CN109255619A - A kind of identity identifying method and equipment based on block chain - Google Patents

A kind of identity identifying method and equipment based on block chain Download PDF

Info

Publication number
CN109255619A
CN109255619A CN201811123678.3A CN201811123678A CN109255619A CN 109255619 A CN109255619 A CN 109255619A CN 201811123678 A CN201811123678 A CN 201811123678A CN 109255619 A CN109255619 A CN 109255619A
Authority
CN
China
Prior art keywords
user
block chain
chain node
identity
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811123678.3A
Other languages
Chinese (zh)
Inventor
陈万康
王志勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Asian Union Innovation Technology Co ltd
Original Assignee
Beijing Asian Union Star Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Asian Union Star Information Technology Co Ltd filed Critical Beijing Asian Union Star Information Technology Co Ltd
Priority to CN201811123678.3A priority Critical patent/CN109255619A/en
Publication of CN109255619A publication Critical patent/CN109255619A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application discloses a kind of identity identifying method and equipment based on block chain, it include: identity information of the first block chain node according to the first user, determine that there are at least one second users of incidence relation with first user, and the second block chain node logged in second user described at least one sends certification request, includes the identity information of first user in the certification request;The authentication information that at least one described first block chain node is sent is received, and according to the authentication contract of the authentication information and setting, the identity of first user is authenticated.By the characteristic that can not be distorted of block chain network, deal maker by having certification permission authenticates the identity for the deal maker for not yet passing certification, and it is realized according to the authentication information of generation and the authentication contract of setting to deal maker's authentication, effectively ensure the authenticity of deal maker's identity information, guarantee the confidence level of transaction member's identity information in the market OTC, reduces the risk traded in the market OTC.

