CN108881253A - Block chain real name participatory approaches and system - Google Patents

Block chain real name participatory approaches and system Download PDF

Info

Publication number
CN108881253A
CN108881253A CN201810692342.2A CN201810692342A CN108881253A CN 108881253 A CN108881253 A CN 108881253A CN 201810692342 A CN201810692342 A CN 201810692342A CN 108881253 A CN108881253 A CN 108881253A
Authority
CN
China
Prior art keywords
user
block chain
time
node
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810692342.2A
Other languages
Chinese (zh)
Other versions
CN108881253B (en
Inventor
路成业
王凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201810692342.2A priority Critical patent/CN108881253B/en
Publication of CN108881253A publication Critical patent/CN108881253A/en
Application granted granted Critical
Publication of CN108881253B publication Critical patent/CN108881253B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of block chain real name participatory approaches and systems, wherein method includes:Node is participated in tentatively to be authenticated according to certification video;After preliminary certification passes through, it digs mine node verification user certificate image and whether living body user matches, if matching, then verify whether user certificate information matches with user basic information, wherein, user certificate image and user certificate information are that the public security bureau obtained authenticates, if matching, then calculate the time difference between video record time and receiving time, if the time difference meets preset time range, it then determines that application user's real-name authentication passes through, if being not received by active broadcast message, block is written in block chain account book.Thus, the user related information provided based on public security bureau realizes the real-name authentication to block chain interior joint, node in block chain network is mapped by the accuracy that ensure that real-name authentication with real-life real user identity, convenient for the legitimacy for managing and maintaining block chain to node.

