CN108876375A - Block chain real name participatory approaches and system - Google Patents
Block chain real name participatory approaches and system Download PDFInfo
- Publication number
- CN108876375A CN108876375A CN201810692345.6A CN201810692345A CN108876375A CN 108876375 A CN108876375 A CN 108876375A CN 201810692345 A CN201810692345 A CN 201810692345A CN 108876375 A CN108876375 A CN 108876375A
- Authority
- CN
- China
- Prior art keywords
- user
- time
- block chain
- node
- certification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention provides a kind of block chain real name participatory approaches and systems, wherein method includes:Node is participated in tentatively to be authenticated according to the time difference between certification video record time and receiving time;After preliminary certification passes through, it digs mine node verification user certificate image and whether living body user matches, if matching, then verify whether user certificate information matches with user basic information, if matching, calculates the time difference between video record time and receiving time, if the time difference meets preset time range, it then determines that application user's real-name authentication passes through, if being not received by active broadcast message, block is written in block chain account book.Hereby it is achieved that the node in block chain network is mapped with real-life real user identity to the real-name authentication of block chain interior joint, convenient for the legitimacy for managing and maintaining block chain to node.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of block chain real name participatory approaches and system.
Background technique
In general, block chain technology is due to the safety by realizing transaction based on the information exchange between node and node
Guarantee, reduces and trust cost and be used widely.
Currently, the participation method in block chain network be all it is anonymous, can only prove all block chain behaviors be it is a certain
The corresponding user of a node implements, and cannot be forged by other users, that is to say, that the implementation environment of block chain network and existing
Work of growing directly from seeds is separation, it is difficult to node in real life, corresponding user is managed, once for example, block chain network
In nodes ' behavior there are illegal activities, such as money laundering etc. can not be traced, completely even by national CA (Certificate
Authority, certificate authority) certificate that organ provides, it can only also prove network identity, and can not prove its real body
Part, and if CA mechanism will prove that true identity needs to participate under line, it is extremely complex.Therefore, a kind of effective determining block is needed
The method of the corresponding real-life real user identity of node in chain network.
Summary of the invention
The present invention provides a kind of block chain real name participatory approaches and system, can not be to block chain to solve in the prior art
Node effectively managed, and the technical issues of can not safeguard the legitimacy of block chain.
First embodiment of the invention provides a kind of block chain real name participatory approaches, including:It participates in node and obtains application user
The certification video of recording, wherein the certification video includes:Living body user includes user certificate image and user certificate information
User certificate and the video record time, and carry out Hash calculation to the certification video and obtain corresponding cryptographic Hash sending
To time stamp server;The time stamp server record receives the receiving time of the cryptographic Hash, and applies the timestamp
The private key of server carries out signature to the cryptographic Hash and the receiving time and is sent to the participation node;The participation node
The time difference between the video record time and the receiving time is calculated, the time difference meets the preset time if knowing
Range is sent to block chain network after then signing using the private key of the application user to certification broadcast message, wherein institute
Stating certification broadcast message includes;The cryptographic Hash and the receiving time by the time stamp server private key signature, institute
State the public key for applying for user and user basic information and the certification video;Mine node is dug using the public affairs of the application user
Key broadcasts the message to received certification and carries out signature verification, the cryptographic Hash and the certification video is verified after being verified whether
Matching, if knowing correct matching, verifies the user certificate image and whether the living body user matches, if knowing correct
Match, then verify whether the user certificate information matches with the user basic information, if knowing correct matching, described in calculating
Time difference between video record time and the receiving time, if after know that the time difference meets preset time model
It encloses, it is determined that the real-name authentication of the application user passes through, and certification success message is written in block and to the block
Chain network broadcast;It is described to dig whether the judgement of mine node receives other instruction blocks for digging the transmission of mine node within a preset time
Active broadcast message, be not received by the active broadcast message if knowing, broadcast the area to the block chain network
Block comes into force, and the block is written in block chain account book.
Second embodiment of the invention provides a kind of block chain real-name authentication system, including:Participate in node, time-stamping service
Device digs mine node, wherein the participation node, the certification video recorded for obtaining application user, wherein the certification view
Frequently include:Living body user, the user certificate comprising user certificate image and user certificate information and video record time, and
The corresponding cryptographic Hash of Hash calculation acquisition is carried out to the certification video and is sent to the time stamp server;The timestamp clothes
Business device, for recording the receiving time for receiving the cryptographic Hash, and the private key of the application time stamp server is to the Hash
Value and the receiving time carry out signature and are sent to the participation node;The participation node, for calculating the video record
Time difference between time and the receiving time, if knowing, the time difference meets preset time range, using described
Apply being sent to block chain network after the private key of user signs to certification broadcast message, wherein the certification broadcast message
Including;The public affairs of the cryptographic Hash and the receiving time, the application user by the time stamp server private key signature
Key and user basic information and the certification video;The digging mine node, the public key docking for the application application user
The certification broadcast message of receipts carries out signature verification, verifies whether the cryptographic Hash matches with the certification video after being verified,
If knowing correct matching, verifies the user certificate image and whether the living body user matches, if knowing correct matching,
It verifies whether the user certificate information matches with the user basic information, if knowing correct matching, calculates the video
Time difference between recording time and the receiving time, if after know that the time difference meets preset time range,
It then determines that the real-name authentication of the application user passes through, and certification success message is written in block and to the block link network
Network broadcast;The digging mine node, for judging that whether receiving other within a preset time digs the instruction area that mine node is sent
The active broadcast message of block is not received by the active broadcast message if knowing, to described in block chain network broadcast
Block comes into force, and the block is written in block chain account book.