Description

A kind of identity identifying method and equipment based on block chain
Technical field
This application involves computer disposal and financial technology technical field more particularly to a kind of identity based on block chain Authentication method and equipment.
Background technique
OTC(Over-The-Counter;Over-the-counter trading) refer to credits, stock that market except stock exchange carries out The transaction such as power.The mainly one-to-one transaction that is carried out by private consultation of both parties.
The market OTC and exchange market are entirely different: not having fixed-site, be not specified by membership qualification, without strictly may be used The regulatory of control is not specified by products transactions limitation.That is, both parties need respectively to undertake letter in the market OTC Use risk.Therefore, in the market OTC, only both sides can trade after establishing credit.
In practical business scene, in order to guarantee the security and reliability of OTC marketing, how to guarantee in the market OTC The confidence level of transaction member's identity information becomes the technical issues of urgent need to resolve.
Summary of the invention
In view of this, the embodiment of the present application provides a kind of identity identifying method and equipment based on block chain, for solving Certainly how to confirm the confidence level of transaction member's identity information in the market OTC.
The embodiment of the present application provides a kind of identity identifying method based on block chain, comprising:
First block chain node determines that there are incidence relations with first user according to the identity information of the first user At least one second user;
The second block chain node transmission that the first block chain node is logged in second user described at least one is recognized Card is requested, and includes the identity information of first user in the certification request;
The first block chain node receives the authentication information that at least one described second block chain node is sent, and according to The authentication contract of the authentication information and setting authenticates the identity of first user.
The embodiment of the present application provides a kind of identity identifying method based on block chain, comprising:
Second block chain node receives the certification request that the first block chain node is sent, and includes first in the certification request The identity information of user;
The second block chain node according to the identity information of first user, determine the second user that logs in it is described Incidence relation between first user;
The second block chain node authenticates the identity of first user according to the incidence relation.
The embodiment of the present application provides a kind of ID authentication device based on block chain, including at least one processor and deposits Reservoir, the memory are stored with program, and are configured to execute following steps by least one described processor:
According to the identity information of the first user, determining there are at least one second use of incidence relation with first user Family;
The the second block chain node logged in second user described at least one sends certification request, the certification request In include first user identity information;
The authentication information that at least one described second block chain node is sent is received, and according to the authentication information and setting Authentication contract, the identity of first user is authenticated.
The embodiment of the present application provides a kind of ID authentication device based on block chain, including at least one processor and deposits Reservoir, the memory are stored with program, and are configured to execute following steps by least one described processor:
The certification request of the first block chain node transmission is received, the identity comprising the first user is believed in the certification request Breath;
According to the identity information of first user, being associated between the second user logged in and first user is determined Relationship;
According to the incidence relation, the identity of first user is authenticated.
What at least one embodiment provided by the present application can reach has the beneficial effect that:
The embodiment of the present application the first block chain node is determined and is deposited with first user according to the identity information of the first user In at least one second user of incidence relation, and the second block chain node hair logged in second user described at least one Certification request is sent, includes the identity information of first user in the certification request;Receive at least one described second block The authentication information that chain node is sent, and according to the authentication contract of the authentication information and setting, to first user's Identity is authenticated.By the characteristic that can not be distorted of block chain network, by having the deal maker of certification permission to not yet passing The identity of the deal maker of certification authenticates, and is realized according to the authentication information of generation and the authentication contract of setting to transaction Member's authentication effectively ensures the authenticity of deal maker's identity information, and transaction member's identity information can in the guarantee market OTC Reliability reduces the risk traded in the market OTC.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly introduced, it should be apparent that, the drawings in the following description are only some examples of the present application, for this For the those of ordinary skill in field, without any creative labor, it can also be obtained according to these attached drawings His attached drawing.
Fig. 1 provides a kind of flow diagram of identity identifying method based on block chain for the embodiment of the present application;
Fig. 2 provides a kind of flow diagram of identity identifying method based on block chain for the embodiment of the present application;
Fig. 3 provides a kind of structural schematic diagram of ID authentication device based on block chain for the embodiment of the present application;
Fig. 4 provides a kind of structural schematic diagram of ID authentication device based on block chain for the embodiment of the present application.
Specific embodiment
In order to realize the purpose of the application, the embodiment of the present application provide a kind of identity identifying method based on block chain and Equipment, the first block chain node is according to the identity information of the first user, and there are incidence relations by determining and first user extremely A few second user, and the second block chain node logged in second user described at least one sends certification request, institute State the identity information in certification request comprising first user;Receive recognizing at least one the second block chain node transmission Information is demonstrate,proved, and according to the authentication contract of the authentication information and setting, the identity of first user is authenticated.It borrows The characteristic that can not be distorted for helping block chain network, by having body of the deal maker of certification permission to the deal maker for not yet passing certification Part is authenticated, and is realized to deal maker's authentication, effectively according to the authentication information of generation and the authentication contract of setting It ensures the authenticity of deal maker's identity information, guarantees the confidence level of transaction member's identity information in the market OTC, reduce the city OTC The risk traded in.