Description

Block chain real name participatory approaches and system
Technical field
The present invention relates to field of communication technology more particularly to a kind of block chain real name participatory approaches and system.
Background technique
In general, block chain technology is due to the safety by realizing transaction based on the information exchange between node and node Guarantee, reduces and trust cost and be used widely.
Currently, the participation method in block chain network be all it is anonymous, can only prove all block chain behaviors be it is a certain The corresponding user of a node implements, and cannot be forged by other users, that is to say, that the implementation environment of block chain network and existing Work of growing directly from seeds is separation, it is difficult to node in real life, corresponding user is managed, once for example, block chain network In nodes ' behavior there are illegal activities, such as money laundering etc. can not be traced, completely even by national CA (Certificate Authority, certificate authority) certificate that organ provides, it can only also prove network identity, and can not prove its real body Part, and if CA mechanism will prove that true identity needs to participate under line, it is extremely complex.Therefore, a kind of effective determining block is needed The method of the corresponding real-life real user identity of node in chain network.
Summary of the invention
The present invention provides a kind of block chain real name participatory approaches and system, can not be to block chain to solve in the prior art Node effectively managed, and the technical issues of can not safeguard the legitimacy of block chain.
First embodiment of the invention provides a kind of block chain real name participatory approaches, including:It participates in node and passes through authorisation device The user certificate image and user certificate information Jing Guo public security bureau's private key signature are read out of application user certificate chip, and are obtained The certification video for taking the application user to record, wherein the certification video includes:Living body user and video record time, And the corresponding cryptographic Hash of Hash calculation acquisition is carried out to the certification video and is sent to time stamp server;The time-stamping service Device, which records, receives the receiving time of the cryptographic Hash, and the private key of the application time stamp server is to the cryptographic Hash and described Receiving time carries out signature and is sent to the participation node;The participation node calculates the video record time and the reception Time difference between time, if knowing, the time difference meets preset time range, the private key of the application application user Block chain network is sent to after signing to certification broadcast message, wherein the certification, which broadcasts the message, includes;By it is described when Between stamp privacy key signature the cryptographic Hash and the receiving time, it is described application user public key and user believe substantially Breath, the user certificate image and user certificate information and the certification video by public security bureau's private key signature;Dig mine section The public key of the point application application user, which broadcasts the message to received certification, carries out signature verification, and the Kazakhstan is verified after being verified Whether uncommon value matches with the certification video, if knowing correct matching, verifies the user certificate image and the living body is used Whether family matches, if knowing correct matching, verifies whether the user certificate information matches with the user basic information, if Know correct matching, then calculate the time difference between the video record time and the receiving time, if after know institute Stating the time difference meets preset time range, it is determined that the real-name authentication of the application user passes through, and will authenticate success message It is written in block and is broadcasted to the block chain network;Whether the digging mine node judgement receives other diggings within a preset time The active broadcast message for the instruction block that mine node is sent, is not received by the active broadcast message if knowing, to The block chain network broadcasts the block and comes into force, and the block is written in block chain account book.
Second embodiment of the invention provides a kind of block chain real-name authentication system, including:Participate in node, time-stamping service Device digs mine node, wherein the participation node passes through for being read out of application user certificate chip by authorisation device The user certificate image and user certificate information of public security bureau's private key signature, and the certification video that the application user records is obtained, Wherein, the certification video includes:Living body user and video record time, and Hash calculation is carried out to the certification video and is obtained Corresponding cryptographic Hash is taken to be sent to the time stamp server;The time stamp server receives the cryptographic Hash for recording Receiving time, and application the time stamp server private key signature transmission is carried out to the cryptographic Hash and the receiving time To the participation node;The participation node, for calculating the time between the video record time and the receiving time Difference, if knowing, the time difference meets preset time range, and the private key of the application application user broadcasts the message to certification Block chain network is sent to after being signed, wherein the certification, which broadcasts the message, includes;By the time stamp server private key Signature the cryptographic Hash and the receiving time, it is described application user public key and user basic information, it is described pass through public security The user certificate image and user certificate information of office's private key signature and the certification video;The digging mine node, for applying It is described application user public key to received certification broadcast the message carry out signature verification, verified after being verified the cryptographic Hash and Whether the certification video matches, if knowing correct matching, whether verifies the user certificate image and the living body user Matching, if knowing correct matching, verifies whether the user certificate information matches with the user basic information, if knowing just Really matching, then calculate the time difference between the video record time and the receiving time, if after know the time Difference meets preset time range, it is determined that the real-name authentication of the application user passes through, and certification success message is written to It is broadcasted in block and to the block chain network;The digging mine node, for judging whether receive other diggings within a preset time The active broadcast message for the instruction block that mine node is sent, is not received by the active broadcast message if knowing, to The block chain network broadcasts the block and comes into force, and the block is written in block chain account book.
Third embodiment of the invention provides a kind of computer equipment, including:Memory, processor and storage are on a memory And the computer program that can be run on a processor, when the processor executes the computer program, realize such as above-mentioned implementation Block chain real name participatory approaches described in example.
Fourth embodiment of the invention provides a kind of non-transitorycomputer readable storage medium, is stored thereon with computer journey Sequence realizes the block chain real name participatory approaches as described in above-described embodiment when the computer program is executed by processor.
Technical solution provided in an embodiment of the present invention can include the following benefits:
The user related information provided based on public security bureau realizes the real-name authentication to block chain interior joint, ensure that real name Node in block chain network is mapped by the accuracy and reliability of certification with real-life real user identity, Convenient for the legitimacy for managing and maintaining block chain to node.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, wherein
Fig. 1 is the structural schematic diagram that block chain real name according to an embodiment of the invention participates in system;
Fig. 2 is the interaction schematic diagram that block chain real name according to an embodiment of the invention participates in system;
Fig. 3 is the interaction schematic diagram that block chain real name in accordance with another embodiment of the present invention participates in system;
Fig. 4 is the flow chart of block chain real name participatory approaches according to an embodiment of the invention;
Fig. 5 is the flow chart of block chain real name participatory approaches in accordance with another embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
Description based on background technique, it can be appreciated that in the prior art, since the participation node in block chain network participates in Mode be it is anonymous, only can confirm that the network identity for participating in node based on block chain network, and can not determine participating in The real identity of the corresponding operation user of node in real life, so as to cause that can not have to the operation of block chain network The supervision of effect.
It is quickly grown instantly in block chain technology, block chain technology is increasingly used to the wealth in the carrying entity world It produces, and anonymity can derive numerous frauds, this restrict the popularizations of block chain technology.
In order to solve the above-mentioned technical problem, the invention proposes a kind of block chain real name participatory approaches, in the method, will The identity information of the user in participation node and real world in block chain is closely connected together, thus, be conducive to be based on Management of the real information of user to node is participated in, and the legitimacy of block chain network environment is guaranteed.
Wherein, clear for description, system is participated in the block chain real name of the embodiment of the present invention first and is described, is schemed 1 is the structural schematic diagram that block chain real name according to an embodiment of the invention participates in system, as shown in Figure 1, the system includes It participates in node 100, dig mine node 200 and time stamp server 300, wherein participating in node 100 is that block chain is added in application for the first time After node, the participation node 100 of network are successfully joined block chain network, book keeping operation function etc., timestamp are exercised as mine node is dug Server 300 is used for the nodes ' behavior in block chain network, including trading activity etc., time label is carried out, to avoid transaction It is forged.
Referring to Fig. 2, in practical implementation, participates in node and obtains the certification video (step 1) that application user records, In, application user can be personal or enterprise, wherein authenticating video includes:Living body user and video record time, And the uniqueness for marking the certification video carries out the corresponding cryptographic Hash of Hash calculation acquisition to certification video and is sent to timestamp Server, however in view of can also complete real-name authentication when illegal user carries out authentication using false user certificate, because And in order to further ensure the accuracy of real-name authentication, it participates in node and passes through authorisation device out of, application user certificate chip Read the user certificate image and user certificate information (step 2) Jing Guo public security bureau's private key signature.
Time stamp server records the receiving time for receiving cryptographic Hash, and the private key of application time stamp server is to cryptographic Hash Signature, which is carried out, with receiving time is sent to participation node, thus, private key signature is carried out to certification video by time stamp server, Avoid the forgery (step 3) to certification video.
The time difference between node calculating video record time and receiving time is participated in, if it is preset to know that the time difference meets Time range then shows that the certification video can really reflect the real information for participating in the corresponding application user of node, thus, it answers Block chain network (step 4) is sent to after being signed with the private key of application user to certification broadcast message, wherein certification broadcast Message includes;The public key of cryptographic Hash and receiving time, application user by time stamp server private key signature and user are basic Information and certification video.
Further, the public key for digging mine node application application user, which broadcasts the message to received certification, carries out signature verification, It disguises oneself as to avoid other illegal nodes and participates in node progress authentication (step 51).
It should be understood that in the embodiment of the present invention, it is corresponding based on participation node of the public key certificate technology to block chain Application user carry out authentication, public key certificate technology and core be a pair of secret keys, the basic principle is that:By a key The information content encrypted can only can be just decrypted by another paired key.Encrypted public key can be widely It issues correspondent related with oneself and digs mine node, encryption key then needs to store fool proofly.In use, participating in Node, which can encrypt broadcast message with the signature private key for participating in node and send to, digs mine node, and digging mine node can make Decryption is completed with the encrypted public key for participating in node.
Further, cryptographic Hash is verified after being verified and whether matches (step 52) with certification video, avoids illegally using Family carries out real-name authentication using other videos, if knowing correct matching, verify user certificate image and living body user whether With (step 53), if knowing correct matching, user certificate information is verified with user basic information and whether matches (step 54), if Know correct matching, then show user certificate information etc. effectively, in turn, calculate between video record time and receiving time when Between poor (step 55), if after know that the time difference meets preset time range, it is determined that apply for that the real-name authentication of user is logical It crosses, and certification success message is written in block and broadcasts (step 56) to block chain network.
In the present embodiment, in order to further verify the validity for participating in node, it is avoided to destroy the fortune of block chain network Row environment, the active broadcast for digging the instruction the block whether judgement of mine node receives other digging mine nodes transmissions within a preset time disappear It ceases, that is, determines that the participation node is added in block chain network, if it is normal to exercise book keeping operation function, it is not received by vain if knowing Broadcast message, then it is normal to exercise book keeping operation function after showing that block chain network is added in the participation node, then it is broadcasted to block chain network Block comes into force, and (step 6) in block chain account book is written in block.
In practical implementation, possible other dig mine node and error in entering accounts occur to which erroneous judgement currently participates in node book keeping operation Mistake, and active broadcast message is had sent, thus, in order to further increase the verifying participated in when node participates in block chain network Accuracy, in one embodiment of the invention, as shown in figure 3, further including following step on the basis of above-mentioned shown in Fig. 2 Suddenly:Active broadcast message is received if knowing, judges to send whether the number of the digging mine node of active broadcast message is more than pre- If threshold value (step 7), than such as whether being more than the digging mine node of half, knowing how number is less than preset threshold, then to block chain Web broadcast block comes into force, and block is written in block chain account book, if knowing, number is more than or equal to preset threshold, to block Chain network broadcasts the invalid (step 8) of block.
The block chain real name of the embodiment of the present invention participates in system as a result, when participating in node application addition block chain network, Real-name authentication is carried out to the corresponding living body user of node is participated in, and user certificate based on total safety certification etc. carries out identity and recognizes Card, further improves the accuracy and reliability of real-name authentication.
In order to which the more detailed block chain real name for illustrating the embodiment of the present invention participates in details when system executes, so that this The technical staff in field is clearer to block chain real name participation process of the invention, concentrates on block chain real name participant below Method side carries out the description of the details of participation process.
Fig. 4 is the flow chart of block chain real name participatory approaches according to an embodiment of the invention, as shown in figure 4, the party Method includes:
Step 101, it participates in node and is read out of application user certificate chip by public security bureau's private key by authorisation device The user certificate image and user certificate information of signature, and obtain the certification video that application user records, wherein certification video bag Contain:Living body user and video record time, and when carrying out Hash calculation to certification video and obtaining corresponding cryptographic Hash and be sent to Between stab server.
Wherein, authorisation device can be that may include by the hardware device of the authoritative institutions such as public security bureau authorization, the hardware device The user certificate image stored in certificate chip and user certificate information etc. can be read.
It is appreciated that in an embodiment of the present invention, participating in certificate chip of the node by authorisation device from application user User certificate image and user certificate information of the interior reading Jing Guo public security bureau's private key signature, rather than obtain what application user uploaded User certificate image and certificate information, thus, avoid having an opportunity to take advantage of for the illegal user for holding false evidence registration.Above-mentioned user certificate Including the identity card comprising user certificate image and user certificate information, passport, student's identity card, medical insurance card etc..
Wherein, the video record time includes the time electronic clock chart at display current specific moment, for example, including showing The electronic clock chart of current days Time of Day Hour Minute Second, alternatively, the current specific moment etc. that living body user reads aloud, i.e., with voice Form indicates current specific moment, specific time of the video record moment to indicate user's recorded video, to avoid user The time of the certification video record of upload is more remote, differs larger with the true looks information of user and waits (for example, 26 years old Shen Please user upload its 18 years old record certification video).
Specifically, in order to realize to the real-name authentication for participating in node application user, user, which needs to have prerecorded one section, to be recognized Video is demonstrate,proved, includes living body user (i.e. true application user, rather than the images such as humanoid vertical board), and view in the certification video Frequency recording time participates in node and obtains the certification video that application user records in turn, wherein participates in node and obtains certification video Mode can be user's active upload, be also possible to user and recorded using the corresponding equipment of node such as smart phone is participated in Afterwards, participate in what node was actively extracted from relevant device.
In turn, to calculating of the node to certification video progress cryptographic Hash is participated in, certification view is marked by the cryptographic Hash The uniqueness of frequency, and the cryptographic Hash is sent to time stamp server, it is sent in order to further acquisition time stamp server Reliable time signature.
Step 102, time stamp server record receives the receiving time of cryptographic Hash, and the private key of application time stamp server Signature is carried out to cryptographic Hash and receiving time and is sent to participation node.
Specifically, time stamp server record receives the receiving time of cryptographic Hash, and should time stamp server private key Signature is carried out to cryptographic Hash and receiving time and is sent to participation node, for example, passing through NFC (Near Field Communication, near field communication (NFC)), WiFi etc. be sent to participation node, hereby it is achieved that node is participated in Application certification video the reliable time signature.
Step 103, the time difference between node calculating video record time and receiving time is participated in, the time difference full if knowing The preset time range of foot is sent to block link network after then signing using the private key of application user to certification broadcast message Network, wherein certification, which broadcasts the message, includes;Cryptographic Hash and receiving time, application user by time stamp server private key signature Public key and user basic information, the user certificate image by public security bureau's private key signature and user certificate information and certification Video.
If it should be understood that participate in node if it is determined that time stamp server receive the receiving time of cryptographic Hash with Video record lead time is larger, it is likely that is that illegal equipment end has pretended time stamp server to the Kazakhstan for participating in node transmission Uncommon value is signed, and the signature is sent to participation node, so as to cause receiving time and video record lead time compared with Greatly, thus, in an embodiment of the present invention, by calculating the time difference between video record time and receiving time, to participation The legitimacy of node is tentatively authenticated.
Specifically, the time difference between video record time and receiving time is calculated, for example, when extraction display is current specific The video record time shown in the time electronic clock chart at quarter, calculate between video record time and receiving time when Between it is poor, judge whether the time difference meets preset time range, which demarcated according to lot of experimental data , usually in the preset time range, legal participation node can be completed for the certification video of recording to be successfully uploaded to The feedback that time stamp server and time stamp server can complete signature is received until participating in node.
If the time difference meets preset time range, show that the signer of cryptographic Hash be time stamp server, from And using the private key of application user to block chain network is sent to after certification broadcast message signature, in order to block chain network root The certification again of the legitimacy of application user is carried out according to certification broadcast message.Wherein, apply the private key of user only by applying User holds.
Above-mentioned certification broadcast message includes the cryptographic Hash and receiving time by time stamp server to private key signature, application The public key and user basic information of user authenticate video and user certificate image and user certificate by secure private key signature altogether Part information, wherein the information of the identity users uniqueness such as user identity card number that user basic information includes, user's name include The information of the identity users identity such as address name, wherein user basic information is corresponding with user certificate information, in order to further The real-name authentication of application user is carried out according to user basic information and user certificate information.
Step 104, the public key for digging mine node application application user, which broadcasts the message to received certification, carries out signature verification, tests Whether verifying cryptographic Hash matches with certification video after card passes through, if knowing correct matching, verifies user certificate image and living body Whether user matches, if knowing correct matching, verifies whether user certificate information matches with user basic information, if knowing just Really matching, then calculate the time difference between video record time and receiving time, if after to know that the time difference meets preset Time range, it is determined that apply for that the real-name authentication of user passes through, and certification success message is written in block and to block chain Web broadcast.
As foregoing description, the private key of participating user and the public key of the participating user in certification broadcast message are a pair of each other Password, thus, in an embodiment of the present invention, the public key of digging mine node application application user is to received by participating user's The certification that the certification broadcast message of private key signature is signed, when the signature in the public key and certification broadcast message of application user Apply for the private key of user to then showing that transmission certification broadcast message is to participate in node itself when corresponding to, so that completion saves participation The verifying again of the legitimacy of point.
Further, it verifies whether cryptographic Hash matches to certification video after being verified, other is avoided to participate in section as a result, The certification video that point is sent obscures real-name authentication process, if correct matching, it is determined that go out the current certification video for participating in certification It is corresponding with the participation node of corresponding user.
Further, real-name authentication is carried out to application user, whether verifying user certificate image matches with living body user, I.e. whether living body user is authenticated using my user certificate, if it does, then verifying user certificate information and user's base Whether this information matches, and is further ensured that living body user carries out real-name authentication using my relevant information to verify, for example, When user certificate information includes certificate number and user certificate title, and user basic information includes user identifier and user's name, Certificate number can be verified and whether user identifier identical, and verifying user certificate title and user's name it is whether identical.
If the certificate information of user is matched with user basic information, show that living body user uses my relevant information Real-name authentication is carried out, at this point, the certificate letter for the user for completing the legitimate verification to certification video content itself, also, authenticating Breath and user certificate image are public security bureau's certifications, ensure that authentication reliability.
If in addition, time stamp server receive cryptographic Hash receiving time and video record lead time it is larger, It is likely to be other illegality equipments and has intercepted and captured the cryptographic Hash for participating in node transmission, disguise oneself as and participate in node to time stamp server hair The cryptographic Hash etc. intercepted and captured has been sent, it is larger so as to cause receiving time and video record lead time, thus, in implementation of the invention In example, by calculating the time difference between video record time and receiving time, the legitimacy for participating in node is authenticated.For Illegal user is avoided to carry out real-name authentication using the certification video of other users, when calculating video record time again and receiving Between time difference, compare and know that the time difference meets preset time range, then show the certification video really and be to participate in node sheet The certification video for the corresponding application user that body is sent, determines that the real-name authentication of application user passes through, and certification success message is write Enter into block and is broadcasted to block chain network.
Wherein, under different application scenarios, certification success message can be about fixed expression and authenticate successful character string, It is also possible to specifically indicate to authenticate successful text information etc., this is not restricted.
In view of in some scenes, some possible illegal users by intercept and capture and reset the certification videos of other users into Row real-name authentication, thus, correspond to application user in order to further ensure participating in the certification video that node provides, in this hair In bright one embodiment, authenticating in video further includes that living body user reads aloud the preset sound bite for authenticating video use, such as Shown in Fig. 5, before the real-name authentication of above-mentioned determining application user passes through, this method further includes:
Step 201, it digs mine node detection is carried out to the lip reading of living body user and obtain lip reading content, and by lip reading content and language The content of text of tablet section is compared.
Step 202, if digging mine node knows that lip reading content is consistent with the content of text of sound bite, it is determined that application user Real-name authentication pass through.
It is appreciated that application user is bright when carrying out the recording of certification video in order to avoid illegally being utilized by other users It reads one section and includes the voice of oneself personal information, for example, reading aloud one section " this is the video that Xiao Ming is used to block chain real-name authentication " Voice etc., thus, dig mine node to the lip reading of living body user carry out detection obtain lip reading content, and by lip reading content with it is preset The content of text of sound bite is compared, if digging mine node knows that lip reading content is consistent with the content of text of sound bite, Determine that the real-name authentication of application user passes through.Thus, on the one hand, the certification that legitimacy is carried out based on lip reading avoids illegal use Family is authenticated by connecing the video of goods to dub, and on the other hand, be ensure that and is intercepted and captured the certification of other users even if illegal user Video, also due to its living body can not be corresponding with the certification video of intercepting and capturing and can not be attacked.
Step 105, it digs mine node and judges that whether receiving other within a preset time digs the instruction block that mine nodes are sent Active broadcast message is not received by active broadcast message if knowing, comes into force to block chain network broadcast block, and by block It is written in block chain account book.
It is understandable to be, after participation node is successfully accessed block chain network, real-name authentication is completed in time, it is also possible to The user of the real-name authentication is illegal user etc., thus, in order to guarantee that the participation node is normally carried out accounting activities, rather than into The illegal activities such as row money laundering, need to verify the accounting activities whether the participation node executes normal legal.
Specifically, the digging mine node in block chain network is by Transaction Information recorded in account book etc. and the participation nodes records The Transaction Information similarly traded be compared, if it is inconsistent, the digging mine node determine participate in node error in entering accounts, sentence The corresponding block for authenticating success message of the participation node that breaks is invalid, digs whether the judgement of mine node receives it within a preset time He digs the broadcast message for indicating that block is invalid of mine node transmission, active broadcast message is not received by if knowing, to block Chain network broadcasts the block and comes into force, and block is written in block chain account book.
Certainly, in practical implementation, possible other dig mine node and error in entering accounts occur to which erroneous judgement currently participates in section Point error in entering accounts, and active broadcast message is had sent, thus, when participating in block chain network to further increase participation node The accuracy of verifying know if digging mine node in one embodiment of the invention and receive active broadcast message, judge Whether the number of diggings mine node for sending active broadcast message is more than preset threshold, the preset threshold and dig the total of mine node and The authority of digging mine node in block chain network is related, and the sum for digging mine node is more, digs the lower (ratio of authority of mine node Such as it is only common participation node), then corresponding preset threshold is lower.
If digging mine node knows that number is less than preset threshold, show that the most digging mine node is to accept the block , alternatively, without authoritative digging mine node think the block be it is invalid, thus, at this time to block chain network broadcast block It comes into force, and block is written in block chain account book, conversely, number is more than or equal to preset threshold if knowing, to block chain network It is invalid to broadcast the block.
In conclusion the block chain real name participatory approaches of the embodiment of the present invention, the user's correlation letter provided based on public security bureau Breath realizes the real-name authentication to block chain interior joint, ensure that the accuracy and reliability of real-name authentication, by block chain network In node be mapped with real-life real user identity, convenient for managing and maintaining the legal of block chain to node Property.
In order to realize above-described embodiment, the invention also provides a kind of computer equipment, including memory, processor and deposit The computer program that can be run on a memory and on a processor is stored up, it is real when the processor executes the computer program The now block chain real name participatory approaches as described in previous embodiment.
In order to realize above-described embodiment, the present invention also proposes a kind of non-transitorycomputer readable storage medium, deposits thereon Computer program is contained, it is real to can be realized block chain as in the foregoing embodiment when the computer program is executed by processor Name participatory approaches.
In the present invention, term " first ", " second " are used for description purposes only, and are not understood to indicate or imply opposite Importance or the quantity for implicitly indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be bright Show or implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two It is a, three etc., unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, fisrt feature in the second feature " on " or " down " can be with It is that the first and second features directly contact or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists Second feature " on ", " top " and " above " but fisrt feature be directly above or diagonally above the second feature, or be merely representative of First feature horizontal height is higher than second feature.Fisrt feature can be under the second feature " below ", " below " and " below " One feature is directly under or diagonally below the second feature, or is merely representative of first feature horizontal height less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned Embodiment is changed, modifies, replacement and variant.

