CN108769035A - A kind of electric power networks transaction verification method and system based on block chain - Google Patents

A kind of electric power networks transaction verification method and system based on block chain Download PDF

Info

Publication number
CN108769035A
CN108769035A CN201810563911.3A CN201810563911A CN108769035A CN 108769035 A CN108769035 A CN 108769035A CN 201810563911 A CN201810563911 A CN 201810563911A CN 108769035 A CN108769035 A CN 108769035A
Authority
CN
China
Prior art keywords
module
information
verification
block chain
input terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810563911.3A
Other languages
Chinese (zh)
Inventor
徐盛
郑立
蔡怡挺
陈梦娴
朱犇
邱川
邱一川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WENZHOU TUSHENG TECHNOLOGY Co Ltd
Wenzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
WENZHOU TUSHENG TECHNOLOGY Co Ltd
Wenzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WENZHOU TUSHENG TECHNOLOGY Co Ltd, Wenzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical WENZHOU TUSHENG TECHNOLOGY Co Ltd
Priority to CN201810563911.3A priority Critical patent/CN108769035A/en
Publication of CN108769035A publication Critical patent/CN108769035A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Water Supply & Treatment (AREA)
  • Biomedical Technology (AREA)
  • Tourism & Hospitality (AREA)
  • Technology Law (AREA)
  • Primary Health Care (AREA)
  • Development Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Public Health (AREA)
  • Collating Specific Patterns (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of electric power networks transaction verification methods and system based on block chain, including transaction verification system, the transaction verification system includes information acquisition module, Authority Verification module and CPU, the output end of described information acquisition module and the input terminal of filter are unidirectionally electrically connected, the output end of the filter and the input terminal of temporary storage module are unidirectionally electrically connected, and the output end of the temporary storage module and the input terminal of wireless module are unidirectionally electrically connected;The output end of the wireless module and the input terminal of Authority Verification module are unidirectionally electrically connected, the output end of the Authority Verification module and the input terminal of CPU are unidirectionally electrically connected, the CPU and the two-way electric connection of short-message verification module, short-message verification module and the two-way electric connection of mobile device.The present invention improves the safety of network trading, solve it is not comprehensive enough in terms of the authentication of existing network transaction system, there are certain loophole, the problem of causing safety to reduce.