Third embodiment of the invention provides a kind of computer equipment, including:Memory, processor and storage are on a memory
And the computer program that can be run on a processor, when the processor executes the computer program, realize such as above-mentioned implementation
Block chain real name participatory approaches described in example.
Fourth embodiment of the invention provides a kind of non-transitorycomputer readable storage medium, is stored thereon with computer journey
Sequence realizes the block chain real name participatory approaches as described in above-described embodiment when the computer program is executed by processor.
Technical solution provided in an embodiment of the present invention can include the following benefits:
The real-name authentication to block chain interior joint is realized, by node in block chain network and real-life true
User identity is mapped, convenient for the legitimacy for managing and maintaining block chain to node.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, wherein
Fig. 1 is the structural schematic diagram that block chain real name according to an embodiment of the invention participates in system;
Fig. 2 is the interaction schematic diagram that block chain real name according to an embodiment of the invention participates in system;
Fig. 3 is the interaction schematic diagram that block chain real name in accordance with another embodiment of the present invention participates in system;
Fig. 4 is the flow chart of block chain real name participatory approaches according to an embodiment of the invention;
Fig. 5 is the flow chart of block chain real name participatory approaches in accordance with another embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
Description based on background technique, it can be appreciated that in the prior art, since the participation node in block chain network participates in
Mode be it is anonymous, only can confirm that the network identity for participating in node based on block chain network, and can not determine participating in
The real identity of the corresponding operation user of node in real life, so as to cause that can not have to the operation of block chain network
The supervision of effect.
It is quickly grown instantly in block chain technology, block chain technology is increasingly used to the wealth in the carrying entity world
It produces, and anonymity can derive numerous frauds, this restrict the popularizations of block chain technology.
In order to solve the above-mentioned technical problem, the invention proposes a kind of block chain real name participatory approaches, in the method, will
The identity information of the user in participation node and real world in block chain is closely connected together, thus, be conducive to be based on
Management of the real information of user to node is participated in, and the legitimacy of block chain network environment is guaranteed.
Wherein, clear for description, system is participated in the block chain real name of the embodiment of the present invention first and is described, is schemed
1 is the structural schematic diagram that block chain real name according to an embodiment of the invention participates in system, as shown in Figure 1, the system includes
It participates in node 100, dig mine node 200 and time stamp server 300, wherein participating in node 100 is that block chain is added in application for the first time
After node, the participation node 100 of network are successfully joined block chain network, book keeping operation function etc., timestamp are exercised as mine node is dug
Server 300 is used for the nodes ' behavior in block chain network, including trading activity etc., time label is carried out, to avoid transaction
It is forged.
Referring to Fig. 2, in practical implementation, participates in node and obtains the certification video (step 1) that application user records,
In, application user can be personal or enterprise, wherein authenticating video includes:Living body user includes user certificate image
User certificate and video record time with user certificate information, and the uniqueness of the certification video is marked, certification is regarded
Frequency carries out the corresponding cryptographic Hash of Hash calculation acquisition and is sent to time stamp server (step 2).
Time stamp server records the receiving time for receiving cryptographic Hash, and the private key of application time stamp server is to cryptographic Hash
Signature, which is carried out, with receiving time is sent to participation node, thus, private key signature is carried out to certification video by time stamp server,
Avoid the forgery (step 3) to certification video.
The time difference between node calculating video record time and receiving time is participated in, if it is preset to know that the time difference meets
Time range then shows that the certification video can really reflect the real information for participating in the corresponding application user of node, thus, it answers
Block chain network (step 4) is sent to after being signed with the private key of application user to certification broadcast message, wherein certification broadcast
Message includes;The public key of cryptographic Hash and receiving time, application user by time stamp server private key signature and user are basic
Information and certification video.
Further, the public key for digging mine node application application user, which broadcasts the message to received certification, carries out signature verification,
It disguises oneself as to avoid other illegal nodes and participates in node progress authentication (step 51).