Claims (10)

1. a kind of block chain real name participatory approaches, which is characterized in that including:
It participates in node and passes through the authorisation device user certificate of reading Jing Guo public security bureau's private key signature out of application user certificate chip Part image and user certificate information, and obtain the certification video that the application user records, wherein the certification video includes: Living body user and video record time, and when carrying out Hash calculation to the certification video and obtaining corresponding cryptographic Hash and be sent to Between stab server;
The time stamp server record receives the receiving time of the cryptographic Hash, and the private key of the application time stamp server Signature is carried out to the cryptographic Hash and the receiving time and is sent to the participation node;
The participation node calculates the time difference between the video record time and the receiving time, if knowing the time Difference meets preset time range, then is sent to area after signing using the private key of the application user to certification broadcast message Block chain network, wherein the certification, which broadcasts the message, includes;The cryptographic Hash by the time stamp server private key signature and The receiving time, the public key and user basic information, the user certificate by public security bureau's private key signature for applying for user Part image and user certificate information and the certification video;
It digs mine node and signature verification is carried out to received certification broadcast message using the public key of the application user, after being verified Verify whether the cryptographic Hash matches with the certification video, if knowing correct matching, verify the user certificate image and Whether the living body user matches, if knowing correct matching, verifies the user certificate information and the user basic information Whether match, if knowing correct matching, calculates the time difference between the video record time and the receiving time, if than After know that the time difference meets preset time range, it is determined that the real-name authentication of the application user passes through, and will recognize Card success message is written in block and broadcasts to the block chain network;
The mine node that digs judges that whether receiving other within a preset time digs the invalid of the instruction block that mine nodes are sent Broadcast message, is not received by the active broadcast message if knowing, broadcasts the block to the block chain network and comes into force, And the block is written in block chain account book.
2. the method as described in claim 1, which is characterized in that further include:
If the digging mine node, which is known, receives the active broadcast message, the digging mine for sending the active broadcast message is judged Whether the number of node is more than preset threshold;
If the digging mine node knows that the number is less than the preset threshold, the block is broadcasted to the block chain network It comes into force, and the block is written in block chain account book, the number is more than or equal to the preset threshold if knowing, to described It is invalid that block chain network broadcasts the block.
3. the method as described in claim 1, which is characterized in that the video record time includes:
The time electronic watch image at display current specific moment;
Alternatively,
The current specific moment that the living body user reads aloud.
4. the method as described in claim 1, which is characterized in that the user certificate information includes:Certificate number and user certificate Title;The user basic information includes:User identifier and user's name;
Whether the verifying user certificate information matches with the user basic information, including:
It verifies the certificate number and whether the user identifier is identical, and verify the user certificate title and the user name Whether identical claim.
5. the method as described in claim 1-4 is any, which is characterized in that the certification video further includes:The living body user The sound bite of preset certification video use is read aloud,
Before the real-name authentication of the determination application user passes through, the method also includes:
The digging mine node carries out detection to the lip reading of the living body user and obtains lip reading content, and by the lip reading content and institute The content of text for stating sound bite is compared;
If the digging mine node knows that the lip reading content is consistent with the content of text of the sound bite, it is determined that the application The real-name authentication of user passes through.
6. a kind of block chain real name participates in system, which is characterized in that including:It participates in node, time stamp server, dig mine node, Wherein,
The participation node passes through public security bureau's private key signature for reading out of application user certificate chip by authorisation device User certificate image and user certificate information, and obtain the certification video that the application user records, wherein the certification regards Frequently include:Living body user and video record time, and Hash calculation is carried out to the certification video and obtains corresponding cryptographic Hash It is sent to the time stamp server;
The time stamp server for recording the receiving time for receiving the cryptographic Hash, and applies the time stamp server Private key to the cryptographic Hash and the receiving time carry out signature be sent to the participation node;
The participation node, for calculating the time difference between the video record time and the receiving time, if knowing institute Stating the time difference meets preset time range, then sends out after signing using the private key of the application user to certification broadcast message Give block chain network, wherein the certification, which broadcasts the message, includes;By the Kazakhstan of the time stamp server private key signature It is uncommon value and the receiving time, the public key of the application user and user basic information, described by public security bureau's private key signature User certificate image and user certificate information and the certification video;
The digging mine node, the public key for the application application user, which broadcasts the message to received certification, carries out signature verification, It verifies whether the cryptographic Hash matches with the certification video after being verified, if knowing correct matching, verifies the user Whether certificate image and the living body user match, if knowing correct matching, verify the user certificate information and the use Whether family essential information matches, if knowing correct matching, calculates between the video record time and the receiving time Time difference, if after know that the time difference meets preset time range, it is determined that it is described application user real-name authentication Pass through, and certification success message is written in block and is broadcasted to the block chain network;
The digging mine node, for judging that whether receiving other within a preset time digs the instruction block that mine node is sent Active broadcast message is not received by the active broadcast message if knowing, broadcasts the block to the block chain network It comes into force, and the block is written in block chain account book.
7. system as claimed in claim 6, which is characterized in that the digging mine node is also used to:
The active broadcast message is received if knowing, judges that the number for the digging mine node for sending the active broadcast message is No is more than preset threshold;
If knowing, the number is less than the preset threshold, broadcasts the block to the block chain network and comes into force, and by institute It states in block write-in block chain account book, if knowing, the number is more than or equal to the preset threshold, to the block chain network It is invalid to broadcast the block.
8. system as claimed in claim 6, which is characterized in that the video record time includes:
The time electronic watch image at display current specific moment;
Alternatively,
The current specific moment that the living body user reads aloud.
9. a kind of computer equipment, which is characterized in that on a memory and can be in processor including memory, processor and storage The computer program of upper operation when the processor executes the computer program, is realized as described in any in claim 1-5 Block chain real name participatory approaches.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program Such as block chain real name participatory approaches as claimed in any one of claims 1 to 5 are realized when being executed by processor.
CN201810692342.2A 2018-06-29 2018-06-29 Block chain real name participation method and system Expired - Fee Related CN108881253B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810692342.2A CN108881253B (en) 2018-06-29 2018-06-29 Block chain real name participation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810692342.2A CN108881253B (en) 2018-06-29 2018-06-29 Block chain real name participation method and system

