CN108876375A - Block chain real name participatory approaches and system - Google Patents

Block chain real name participatory approaches and system Download PDF

Info

Publication number
CN108876375A
CN108876375A CN201810692345.6A CN201810692345A CN108876375A CN 108876375 A CN108876375 A CN 108876375A CN 201810692345 A CN201810692345 A CN 201810692345A CN 108876375 A CN108876375 A CN 108876375A
Authority
CN
China
Prior art keywords
user
time
block chain
node
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810692345.6A
Other languages
Chinese (zh)
Other versions
CN108876375B (en
Inventor
路成业
王凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201810692345.6A priority Critical patent/CN108876375B/en
Publication of CN108876375A publication Critical patent/CN108876375A/en
Application granted granted Critical
Publication of CN108876375B publication Critical patent/CN108876375B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of block chain real name participatory approaches and systems, wherein method includes:Node is participated in tentatively to be authenticated according to the time difference between certification video record time and receiving time;After preliminary certification passes through, it digs mine node verification user certificate image and whether living body user matches, if matching, then verify whether user certificate information matches with user basic information, if matching, calculates the time difference between video record time and receiving time, if the time difference meets preset time range, it then determines that application user's real-name authentication passes through, if being not received by active broadcast message, block is written in block chain account book.Hereby it is achieved that the node in block chain network is mapped with real-life real user identity to the real-name authentication of block chain interior joint, convenient for the legitimacy for managing and maintaining block chain to node.