It should be understood that in the embodiment of the present invention, it is corresponding based on participation node of the public key certificate technology to block chain
Application user carry out authentication, public key certificate technology and core be a pair of secret keys, the basic principle is that:By a key
The information content encrypted can only can be just decrypted by another paired key.Encrypted public key can be widely
It issues correspondent related with oneself and digs mine node, encryption key then needs to store fool proofly.In use, participating in
Node, which can encrypt broadcast message with the signature private key for participating in node and send to, digs mine node, and digging mine node can make
Decryption is completed with the encrypted public key for participating in node.
Further, cryptographic Hash is verified after being verified and whether matches (step 52) with certification video, avoids illegally using
Family carries out real-name authentication using other videos, if knowing correct matching, verify user certificate image and living body user whether
With (step 53), if knowing correct matching, user certificate information is verified with user basic information and whether matches (step 54), if
Know correct matching, then show user certificate information etc. effectively, in turn, calculate between video record time and receiving time when
Between poor (step 55), if after know that the time difference meets preset time range, it is determined that apply for that the real-name authentication of user is logical
It crosses, and certification success message is written in block and broadcasts (step 56) to block chain network.
In the present embodiment, in order to further verify the validity for participating in node, it is avoided to destroy the fortune of block chain network
Row environment, the active broadcast for digging the instruction the block whether judgement of mine node receives other digging mine nodes transmissions within a preset time disappear
It ceases, that is, determines that the participation node is added in block chain network, if it is normal to exercise book keeping operation function, it is not received by vain if knowing
Broadcast message, then it is normal to exercise book keeping operation function after showing that block chain network is added in the participation node, then it is broadcasted to block chain network
Block comes into force, and (step 6) in block chain account book is written in block.
In practical implementation, possible other dig mine node and error in entering accounts occur to which erroneous judgement currently participates in node book keeping operation
Mistake, and active broadcast message is had sent, thus, in order to further increase the verifying participated in when node participates in block chain network
Accuracy, in one embodiment of the invention, as shown in figure 3, further including following step on the basis of above-mentioned shown in Fig. 2
Suddenly:Active broadcast message is received if knowing, judges to send whether the number of the digging mine node of active broadcast message is more than pre-
If threshold value (step 7), than such as whether being more than the digging mine node of half, knowing how number is less than preset threshold, then to block chain
Web broadcast block comes into force, and block is written in block chain account book, if knowing, number is more than or equal to preset threshold, to block
Chain network broadcasts the invalid (step 8) of block.
The block chain real name of the embodiment of the present invention participates in system as a result, when participating in node application addition block chain network,
Real-name authentication is carried out to the corresponding living body user of node is participated in, real-name authentication at least has the advantages that following several significant:
First:Node in block chain network is due to having carried out real-name authentication, and one therefore, and block chain network is by network and now
It is real compact it is close link together, thus, block chain network can be used as deposit card, as right, as symbol of identity etc..
Second, convenience is brought for the management of node, for example, user reports the loss after Lost Security Key to passing through, it can basis
The key that the real information feedback of user is lost, solving user's Lost Security Key can not report the loss the technical issues of giving for change.
Third, under system of real name system, the meeting such as nodes ' behavior in block chain network and specific investor etc. are contacted
Together, so as to form a social contract, to release the strength of powerful responsibility and promise.
4th, according to relevant laws and regulations, in order to guarantee the property safety of user, real-name authentication is essential, thus, it is real
The block chain network of name system has broken the opposition with law, is conducive to supervised and manages, is of great significance to popularization.
5th, under the system of system of real name, to many illegal nodes ' behaviors, for example, all being formed the problem of intelligent contract
Effective transparent management environment maintains the legitimacy and authenticity of the operation of block chain network.
In order to which the more detailed block chain real name for illustrating the embodiment of the present invention participates in details when system executes, so that this
The technical staff in field is clearer to block chain real name participation process of the invention, concentrates on block chain real name participant below
Method side carries out the description of the details of participation process.
Fig. 4 is the flow chart of block chain real name participatory approaches according to an embodiment of the invention, as shown in figure 4, the party
Method includes:
Step 101, it participates in node and obtains the certification video that application user records, wherein authenticating video includes:Living body is used
Family, the user certificate comprising user certificate image and user certificate information and video record time, and certification video is carried out
Hash calculation obtains corresponding cryptographic Hash and is sent to time stamp server.
Wherein, the video record time includes the time electronic clock chart at display current specific moment, for example, including showing
The electronic clock chart of current days Time of Day Hour Minute Second, alternatively, the current specific moment etc. that living body user reads aloud, i.e., with voice
Form indicates current specific moment, specific time of the video record moment to indicate user's recorded video, to avoid user
The time of the certification video record of upload is more remote, differs larger with the true looks information of user and waits (for example, 26 years old Shen
Please user upload its 18 years old record certification video).
In addition, above-mentioned user certificate includes comprising user certificate image and the identity card of user certificate information, passport, student
Card, medical insurance card etc..