Publications (2)

Publication Number Publication Date
CN108881253A true CN108881253A (en) 2018-11-23
CN108881253B CN108881253B (en) 2020-11-06

Family

ID=64296780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810692342.2A Expired - Fee Related CN108881253B (en) 2018-06-29 2018-06-29 Block chain real name participation method and system

Country Status (1)

Country Link
CN (1) CN108881253B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109194481A (en) * 2018-07-24 2019-01-11 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN110380847A (en) * 2019-07-01 2019-10-25 阿里巴巴集团控股有限公司 A kind of block chain common recognition method and apparatus
CN111108526A (en) * 2019-09-02 2020-05-05 阿里巴巴集团控股有限公司 Centralized account book system based on block chain management
CN111294323A (en) * 2018-12-10 2020-06-16 成都高新信息技术研究院 Decentralized mobile subscriber identification method and system
CN111325581A (en) * 2020-02-27 2020-06-23 腾讯科技(深圳)有限公司 Data processing method and device, electronic equipment and computer readable storage medium
CN111586059A (en) * 2020-05-09 2020-08-25 杭州安存网络科技有限公司 Block chain machine, block chain data access authentication method and computer readable storage medium
CN111885073A (en) * 2020-07-29 2020-11-03 中国联合网络通信集团有限公司 Vehicle granting method and server
CN112637298A (en) * 2020-12-15 2021-04-09 中国联合网络通信集团有限公司 Authentication method and member node
US11250428B2 (en) 2020-04-22 2022-02-15 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems
US11271760B2 (en) 2019-09-02 2022-03-08 Advanced New Technologies Co., Ltd. Managing blockchain-based centralized ledger systems
CN114334110A (en) * 2021-12-28 2022-04-12 中国联合网络通信集团有限公司 Reservation method, block chain system, electronic device and computer readable medium
US11455297B2 (en) 2020-04-22 2022-09-27 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems
US11455631B2 (en) 2020-04-22 2022-09-27 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060005031A1 (en) * 2004-06-15 2006-01-05 Apostolopoulos John G Methods and systems for utilizing a single cryptographic integrity check to generate multiple cryptographic integrity check values for components of transcodable content
US20140280475A1 (en) * 2013-03-15 2014-09-18 Beeonics, Inc. Apparatus for Single Workflow for Multi-Platform Mobile Application Creation and Delivery
CN106411503A (en) * 2016-11-28 2017-02-15 中国银行股份有限公司 Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN107403303A (en) * 2017-06-16 2017-11-28 兴业数字金融服务(上海)股份有限公司 A kind of signature method for the electronic contract system that card is deposited based on block chain
CN107580196A (en) * 2017-07-28 2018-01-12 国创科视科技股份有限公司 A kind of video data shared system and method
CN107682378A (en) * 2017-11-22 2018-02-09 国民认证科技(北京)有限公司 A kind of real name identification method and system based on block chain
CN107784604A (en) * 2017-10-28 2018-03-09 北京安妮全版权科技发展有限公司 Copyright deposits card method, apparatus, storage medium and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060005031A1 (en) * 2004-06-15 2006-01-05 Apostolopoulos John G Methods and systems for utilizing a single cryptographic integrity check to generate multiple cryptographic integrity check values for components of transcodable content
US20140280475A1 (en) * 2013-03-15 2014-09-18 Beeonics, Inc. Apparatus for Single Workflow for Multi-Platform Mobile Application Creation and Delivery
CN106570710A (en) * 2016-10-27 2017-04-19 纸飞机(北京)科技有限公司 Commodity anti-counterfeiting method and device
CN106411503A (en) * 2016-11-28 2017-02-15 中国银行股份有限公司 Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode
CN107403303A (en) * 2017-06-16 2017-11-28 兴业数字金融服务(上海)股份有限公司 A kind of signature method for the electronic contract system that card is deposited based on block chain
CN107580196A (en) * 2017-07-28 2018-01-12 国创科视科技股份有限公司 A kind of video data shared system and method
CN107784604A (en) * 2017-10-28 2018-03-09 北京安妮全版权科技发展有限公司 Copyright deposits card method, apparatus, storage medium and electronic equipment
CN107682378A (en) * 2017-11-22 2018-02-09 国民认证科技(北京)有限公司 A kind of real name identification method and system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李吉广: "视频版权自动认证***的思考与设计", 《采集与制作》 *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109194481B (en) * 2018-07-24 2021-07-27 中国联合网络通信集团有限公司 Block chain real-name authentication method, device, equipment and storage medium
CN109194481A (en) * 2018-07-24 2019-01-11 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN111294323A (en) * 2018-12-10 2020-06-16 成都高新信息技术研究院 Decentralized mobile subscriber identification method and system
CN111294323B (en) * 2018-12-10 2022-01-18 成都高新信息技术研究院 Decentralized mobile subscriber identification method and system
CN110380847A (en) * 2019-07-01 2019-10-25 阿里巴巴集团控股有限公司 A kind of block chain common recognition method and apparatus
CN110380847B (en) * 2019-07-01 2021-11-19 创新先进技术有限公司 Block chain consensus method and device
US11271760B2 (en) 2019-09-02 2022-03-08 Advanced New Technologies Co., Ltd. Managing blockchain-based centralized ledger systems
CN111108526B (en) * 2019-09-02 2024-04-12 创新先进技术有限公司 Managing a blockchain-based centralized ledger system
EP3808030A4 (en) * 2019-09-02 2021-04-21 Advanced New Technologies Co., Ltd. Managing blockchain-based centralized ledger systems
US10904017B2 (en) 2019-09-02 2021-01-26 Advanced New Technologies Co., Ltd. Managing blockchain-based centralized ledger systems
CN111108526A (en) * 2019-09-02 2020-05-05 阿里巴巴集团控股有限公司 Centralized account book system based on block chain management
CN111325581A (en) * 2020-02-27 2020-06-23 腾讯科技(深圳)有限公司 Data processing method and device, electronic equipment and computer readable storage medium
US11455297B2 (en) 2020-04-22 2022-09-27 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems
US11250428B2 (en) 2020-04-22 2022-02-15 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems
US11455631B2 (en) 2020-04-22 2022-09-27 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems
CN111586059A (en) * 2020-05-09 2020-08-25 杭州安存网络科技有限公司 Block chain machine, block chain data access authentication method and computer readable storage medium
CN111885073A (en) * 2020-07-29 2020-11-03 中国联合网络通信集团有限公司 Vehicle granting method and server
CN112637298B (en) * 2020-12-15 2022-03-04 中国联合网络通信集团有限公司 Authentication method and member node
CN112637298A (en) * 2020-12-15 2021-04-09 中国联合网络通信集团有限公司 Authentication method and member node
CN114334110A (en) * 2021-12-28 2022-04-12 中国联合网络通信集团有限公司 Reservation method, block chain system, electronic device and computer readable medium
CN114334110B (en) * 2021-12-28 2023-01-17 中国联合网络通信集团有限公司 Reservation method, block chain system, electronic device and computer readable medium