Description

Block chain real name participatory approaches and system
Technical field
The present invention relates to field of communication technology more particularly to a kind of block chain real name participatory approaches and system.
Background technique
In general, block chain technology is due to the safety by realizing transaction based on the information exchange between node and node Guarantee, reduces and trust cost and be used widely.
Currently, the participation method in block chain network be all it is anonymous, can only prove all block chain behaviors be it is a certain The corresponding user of a node implements, and cannot be forged by other users, that is to say, that the implementation environment of block chain network and existing Work of growing directly from seeds is separation, it is difficult to node in real life, corresponding user is managed, once for example, block chain network In nodes ' behavior there are illegal activities, such as money laundering etc. can not be traced, completely even by national CA (Certificate Authority, certificate authority) certificate that organ provides, it can only also prove network identity, and can not prove its real body Part, and if CA mechanism will prove that true identity needs to participate under line, it is extremely complex.Therefore, a kind of effective determining block is needed The method of the corresponding real-life real user identity of node in chain network.
Summary of the invention
The present invention provides a kind of block chain real name participatory approaches and system, can not be to block chain to solve in the prior art Node effectively managed, and the technical issues of can not safeguard the legitimacy of block chain.
First embodiment of the invention provides a kind of block chain real name participatory approaches, including:It participates in node and obtains application user The certification video of recording, wherein the certification video includes:Living body user includes user certificate image and user certificate information User certificate and the video record time, and carry out Hash calculation to the certification video and obtain corresponding cryptographic Hash sending To time stamp server;The time stamp server record receives the receiving time of the cryptographic Hash, and applies the timestamp The private key of server carries out signature to the cryptographic Hash and the receiving time and is sent to the participation node;The participation node The time difference between the video record time and the receiving time is calculated, the time difference meets the preset time if knowing Range is sent to block chain network after then signing using the private key of the application user to certification broadcast message, wherein institute Stating certification broadcast message includes;The cryptographic Hash and the receiving time by the time stamp server private key signature, institute State the public key for applying for user and user basic information and the certification video;Mine node is dug using the public affairs of the application user Key broadcasts the message to received certification and carries out signature verification, the cryptographic Hash and the certification video is verified after being verified whether Matching, if knowing correct matching, verifies the user certificate image and whether the living body user matches, if knowing correct Match, then verify whether the user certificate information matches with the user basic information, if knowing correct matching, described in calculating Time difference between video record time and the receiving time, if after know that the time difference meets preset time model It encloses, it is determined that the real-name authentication of the application user passes through, and certification success message is written in block and to the block Chain network broadcast;It is described to dig whether the judgement of mine node receives other instruction blocks for digging the transmission of mine node within a preset time Active broadcast message, be not received by the active broadcast message if knowing, broadcast the area to the block chain network Block comes into force, and the block is written in block chain account book.
Second embodiment of the invention provides a kind of block chain real-name authentication system, including:Participate in node, time-stamping service Device digs mine node, wherein the participation node, the certification video recorded for obtaining application user, wherein the certification view Frequently include:Living body user, the user certificate comprising user certificate image and user certificate information and video record time, and The corresponding cryptographic Hash of Hash calculation acquisition is carried out to the certification video and is sent to the time stamp server;The timestamp clothes Business device, for recording the receiving time for receiving the cryptographic Hash, and the private key of the application time stamp server is to the Hash Value and the receiving time carry out signature and are sent to the participation node;The participation node, for calculating the video record Time difference between time and the receiving time, if knowing, the time difference meets preset time range, using described Apply being sent to block chain network after the private key of user signs to certification broadcast message, wherein the certification broadcast message Including;The public affairs of the cryptographic Hash and the receiving time, the application user by the time stamp server private key signature Key and user basic information and the certification video;The digging mine node, the public key docking for the application application user The certification broadcast message of receipts carries out signature verification, verifies whether the cryptographic Hash matches with the certification video after being verified, If knowing correct matching, verifies the user certificate image and whether the living body user matches, if knowing correct matching, It verifies whether the user certificate information matches with the user basic information, if knowing correct matching, calculates the video Time difference between recording time and the receiving time, if after know that the time difference meets preset time range, It then determines that the real-name authentication of the application user passes through, and certification success message is written in block and to the block link network Network broadcast;The digging mine node, for judging that whether receiving other within a preset time digs the instruction area that mine node is sent The active broadcast message of block is not received by the active broadcast message if knowing, to described in block chain network broadcast Block comes into force, and the block is written in block chain account book.
Third embodiment of the invention provides a kind of computer equipment, including:Memory, processor and storage are on a memory And the computer program that can be run on a processor, when the processor executes the computer program, realize such as above-mentioned implementation Block chain real name participatory approaches described in example.