Specifically, in order to realize to the real-name authentication for participating in node application user, user, which needs to have prerecorded one section, to be recognized
Video is demonstrate,proved, includes living body user (i.e. true application user, rather than the images such as humanoid vertical board) in the certification video, comprising using
The user certificate and video record time of family certificate image and user certificate information participate in node and obtain application user in turn
The certification video of recording, wherein participate in node and obtain the mode of certification video to be user's active upload, be also possible to user
After participating in the such as smart phone recording of the corresponding equipment of node, participate in what node was actively extracted from relevant device.
In turn, to calculating of the node to certification video progress cryptographic Hash is participated in, certification view is marked by the cryptographic Hash
The uniqueness of frequency, and the cryptographic Hash is sent to time stamp server, it is sent in order to further acquisition time stamp server
Reliable time signature.
Step 102, time stamp server record receives the receiving time of cryptographic Hash, and the private key of application time stamp server
Signature is carried out to cryptographic Hash and receiving time and is sent to participation node.
Specifically, time stamp server record receives the receiving time of cryptographic Hash, and should time stamp server private key
Signature is carried out to cryptographic Hash and receiving time and is sent to participation node, for example, passing through NFC (Near Field
Communication, near field communication (NFC)), WiFi etc. be sent to participation node, hereby it is achieved that node is participated in
Application certification video the reliable time signature.
Step 103, the time difference between node calculating video record time and receiving time is participated in, the time difference full if knowing
The preset time range of foot is sent to block link network after then signing using the private key of application user to certification broadcast message
Network, wherein certification, which broadcasts the message, includes;Cryptographic Hash and receiving time, application user by time stamp server private key signature
Public key and user basic information and certification video.
If it should be understood that participate in node if it is determined that time stamp server receive the receiving time of cryptographic Hash with
Video record lead time is larger, it is likely that is that illegal equipment end has pretended time stamp server to the Kazakhstan for participating in node transmission
Uncommon value is signed, and the signature is sent to participation node, so as to cause receiving time and video record lead time compared with
Greatly, thus, in an embodiment of the present invention, by calculating the time difference between video record time and receiving time, to participation
The legitimacy of node is tentatively authenticated.
Specifically, the time difference between video record time and receiving time is calculated, for example, when extraction display is current specific
The video record time shown in the time electronic clock chart at quarter, calculate between video record time and receiving time when
Between it is poor, judge whether the time difference meets preset time range, which demarcated according to lot of experimental data
, usually in the preset time range, legal participation node can be completed for the certification video of recording to be successfully uploaded to
The feedback that time stamp server and time stamp server can complete signature is received until participating in node.
If the time difference meets preset time range, show that the signer of cryptographic Hash be time stamp server, from
And using the private key of application user to block chain network is sent to after certification broadcast message signature, in order to block chain network root
The certification again of the legitimacy of application user is carried out according to certification broadcast message.Wherein, apply the private key of user only by applying
User holds.
Above-mentioned certification broadcast message includes the cryptographic Hash and receiving time by time stamp server to private key signature, application
The public key and user basic information and certification video of user, wherein the marks such as the user identity card number that user basic information includes
Know the information of user's uniqueness, user's name includes the information of the identity users identity such as address name, wherein user basic information
It is corresponding with user certificate information, in order to further carry out the reality of application user according to user basic information and user certificate information
Name certification.
Step 104, the public key for digging mine node application application user, which broadcasts the message to received certification, carries out signature verification, tests
Whether verifying cryptographic Hash matches with certification video after card passes through, if knowing correct matching, verifies user certificate image and living body
Whether user matches, if knowing correct matching, verifies whether user certificate information matches with user basic information, if knowing just
Really matching, then calculate the time difference between video record time and receiving time, if after to know that the time difference meets preset
Time range, it is determined that apply for that the real-name authentication of user passes through, and certification success message is written in block and to block chain
Web broadcast.
As foregoing description, the private key of participating user and the public key of the participating user in certification broadcast message are a pair of each other
Password, thus, in an embodiment of the present invention, the public key of digging mine node application application user is to received by participating user's
The certification that the certification broadcast message of private key signature is signed, when the signature in the public key and certification broadcast message of application user
Apply for the private key of user to then showing that transmission certification broadcast message is to participate in node itself when corresponding to, so that completion saves participation
The verifying again of the legitimacy of point.
Further, it verifies whether cryptographic Hash matches to certification video after being verified, other is avoided to participate in section as a result,
The certification video that point is sent obscures real-name authentication process, if correct matching, it is determined that go out the current certification video for participating in certification
It is corresponding with the participation node of corresponding user.
Further, real-name authentication is carried out to application user, whether verifying user certificate image matches with living body user,
I.e. whether living body user is authenticated using my user certificate, if it does, then verifying user certificate information and user's base
Whether this information matches, and is further ensured that living body user carries out real-name authentication using my relevant information to verify, for example,
When user certificate information includes certificate number and user certificate title, and user basic information includes user identifier and user's name,
Certificate number can be verified and whether user identifier identical, and verifying user certificate title and user's name it is whether identical.