Also Published As

Publication number Publication date
CN108881253B (en) 2020-11-06

Similar Documents

Publication Publication Date Title
CN108881253A (en) Block chain real name participatory approaches and system
US10127378B2 (en) Systems and methods for registering and acquiring E-credentials using proof-of-existence and digital seals
US11722301B2 (en) Blockchain ID connect
US11777726B2 (en) Methods and systems for recovering data using dynamic passwords
US10558974B2 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
US9900309B2 (en) Methods for using digital seals for non-repudiation of attestations
US11082221B2 (en) Methods and systems for creating and recovering accounts using dynamic passwords
CN112487778B (en) Multi-user online signing system and method
EP3343831B1 (en) Identity authentication method and apparatus
CN108900507A (en) Block chain real name identification method and system
CN108880832A (en) Block chain real name identification method and system
CN108876375A (en) Block chain real name participatory approaches and system
KR102441120B1 (en) System and method for credit exchange using block-chain technology
US10938808B2 (en) Account access
CN112002436A (en) Block chain-based medical question answering method, device and medium
US11444784B2 (en) System and method for generation and verification of a subject's identity based on the subject's association with an organization
CN101741561B (en) Method and system for authenticating two-way hardware
CN113515756A (en) High-reliability digital identity management method and system based on block chain
Pali et al. A comprehensive survey of aadhar and security issues
US11252153B2 (en) Method of providing mutual authentication of contents in social media service, and server, user terminal, and application implementing the method
Alshehri NFC mobile coupon protocols: developing, formal security modelling and analysis, and addressing relay attack
Chen Trust Management for a Smart Card Based Private eID Manager
CN109635594A (en) Electronics execution of contract and the anti-counterfeit authentication method for signing process again
KR101619282B1 (en) Cloud system for manging combined password and control method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing

Applicant after: IALLCHAIN Co.,Ltd.

Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing.

Applicant before: IALLCHAIN Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201106

Termination date: 20210629