Fourth embodiment of the invention provides a kind of non-transitorycomputer readable storage medium, is stored thereon with computer journey Sequence realizes the block chain real name participatory approaches as described in above-described embodiment when the computer program is executed by processor.
Technical solution provided in an embodiment of the present invention can include the following benefits:
The real-name authentication to block chain interior joint is realized, by node in block chain network and real-life true User identity is mapped, convenient for the legitimacy for managing and maintaining block chain to node.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, wherein
Fig. 1 is the structural schematic diagram that block chain real name according to an embodiment of the invention participates in system;
Fig. 2 is the interaction schematic diagram that block chain real name according to an embodiment of the invention participates in system;
Fig. 3 is the interaction schematic diagram that block chain real name in accordance with another embodiment of the present invention participates in system;
Fig. 4 is the flow chart of block chain real name participatory approaches according to an embodiment of the invention;
Fig. 5 is the flow chart of block chain real name participatory approaches in accordance with another embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
Description based on background technique, it can be appreciated that in the prior art, since the participation node in block chain network participates in Mode be it is anonymous, only can confirm that the network identity for participating in node based on block chain network, and can not determine participating in The real identity of the corresponding operation user of node in real life, so as to cause that can not have to the operation of block chain network The supervision of effect.
It is quickly grown instantly in block chain technology, block chain technology is increasingly used to the wealth in the carrying entity world It produces, and anonymity can derive numerous frauds, this restrict the popularizations of block chain technology.
In order to solve the above-mentioned technical problem, the invention proposes a kind of block chain real name participatory approaches, in the method, will The identity information of the user in participation node and real world in block chain is closely connected together, thus, be conducive to be based on Management of the real information of user to node is participated in, and the legitimacy of block chain network environment is guaranteed.
Wherein, clear for description, system is participated in the block chain real name of the embodiment of the present invention first and is described, is schemed 1 is the structural schematic diagram that block chain real name according to an embodiment of the invention participates in system, as shown in Figure 1, the system includes It participates in node 100, dig mine node 200 and time stamp server 300, wherein participating in node 100 is that block chain is added in application for the first time After node, the participation node 100 of network are successfully joined block chain network, book keeping operation function etc., timestamp are exercised as mine node is dug Server 300 is used for the nodes ' behavior in block chain network, including trading activity etc., time label is carried out, to avoid transaction It is forged.
Referring to Fig. 2, in practical implementation, participates in node and obtains the certification video (step 1) that application user records, In, application user can be personal or enterprise, wherein authenticating video includes:Living body user includes user certificate image User certificate and video record time with user certificate information, and the uniqueness of the certification video is marked, certification is regarded Frequency carries out the corresponding cryptographic Hash of Hash calculation acquisition and is sent to time stamp server (step 2).
Time stamp server records the receiving time for receiving cryptographic Hash, and the private key of application time stamp server is to cryptographic Hash Signature, which is carried out, with receiving time is sent to participation node, thus, private key signature is carried out to certification video by time stamp server, Avoid the forgery (step 3) to certification video.
The time difference between node calculating video record time and receiving time is participated in, if it is preset to know that the time difference meets Time range then shows that the certification video can really reflect the real information for participating in the corresponding application user of node, thus, it answers Block chain network (step 4) is sent to after being signed with the private key of application user to certification broadcast message, wherein certification broadcast Message includes;The public key of cryptographic Hash and receiving time, application user by time stamp server private key signature and user are basic Information and certification video.
Further, the public key for digging mine node application application user, which broadcasts the message to received certification, carries out signature verification, It disguises oneself as to avoid other illegal nodes and participates in node progress authentication (step 51).
It should be understood that in the embodiment of the present invention, it is corresponding based on participation node of the public key certificate technology to block chain Application user carry out authentication, public key certificate technology and core be a pair of secret keys, the basic principle is that:By a key The information content encrypted can only can be just decrypted by another paired key.Encrypted public key can be widely It issues correspondent related with oneself and digs mine node, encryption key then needs to store fool proofly.In use, participating in Node, which can encrypt broadcast message with the signature private key for participating in node and send to, digs mine node, and digging mine node can make Decryption is completed with the encrypted public key for participating in node.
Further, cryptographic Hash is verified after being verified and whether matches (step 52) with certification video, avoids illegally using Family carries out real-name authentication using other videos, if knowing correct matching, verify user certificate image and living body user whether With (step 53), if knowing correct matching, user certificate information is verified with user basic information and whether matches (step 54), if Know correct matching, then show user certificate information etc. effectively, in turn, calculate between video record time and receiving time when Between poor (step 55), if after know that the time difference meets preset time range, it is determined that apply for that the real-name authentication of user is logical It crosses, and certification success message is written in block and broadcasts (step 56) to block chain network.