If the certificate information of user is matched with user basic information, show that living body user uses my relevant information
Real-name authentication is carried out, at this point, completing the legitimate verification to certification video content itself.
If in addition, time stamp server receive cryptographic Hash receiving time and video record lead time it is larger,
It is likely to be other illegality equipments and has intercepted and captured the cryptographic Hash for participating in node transmission, disguise oneself as and participate in node to time stamp server hair
The cryptographic Hash etc. intercepted and captured has been sent, it is larger so as to cause receiving time and video record lead time, thus, in implementation of the invention
In example, by calculating the time difference between video record time and receiving time, the legitimacy for participating in node is authenticated.For
Illegal user is avoided to carry out real-name authentication using the certification video of other users, when calculating video record time again and receiving
Between time difference, compare and know that the time difference meets preset time range, then show the certification video really and be to participate in node sheet
The certification video for the corresponding application user that body is sent, determines that the real-name authentication of application user passes through, and certification success message is write
Enter into block and is broadcasted to block chain network.
Wherein, under different application scenarios, certification success message can be about fixed expression and authenticate successful character string,
It is also possible to specifically indicate to authenticate successful text information etc., this is not restricted.
In view of in some scenes, some possible illegal users by intercept and capture and reset the certification videos of other users into
Row real-name authentication, thus, correspond to application user in order to further ensure participating in the certification video that node provides, in this hair
In bright one embodiment, authenticating in video further includes that living body user reads aloud the preset sound bite for authenticating video use, such as
Shown in Fig. 5, before the real-name authentication of above-mentioned determining application user passes through, this method further includes:
Step 201, it digs mine node detection is carried out to the lip reading of living body user and obtain lip reading content, and by lip reading content and language
The content of text of tablet section is compared.
Step 202, if digging mine node knows that lip reading content is consistent with the content of text of sound bite, it is determined that application user
Real-name authentication pass through.
It is appreciated that application user is bright when carrying out the recording of certification video in order to avoid illegally being utilized by other users
It reads one section and includes the voice of oneself personal information, for example, reading aloud one section " this is the video that Xiao Ming is used to block chain real-name authentication "
Voice etc., thus, dig mine node to the lip reading of living body user carry out detection obtain lip reading content, and by lip reading content with it is preset
The content of text of sound bite is compared, if digging mine node knows that lip reading content is consistent with the content of text of sound bite,
Determine that the real-name authentication of application user passes through.Thus, on the one hand, the certification that legitimacy is carried out based on lip reading avoids illegal use
Family is authenticated by connecing the video of goods to dub, and on the other hand, be ensure that and is intercepted and captured the certification of other users even if illegal user
Video, also due to its living body can not be corresponding with the certification video of intercepting and capturing and can not be attacked.
Step 105, it digs mine node and judges that whether receiving other within a preset time digs the instruction block that mine nodes are sent
Active broadcast message is not received by active broadcast message if knowing, comes into force to block chain network broadcast block, and by block
It is written in block chain account book.
It is understandable to be, after participation node is successfully accessed block chain network, real-name authentication is completed in time, it is also possible to
The user of the real-name authentication is illegal user etc., thus, in order to guarantee that the participation node is normally carried out accounting activities, rather than into
The illegal activities such as row money laundering, need to verify the accounting activities whether the participation node executes normal legal.
Specifically, the digging mine node in block chain network is by Transaction Information recorded in account book etc. and the participation nodes records
The Transaction Information similarly traded be compared, if it is inconsistent, the digging mine node determine participate in node error in entering accounts, sentence
The corresponding block for authenticating success message of the participation node that breaks is invalid, digs whether the judgement of mine node receives it within a preset time
He digs the broadcast message for indicating that block is invalid of mine node transmission, active broadcast message is not received by if knowing, to block
Chain network broadcasts the block and comes into force, and block is written in block chain account book.
Certainly, in practical implementation, possible other dig mine node and error in entering accounts occur to which erroneous judgement currently participates in section
Point error in entering accounts, and active broadcast message is had sent, thus, when participating in block chain network to further increase participation node
The accuracy of verifying know if digging mine node in one embodiment of the invention and receive active broadcast message, judge
Whether the number of diggings mine node for sending active broadcast message is more than preset threshold, the preset threshold and dig the total of mine node and
The authority of digging mine node in block chain network is related, and the sum for digging mine node is more, digs the lower (ratio of authority of mine node
Such as it is only common participation node), then corresponding preset threshold is lower.
If digging mine node knows that number is less than preset threshold, show that the most digging mine node is to accept the block
, alternatively, without authoritative digging mine node think the block be it is invalid, thus, at this time to block chain network broadcast block
It comes into force, and block is written in block chain account book, conversely, number is more than or equal to preset threshold if knowing, to block chain network
It is invalid to broadcast the block.