Description

A kind of electric power networks transaction verification method and system based on block chain
Technical field
The present invention relates to technical field of electric power more particularly to a kind of electric power networks transaction verification method based on block chain and System.
Background technology
With information-based deep development, information technology is maked rapid progress, and thing followed security breaches and hidden danger layer go out not Thoroughly.Presently, information security circle has been reached common understanding, and outside threat can not be eliminated, and can only be evaded even in minimum limit Receive, i.e., no matter how perfect the safety protection technique of information system front and back end is made, and security risk can not always avoid;Change speech It, hacker or attacker can always find a break-through point and be broken through to information system.Therefore, in intra-company, information peace How the full most important thing for having become information work, carry out protecting information safety and information departments need override to consider Significant problem.
The traditional approach of information security is referred to as security boundary.In conventional information trouble free service, data to be protected is needed Always uniformly it is stored in Centroid(Server and database)In.When facing outside threat, side is just set up therebetween Boundary(Wall), attacker is blocked in outside boundary.However, this method effect is not very good, because boundary is always broken into.And one Denier enters inside, and attacker can obtain complete control, steal sensitive data(It such as credit card hacker event and extorts software and attacks It hits), or take over strength control(Such as Ukraine's large-area power-cuts and Iranian nuclear reaction system).
The invention of Patent No. CN106548330A proposes a kind of transaction verification method and system based on block chain, should Invention is encrypted remaining sum by block chain, improves safety and trading processing speed, but the invention is in authentication side Face is not comprehensive enough, and there are certain loopholes, and safety is caused to reduce, for this purpose, it is proposed that a kind of electric power networks based on block chain Transaction verification method and system.
Invention content
Technical problems based on background technology, the present invention propose it is a kind of based on block chain electric power networks transaction test The characteristics of demonstrate,proving method and system, having and verified simultaneously to multinomial information, improve safety solves existing network transaction system It is not comprehensive enough in terms of the authentication of system, there are certain loophole, the problem of causing safety to reduce.
The present invention provides the following technical solutions:
A kind of electric power networks transaction verification system based on block chain, including transaction verification system, the transaction verification system packet Information acquisition module, Authority Verification module and CPU are included, the output end of described information acquisition module and the input terminal of filter are unidirectional It is electrically connected, the output end of the filter and the input terminal of temporary storage module are unidirectionally electrically connected, the interim storage mould The output end of block and the input terminal of wireless module are unidirectionally electrically connected;The output end of the wireless module and Authority Verification module Input terminal is unidirectionally electrically connected, and the output end of the Authority Verification module and the input terminal of CPU are unidirectionally electrically connected, the CPU With the two-way electric connection of short-message verification module, the short-message verification module and the two-way electric connection of mobile device, the short message are tested Card module includes identifying code contrast module and SMS transmission module, output end and the identifying code contrast module of the mobile device Input terminal is unidirectionally electrically connected, and the output end of the identifying code contrast module and the input terminal of CPU are unidirectionally electrically connected, described The output end of CPU and the input terminal of SMS transmission module are unidirectionally electrically connected, the output end of the SMS transmission module and movement The input terminal of equipment is unidirectionally electrically connected.
Preferably, described information acquisition module includes CCD camera, finger-print recognising instrument and refers to hand vein recognition instrument.
Preferably, the Authority Verification module includes data comparison module, memory module and feedback module, the storage mould Block uses mechanical hard disk or Fixed disk.
Preferably, the data comparison module includes fingerprint contrast module, refers to vein contrast module and image authentication module.
A kind of electric power networks transaction verification method based on block chain, includes the following steps:
(1)Identity information acquisition:The identity information of user is acquired by information acquisition module, by CCD camera into Pedestrian's face information collection, or finger print information is acquired by finger-print recognising instrument, or by referring to hand vein recognition instrument to user Finger vena information be acquired, and stored by filter process and temporary storage module, be sent to finally by module Authority Verification module;
(2)Authentication:Authority Verification module receive after information by data comparison mould fingerprint contrast module in the block, refer to it is quiet Corresponding information is carried out comparison identification by arteries and veins contrast module and image authentication module;
(3)Short-message verification:User receives the verification information that short-message verification module is sent by mobile device, and inputs, by short Letter authentication module compares the identifying code sent out and the identifying code received;
(4)Network trading:When authentication is successful and short-message verification passes through, you can carry out network trading, work as authentication Or when short-message verification one of which is unqualified or two unqualified, network trading can not be carried out.
Preferably, the transaction verification system is run based on block chain, and outer block chain takes one-way hash function algorithm, Mei Gexin The block of generation is promoted in strict accordance with time linear sequence, the irreversibility of time make it is any attempt to invade distort number in block chain It is believed that the behavior of breath is traced, cause by the repulsion of other nodes, to limit related malfeasance.
Preferably, the data comparison module is compared by comparing the information in the information and memory module that receive, To realize purview certification.
Preferably, it is stored with the face information of user, finger print information in the memory module and refers to venous information.
