en) 2018-04-28 2018-04-28 Authentication method and computing device

Country Status (1)

Country Link
CN (1) CN108683646B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109801072A (en) * 2019-01-24 2019-05-24 易保互联医疗信息科技(北京)有限公司 The private key generation method and system of block chain stored value card based on facial characteristics
CN110032846A (en) * 2018-11-30 2019-07-19 阿里巴巴集团控股有限公司 The anti-misuse method and device of identity data, electronic equipment
CN110457878A (en) * 2019-08-14 2019-11-15 北京中电普华信息技术有限公司 A kind of identity identifying method based on block chain, apparatus and system
CN110520882A (en) * 2018-12-28 2019-11-29 阿里巴巴集团控股有限公司 Transaction is executed parallel in block chain network
CN110599190A (en) * 2019-09-27 2019-12-20 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain
CN110612700A (en) * 2019-03-15 2019-12-24 阿里巴巴集团控股有限公司 Authentication based on recovered public key
WO2019101228A3 (en) * 2019-03-01 2020-01-02 Alibaba Group Holding Limited Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
CN111046372A (en) * 2019-12-04 2020-04-21 深圳模微半导体有限公司 Method, chip and electronic equipment for information security authentication between communication equipment
CN112380509A (en) * 2020-11-16 2021-02-19 湖南中育至诚科技有限公司 Identity information generation and verification method, device and readable storage medium
CN113055886A (en) * 2021-03-15 2021-06-29 中国联合网络通信集团有限公司 Terminal authentication method, system, server and medium in edge computing network
CN114398606A (en) * 2021-10-09 2022-04-26 武汉烽火信息集成技术有限公司 Block chain-based face verification method, equipment and computer-readable storage medium
CN115022016A (en) * 2022-05-31 2022-09-06 中国银行股份有限公司 Block chain-based user identity authentication method and device
CN115514502A (en) * 2021-06-03 2022-12-23 中移雄安信息通信科技有限公司 Block chain-based edge computing platform identity authentication method and device
WO2023079262A1 (en) * 2021-11-03 2023-05-11 Vodafone Group Services Limited Authenticating a device
GB2621504A (en) * 2021-11-03 2024-02-14 Dabco Ltd Authenticating a device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533696A (en) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 Block chain-based identity authentication methods, authentication server and user terminal
US20170316497A1 (en) * 2016-04-28 2017-11-02 Coinplug, Inc. Method for creating, registering, revoking authentication information and server using the same
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
US20180048461A1 (en) * 2016-08-10 2018-02-15 Peer Ledger Inc. Apparatus, system, and methods for a blockchain identity translator
CN107833052A (en) * 2017-10-27 2018-03-23 南京物联传感技术有限公司 A kind of polymerization payment system and method for work based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170316497A1 (en) * 2016-04-28 2017-11-02 Coinplug, Inc. Method for creating, registering, revoking authentication information and server using the same
US20180048461A1 (en) * 2016-08-10 2018-02-15 Peer Ledger Inc. Apparatus, system, and methods for a blockchain identity translator
CN106533696A (en) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 Block chain-based identity authentication methods, authentication server and user terminal
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN107833052A (en) * 2017-10-27 2018-03-23 南京物联传感技术有限公司 A kind of polymerization payment system and method for work based on block chain