In conclusion the block chain real name participatory approaches of the embodiment of the present invention, realize the real name to block chain interior joint
Certification, the node in block chain network is mapped with real-life real user identity, convenient for the management to node
With the legitimacy of maintenance block chain.
In order to realize above-described embodiment, the invention also provides a kind of computer equipment, including memory, processor and deposit
The computer program that can be run on a memory and on a processor is stored up, it is real when the processor executes the computer program
The now block chain real name participatory approaches as described in previous embodiment.
In order to realize above-described embodiment, the present invention also proposes a kind of non-transitorycomputer readable storage medium, deposits thereon
Computer program is contained, it is real to can be realized block chain as in the foregoing embodiment when the computer program is executed by processor
Name participatory approaches.
In the present invention, term " first ", " second " are used for description purposes only, and are not understood to indicate or imply opposite
Importance or the quantity for implicitly indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be bright
Show or implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two
It is a, three etc., unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, fisrt feature in the second feature " on " or " down " can be with
It is that the first and second features directly contact or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists
Second feature " on ", " top " and " above " but fisrt feature be directly above or diagonally above the second feature, or be merely representative of
First feature horizontal height is higher than second feature.Fisrt feature can be under the second feature " below ", " below " and " below "
One feature is directly under or diagonally below the second feature, or is merely representative of first feature horizontal height less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned
Embodiment is changed, modifies, replacement and variant.
Claims (10)
1. a kind of block chain real name participatory approaches, which is characterized in that including:
It participates in node and obtains the certification video that application user records, wherein the certification video includes:Living body user includes use
The user certificate and video record time of family certificate image and user certificate information, and Hash is carried out to the certification video
It calculates the corresponding cryptographic Hash of acquisition and is sent to time stamp server;
The time stamp server record receives the receiving time of the cryptographic Hash, and the private key of the application time stamp server
Signature is carried out to the cryptographic Hash and the receiving time and is sent to the participation node;
The participation node calculates the time difference between the video record time and the receiving time, if knowing the time
Difference meets preset time range, then is sent to area after signing using the private key of the application user to certification broadcast message
Block chain network, wherein the certification, which broadcasts the message, includes;The cryptographic Hash by the time stamp server private key signature and
The receiving time, the public key of the application user and user basic information and the certification video;
It digs mine node and signature verification is carried out to received certification broadcast message using the public key of the application user, after being verified
Verify whether the cryptographic Hash matches with the certification video, if knowing correct matching, verify the user certificate image and
Whether the living body user matches, if knowing correct matching, verifies the user certificate information and the user basic information
Whether match, if knowing correct matching, calculates the time difference between the video record time and the receiving time, if than
After know that the time difference meets preset time range, it is determined that the real-name authentication of the application user passes through, and will recognize
Card success message is written in block and broadcasts to the block chain network;
The mine node that digs judges that whether receiving other within a preset time digs the invalid of the instruction block that mine nodes are sent
Broadcast message, is not received by the active broadcast message if knowing, broadcasts the block to the block chain network and comes into force,
And the block is written in block chain account book.
2. the method as described in claim 1, which is characterized in that further include:
If the digging mine node, which is known, receives the active broadcast message, the digging mine for sending the active broadcast message is judged
Whether the number of node is more than preset threshold;
If the digging mine node knows that the number is less than the preset threshold, the block is broadcasted to the block chain network
It comes into force, and the block is written in block chain account book, the number is more than or equal to the preset threshold if knowing, to described
It is invalid that block chain network broadcasts the block.
3. the method as described in claim 1, which is characterized in that the video record time includes:
The time electronic watch image at display current specific moment;
Alternatively,
The current specific moment that the living body user reads aloud.
4. the method as described in claim 1, which is characterized in that the user certificate information includes:Certificate number and user certificate
Title;The user basic information includes:User identifier and user's name;
Whether the verifying user certificate information matches with the user basic information, including:
It verifies the certificate number and whether the user identifier is identical, and verify the user certificate title and the user name
Whether identical claim.
5. the method as described in claim 1-4 is any, which is characterized in that the certification video further includes:The living body user
The sound bite of preset certification video use is read aloud,
Before the real-name authentication of the determination application user passes through, the method also includes:
The digging mine node carries out detection to the lip reading of the living body user and obtains lip reading content, and by the lip reading content and institute
The content of text for stating sound bite is compared;
If the digging mine node knows that the lip reading content is consistent with the content of text of the sound bite, it is determined that the application
The real-name authentication of user passes through.