The present invention provides a kind of electric power networks transaction verification methods and system based on block chain, pass through data comparison mould The finger print information that fingerprint contrast module in the block acquires finger-print recognising instrument is identified, quiet to referring to by referring to vein contrast module The finger vena information of arteries and veins identifier acquisition is identified, the face information acquired to CCD camera by image authentication module It is identified, the verification information that short-message verification module is sent is received by mobile device, and input, pass through short-message verification module pair The identifying code sent out and the identifying code received are compared, and six random numbers of the short message verification code in the form of SMS are short The effective time of letter identifying code is three minutes after sending out identifying code, when authentication success and short-message verification by when, i.e., Network trading can be carried out, when authentication or when short-message verification one of which is unqualified or two unqualified, net can not be carried out Network is merchandised, and to improve the safety of network trading, the authentication aspect for solving existing network transaction system is not complete enough Face, there are certain loophole, the problem of causing safety to reduce.
Description of the drawings
Fig. 1 is present system schematic diagram;
Fig. 2 is operational flow diagram of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
- 2 are please referred to Fig.1, the present invention provides a kind of technical solution:
A kind of electric power networks transaction verification system based on block chain, including transaction verification system, transaction verification system include letter Breath acquisition module, Authority Verification module and CPU, the output end of information acquisition module and the input terminal of filter unidirectionally electrically connect It connects, the output end of filter and the input terminal of temporary storage module are unidirectionally electrically connected, the output end and nothing of temporary storage module The input terminal of wire module is unidirectionally electrically connected;The output end of wireless module and the input terminal of Authority Verification module unidirectionally electrically connect Connect, the output end of Authority Verification module and the input terminal of CPU are unidirectionally electrically connected, CPU with short-message verification module is two-way electrically connects It connects, short-message verification module and the two-way electric connection of mobile device, short-message verification module includes identifying code contrast module and short message hair Module, the output end of mobile device is sent unidirectionally to be electrically connected with the input terminal of identifying code contrast module, identifying code contrast module The input terminal of output end and CPU are unidirectionally electrically connected, and the output end of CPU and the input terminal of SMS transmission module unidirectionally electrically connect It connects, the output end of SMS transmission module and the input terminal of mobile device are unidirectionally electrically connected, and information acquisition module includes CCD camera shootings Head and refers to hand vein recognition instrument at finger-print recognising instrument, and Authority Verification module includes data comparison module, memory module and feedback module, Memory module uses mechanical hard disk or Fixed disk, data comparison module includes fingerprint contrast module, refer to vein contrast module and Image authentication module.
A kind of electric power networks transaction verification method based on block chain, includes the following steps:
(1)Identity information acquisition:The identity information of user is acquired by information acquisition module, by CCD camera into Pedestrian's face information collection, or finger print information is acquired by finger-print recognising instrument, or by referring to hand vein recognition instrument to user Finger vena information be acquired, and stored by filter process and temporary storage module, be sent to finally by module Authority Verification module;
(2)Authentication:Authority Verification module receive after information by data comparison mould fingerprint contrast module in the block, refer to it is quiet Corresponding information is carried out comparison identification by arteries and veins contrast module and image authentication module;
(3)Short-message verification:User receives the verification information that short-message verification module is sent by mobile device, and inputs, by short Letter authentication module compares the identifying code sent out and the identifying code received;
(4)Network trading:When authentication is successful and short-message verification passes through, you can carry out network trading, work as authentication Or when short-message verification one of which is unqualified or two unqualified, network trading can not be carried out.
Embodiment one
Identity information acquisition is carried out first:The identity information of user is acquired by information acquisition module, is imaged by CCD Head carries out face information acquisition, or is acquired to finger print information by finger-print recognising instrument, or by referring to hand vein recognition instrument pair The finger vena information of user is acquired, and is stored by filter process and temporary storage module, is sent out finally by module It send to Authority Verification module;Then authentication is carried out:Authority Verification module receives after information by data comparison module Fingerprint contrast module, refer to vein contrast module and corresponding information is carried out comparison identification by image authentication module;Then it carries out Short-message verification:User receives the verification information that short-message verification module is sent by mobile device, and inputs, and passes through short-message verification mould Block compares the identifying code sent out and the identifying code received;Finally carry out network trading:When authentication is successful and short Letter verification is when passing through, you can carry out network trading, when authentication or short-message verification one of which it is unqualified or two not When qualified, network trading can not be carried out.
Embodiment two
In embodiment one, following processes are added:
Transaction verification system is run based on block chain, and outer block chain takes one-way hash function algorithm, and each newly generated block is stringent It is promoted according to time linear sequence, the irreversibility of time makes any behavior quilt for attempting invasion and distorting data information in block chain Retrospect, causes by the repulsion of other nodes, to limit related malfeasance.