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110032846A (en) * 2018-11-30 2019-07-19 阿里巴巴集团控股有限公司 The anti-misuse method and device of identity data, electronic equipment
CN110520882A (en) * 2018-12-28 2019-11-29 阿里巴巴集团控股有限公司 Transaction is executed parallel in block chain network
CN109801072B (en) * 2019-01-24 2021-08-27 易保互联医疗信息科技(北京)有限公司 Private key generation method and system of block chain electronic wallet based on facial features
CN109801072A (en) * 2019-01-24 2019-05-24 易保互联医疗信息科技(北京)有限公司 The private key generation method and system of block chain stored value card based on facial characteristics
US10853801B2 (en) 2019-03-01 2020-12-01 Advanced New Technologies Co., Ltd. Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
CN110692228B (en) * 2019-03-01 2022-02-22 创新先进技术有限公司 Method and equipment for protecting transaction activity sensitive data based on intelligent contracts in blockchain
WO2019101228A3 (en) * 2019-03-01 2020-01-02 Alibaba Group Holding Limited Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
CN110692228A (en) * 2019-03-01 2020-01-14 阿里巴巴集团控股有限公司 Method and equipment for protecting transaction activity sensitive data based on intelligent contracts in blockchain
US11004067B2 (en) 2019-03-01 2021-05-11 Advanced New Technologies Co., Ltd. Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
TWI723658B (en) * 2019-03-01 2021-04-01 開曼群島商創新先進技術有限公司 Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
CN110612700B (en) * 2019-03-15 2021-06-22 创新先进技术有限公司 Authentication based on recovered public key
US10659233B1 (en) 2019-03-15 2020-05-19 Alibaba Group Holding Limited Authentication based on a recovered public key
CN110612700A (en) * 2019-03-15 2019-12-24 阿里巴巴集团控股有限公司 Authentication based on recovered public key
WO2019101240A3 (en) * 2019-03-15 2021-09-10 Advanced New Technologies Co., Ltd. Authentication based on a recoverd public key
CN110457878A (en) * 2019-08-14 2019-11-15 北京中电普华信息技术有限公司 A kind of identity identifying method based on block chain, apparatus and system
CN110599190A (en) * 2019-09-27 2019-12-20 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain
CN110599190B (en) * 2019-09-27 2022-10-21 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain
CN111046372A (en) * 2019-12-04 2020-04-21 深圳模微半导体有限公司 Method, chip and electronic equipment for information security authentication between communication equipment
CN111046372B (en) * 2019-12-04 2023-05-23 深圳模微半导体有限公司 Method for information security authentication between communication devices, chip and electronic device
CN112380509A (en) * 2020-11-16 2021-02-19 湖南中育至诚科技有限公司 Identity information generation and verification method, device and readable storage medium
CN113055886A (en) * 2021-03-15 2021-06-29 中国联合网络通信集团有限公司 Terminal authentication method, system, server and medium in edge computing network
CN115514502A (en) * 2021-06-03 2022-12-23 中移雄安信息通信科技有限公司 Block chain-based edge computing platform identity authentication method and device
CN114398606A (en) * 2021-10-09 2022-04-26 武汉烽火信息集成技术有限公司 Block chain-based face verification method, equipment and computer-readable storage medium
CN114398606B (en) * 2021-10-09 2024-05-03 武汉烽火信息集成技术有限公司 Face verification method, equipment and computer readable storage medium based on block chain
WO2023079262A1 (en) * 2021-11-03 2023-05-11 Vodafone Group Services Limited Authenticating a device
GB2612769A (en) * 2021-11-03 2023-05-17 Vodafone Group Services Ltd Authenticating a device
GB2612769B (en) * 2021-11-03 2023-12-27 Dabco Ltd Authenticating a device
GB2621504A (en) * 2021-11-03 2024-02-14 Dabco Ltd Authenticating a device
CN115022016A (en) * 2022-05-31 2022-09-06 中国银行股份有限公司 Block chain-based user identity authentication method and device

Also Published As

Publication number Publication date
CN108683646B (en) 2021-03-16

Similar Documents

Publication Publication Date Title
CN108683646A (en) A kind of authentication method and computing device
US11743038B2 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
CN105681269B (en) Biometric authentication method and computer-readable medium based on secret protection set
US9871783B2 (en) Universal enrollment using biometric PKI
CN110326251A (en) The system and method that the general dispersion solution of user is verified using cross validation feature are provided
CN106330850A (en) Biological characteristic-based security verification method, client and server
CN107294900A (en) Identity registration method and apparatus based on biological characteristic
US20200213294A1 (en) Providing verified claims of user identity
US20210014064A1 (en) Method and apparatus for managing user authentication in a blockchain network
CN110401540A (en) A kind of threshold group signatures method that verification can be disclosed based on block chain
Ren et al. How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising attack
Pangan et al. Authenticating data transfer using RSA-Generated QR Codes
Alkhalifah Password based authentication for web based graphics computing services retrieval in cloud
JP2020102741A (en) Authentication system, authentication method, and authentication program
KR102322435B1 (en) Method for extracting a same key from fuzzy data and method for authenticating user using the same
US20240205013A1 (en) Privacy preserving authentication augmented with physical biometric proof
Imtiaz et al. Smart Identity Management System Using Blockchain Technology
Alizadeh Saveh A PERMISSIONED BLOCKCHAIN-BASED MODEL FOR DIGITAL FORENSICS
Azraoui Verifiability and accountability in the Cloud
JP2004104172A (en) Structure of electronic signature, method and system for verifying information therewith

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant