CN108769035A - A kind of electric power networks transaction verification method and system based on block chain - Google Patents
A kind of electric power networks transaction verification method and system based on block chain Download PDFInfo
- Publication number
- CN108769035A CN108769035A CN201810563911.3A CN201810563911A CN108769035A CN 108769035 A CN108769035 A CN 108769035A CN 201810563911 A CN201810563911 A CN 201810563911A CN 108769035 A CN108769035 A CN 108769035A
- Authority
- CN
- China
- Prior art keywords
- module
- information
- verification
- block chain
- input terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 122
- 238000000034 method Methods 0.000 title claims abstract description 26
- 210000003462 vein Anatomy 0.000 claims description 24
- 230000005540 biological transmission Effects 0.000 claims description 9
- 230000006399 behavior Effects 0.000 claims description 6
- 230000006870 function Effects 0.000 claims description 5
- 210000001367 artery Anatomy 0.000 claims description 4
- 238000012360 testing method Methods 0.000 claims description 3
- 238000001914 filtration Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 2
- 230000009545 invasion Effects 0.000 description 2
- 230000033001 locomotion Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S10/00—Systems supporting electrical power generation, transmission or distribution
- Y04S10/50—Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Economics (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Finance (AREA)
- Marketing (AREA)
- Water Supply & Treatment (AREA)
- Biomedical Technology (AREA)
- Tourism & Hospitality (AREA)
- Technology Law (AREA)
- Primary Health Care (AREA)
- Development Economics (AREA)
- Human Resources & Organizations (AREA)
- Public Health (AREA)
- Collating Specific Patterns (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of electric power networks transaction verification methods and system based on block chain, including transaction verification system, the transaction verification system includes information acquisition module, Authority Verification module and CPU, the output end of described information acquisition module and the input terminal of filter are unidirectionally electrically connected, the output end of the filter and the input terminal of temporary storage module are unidirectionally electrically connected, and the output end of the temporary storage module and the input terminal of wireless module are unidirectionally electrically connected;The output end of the wireless module and the input terminal of Authority Verification module are unidirectionally electrically connected, the output end of the Authority Verification module and the input terminal of CPU are unidirectionally electrically connected, the CPU and the two-way electric connection of short-message verification module, short-message verification module and the two-way electric connection of mobile device.The present invention improves the safety of network trading, solve it is not comprehensive enough in terms of the authentication of existing network transaction system, there are certain loophole, the problem of causing safety to reduce.
Description
Technical field
The present invention relates to technical field of electric power more particularly to a kind of electric power networks transaction verification method based on block chain and
System.
Background technology
With information-based deep development, information technology is maked rapid progress, and thing followed security breaches and hidden danger layer go out not
Thoroughly.Presently, information security circle has been reached common understanding, and outside threat can not be eliminated, and can only be evaded even in minimum limit
Receive, i.e., no matter how perfect the safety protection technique of information system front and back end is made, and security risk can not always avoid;Change speech
It, hacker or attacker can always find a break-through point and be broken through to information system.Therefore, in intra-company, information peace
How the full most important thing for having become information work, carry out protecting information safety and information departments need override to consider
Significant problem.
The traditional approach of information security is referred to as security boundary.In conventional information trouble free service, data to be protected is needed
Always uniformly it is stored in Centroid(Server and database)In.When facing outside threat, side is just set up therebetween
Boundary(Wall), attacker is blocked in outside boundary.However, this method effect is not very good, because boundary is always broken into.And one
Denier enters inside, and attacker can obtain complete control, steal sensitive data(It such as credit card hacker event and extorts software and attacks
It hits), or take over strength control(Such as Ukraine's large-area power-cuts and Iranian nuclear reaction system).
The invention of Patent No. CN106548330A proposes a kind of transaction verification method and system based on block chain, should
Invention is encrypted remaining sum by block chain, improves safety and trading processing speed, but the invention is in authentication side
Face is not comprehensive enough, and there are certain loopholes, and safety is caused to reduce, for this purpose, it is proposed that a kind of electric power networks based on block chain
Transaction verification method and system.
Invention content
Technical problems based on background technology, the present invention propose it is a kind of based on block chain electric power networks transaction test
The characteristics of demonstrate,proving method and system, having and verified simultaneously to multinomial information, improve safety solves existing network transaction system
It is not comprehensive enough in terms of the authentication of system, there are certain loophole, the problem of causing safety to reduce.
The present invention provides the following technical solutions:
A kind of electric power networks transaction verification system based on block chain, including transaction verification system, the transaction verification system packet
Information acquisition module, Authority Verification module and CPU are included, the output end of described information acquisition module and the input terminal of filter are unidirectional
It is electrically connected, the output end of the filter and the input terminal of temporary storage module are unidirectionally electrically connected, the interim storage mould
The output end of block and the input terminal of wireless module are unidirectionally electrically connected;The output end of the wireless module and Authority Verification module
Input terminal is unidirectionally electrically connected, and the output end of the Authority Verification module and the input terminal of CPU are unidirectionally electrically connected, the CPU
With the two-way electric connection of short-message verification module, the short-message verification module and the two-way electric connection of mobile device, the short message are tested
Card module includes identifying code contrast module and SMS transmission module, output end and the identifying code contrast module of the mobile device
Input terminal is unidirectionally electrically connected, and the output end of the identifying code contrast module and the input terminal of CPU are unidirectionally electrically connected, described
The output end of CPU and the input terminal of SMS transmission module are unidirectionally electrically connected, the output end of the SMS transmission module and movement
The input terminal of equipment is unidirectionally electrically connected.
Preferably, described information acquisition module includes CCD camera, finger-print recognising instrument and refers to hand vein recognition instrument.
Preferably, the Authority Verification module includes data comparison module, memory module and feedback module, the storage mould
Block uses mechanical hard disk or Fixed disk.
Preferably, the data comparison module includes fingerprint contrast module, refers to vein contrast module and image authentication module.
A kind of electric power networks transaction verification method based on block chain, includes the following steps:
(1)Identity information acquisition:The identity information of user is acquired by information acquisition module, by CCD camera into
Pedestrian's face information collection, or finger print information is acquired by finger-print recognising instrument, or by referring to hand vein recognition instrument to user
Finger vena information be acquired, and stored by filter process and temporary storage module, be sent to finally by module
Authority Verification module;
(2)Authentication:Authority Verification module receive after information by data comparison mould fingerprint contrast module in the block, refer to it is quiet
Corresponding information is carried out comparison identification by arteries and veins contrast module and image authentication module;
(3)Short-message verification:User receives the verification information that short-message verification module is sent by mobile device, and inputs, by short
Letter authentication module compares the identifying code sent out and the identifying code received;
(4)Network trading:When authentication is successful and short-message verification passes through, you can carry out network trading, work as authentication
Or when short-message verification one of which is unqualified or two unqualified, network trading can not be carried out.
Preferably, the transaction verification system is run based on block chain, and outer block chain takes one-way hash function algorithm, Mei Gexin
The block of generation is promoted in strict accordance with time linear sequence, the irreversibility of time make it is any attempt to invade distort number in block chain
It is believed that the behavior of breath is traced, cause by the repulsion of other nodes, to limit related malfeasance.
Preferably, the data comparison module is compared by comparing the information in the information and memory module that receive,
To realize purview certification.
Preferably, it is stored with the face information of user, finger print information in the memory module and refers to venous information.
The present invention provides a kind of electric power networks transaction verification methods and system based on block chain, pass through data comparison mould
The finger print information that fingerprint contrast module in the block acquires finger-print recognising instrument is identified, quiet to referring to by referring to vein contrast module
The finger vena information of arteries and veins identifier acquisition is identified, the face information acquired to CCD camera by image authentication module
It is identified, the verification information that short-message verification module is sent is received by mobile device, and input, pass through short-message verification module pair
The identifying code sent out and the identifying code received are compared, and six random numbers of the short message verification code in the form of SMS are short
The effective time of letter identifying code is three minutes after sending out identifying code, when authentication success and short-message verification by when, i.e.,
Network trading can be carried out, when authentication or when short-message verification one of which is unqualified or two unqualified, net can not be carried out
Network is merchandised, and to improve the safety of network trading, the authentication aspect for solving existing network transaction system is not complete enough
Face, there are certain loophole, the problem of causing safety to reduce.
Description of the drawings
Fig. 1 is present system schematic diagram;
Fig. 2 is operational flow diagram of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
- 2 are please referred to Fig.1, the present invention provides a kind of technical solution:
A kind of electric power networks transaction verification system based on block chain, including transaction verification system, transaction verification system include letter
Breath acquisition module, Authority Verification module and CPU, the output end of information acquisition module and the input terminal of filter unidirectionally electrically connect
It connects, the output end of filter and the input terminal of temporary storage module are unidirectionally electrically connected, the output end and nothing of temporary storage module
The input terminal of wire module is unidirectionally electrically connected;The output end of wireless module and the input terminal of Authority Verification module unidirectionally electrically connect
Connect, the output end of Authority Verification module and the input terminal of CPU are unidirectionally electrically connected, CPU with short-message verification module is two-way electrically connects
It connects, short-message verification module and the two-way electric connection of mobile device, short-message verification module includes identifying code contrast module and short message hair
Module, the output end of mobile device is sent unidirectionally to be electrically connected with the input terminal of identifying code contrast module, identifying code contrast module
The input terminal of output end and CPU are unidirectionally electrically connected, and the output end of CPU and the input terminal of SMS transmission module unidirectionally electrically connect
It connects, the output end of SMS transmission module and the input terminal of mobile device are unidirectionally electrically connected, and information acquisition module includes CCD camera shootings
Head and refers to hand vein recognition instrument at finger-print recognising instrument, and Authority Verification module includes data comparison module, memory module and feedback module,
Memory module uses mechanical hard disk or Fixed disk, data comparison module includes fingerprint contrast module, refer to vein contrast module and
Image authentication module.
A kind of electric power networks transaction verification method based on block chain, includes the following steps:
(1)Identity information acquisition:The identity information of user is acquired by information acquisition module, by CCD camera into
Pedestrian's face information collection, or finger print information is acquired by finger-print recognising instrument, or by referring to hand vein recognition instrument to user
Finger vena information be acquired, and stored by filter process and temporary storage module, be sent to finally by module
Authority Verification module;
(2)Authentication:Authority Verification module receive after information by data comparison mould fingerprint contrast module in the block, refer to it is quiet
Corresponding information is carried out comparison identification by arteries and veins contrast module and image authentication module;
(3)Short-message verification:User receives the verification information that short-message verification module is sent by mobile device, and inputs, by short
Letter authentication module compares the identifying code sent out and the identifying code received;
(4)Network trading:When authentication is successful and short-message verification passes through, you can carry out network trading, work as authentication
Or when short-message verification one of which is unqualified or two unqualified, network trading can not be carried out.
Embodiment one
Identity information acquisition is carried out first:The identity information of user is acquired by information acquisition module, is imaged by CCD
Head carries out face information acquisition, or is acquired to finger print information by finger-print recognising instrument, or by referring to hand vein recognition instrument pair
The finger vena information of user is acquired, and is stored by filter process and temporary storage module, is sent out finally by module
It send to Authority Verification module;Then authentication is carried out:Authority Verification module receives after information by data comparison module
Fingerprint contrast module, refer to vein contrast module and corresponding information is carried out comparison identification by image authentication module;Then it carries out
Short-message verification:User receives the verification information that short-message verification module is sent by mobile device, and inputs, and passes through short-message verification mould
Block compares the identifying code sent out and the identifying code received;Finally carry out network trading:When authentication is successful and short
Letter verification is when passing through, you can carry out network trading, when authentication or short-message verification one of which it is unqualified or two not
When qualified, network trading can not be carried out.
Embodiment two
In embodiment one, following processes are added:
Transaction verification system is run based on block chain, and outer block chain takes one-way hash function algorithm, and each newly generated block is stringent
It is promoted according to time linear sequence, the irreversibility of time makes any behavior quilt for attempting invasion and distorting data information in block chain
Retrospect, causes by the repulsion of other nodes, to limit related malfeasance.
Identity information acquisition is carried out first:The identity information of user is acquired by information acquisition module, passes through CCD
Camera carries out face information acquisition, or is acquired to finger print information by finger-print recognising instrument, or by referring to hand vein recognition
Instrument is acquired the finger vena information of user, and is stored by filter process and temporary storage module, finally by mould
Block is sent to Authority Verification module;Then authentication is carried out:Authority Verification module receives after information through data comparison mould
Fingerprint contrast module in the block refers to vein contrast module and corresponding information is carried out comparison identification by image authentication module;Then
Carry out short-message verification:User receives the verification information that short-message verification module is sent by mobile device, and inputs, and is tested by short message
Card module compares the identifying code sent out and the identifying code received;Finally carry out network trading:When authentication success
And short-message verification is when passing through, you can network trading is carried out, when authentication or short-message verification one of which are unqualified or two
When unqualified, network trading can not be carried out;Wherein transaction verification system is run based on block chain, and outer block chain takes unidirectional Kazakhstan
Uncommon algorithm, each newly generated block are promoted in strict accordance with time linear sequence, and the irreversibility of time makes any to attempt to invade
The behavior for distorting data information in block chain is traced, and is caused by the repulsion of other nodes, to limit related malfeasance.
Embodiment three
In embodiment two, following processes are added:
Data comparison module is compared by comparing the information in the information and memory module that receive, to realize that permission is recognized
Card.
Identity information acquisition is carried out first:The identity information of user is acquired by information acquisition module, passes through CCD
Camera carries out face information acquisition, or is acquired to finger print information by finger-print recognising instrument, or by referring to hand vein recognition
Instrument is acquired the finger vena information of user, and is stored by filter process and temporary storage module, finally by mould
Block is sent to Authority Verification module;Then authentication is carried out:Authority Verification module receives after information through data comparison mould
Fingerprint contrast module in the block refers to vein contrast module and corresponding information is carried out comparison identification, data by image authentication module
Contrast module is compared by comparing the information in the information and memory module that receive, to realize purview certification;Then into
Row short-message verification:User receives the verification information that short-message verification module is sent by mobile device, and inputs, and passes through short-message verification
Module compares the identifying code sent out and the identifying code received;Finally carry out network trading:When authentication success and
When short-message verification passes through, you can carry out network trading, when authentication or short-message verification one of which is unqualified or two equal
When unqualified, network trading can not be carried out;Wherein transaction verification system is run based on block chain, and outer block chain takes one-way hash function
Algorithm, each newly generated block are promoted in strict accordance with time linear sequence, the irreversibility of time make it is any attempt to invade usurp
The behavior for changing data information in block chain is traced, and is caused by the repulsion of other nodes, to limit related malfeasance.
Example IV:
It is stored with the face information of user, finger print information in memory module and refers to venous information.
Identity information acquisition is carried out first:The identity information of user is acquired by information acquisition module, passes through CCD
Camera carries out face information acquisition, or is acquired to finger print information by finger-print recognising instrument, or by referring to hand vein recognition
Instrument is acquired the finger vena information of user, and is stored by filter process and temporary storage module, finally by mould
Block is sent to Authority Verification module;Then authentication is carried out:Authority Verification module receives after information through data comparison mould
Fingerprint contrast module in the block refers to vein contrast module and corresponding information is carried out comparison identification, data by image authentication module
Contrast module is compared by comparing the information in the information and memory module that receive, to realize purview certification, stores mould
It is stored with the face information of user, finger print information in block and refers to venous information;Then short-message verification is carried out:User is set by movement
The standby verification information for receiving short-message verification module and sending, and input, by short-message verification module to the identifying code sent out and reception
To identifying code compared;Finally carry out network trading:When authentication is successful and short-message verification passes through, you can carry out
Network trading can not carry out network trading when authentication or when short-message verification one of which is unqualified or two unqualified;
Wherein transaction verification system is run based on block chain, and outer block chain takes one-way hash function algorithm, and each newly generated block is stringent
It is promoted according to time linear sequence, the irreversibility of time makes any behavior quilt for attempting invasion and distorting data information in block chain
Retrospect, causes by the repulsion of other nodes, to limit related malfeasance.
In the present invention, finger-print recognising instrument is acquired by data comparison mould fingerprint contrast module in the block finger print information into
Row identification is identified the finger vena information for referring to the acquisition of hand vein recognition instrument by referring to vein contrast module, is tested by image
The face information that card module acquires CCD camera is identified, and testing for short-message verification module transmission is received by mobile device
Information is demonstrate,proved, and is inputted, the identifying code sent out and the identifying code received are compared by short-message verification module, short-message verification
Six random numbers of the code in the form of SMS, the effective time of short message verification code is three minutes after sending out identifying code, works as body
Part certification success and when short-message verification passes through, you can carry out network trading, when authentication or short-message verification one of which not
It is qualified or when two are unqualified, network trading can not be carried out, to improve the safety of network trading, solves existing net
It is not comprehensive enough in terms of the authentication of network transaction system, there are certain loophole, the problem of causing safety to reduce.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Any one skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (8)
1. a kind of electric power networks transaction verification system based on block chain, including transaction verification system, the transaction verification system
Including information acquisition module, Authority Verification module and CPU, it is characterised in that:The output end of described information acquisition module and filtering
The input terminal of device is unidirectionally electrically connected, and the output end of the filter and the input terminal of temporary storage module are unidirectionally electrically connected,
The output end of the temporary storage module and the input terminal of wireless module are unidirectionally electrically connected;The output end of the wireless module with
The input terminal of Authority Verification module is unidirectionally electrically connected, and the output end of the Authority Verification module and the input terminal of CPU are unidirectionally electric
Property connection, the CPU and the two-way electric connection of short-message verification module, the short-message verification module with mobile device is two-way electrically connects
Connect, the short-message verification module includes identifying code contrast module and SMS transmission module, the output end of the mobile device with test
The input terminal of card code contrast module is unidirectionally electrically connected, and the output end of the identifying code contrast module and the input terminal of CPU are unidirectional
It is electrically connected, the output end of the CPU and the input terminal of SMS transmission module are unidirectionally electrically connected, the SMS transmission module
Output end and the input terminal of mobile device are unidirectionally electrically connected.
2. a kind of electric power networks transaction verification system based on block chain according to claim 1, it is characterised in that:It is described
Information acquisition module includes CCD camera, finger-print recognising instrument and refers to hand vein recognition instrument.
3. a kind of electric power networks transaction verification system based on block chain according to claim 1, it is characterised in that:It is described
Authority Verification module includes data comparison module, memory module and feedback module, and the memory module is using mechanical hard disk or admittedly
Determine hard disk.
4. a kind of electric power networks transaction verification system based on block chain according to claim 3, it is characterised in that:It is described
Data comparison module includes fingerprint contrast module, refers to vein contrast module and image authentication module.
5. a kind of electric power networks transaction verification method based on block chain, it is characterised in that:Include the following steps:
(1)Identity information acquisition:The identity information of user is acquired by information acquisition module, by CCD camera into
Pedestrian's face information collection, or finger print information is acquired by finger-print recognising instrument, or by referring to hand vein recognition instrument to user
Finger vena information be acquired, and stored by filter process and temporary storage module, be sent to finally by module
Authority Verification module;
(2)Authentication:Authority Verification module receive after information by data comparison mould fingerprint contrast module in the block, refer to it is quiet
Corresponding information is carried out comparison identification by arteries and veins contrast module and image authentication module;
(3)Short-message verification:User receives the verification information that short-message verification module is sent by mobile device, and inputs, by short
Letter authentication module compares the identifying code sent out and the identifying code received;
(4)Network trading:When authentication is successful and short-message verification passes through, you can carry out network trading, work as authentication
Or when short-message verification one of which is unqualified or two unqualified, network trading can not be carried out.
6. a kind of electric power networks transaction verification method based on block chain according to claim 5, it is characterised in that:It is described
Transaction verification system is run based on block chain, and outer block chain takes one-way hash function algorithm, each newly generated block in strict accordance with
Time linear sequence promotes, the irreversibility of time make it is any attempt to invade the behavior for distorting data information in block chain chased after
It traces back, causes by the repulsion of other nodes, to limit related malfeasance.
7. a kind of electric power networks transaction verification method based on block chain according to claim 5, it is characterised in that:It is described
Data comparison module is compared by comparing the information in the information and memory module that receive, to realize purview certification.
8. a kind of electric power networks transaction verification method based on block chain according to claim 7, it is characterised in that:It is described
It is stored with the face information of user, finger print information in memory module and refers to venous information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810563911.3A CN108769035A (en) | 2018-06-04 | 2018-06-04 | A kind of electric power networks transaction verification method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810563911.3A CN108769035A (en) | 2018-06-04 | 2018-06-04 | A kind of electric power networks transaction verification method and system based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108769035A true CN108769035A (en) | 2018-11-06 |
Family
ID=64002650
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810563911.3A Pending CN108769035A (en) | 2018-06-04 | 2018-06-04 | A kind of electric power networks transaction verification method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108769035A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109978347A (en) * | 2019-03-07 | 2019-07-05 | 国网冀北电力有限公司技能培训中心 | The community energy autonomy method containing distributed power generation based on block chain technology |
CN110147668A (en) * | 2019-04-01 | 2019-08-20 | 深圳天顺智慧能源科技有限公司 | A kind of equipment authentication method and device based on block chain |
CN112950376A (en) * | 2021-03-05 | 2021-06-11 | 广东电网有限责任公司 | Electric power industry digital identity card management method and system based on block chain technology |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120132706A1 (en) * | 2010-06-04 | 2012-05-31 | Mckenzie Craig | Electronic credit card with fraud protection |
CN104484804A (en) * | 2014-12-24 | 2015-04-01 | 福建联迪商用设备有限公司 | Secure fingerprint transaction paying method and system |
CN106204033A (en) * | 2016-07-04 | 2016-12-07 | 首都师范大学 | A kind of based on recognition of face with the payment system of fingerprint recognition |
CN106296359A (en) * | 2016-08-13 | 2017-01-04 | 深圳市樊溪电子有限公司 | Credible electric power networks transaction platform based on block chain technology |
US20170339128A1 (en) * | 2016-05-23 | 2017-11-23 | Lg Electronics Inc. | Method and apparatus for authenticating a device using bluetooth technology |
-
2018
- 2018-06-04 CN CN201810563911.3A patent/CN108769035A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120132706A1 (en) * | 2010-06-04 | 2012-05-31 | Mckenzie Craig | Electronic credit card with fraud protection |
CN104484804A (en) * | 2014-12-24 | 2015-04-01 | 福建联迪商用设备有限公司 | Secure fingerprint transaction paying method and system |
US20170339128A1 (en) * | 2016-05-23 | 2017-11-23 | Lg Electronics Inc. | Method and apparatus for authenticating a device using bluetooth technology |
CN106204033A (en) * | 2016-07-04 | 2016-12-07 | 首都师范大学 | A kind of based on recognition of face with the payment system of fingerprint recognition |
CN106296359A (en) * | 2016-08-13 | 2017-01-04 | 深圳市樊溪电子有限公司 | Credible electric power networks transaction platform based on block chain technology |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109978347A (en) * | 2019-03-07 | 2019-07-05 | 国网冀北电力有限公司技能培训中心 | The community energy autonomy method containing distributed power generation based on block chain technology |
CN109978347B (en) * | 2019-03-07 | 2023-04-07 | 国网冀北电力有限公司技能培训中心 | Community energy autonomous method with distributed power generation based on block chain technology |
CN110147668A (en) * | 2019-04-01 | 2019-08-20 | 深圳天顺智慧能源科技有限公司 | A kind of equipment authentication method and device based on block chain |
CN112950376A (en) * | 2021-03-05 | 2021-06-11 | 广东电网有限责任公司 | Electric power industry digital identity card management method and system based on block chain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Das et al. | Design of secure and lightweight authentication protocol for wearable devices environment | |
Schrittwieser et al. | Guess who is texting you? evaluating the security of smartphone messaging applications | |
Parmar et al. | A comprehensive study on passwordless authentication | |
Hammood et al. | A review of user authentication model for online banking system based on mobile IMEI number | |
CN108769035A (en) | A kind of electric power networks transaction verification method and system based on block chain | |
Khan et al. | [Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server | |
CN105431843A (en) | Network identity authentication using communication device identification code | |
Javed et al. | Secure fallback authentication and the trusted friend attack | |
Bani-Hani et al. | Online authentication methods used in banks and attacks against these methods | |
Giura et al. | Is it really you? User identification via adaptive behavior fingerprinting | |
CN101667917B (en) | Dynamic password input rule | |
Hussain et al. | Secure annihilation of out-of-band authorization for online transactions | |
Panjwani | Towards end-to-end security in branchless banking | |
Pampori et al. | Securely eradicating cellular dependency for e-banking applications | |
Ariffin et al. | Vulnerabilities detection using attack recognition technique in multi-factor authentication | |
Hossain et al. | Adding Knock Code Technology as a Third Authentication Element to a Global Two-factor Authentication System | |
Evseev et al. | Two-factor authentication methods threats analysis | |
Aldwairi et al. | A novel multi-stage authentication system for mobile applications | |
Hartung et al. | Biometric transaction authentication protocol | |
Khatri et al. | Biometrie based authentication and access control techniques to secure mobile cloud computing | |
Tan et al. | Securing password authentication for web-based applications | |
Al‐Dablan et al. | An analysis of various social engineering attack in social network using machine learning algorithm | |
Al-Refai et al. | An enhanced user authentication framework in cloud computing | |
Patil et al. | A brief survey on password authentication | |
Anoh et al. | Multi-factor authentication system for securing mobile money transactions using mobile money services in Ivory Coast |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181106 |
|
RJ01 | Rejection of invention patent application after publication |