It should be noted that " the first user " that is recorded in the embodiment of the present application, " first " in " second user " and " Two " do not have particular meaning, are only used to indicate different users;" the first block chain node " recorded in the embodiment of the present application, " " first " and " second " in two block chain nodes " does not have particular meaning, is only used to indicate arbitrary block in block chain network Chain node.
The each embodiment of the application is described in further detail with reference to the accompanying drawings of the specification.Obviously, described Embodiment is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field Those of ordinary skill's all other embodiment obtained without making creative work belongs to the application protection Range.
Fig. 1 is a kind of flow diagram of the identity identifying method based on block chain provided by the embodiments of the present application.It is described Method can be as follows.
Step 101: according to the identity information of the first user, determining and first user exists closes the first block chain node At least one second user of connection relationship.
In the embodiment of the present application, the first block chain node can be used as the arbitrary node in block chain network, show shape Formula can be a system client, and user is provided after logining successfully using system by system client login system Function.
Specifically, the first user completes registration by the first block chain node in system, and utilizes generation user information Login system.
Firstly, the first user sends registration request, at this time the first block chain to system by the first block chain node Node receives the registration request of first user, includes the identity information of first user in the registration request.
Here identity information is including but not limited to user name, login password, name, occupation, education background, work experience Etc..
Such as: user initiates registration request by a certain system client, and carries in the registration request and filled in Identity information.
Secondly, the first block chain node stores the registration request of first user.
Specifically, the first block chain node is in the case where receiving registration request, can should by way of broadcast The identity information for including in registration request is sent to other nodes in block chain network.According to the conjunction of block chain information cochain About, in the case where determining that the registration request is verified, store the identity information for including in the registration request, i.e., it is so-called Identity information cochain.Here storage is not limited only to the storage of the first block chain node, further includes but is not limited to block chain network In all block chain nodes store the identity information for including in the registration request that the first user sends.
It should be noted that implementing here according to the contract of block chain information cochain to the verifying of registration request and the application The authentication recorded in example is different.Here verifying is the data storage technology based on block chain, and being used to determine whether should Identity information is stored into block chain network.There are many kinds of verification modes, such as: proof of work, equity prove etc., at this Verification mode is not specifically limited in application embodiment.
For cochain user (registering the deal maker of completion), if having certification permission, or whether can be by it His users to trust, it is also necessary to further the identity of the user be authenticated.So the first block chain node is used according to first The identity information at family, there are at least one second users of incidence relation with first user for lookup from block chain.
The incidence relation recorded in the embodiment of the present application includes but is not limited to that Peer Relationships (can be passed through according to the work of submission Go through information judgement), transaction relationship (historical trading data that can be dispatched according to internet financial platform judges), acquaintance etc. Deng.
Step 102: the second block chain link that the first block chain node is logged in second user described at least one Point sends certification request, includes the identity information of first user in the certification request.
In the embodiment of the present application, the second block chain link that the first block chain node can be logged in determining second user Point sends certification request, and the certification request is for requesting second user to authenticate the identity of the first user.
Specifically, the first block chain node is according to the certification permission of the different user of storage, from it is determining with it is described First user has the second user of certification permission there are filtering out at least one second user of incidence relation, and to screening The second block chain node that the second user that out at least one has certification permission is logged in sends certification request.
More preferably, there are at least one second use of incidence relation in determining and first user for the first block chain node In the case where family, certification request can be sent by the way of broadcast, so that receiving other block chains of the certification request Node realizes the authentication to the first user in the case where having certification permission.
Since there may be some second users not to authenticate permission in determining second user, in order to guarantee authentication information Credibility, in the embodiment of the present application, firstly, whether the first block chain node determines at least one described second user Has certification permission.
Specifically, the first block chain node executes following operation for each determining second user respectively:
Search whether second user has certification permission.
Secondly, the first block chain node logged in at least one the described second user for having certification permission the Two block chain nodes send certification request.
Step 103: the first block chain node receives the certification letter that at least one described second block chain node is sent Breath.
In the embodiment of the present application, the first block chain node receives what the second different block chain nodes was sent respectively Authentication information.What needs to be explained here is that the mode that the second block chain node sends authentication information can use point-to-point transmission Mode, can also using broadcast transmission by the way of, sending method is not specifically limited here.
More preferably, the first block chain node stores the authentication information.
Wherein, in the authentication information comprising authenticated time, authenticating tag, first user user information, described The user information of second user, the authenticating tag characterize in the incidence relation between first user and the second user It is at least one or a variety of.It also include the whether true information of subscriber identity information to be verified in the authentication information.
Specifically, the first block chain node is the case where receiving the authentication information of each second block chain node transmission Under, regardless of the authentication information indicates that subscriber identity information is true or untrue, the first block chain node stores the authentication information, Include authenticated time (can be the time for receiving authentication information), authenticating tag (i.e. the first user and the in the authentication information Incidence relation between two users, such as: the corresponding colleague's label of Peer Relationships;Business relations correspond to service label), the first user User information, one or more of the user information of second user.