In the present embodiment, in order to further verify the validity for participating in node, it is avoided to destroy the fortune of block chain network Row environment, the active broadcast for digging the instruction the block whether judgement of mine node receives other digging mine nodes transmissions within a preset time disappear It ceases, that is, determines that the participation node is added in block chain network, if it is normal to exercise book keeping operation function, it is not received by vain if knowing Broadcast message, then it is normal to exercise book keeping operation function after showing that block chain network is added in the participation node, then it is broadcasted to block chain network Block comes into force, and (step 6) in block chain account book is written in block.
In practical implementation, possible other dig mine node and error in entering accounts occur to which erroneous judgement currently participates in node book keeping operation Mistake, and active broadcast message is had sent, thus, in order to further increase the verifying participated in when node participates in block chain network Accuracy, in one embodiment of the invention, as shown in figure 3, further including following step on the basis of above-mentioned shown in Fig. 2 Suddenly:Active broadcast message is received if knowing, judges to send whether the number of the digging mine node of active broadcast message is more than pre- If threshold value (step 7), than such as whether being more than the digging mine node of half, knowing how number is less than preset threshold, then to block chain Web broadcast block comes into force, and block is written in block chain account book, if knowing, number is more than or equal to preset threshold, to block Chain network broadcasts the invalid (step 8) of block.
The block chain real name of the embodiment of the present invention participates in system as a result, when participating in node application addition block chain network, Real-name authentication is carried out to the corresponding living body user of node is participated in, real-name authentication at least has the advantages that following several significant:
First:Node in block chain network is due to having carried out real-name authentication, and one therefore, and block chain network is by network and now It is real compact it is close link together, thus, block chain network can be used as deposit card, as right, as symbol of identity etc..
Second, convenience is brought for the management of node, for example, user reports the loss after Lost Security Key to passing through, it can basis The key that the real information feedback of user is lost, solving user's Lost Security Key can not report the loss the technical issues of giving for change.
Third, under system of real name system, the meeting such as nodes ' behavior in block chain network and specific investor etc. are contacted Together, so as to form a social contract, to release the strength of powerful responsibility and promise.
4th, according to relevant laws and regulations, in order to guarantee the property safety of user, real-name authentication is essential, thus, it is real The block chain network of name system has broken the opposition with law, is conducive to supervised and manages, is of great significance to popularization.
5th, under the system of system of real name, to many illegal nodes ' behaviors, for example, all being formed the problem of intelligent contract Effective transparent management environment maintains the legitimacy and authenticity of the operation of block chain network.
In order to which the more detailed block chain real name for illustrating the embodiment of the present invention participates in details when system executes, so that this The technical staff in field is clearer to block chain real name participation process of the invention, concentrates on block chain real name participant below Method side carries out the description of the details of participation process.
Fig. 4 is the flow chart of block chain real name participatory approaches according to an embodiment of the invention, as shown in figure 4, the party Method includes:
Step 101, it participates in node and obtains the certification video that application user records, wherein authenticating video includes:Living body is used Family, the user certificate comprising user certificate image and user certificate information and video record time, and certification video is carried out Hash calculation obtains corresponding cryptographic Hash and is sent to time stamp server.
Wherein, the video record time includes the time electronic clock chart at display current specific moment, for example, including showing The electronic clock chart of current days Time of Day Hour Minute Second, alternatively, the current specific moment etc. that living body user reads aloud, i.e., with voice Form indicates current specific moment, specific time of the video record moment to indicate user's recorded video, to avoid user The time of the certification video record of upload is more remote, differs larger with the true looks information of user and waits (for example, 26 years old Shen Please user upload its 18 years old record certification video).
In addition, above-mentioned user certificate includes comprising user certificate image and the identity card of user certificate information, passport, student Card, medical insurance card etc..
Specifically, in order to realize to the real-name authentication for participating in node application user, user, which needs to have prerecorded one section, to be recognized Video is demonstrate,proved, includes living body user (i.e. true application user, rather than the images such as humanoid vertical board) in the certification video, comprising using The user certificate and video record time of family certificate image and user certificate information participate in node and obtain application user in turn The certification video of recording, wherein participate in node and obtain the mode of certification video to be user's active upload, be also possible to user After participating in the such as smart phone recording of the corresponding equipment of node, participate in what node was actively extracted from relevant device.
In turn, to calculating of the node to certification video progress cryptographic Hash is participated in, certification view is marked by the cryptographic Hash The uniqueness of frequency, and the cryptographic Hash is sent to time stamp server, it is sent in order to further acquisition time stamp server Reliable time signature.
Step 102, time stamp server record receives the receiving time of cryptographic Hash, and the private key of application time stamp server Signature is carried out to cryptographic Hash and receiving time and is sent to participation node.
Specifically, time stamp server record receives the receiving time of cryptographic Hash, and should time stamp server private key Signature is carried out to cryptographic Hash and receiving time and is sent to participation node, for example, passing through NFC (Near Field Communication, near field communication (NFC)), WiFi etc. be sent to participation node, hereby it is achieved that node is participated in Application certification video the reliable time signature.
Step 103, the time difference between node calculating video record time and receiving time is participated in, the time difference full if knowing The preset time range of foot is sent to block link network after then signing using the private key of application user to certification broadcast message Network, wherein certification, which broadcasts the message, includes;Cryptographic Hash and receiving time, application user by time stamp server private key signature Public key and user basic information and certification video.