Identity information acquisition is carried out first:The identity information of user is acquired by information acquisition module, passes through CCD Camera carries out face information acquisition, or is acquired to finger print information by finger-print recognising instrument, or by referring to hand vein recognition Instrument is acquired the finger vena information of user, and is stored by filter process and temporary storage module, finally by mould Block is sent to Authority Verification module;Then authentication is carried out:Authority Verification module receives after information through data comparison mould Fingerprint contrast module in the block refers to vein contrast module and corresponding information is carried out comparison identification by image authentication module;Then Carry out short-message verification:User receives the verification information that short-message verification module is sent by mobile device, and inputs, and is tested by short message Card module compares the identifying code sent out and the identifying code received;Finally carry out network trading:When authentication success And short-message verification is when passing through, you can network trading is carried out, when authentication or short-message verification one of which are unqualified or two When unqualified, network trading can not be carried out;Wherein transaction verification system is run based on block chain, and outer block chain takes unidirectional Kazakhstan Uncommon algorithm, each newly generated block are promoted in strict accordance with time linear sequence, and the irreversibility of time makes any to attempt to invade The behavior for distorting data information in block chain is traced, and is caused by the repulsion of other nodes, to limit related malfeasance.
Embodiment three
In embodiment two, following processes are added:
Data comparison module is compared by comparing the information in the information and memory module that receive, to realize that permission is recognized Card.
Identity information acquisition is carried out first:The identity information of user is acquired by information acquisition module, passes through CCD Camera carries out face information acquisition, or is acquired to finger print information by finger-print recognising instrument, or by referring to hand vein recognition Instrument is acquired the finger vena information of user, and is stored by filter process and temporary storage module, finally by mould Block is sent to Authority Verification module;Then authentication is carried out:Authority Verification module receives after information through data comparison mould Fingerprint contrast module in the block refers to vein contrast module and corresponding information is carried out comparison identification, data by image authentication module Contrast module is compared by comparing the information in the information and memory module that receive, to realize purview certification;Then into Row short-message verification:User receives the verification information that short-message verification module is sent by mobile device, and inputs, and passes through short-message verification Module compares the identifying code sent out and the identifying code received;Finally carry out network trading:When authentication success and When short-message verification passes through, you can carry out network trading, when authentication or short-message verification one of which is unqualified or two equal When unqualified, network trading can not be carried out;Wherein transaction verification system is run based on block chain, and outer block chain takes one-way hash function Algorithm, each newly generated block are promoted in strict accordance with time linear sequence, the irreversibility of time make it is any attempt to invade usurp The behavior for changing data information in block chain is traced, and is caused by the repulsion of other nodes, to limit related malfeasance.
Example IV:
It is stored with the face information of user, finger print information in memory module and refers to venous information.
Identity information acquisition is carried out first:The identity information of user is acquired by information acquisition module, passes through CCD Camera carries out face information acquisition, or is acquired to finger print information by finger-print recognising instrument, or by referring to hand vein recognition Instrument is acquired the finger vena information of user, and is stored by filter process and temporary storage module, finally by mould Block is sent to Authority Verification module;Then authentication is carried out:Authority Verification module receives after information through data comparison mould Fingerprint contrast module in the block refers to vein contrast module and corresponding information is carried out comparison identification, data by image authentication module Contrast module is compared by comparing the information in the information and memory module that receive, to realize purview certification, stores mould It is stored with the face information of user, finger print information in block and refers to venous information;Then short-message verification is carried out:User is set by movement The standby verification information for receiving short-message verification module and sending, and input, by short-message verification module to the identifying code sent out and reception To identifying code compared;Finally carry out network trading:When authentication is successful and short-message verification passes through, you can carry out Network trading can not carry out network trading when authentication or when short-message verification one of which is unqualified or two unqualified; Wherein transaction verification system is run based on block chain, and outer block chain takes one-way hash function algorithm, and each newly generated block is stringent It is promoted according to time linear sequence, the irreversibility of time makes any behavior quilt for attempting invasion and distorting data information in block chain Retrospect, causes by the repulsion of other nodes, to limit related malfeasance.
In the present invention, finger-print recognising instrument is acquired by data comparison mould fingerprint contrast module in the block finger print information into Row identification is identified the finger vena information for referring to the acquisition of hand vein recognition instrument by referring to vein contrast module, is tested by image The face information that card module acquires CCD camera is identified, and testing for short-message verification module transmission is received by mobile device Information is demonstrate,proved, and is inputted, the identifying code sent out and the identifying code received are compared by short-message verification module, short-message verification Six random numbers of the code in the form of SMS, the effective time of short message verification code is three minutes after sending out identifying code, works as body Part certification success and when short-message verification passes through, you can carry out network trading, when authentication or short-message verification one of which not It is qualified or when two are unqualified, network trading can not be carried out, to improve the safety of network trading, solves existing net It is not comprehensive enough in terms of the authentication of network transaction system, there are certain loophole, the problem of causing safety to reduce.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Any one skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (8)