Whether subscriber identity information to be verified here thinks that genuine information is a second user to the first user Identity carries out what certification obtained, i.e., some second user authenticates the identity of the first user, generates subscriber identity information Be true or subscriber identity information is false information, that is to say, that whether in authentication information comprising subscriber identity information be it is true, use Family identity information is false one of information.
Step 104: the first block chain node is according to the authentication contract of the authentication information and setting, to described The identity of first user authenticates.
In the embodiment of the present application, the first block chain node is receiving the transmission of each second block chain node In the case where authentication information, " whether subscriber identity information is genuine information " in authentication information read.
For the first block chain node in determining the authentication information received, authentication information is that subscriber identity information is true And in the case that authentication information indicates that subscriber identity information is the authentication contract that genuine quantity meets setting, by described The authentication of first user.
Here the contract rule being arranged in the authentication contract set, which can be, indicates subscriber identity information really to recognize The quantity for demonstrate,proving information is greater than setting numerical value, that is to say, that once the first block chain node is determining the authentication information received In, authentication information indicates that subscriber identity information is genuine information and indicates that the quantity that subscriber identity information is genuine authentication information is big In setting numerical value, illustrate the authentication contract for meeting setting.Once the first block chain node is recognized what determination received It demonstrate,proves in information, authentication information indicates that the quantity that subscriber identity information is genuine information is not more than setting numerical value, illustrates to be unsatisfactory for setting Fixed authentication contract.
Such as: the first block chain node receives the authentication information that different second block chain nodes are sent, and confirms and receives Include in authentication information is that subscriber identity information is genuine information or subscriber identity information is false information, if authentication information It is genuine information for subscriber identity information, then counter adds 1, otherwise, counter values are remained unchanged.When the numerical value of counter In the case where greater than setting numerical value, pass through the authentication to first user.
More preferably, in the embodiment of the present application, the method also includes:
The first block chain node determines described first through authentication to first user The certification permission of user, the certification permission, which characterizes first user, to authenticate the identity of other users;
Specifically, the first block chain node is through authentication to first user, for institute It states the first user and distributes (or open-minded) certification permission, is i.e. the first user can authenticate the identity of other users.
More preferably, the first block chain node broadcasts the certification permission of first user in block chain network, with The certification permission of the first user is stored convenient for other block chain nodes in block chain network.
In the embodiment of the present application, the executing subject of the embodiment of the present application can be any one area in block chain network Block chain node is also possible to all block chain nodes, can also be block chain node (i.e. the first block chain that the first user logs in Node), above-described embodiment is described using the first block chain node as executing subject, but the executing subject of this programme not office It is limited to the first block chain node.
By technical solution provided by the embodiments of the present application, the first block chain node according to the identity information of the first user, It determines that there are at least one second users of incidence relation with first user, and is stepped on to second user described at least one Second block chain node of record sends certification request, includes the identity information of first user in the certification request;It receives The authentication information that at least one described second block chain node is sent, and closed according to the authentication of the authentication information and setting About, the identity of first user is authenticated.By the characteristic that can not be distorted of block chain network, by having certification permission Deal maker the identity for the deal maker for not yet passing certification is authenticated, and according to the identity of the authentication information of generation and setting It authenticates contract to realize to deal maker's authentication, effectively ensures the authenticity of deal maker's identity information, guarantee to hand in the market OTC The confidence level of easy member identities' information, reduces the risk traded in the market OTC.
Fig. 2 is a kind of flow diagram of the identity identifying method based on block chain provided by the embodiments of the present application.It is described Method can be as follows.
Step 201: the second block chain node receives the certification request that the first block chain node is sent, in the certification request Identity information comprising the first user.
In the embodiment of the present application, since the first block chain node can be sent and be recognized using broadcast or point-to-point mode Card request, then the second block chain node receives the certification request that the first block chain node is sent.
Step 202: the second block chain node determines that log in second uses according to the identity information of first user Incidence relation between family and first user.
In the embodiment of the present application, the second block chain node is in the case where receiving certification request, according to certification request In include the first user identity information and login second user user information, determine log in second user with it is described It whether there is incidence relation between first user.
Such as: whether in second user friend information have first user, search the transaction pair in historical transactional information if searching Whether there is second user etc. in hand.
Step 203: the second block chain node recognizes the identity of first user according to the incidence relation Card.
In the embodiment of the present application, the second block chain node once it is determined that log in second user and the first user it Between there are incidence relations, prompt information can be sent, prompt log in second user the identity of the first user is authenticated, and According to the information that second user inputs, authentication information is generated, the first block chain node is sent to.
Fig. 3 is a kind of structural schematic diagram of the ID authentication device based on block chain provided by the embodiments of the present application.It is described ID authentication device comprises determining that unit 301, transmission unit 302 and authentication unit 303, in which:
Determination unit 301 determines that there are incidence relations with first user for the identity information according to the first user At least one second user;
Transmission unit 302, the second block chain node for being logged in second user described at least one send certification It requests, includes the identity information of first user in the certification request;
Authentication unit 303, the authentication information sent for receiving at least one described second block chain node, and according to institute The authentication contract for stating authentication information and setting authenticates the identity of first user.
In another embodiment of the application, the authentication unit 303 is according to the identity of the authentication information and setting Contract is authenticated, the identity of first user is authenticated, comprising:
Determining that the authentication information received is to indicate that subscriber identity information is genuine information and indicates user identity Information is in the case that the quantity of genuine information meets the authentication contract set, to be recognized by the identity to first user Card.
In another embodiment of the application, the ID authentication device further include: certification priority assignation unit 304, Wherein:
The certification priority assignation unit 304, for being through authentication to first user First user distributes certification permission, and the certification permission, which characterizes first user, to carry out the identity of other users Certification.
In another embodiment of the application, the ID authentication device further include: radio unit 305, wherein described Radio unit 305, for broadcasting the certification permission of first user in block chain network.
In another embodiment of the application, the ID authentication device further include: storage unit 306, wherein;
The storage unit 306, for receiving at least one described second block chain node in the authentication unit 303 In the case where the authentication information of transmission, store the authentication information, in the authentication information comprising authenticated time, authenticating tag, At least one or multiple of the user information of first user, user information of the second user, the certification letter It further include whether subscriber identity information is genuine information in breath, the authenticating tag characterizes first user and described second and uses Incidence relation between family.
In another embodiment of the application, the ID authentication device further include: receiving unit 307, in which:
The receiving unit 307 includes described in the registration request for receiving the registration request of first user The identity information of first user;Store the registration request of first user.
In another embodiment of the application, the transmission unit 302 is logged in second user described at least one The second block chain node send certification request, comprising:
Broadcast authentication is requested in block chain network;
Alternatively, having described the second of certification permission according to the certification permission of the different user of storage at least one and using The second block chain node that family is logged in sends certification request.
It should be noted that the ID authentication device recorded in the embodiment of the present application can be realized by software mode, It can be realized by hardware mode, be not specifically limited here.ID authentication device is determined according to the identity information of the first user There are at least one second users of incidence relation with first user, and logged in second user described at least one Second block chain node sends certification request, includes the identity information of first user in the certification request;It receives at least The authentication information that one the second block chain node is sent, and according to the authentication contract of the authentication information and setting, The identity of first user is authenticated.By the characteristic that can not be distorted of block chain network, by having certification permission Deal maker authenticates the identity for the deal maker for not yet passing certification, and is recognized according to the authentication information of generation and the identity of setting It demonstrate,proves contract to realize to deal maker's authentication, effectively ensures the authenticity of deal maker's identity information, guarantee to trade in the market OTC The confidence level of member identities' information reduces the risk traded in the market OTC.
Based on the same inventive concept, the embodiment of the present application also provides a kind of ID authentication device based on block chain, Including at least one processor and memory, the memory is stored with program, and be configured to by it is described at least one It manages device and executes following steps:
According to the identity information of the first user, determining there are at least one second use of incidence relation with first user Family;
The the second block chain node logged in second user described at least one sends certification request, the certification request In include first user identity information;
The authentication information that at least one described second block chain node is sent is received, and according to the authentication information and setting Authentication contract, the identity of first user is authenticated.
The processor recorded in the embodiment of the present application can be central processing unit, can also be other controllers, here not It is specifically limited.
Fig. 4 is a kind of structural schematic diagram of the ID authentication device based on block chain provided by the embodiments of the present application.It is described ID authentication device includes: receiving unit 401, determination unit 402 and authentication unit 403, in which:
Receiving unit 401, for receiving the certification request of the first block chain node transmission, comprising the in the certification request The identity information of one user;
Determination unit 402 determines the second user logged in and described for the identity information according to first user Incidence relation between one user;
Authentication unit 403, for being authenticated to the identity of first user according to the incidence relation.
It should be noted that ID authentication device provided by the embodiments of the present application can be realized by software mode, it can also To be realized by hardware mode, it is not specifically limited here.
Based on the same inventive concept, the embodiment of the present application also provides a kind of ID authentication device based on block chain, Including at least one processor and memory, the memory is stored with program, and be configured to by it is described at least one It manages device and executes following steps:
The certification request of the first block chain node transmission is received, the identity comprising the first user is believed in the certification request Breath;
According to the identity information of first user, being associated between the second user logged in and first user is determined Relationship;
According to the incidence relation, the identity of first user is authenticated.
It will be understood by those skilled in the art that embodiments herein can provide as method, apparatus (equipment) or computer Program product.Therefore, in terms of the application can be used complete hardware embodiment, complete software embodiment or combine software and hardware Embodiment form.Moreover, it wherein includes the meter of computer usable program code that the application, which can be used in one or more, The computer journey implemented in calculation machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of sequence product.
The application is flow chart of the reference according to method, apparatus (equipment) and computer program product of the embodiment of the present application And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate One machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies Within, then the application is also intended to include these modifications and variations.