If it should be understood that participate in node if it is determined that time stamp server receive the receiving time of cryptographic Hash with Video record lead time is larger, it is likely that is that illegal equipment end has pretended time stamp server to the Kazakhstan for participating in node transmission Uncommon value is signed, and the signature is sent to participation node, so as to cause receiving time and video record lead time compared with Greatly, thus, in an embodiment of the present invention, by calculating the time difference between video record time and receiving time, to participation The legitimacy of node is tentatively authenticated.
Specifically, the time difference between video record time and receiving time is calculated, for example, when extraction display is current specific The video record time shown in the time electronic clock chart at quarter, calculate between video record time and receiving time when Between it is poor, judge whether the time difference meets preset time range, which demarcated according to lot of experimental data , usually in the preset time range, legal participation node can be completed for the certification video of recording to be successfully uploaded to The feedback that time stamp server and time stamp server can complete signature is received until participating in node.
If the time difference meets preset time range, show that the signer of cryptographic Hash be time stamp server, from And using the private key of application user to block chain network is sent to after certification broadcast message signature, in order to block chain network root The certification again of the legitimacy of application user is carried out according to certification broadcast message.Wherein, apply the private key of user only by applying User holds.
Above-mentioned certification broadcast message includes the cryptographic Hash and receiving time by time stamp server to private key signature, application The public key and user basic information and certification video of user, wherein the marks such as the user identity card number that user basic information includes Know the information of user's uniqueness, user's name includes the information of the identity users identity such as address name, wherein user basic information It is corresponding with user certificate information, in order to further carry out the reality of application user according to user basic information and user certificate information Name certification.
Step 104, the public key for digging mine node application application user, which broadcasts the message to received certification, carries out signature verification, tests Whether verifying cryptographic Hash matches with certification video after card passes through, if knowing correct matching, verifies user certificate image and living body Whether user matches, if knowing correct matching, verifies whether user certificate information matches with user basic information, if knowing just Really matching, then calculate the time difference between video record time and receiving time, if after to know that the time difference meets preset Time range, it is determined that apply for that the real-name authentication of user passes through, and certification success message is written in block and to block chain Web broadcast.
As foregoing description, the private key of participating user and the public key of the participating user in certification broadcast message are a pair of each other Password, thus, in an embodiment of the present invention, the public key of digging mine node application application user is to received by participating user's The certification that the certification broadcast message of private key signature is signed, when the signature in the public key and certification broadcast message of application user Apply for the private key of user to then showing that transmission certification broadcast message is to participate in node itself when corresponding to, so that completion saves participation The verifying again of the legitimacy of point.
Further, it verifies whether cryptographic Hash matches to certification video after being verified, other is avoided to participate in section as a result, The certification video that point is sent obscures real-name authentication process, if correct matching, it is determined that go out the current certification video for participating in certification It is corresponding with the participation node of corresponding user.
Further, real-name authentication is carried out to application user, whether verifying user certificate image matches with living body user, I.e. whether living body user is authenticated using my user certificate, if it does, then verifying user certificate information and user's base Whether this information matches, and is further ensured that living body user carries out real-name authentication using my relevant information to verify, for example, When user certificate information includes certificate number and user certificate title, and user basic information includes user identifier and user's name, Certificate number can be verified and whether user identifier identical, and verifying user certificate title and user's name it is whether identical.
If the certificate information of user is matched with user basic information, show that living body user uses my relevant information Real-name authentication is carried out, at this point, completing the legitimate verification to certification video content itself.
If in addition, time stamp server receive cryptographic Hash receiving time and video record lead time it is larger, It is likely to be other illegality equipments and has intercepted and captured the cryptographic Hash for participating in node transmission, disguise oneself as and participate in node to time stamp server hair The cryptographic Hash etc. intercepted and captured has been sent, it is larger so as to cause receiving time and video record lead time, thus, in implementation of the invention In example, by calculating the time difference between video record time and receiving time, the legitimacy for participating in node is authenticated.For Illegal user is avoided to carry out real-name authentication using the certification video of other users, when calculating video record time again and receiving Between time difference, compare and know that the time difference meets preset time range, then show the certification video really and be to participate in node sheet The certification video for the corresponding application user that body is sent, determines that the real-name authentication of application user passes through, and certification success message is write Enter into block and is broadcasted to block chain network.
Wherein, under different application scenarios, certification success message can be about fixed expression and authenticate successful character string, It is also possible to specifically indicate to authenticate successful text information etc., this is not restricted.
In view of in some scenes, some possible illegal users by intercept and capture and reset the certification videos of other users into Row real-name authentication, thus, correspond to application user in order to further ensure participating in the certification video that node provides, in this hair In bright one embodiment, authenticating in video further includes that living body user reads aloud the preset sound bite for authenticating video use, such as Shown in Fig. 5, before the real-name authentication of above-mentioned determining application user passes through, this method further includes:
Step 201, it digs mine node detection is carried out to the lip reading of living body user and obtain lip reading content, and by lip reading content and language The content of text of tablet section is compared.
Step 202, if digging mine node knows that lip reading content is consistent with the content of text of sound bite, it is determined that application user Real-name authentication pass through.
It is appreciated that application user is bright when carrying out the recording of certification video in order to avoid illegally being utilized by other users It reads one section and includes the voice of oneself personal information, for example, reading aloud one section " this is the video that Xiao Ming is used to block chain real-name authentication " Voice etc., thus, dig mine node to the lip reading of living body user carry out detection obtain lip reading content, and by lip reading content with it is preset The content of text of sound bite is compared, if digging mine node knows that lip reading content is consistent with the content of text of sound bite, Determine that the real-name authentication of application user passes through.Thus, on the one hand, the certification that legitimacy is carried out based on lip reading avoids illegal use Family is authenticated by connecing the video of goods to dub, and on the other hand, be ensure that and is intercepted and captured the certification of other users even if illegal user Video, also due to its living body can not be corresponding with the certification video of intercepting and capturing and can not be attacked.
Step 105, it digs mine node and judges that whether receiving other within a preset time digs the instruction block that mine nodes are sent Active broadcast message is not received by active broadcast message if knowing, comes into force to block chain network broadcast block, and by block It is written in block chain account book.
It is understandable to be, after participation node is successfully accessed block chain network, real-name authentication is completed in time, it is also possible to The user of the real-name authentication is illegal user etc., thus, in order to guarantee that the participation node is normally carried out accounting activities, rather than into The illegal activities such as row money laundering, need to verify the accounting activities whether the participation node executes normal legal.
Specifically, the digging mine node in block chain network is by Transaction Information recorded in account book etc. and the participation nodes records The Transaction Information similarly traded be compared, if it is inconsistent, the digging mine node determine participate in node error in entering accounts, sentence The corresponding block for authenticating success message of the participation node that breaks is invalid, digs whether the judgement of mine node receives it within a preset time He digs the broadcast message for indicating that block is invalid of mine node transmission, active broadcast message is not received by if knowing, to block Chain network broadcasts the block and comes into force, and block is written in block chain account book.
Certainly, in practical implementation, possible other dig mine node and error in entering accounts occur to which erroneous judgement currently participates in section Point error in entering accounts, and active broadcast message is had sent, thus, when participating in block chain network to further increase participation node The accuracy of verifying know if digging mine node in one embodiment of the invention and receive active broadcast message, judge Whether the number of diggings mine node for sending active broadcast message is more than preset threshold, the preset threshold and dig the total of mine node and The authority of digging mine node in block chain network is related, and the sum for digging mine node is more, digs the lower (ratio of authority of mine node Such as it is only common participation node), then corresponding preset threshold is lower.
If digging mine node knows that number is less than preset threshold, show that the most digging mine node is to accept the block , alternatively, without authoritative digging mine node think the block be it is invalid, thus, at this time to block chain network broadcast block It comes into force, and block is written in block chain account book, conversely, number is more than or equal to preset threshold if knowing, to block chain network It is invalid to broadcast the block.
In conclusion the block chain real name participatory approaches of the embodiment of the present invention, realize the real name to block chain interior joint Certification, the node in block chain network is mapped with real-life real user identity, convenient for the management to node With the legitimacy of maintenance block chain.
In order to realize above-described embodiment, the invention also provides a kind of computer equipment, including memory, processor and deposit The computer program that can be run on a memory and on a processor is stored up, it is real when the processor executes the computer program The now block chain real name participatory approaches as described in previous embodiment.
In order to realize above-described embodiment, the present invention also proposes a kind of non-transitorycomputer readable storage medium, deposits thereon Computer program is contained, it is real to can be realized block chain as in the foregoing embodiment when the computer program is executed by processor Name participatory approaches.
In the present invention, term " first ", " second " are used for description purposes only, and are not understood to indicate or imply opposite Importance or the quantity for implicitly indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be bright Show or implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two It is a, three etc., unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, fisrt feature in the second feature " on " or " down " can be with It is that the first and second features directly contact or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists Second feature " on ", " top " and " above " but fisrt feature be directly above or diagonally above the second feature, or be merely representative of First feature horizontal height is higher than second feature.Fisrt feature can be under the second feature " below ", " below " and " below " One feature is directly under or diagonally below the second feature, or is merely representative of first feature horizontal height less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned Embodiment is changed, modifies, replacement and variant.