1. a kind of electric power networks transaction verification system based on block chain, including transaction verification system, the transaction verification system Including information acquisition module, Authority Verification module and CPU, it is characterised in that:The output end of described information acquisition module and filtering The input terminal of device is unidirectionally electrically connected, and the output end of the filter and the input terminal of temporary storage module are unidirectionally electrically connected, The output end of the temporary storage module and the input terminal of wireless module are unidirectionally electrically connected;The output end of the wireless module with The input terminal of Authority Verification module is unidirectionally electrically connected, and the output end of the Authority Verification module and the input terminal of CPU are unidirectionally electric Property connection, the CPU and the two-way electric connection of short-message verification module, the short-message verification module with mobile device is two-way electrically connects Connect, the short-message verification module includes identifying code contrast module and SMS transmission module, the output end of the mobile device with test The input terminal of card code contrast module is unidirectionally electrically connected, and the output end of the identifying code contrast module and the input terminal of CPU are unidirectional It is electrically connected, the output end of the CPU and the input terminal of SMS transmission module are unidirectionally electrically connected, the SMS transmission module Output end and the input terminal of mobile device are unidirectionally electrically connected.
2. a kind of electric power networks transaction verification system based on block chain according to claim 1, it is characterised in that:It is described Information acquisition module includes CCD camera, finger-print recognising instrument and refers to hand vein recognition instrument.
3. a kind of electric power networks transaction verification system based on block chain according to claim 1, it is characterised in that:It is described Authority Verification module includes data comparison module, memory module and feedback module, and the memory module is using mechanical hard disk or admittedly Determine hard disk.
4. a kind of electric power networks transaction verification system based on block chain according to claim 3, it is characterised in that:It is described Data comparison module includes fingerprint contrast module, refers to vein contrast module and image authentication module.
5. a kind of electric power networks transaction verification method based on block chain, it is characterised in that:Include the following steps:
(1)Identity information acquisition:The identity information of user is acquired by information acquisition module, by CCD camera into Pedestrian's face information collection, or finger print information is acquired by finger-print recognising instrument, or by referring to hand vein recognition instrument to user Finger vena information be acquired, and stored by filter process and temporary storage module, be sent to finally by module Authority Verification module;
(2)Authentication:Authority Verification module receive after information by data comparison mould fingerprint contrast module in the block, refer to it is quiet Corresponding information is carried out comparison identification by arteries and veins contrast module and image authentication module;
(3)Short-message verification:User receives the verification information that short-message verification module is sent by mobile device, and inputs, by short Letter authentication module compares the identifying code sent out and the identifying code received;
(4)Network trading:When authentication is successful and short-message verification passes through, you can carry out network trading, work as authentication Or when short-message verification one of which is unqualified or two unqualified, network trading can not be carried out.
6. a kind of electric power networks transaction verification method based on block chain according to claim 5, it is characterised in that:It is described Transaction verification system is run based on block chain, and outer block chain takes one-way hash function algorithm, each newly generated block in strict accordance with Time linear sequence promotes, the irreversibility of time make it is any attempt to invade the behavior for distorting data information in block chain chased after It traces back, causes by the repulsion of other nodes, to limit related malfeasance.
7. a kind of electric power networks transaction verification method based on block chain according to claim 5, it is characterised in that:It is described Data comparison module is compared by comparing the information in the information and memory module that receive, to realize purview certification.
8. a kind of electric power networks transaction verification method based on block chain according to claim 7, it is characterised in that:It is described It is stored with the face information of user, finger print information in memory module and refers to venous information.
CN201810563911.3A 2018-06-04 2018-06-04 A kind of electric power networks transaction verification method and system based on block chain Pending CN108769035A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810563911.3A CN108769035A (en) 2018-06-04 2018-06-04 A kind of electric power networks transaction verification method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810563911.3A CN108769035A (en) 2018-06-04 2018-06-04 A kind of electric power networks transaction verification method and system based on block chain