Claims (10)

1. a kind of identity identifying method based on block chain characterized by comprising
First block chain node is according to the identity information of the first user, and there are incidence relations by determining and first user at least One second user;
The second block chain node that the first block chain node is logged in second user described at least one sends certification and asks It asks, includes the identity information of first user in the certification request;
The first block chain node receives the authentication information that at least one described second block chain node is sent, and according to described The authentication contract of authentication information and setting authenticates the identity of first user.
2. identity identifying method according to claim 1, which is characterized in that the first block chain node is recognized according to The authentication contract for demonstrate,proving information and setting, authenticates the identity of first user, comprising:
The first block chain node is determining that the authentication information received expression subscriber identity information is true and expression is used Family identity information is in the case that the quantity of genuine authentication information meets the authentication contract set, by using described first The authentication at family.
3. identity identifying method according to claim 2, which is characterized in that the method also includes:
The first block chain node is through authentication to first user, for first user point With certification permission, the certification permission, which characterizes first user, to authenticate the identity of other users.
4. identity identifying method according to claim 3, which is characterized in that the method also includes:
The first block chain node broadcasts the certification permission of first user in block chain network.
5. identity identifying method according to any one of claims 1 to 4, which is characterized in that the first block chain node In the case where receiving the authentication information that at least one described second block chain node is sent, the method also includes:
The first block chain node stores the authentication information, includes authenticated time, authenticating tag, institute in the authentication information State at least one or multiple of user information, the user information of the second user of the first user, the authentication information In further include whether subscriber identity information is genuine information, the authenticating tag characterizes first user and the second user Between incidence relation.
6. identity identifying method according to claim 1, which is characterized in that the method also includes:
The first block chain node receives the registration request of first user, uses in the registration request comprising described first The identity information at family;
The first block chain node stores the registration request of first user.
7. identity identifying method according to claim 1, which is characterized in that the first block chain node at least one The second block chain node that the second user is logged in sends certification request, comprising:
First block chain node broadcast authentication in block chain network is requested;
Alternatively, certification permission of the first block chain node according to the different user of storage, has certification power at least one The second block chain node that the second user of limit is logged in sends certification request.
8. a kind of identity identifying method based on block chain characterized by comprising
Second block chain node receives the certification request that the first block chain node is sent, and includes the first user in the certification request Identity information;
The second block chain node determines the second user and described first logged according to the identity information of first user Incidence relation between user;
The second block chain node authenticates the identity of first user according to the incidence relation.
9. a kind of ID authentication device based on block chain, which is characterized in that described including at least one processor and memory Memory is stored with program, and is configured to execute following steps by least one described processor:
According to the identity information of the first user, determine that there are at least one second users of incidence relation with first user;
The the second block chain node logged in second user described at least one sends certification request, wraps in the certification request Identity information containing first user;
The authentication information that at least one described second block chain node is sent is received, and according to the body of the authentication information and setting Part certification contract, authenticates the identity of first user.
10. a kind of ID authentication device based on block chain, which is characterized in that including at least one processor and memory, institute It states memory and is stored with program, and be configured to execute following steps by least one described processor:
The certification request of the first block chain node transmission is received, includes the identity information of the first user in the certification request;
According to the identity information of first user, being associated between the second user logged in and first user is determined System;
According to the incidence relation, the identity of first user is authenticated.
CN201811123678.3A 2018-09-26 2018-09-26 A kind of identity identifying method and equipment based on block chain Pending CN109255619A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811123678.3A CN109255619A (en) 2018-09-26 2018-09-26 A kind of identity identifying method and equipment based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811123678.3A CN109255619A (en) 2018-09-26 2018-09-26 A kind of identity identifying method and equipment based on block chain