Claims (10)

1. a kind of block chain real name participatory approaches, which is characterized in that including:
It participates in node and obtains the certification video that application user records, wherein the certification video includes:Living body user includes use The user certificate and video record time of family certificate image and user certificate information, and Hash is carried out to the certification video It calculates the corresponding cryptographic Hash of acquisition and is sent to time stamp server;
The time stamp server record receives the receiving time of the cryptographic Hash, and the private key of the application time stamp server Signature is carried out to the cryptographic Hash and the receiving time and is sent to the participation node;
The participation node calculates the time difference between the video record time and the receiving time, if knowing the time Difference meets preset time range, then is sent to area after signing using the private key of the application user to certification broadcast message Block chain network, wherein the certification, which broadcasts the message, includes;The cryptographic Hash by the time stamp server private key signature and The receiving time, the public key of the application user and user basic information and the certification video;
It digs mine node and signature verification is carried out to received certification broadcast message using the public key of the application user, after being verified Verify whether the cryptographic Hash matches with the certification video, if knowing correct matching, verify the user certificate image and Whether the living body user matches, if knowing correct matching, verifies the user certificate information and the user basic information Whether match, if knowing correct matching, calculates the time difference between the video record time and the receiving time, if than After know that the time difference meets preset time range, it is determined that the real-name authentication of the application user passes through, and will recognize Card success message is written in block and broadcasts to the block chain network;
The mine node that digs judges that whether receiving other within a preset time digs the invalid of the instruction block that mine nodes are sent Broadcast message, is not received by the active broadcast message if knowing, broadcasts the block to the block chain network and comes into force, And the block is written in block chain account book.
2. the method as described in claim 1, which is characterized in that further include:
If the digging mine node, which is known, receives the active broadcast message, the digging mine for sending the active broadcast message is judged Whether the number of node is more than preset threshold;
If the digging mine node knows that the number is less than the preset threshold, the block is broadcasted to the block chain network It comes into force, and the block is written in block chain account book, the number is more than or equal to the preset threshold if knowing, to described It is invalid that block chain network broadcasts the block.
3. the method as described in claim 1, which is characterized in that the video record time includes:
The time electronic watch image at display current specific moment;
Alternatively,
The current specific moment that the living body user reads aloud.
4. the method as described in claim 1, which is characterized in that the user certificate information includes:Certificate number and user certificate Title;The user basic information includes:User identifier and user's name;
Whether the verifying user certificate information matches with the user basic information, including:
It verifies the certificate number and whether the user identifier is identical, and verify the user certificate title and the user name Whether identical claim.
5. the method as described in claim 1-4 is any, which is characterized in that the certification video further includes:The living body user The sound bite of preset certification video use is read aloud,
Before the real-name authentication of the determination application user passes through, the method also includes:
The digging mine node carries out detection to the lip reading of the living body user and obtains lip reading content, and by the lip reading content and institute The content of text for stating sound bite is compared;
If the digging mine node knows that the lip reading content is consistent with the content of text of the sound bite, it is determined that the application The real-name authentication of user passes through.
6. a kind of block chain real-name authentication system, which is characterized in that including:It participates in node, time stamp server, dig mine node, Wherein,
The participation node, the certification video recorded for obtaining application user, wherein the certification video includes:Living body is used Family, the user certificate comprising user certificate image and user certificate information and video record time, and to the certification video It carries out the corresponding cryptographic Hash of Hash calculation acquisition and is sent to the time stamp server;
The time stamp server for recording the receiving time for receiving the cryptographic Hash, and applies the time stamp server Private key to the cryptographic Hash and the receiving time carry out signature be sent to the participation node;
The participation node, for calculating the time difference between the video record time and the receiving time, if knowing institute Stating the time difference meets preset time range, then sends out after signing using the private key of the application user to certification broadcast message Give block chain network, wherein the certification, which broadcasts the message, includes;By the Kazakhstan of the time stamp server private key signature Uncommon value and the receiving time, the public key of the application user and user basic information and the certification video;
The digging mine node, the public key for the application application user, which broadcasts the message to received certification, carries out signature verification, It verifies whether the cryptographic Hash matches with the certification video after being verified, if knowing correct matching, verifies the user Whether certificate image and the living body user match, if knowing correct matching, verify the user certificate information and the use Whether family essential information matches, if knowing correct matching, calculates between the video record time and the receiving time Time difference, if after know that the time difference meets preset time range, it is determined that it is described application user real-name authentication Pass through, and certification success message is written in block and is broadcasted to the block chain network;
The digging mine node, for judging that whether receiving other within a preset time digs the instruction block that mine node is sent Active broadcast message is not received by the active broadcast message if knowing, broadcasts the block to the block chain network It comes into force, and the block is written in block chain account book.
7. system as claimed in claim 6, which is characterized in that the digging mine node is also used to:
The active broadcast message is received if knowing, judges that the number for the digging mine node for sending the active broadcast message is No is more than preset threshold;
If knowing, the number is less than the preset threshold, broadcasts the block to the block chain network and comes into force, and by institute It states in block write-in block chain account book, if knowing, the number is more than or equal to the preset threshold, to the block chain network It is invalid to broadcast the block.
8. system as claimed in claim 6, which is characterized in that the video record time includes:
The time electronic watch image at display current specific moment;
Alternatively,
The current specific moment that the living body user reads aloud.
9. a kind of computer equipment, which is characterized in that on a memory and can be in processor including memory, processor and storage The computer program of upper operation when the processor executes the computer program, is realized as described in any in claim 1-5 Block chain real name participatory approaches.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program Such as block chain real name participatory approaches as claimed in any one of claims 1 to 5 are realized when being executed by processor.
CN201810692345.6A 2018-06-29 2018-06-29 Block chain real name participation method and system Expired - Fee Related CN108876375B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810692345.6A CN108876375B (en) 2018-06-29 2018-06-29 Block chain real name participation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810692345.6A CN108876375B (en) 2018-06-29 2018-06-29 Block chain real name participation method and system