Publications (1)

Publication Number Publication Date
CN108769035A true CN108769035A (en) 2018-11-06

Family

ID=64002650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810563911.3A Pending CN108769035A (en) 2018-06-04 2018-06-04 A kind of electric power networks transaction verification method and system based on block chain

Country Status (1)

Country Link
CN (1) CN108769035A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109978347A (en) * 2019-03-07 2019-07-05 国网冀北电力有限公司技能培训中心 The community energy autonomy method containing distributed power generation based on block chain technology
CN110147668A (en) * 2019-04-01 2019-08-20 深圳天顺智慧能源科技有限公司 A kind of equipment authentication method and device based on block chain
CN112950376A (en) * 2021-03-05 2021-06-11 广东电网有限责任公司 Electric power industry digital identity card management method and system based on block chain technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120132706A1 (en) * 2010-06-04 2012-05-31 Mckenzie Craig Electronic credit card with fraud protection
CN104484804A (en) * 2014-12-24 2015-04-01 福建联迪商用设备有限公司 Secure fingerprint transaction paying method and system
CN106204033A (en) * 2016-07-04 2016-12-07 首都师范大学 A kind of based on recognition of face with the payment system of fingerprint recognition
CN106296359A (en) * 2016-08-13 2017-01-04 深圳市樊溪电子有限公司 Credible electric power networks transaction platform based on block chain technology
US20170339128A1 (en) * 2016-05-23 2017-11-23 Lg Electronics Inc. Method and apparatus for authenticating a device using bluetooth technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120132706A1 (en) * 2010-06-04 2012-05-31 Mckenzie Craig Electronic credit card with fraud protection
CN104484804A (en) * 2014-12-24 2015-04-01 福建联迪商用设备有限公司 Secure fingerprint transaction paying method and system
US20170339128A1 (en) * 2016-05-23 2017-11-23 Lg Electronics Inc. Method and apparatus for authenticating a device using bluetooth technology
CN106204033A (en) * 2016-07-04 2016-12-07 首都师范大学 A kind of based on recognition of face with the payment system of fingerprint recognition
CN106296359A (en) * 2016-08-13 2017-01-04 深圳市樊溪电子有限公司 Credible electric power networks transaction platform based on block chain technology

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109978347A (en) * 2019-03-07 2019-07-05 国网冀北电力有限公司技能培训中心 The community energy autonomy method containing distributed power generation based on block chain technology
CN109978347B (en) * 2019-03-07 2023-04-07 国网冀北电力有限公司技能培训中心 Community energy autonomous method with distributed power generation based on block chain technology
CN110147668A (en) * 2019-04-01 2019-08-20 深圳天顺智慧能源科技有限公司 A kind of equipment authentication method and device based on block chain
CN112950376A (en) * 2021-03-05 2021-06-11 广东电网有限责任公司 Electric power industry digital identity card management method and system based on block chain technology

Similar Documents

Publication Publication Date Title
Das et al. Design of secure and lightweight authentication protocol for wearable devices environment
Schrittwieser et al. Guess who is texting you? evaluating the security of smartphone messaging applications
Parmar et al. A comprehensive study on passwordless authentication
Hammood et al. A review of user authentication model for online banking system based on mobile IMEI number
CN108769035A (en) A kind of electric power networks transaction verification method and system based on block chain
Khan et al. [Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server
CN105431843A (en) Network identity authentication using communication device identification code
Javed et al. Secure fallback authentication and the trusted friend attack
Bani-Hani et al. Online authentication methods used in banks and attacks against these methods
Giura et al. Is it really you? User identification via adaptive behavior fingerprinting
CN101667917B (en) Dynamic password input rule
Hussain et al. Secure annihilation of out-of-band authorization for online transactions
Panjwani Towards end-to-end security in branchless banking
Pampori et al. Securely eradicating cellular dependency for e-banking applications
Ariffin et al. Vulnerabilities detection using attack recognition technique in multi-factor authentication
Hossain et al. Adding Knock Code Technology as a Third Authentication Element to a Global Two-factor Authentication System
Evseev et al. Two-factor authentication methods threats analysis
Aldwairi et al. A novel multi-stage authentication system for mobile applications
Hartung et al. Biometric transaction authentication protocol
Khatri et al. Biometrie based authentication and access control techniques to secure mobile cloud computing
Tan et al. Securing password authentication for web-based applications
Al‐Dablan et al. An analysis of various social engineering attack in social network using machine learning algorithm
Al-Refai et al. An enhanced user authentication framework in cloud computing
Patil et al. A brief survey on password authentication
Anoh et al. Multi-factor authentication system for securing mobile money transactions using mobile money services in Ivory Coast

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181106

RJ01 Rejection of invention patent application after publication