6. a kind of block chain real-name authentication system, which is characterized in that including:It participates in node, time stamp server, dig mine node,
Wherein,
The participation node, the certification video recorded for obtaining application user, wherein the certification video includes:Living body is used
Family, the user certificate comprising user certificate image and user certificate information and video record time, and to the certification video
It carries out the corresponding cryptographic Hash of Hash calculation acquisition and is sent to the time stamp server;
The time stamp server for recording the receiving time for receiving the cryptographic Hash, and applies the time stamp server
Private key to the cryptographic Hash and the receiving time carry out signature be sent to the participation node;
The participation node, for calculating the time difference between the video record time and the receiving time, if knowing institute
Stating the time difference meets preset time range, then sends out after signing using the private key of the application user to certification broadcast message
Give block chain network, wherein the certification, which broadcasts the message, includes;By the Kazakhstan of the time stamp server private key signature
Uncommon value and the receiving time, the public key of the application user and user basic information and the certification video;
The digging mine node, the public key for the application application user, which broadcasts the message to received certification, carries out signature verification,
It verifies whether the cryptographic Hash matches with the certification video after being verified, if knowing correct matching, verifies the user
Whether certificate image and the living body user match, if knowing correct matching, verify the user certificate information and the use
Whether family essential information matches, if knowing correct matching, calculates between the video record time and the receiving time
Time difference, if after know that the time difference meets preset time range, it is determined that it is described application user real-name authentication
Pass through, and certification success message is written in block and is broadcasted to the block chain network;
The digging mine node, for judging that whether receiving other within a preset time digs the instruction block that mine node is sent
Active broadcast message is not received by the active broadcast message if knowing, broadcasts the block to the block chain network
It comes into force, and the block is written in block chain account book.
7. system as claimed in claim 6, which is characterized in that the digging mine node is also used to:
The active broadcast message is received if knowing, judges that the number for the digging mine node for sending the active broadcast message is
No is more than preset threshold;
If knowing, the number is less than the preset threshold, broadcasts the block to the block chain network and comes into force, and by institute
It states in block write-in block chain account book, if knowing, the number is more than or equal to the preset threshold, to the block chain network
It is invalid to broadcast the block.
8. system as claimed in claim 6, which is characterized in that the video record time includes:
The time electronic watch image at display current specific moment;
Alternatively,
The current specific moment that the living body user reads aloud.
9. a kind of computer equipment, which is characterized in that on a memory and can be in processor including memory, processor and storage
The computer program of upper operation when the processor executes the computer program, is realized as described in any in claim 1-5
Block chain real name participatory approaches.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
Such as block chain real name participatory approaches as claimed in any one of claims 1 to 5 are realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810692345.6A CN108876375B (en) | 2018-06-29 | 2018-06-29 | Block chain real name participation method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810692345.6A CN108876375B (en) | 2018-06-29 | 2018-06-29 | Block chain real name participation method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108876375A true CN108876375A (en) | 2018-11-23 |
CN108876375B CN108876375B (en) | 2020-09-08 |
Family
ID=64296777
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810692345.6A Expired - Fee Related CN108876375B (en) | 2018-06-29 | 2018-06-29 | Block chain real name participation method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108876375B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109067721A (en) * | 2018-07-24 | 2018-12-21 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN109450659A (en) * | 2018-12-25 | 2019-03-08 | 杭州复杂美科技有限公司 | Block delayed broadcast method, equipment and storage medium |
CN110661779A (en) * | 2019-08-15 | 2020-01-07 | 中国平安财产保险股份有限公司 | Block chain network-based electronic certificate management method, system, device and medium |
WO2021017350A1 (en) * | 2019-07-26 | 2021-02-04 | 深圳壹账通智能科技有限公司 | Bidding document management method and system, and computer readable storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105490814A (en) * | 2015-12-08 | 2016-04-13 | 中国人民大学 | Ticket real name authentication method and system based on three-dimensional code |
US20170041296A1 (en) * | 2015-08-05 | 2017-02-09 | Intralinks, Inc. | Systems and methods of secure data exchange |
JP2017098806A (en) * | 2015-11-26 | 2017-06-01 | 株式会社bitFlyer | Existence proof program and existence proof server for electronic data |
CN106899570A (en) * | 2016-12-14 | 2017-06-27 | 阿里巴巴集团控股有限公司 | The processing method of Quick Response Code, apparatus and system |