Publications (2)

Publication Number Publication Date
CN108876375A true CN108876375A (en) 2018-11-23
CN108876375B CN108876375B (en) 2020-09-08

Family

ID=64296777

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810692345.6A Expired - Fee Related CN108876375B (en) 2018-06-29 2018-06-29 Block chain real name participation method and system

Country Status (1)

Country Link
CN (1) CN108876375B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067721A (en) * 2018-07-24 2018-12-21 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN109450659A (en) * 2018-12-25 2019-03-08 杭州复杂美科技有限公司 Block delayed broadcast method, equipment and storage medium
CN110661779A (en) * 2019-08-15 2020-01-07 中国平安财产保险股份有限公司 Block chain network-based electronic certificate management method, system, device and medium
WO2021017350A1 (en) * 2019-07-26 2021-02-04 深圳壹账通智能科技有限公司 Bidding document management method and system, and computer readable storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105490814A (en) * 2015-12-08 2016-04-13 中国人民大学 Ticket real name authentication method and system based on three-dimensional code
US20170041296A1 (en) * 2015-08-05 2017-02-09 Intralinks, Inc. Systems and methods of secure data exchange
JP2017098806A (en) * 2015-11-26 2017-06-01 株式会社bitFlyer Existence proof program and existence proof server for electronic data
CN106899570A (en) * 2016-12-14 2017-06-27 阿里巴巴集团控股有限公司 The processing method of Quick Response Code, apparatus and system
WO2017116019A1 (en) * 2015-12-29 2017-07-06 주식회사 코인플러그 Method and server for authenticating and verifying file
US20170214522A1 (en) * 2015-11-10 2017-07-27 Shannon Code System and process for tokenization of digital media
US20170221288A1 (en) * 2016-02-02 2017-08-03 David Johnson Decentralized virtual trustless ledger for access control
CN107086914A (en) * 2017-04-24 2017-08-22 武汉康慧然信息技术咨询有限公司 Individual health data based on big data technology integrates distribution method and system
CN107832624A (en) * 2017-10-25 2018-03-23 济南浪潮高新科技投资发展有限公司 A kind of visualization signature system and method based on block chain
CN108055240A (en) * 2017-11-15 2018-05-18 上海国际汽车城(集团)有限公司 A kind of user authentication method of shared automobile
CN108075894A (en) * 2016-11-17 2018-05-25 广州大白互联网科技有限公司 A kind of authentication on-line processing method and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170041296A1 (en) * 2015-08-05 2017-02-09 Intralinks, Inc. Systems and methods of secure data exchange
US20170214522A1 (en) * 2015-11-10 2017-07-27 Shannon Code System and process for tokenization of digital media
JP2017098806A (en) * 2015-11-26 2017-06-01 株式会社bitFlyer Existence proof program and existence proof server for electronic data
CN105490814A (en) * 2015-12-08 2016-04-13 中国人民大学 Ticket real name authentication method and system based on three-dimensional code
WO2017116019A1 (en) * 2015-12-29 2017-07-06 주식회사 코인플러그 Method and server for authenticating and verifying file
US20170221288A1 (en) * 2016-02-02 2017-08-03 David Johnson Decentralized virtual trustless ledger for access control
CN108075894A (en) * 2016-11-17 2018-05-25 广州大白互联网科技有限公司 A kind of authentication on-line processing method and system
CN106899570A (en) * 2016-12-14 2017-06-27 阿里巴巴集团控股有限公司 The processing method of Quick Response Code, apparatus and system
CN107086914A (en) * 2017-04-24 2017-08-22 武汉康慧然信息技术咨询有限公司 Individual health data based on big data technology integrates distribution method and system
CN107832624A (en) * 2017-10-25 2018-03-23 济南浪潮高新科技投资发展有限公司 A kind of visualization signature system and method based on block chain
CN108055240A (en) * 2017-11-15 2018-05-18 上海国际汽车城(集团)有限公司 A kind of user authentication method of shared automobile

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067721A (en) * 2018-07-24 2018-12-21 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN109067721B (en) * 2018-07-24 2021-02-19 中国联合网络通信集团有限公司 Block chain real-name authentication method, device, equipment and storage medium
CN109450659A (en) * 2018-12-25 2019-03-08 杭州复杂美科技有限公司 Block delayed broadcast method, equipment and storage medium
WO2021017350A1 (en) * 2019-07-26 2021-02-04 深圳壹账通智能科技有限公司 Bidding document management method and system, and computer readable storage medium
CN110661779A (en) * 2019-08-15 2020-01-07 中国平安财产保险股份有限公司 Block chain network-based electronic certificate management method, system, device and medium

Also Published As

Publication number Publication date
CN108876375B (en) 2020-09-08

Similar Documents

Publication Publication Date Title
CN108881253A (en) Block chain real name participatory approaches and system
US11777726B2 (en) Methods and systems for recovering data using dynamic passwords
US10558974B2 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
US11082221B2 (en) Methods and systems for creating and recovering accounts using dynamic passwords
CN112487778B (en) Multi-user online signing system and method
CN108900507A (en) Block chain real name identification method and system
CN108880832A (en) Block chain real name identification method and system
CN108876375A (en) Block chain real name participatory approaches and system
CN110417750A (en) File based on block chain technology is read and method, terminal device and the storage medium of storage
WO2018088475A1 (en) Electronic authentication method and program
KR102441120B1 (en) System and method for credit exchange using block-chain technology
CN112002436A (en) Block chain-based medical question answering method, device and medium
CN101741561B (en) Method and system for authenticating two-way hardware
Zhu et al. Secure Online Examination with Biometric Authentication and Blockchain‐Based Framework
CN113515756A (en) High-reliability digital identity management method and system based on block chain
Pali et al. A comprehensive survey of aadhar and security issues
US11252153B2 (en) Method of providing mutual authentication of contents in social media service, and server, user terminal, and application implementing the method
Alshehri NFC mobile coupon protocols: developing, formal security modelling and analysis, and addressing relay attack
CN111935183B (en) Method and system for credible transfer of user information between non-cooperative bodies of distributed network
CN115967495A (en) Public service application management method and device based on block chain
CN112488656A (en) Method, device, processor and storage medium for realizing peer-to-peer multi-party digital service universe management based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing

Applicant after: IALLCHAIN Co.,Ltd.

Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing.

Applicant before: IALLCHAIN Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200908

Termination date: 20210629