WO2017116019A1 (en) * | 2015-12-29 | 2017-07-06 | 주식회사 코인플러그 | Method and server for authenticating and verifying file |
US20170214522A1 (en) * | 2015-11-10 | 2017-07-27 | Shannon Code | System and process for tokenization of digital media |
US20170221288A1 (en) * | 2016-02-02 | 2017-08-03 | David Johnson | Decentralized virtual trustless ledger for access control |
CN107086914A (en) * | 2017-04-24 | 2017-08-22 | 武汉康慧然信息技术咨询有限公司 | Individual health data based on big data technology integrates distribution method and system |
CN107832624A (en) * | 2017-10-25 | 2018-03-23 | 济南浪潮高新科技投资发展有限公司 | A kind of visualization signature system and method based on block chain |
CN108055240A (en) * | 2017-11-15 | 2018-05-18 | 上海国际汽车城(集团)有限公司 | A kind of user authentication method of shared automobile |
CN108075894A (en) * | 2016-11-17 | 2018-05-25 | 广州大白互联网科技有限公司 | A kind of authentication on-line processing method and system |
-
2018
- 2018-06-29 CN CN201810692345.6A patent/CN108876375B/en not_active Expired - Fee Related
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170041296A1 (en) * | 2015-08-05 | 2017-02-09 | Intralinks, Inc. | Systems and methods of secure data exchange |
US20170214522A1 (en) * | 2015-11-10 | 2017-07-27 | Shannon Code | System and process for tokenization of digital media |
JP2017098806A (en) * | 2015-11-26 | 2017-06-01 | 株式会社bitFlyer | Existence proof program and existence proof server for electronic data |
CN105490814A (en) * | 2015-12-08 | 2016-04-13 | 中国人民大学 | Ticket real name authentication method and system based on three-dimensional code |
WO2017116019A1 (en) * | 2015-12-29 | 2017-07-06 | 주식회사 코인플러그 | Method and server for authenticating and verifying file |
US20170221288A1 (en) * | 2016-02-02 | 2017-08-03 | David Johnson | Decentralized virtual trustless ledger for access control |
CN108075894A (en) * | 2016-11-17 | 2018-05-25 | 广州大白互联网科技有限公司 | A kind of authentication on-line processing method and system |
CN106899570A (en) * | 2016-12-14 | 2017-06-27 | 阿里巴巴集团控股有限公司 | The processing method of Quick Response Code, apparatus and system |
CN107086914A (en) * | 2017-04-24 | 2017-08-22 | 武汉康慧然信息技术咨询有限公司 | Individual health data based on big data technology integrates distribution method and system |
CN107832624A (en) * | 2017-10-25 | 2018-03-23 | 济南浪潮高新科技投资发展有限公司 | A kind of visualization signature system and method based on block chain |
CN108055240A (en) * | 2017-11-15 | 2018-05-18 | 上海国际汽车城(集团)有限公司 | A kind of user authentication method of shared automobile |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109067721A (en) * | 2018-07-24 | 2018-12-21 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN109067721B (en) * | 2018-07-24 | 2021-02-19 | 中国联合网络通信集团有限公司 | Block chain real-name authentication method, device, equipment and storage medium |
CN109450659A (en) * | 2018-12-25 | 2019-03-08 | 杭州复杂美科技有限公司 | Block delayed broadcast method, equipment and storage medium |
WO2021017350A1 (en) * | 2019-07-26 | 2021-02-04 | 深圳壹账通智能科技有限公司 | Bidding document management method and system, and computer readable storage medium |
CN110661779A (en) * | 2019-08-15 | 2020-01-07 | 中国平安财产保险股份有限公司 | Block chain network-based electronic certificate management method, system, device and medium |
Also Published As
Publication number | Publication date |
---|---|
CN108876375B (en) | 2020-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108881253A (en) | Block chain real name participatory approaches and system | |
US11777726B2 (en) | Methods and systems for recovering data using dynamic passwords | |
US10558974B2 (en) | Methods and systems of providing verification of information using a centralized or distributed ledger | |
US11082221B2 (en) | Methods and systems for creating and recovering accounts using dynamic passwords | |
CN112487778B (en) | Multi-user online signing system and method | |
CN108900507A (en) | Block chain real name identification method and system | |
CN108880832A (en) | Block chain real name identification method and system | |
CN108876375A (en) | Block chain real name participatory approaches and system | |
CN110417750A (en) | File based on block chain technology is read and method, terminal device and the storage medium of storage | |
WO2018088475A1 (en) | Electronic authentication method and program | |
KR102441120B1 (en) | System and method for credit exchange using block-chain technology | |
CN112002436A (en) | Block chain-based medical question answering method, device and medium | |
CN101741561B (en) | Method and system for authenticating two-way hardware | |
Zhu et al. | Secure Online Examination with Biometric Authentication and Blockchain‐Based Framework | |
CN113515756A (en) | High-reliability digital identity management method and system based on block chain | |
Pali et al. | A comprehensive survey of aadhar and security issues | |
US11252153B2 (en) | Method of providing mutual authentication of contents in social media service, and server, user terminal, and application implementing the method | |
Alshehri | NFC mobile coupon protocols: developing, formal security modelling and analysis, and addressing relay attack | |
CN111935183B (en) | Method and system for credible transfer of user information between non-cooperative bodies of distributed network | |
CN115967495A (en) | Public service application management method and device based on block chain | |
CN112488656A (en) | Method, device, processor and storage medium for realizing peer-to-peer multi-party digital service universe management based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing Applicant after: IALLCHAIN Co.,Ltd. Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing. Applicant before: IALLCHAIN Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200908 Termination date: 20210629 |