Publications (1)

Publication Number Publication Date
CN109255619A true CN109255619A (en) 2019-01-22

Family

ID=65047380

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811123678.3A Pending CN109255619A (en) 2018-09-26 2018-09-26 A kind of identity identifying method and equipment based on block chain

Country Status (1)

Country Link
CN (1) CN109255619A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110060060A (en) * 2019-03-01 2019-07-26 阿里巴巴集团控股有限公司 Method of controlling security, device, electronic equipment and computer readable storage medium
CN110443624A (en) * 2019-07-31 2019-11-12 中国工商银行股份有限公司 Shou Dan trade company checking method and node apparatus based on block chain
CN110473102A (en) * 2019-08-15 2019-11-19 广州蚁比特区块链科技有限公司 Transaction processing method, device and block chain node
CN110599190A (en) * 2019-09-27 2019-12-20 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain
CN111444271A (en) * 2020-03-05 2020-07-24 链农(深圳)信息科技有限公司 Information collection and judgment method and system based on block chain
US10791122B2 (en) 2019-07-04 2020-09-29 Alibaba Group Holding Limited Blockchain user account data
CN112115523A (en) * 2020-09-30 2020-12-22 海南大学 Data self-destruction encryption storage device
CN112134883A (en) * 2020-09-22 2020-12-25 北京八分量信息科技有限公司 Method and device for quickly authenticating trust relationship between nodes based on trusted computing and related products
WO2021000578A1 (en) * 2019-07-04 2021-01-07 创新先进技术有限公司 Method, device and apparatus for creating user in chained-block account book
CN113190813A (en) * 2021-05-25 2021-07-30 数字广东网络建设有限公司 Dual-authentication processing method, device, equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375317A (en) * 2016-08-31 2017-02-01 北京明朝万达科技股份有限公司 Block chain-based big data security authentication method and system
CN107426157A (en) * 2017-04-21 2017-12-01 杭州趣链科技有限公司 A kind of alliance's chain authority control method based on digital certificate and ca authentication system
WO2018046009A1 (en) * 2016-09-12 2018-03-15 上海鼎利信息科技有限公司 Block chain identity system
CN108551437A (en) * 2018-03-13 2018-09-18 百度在线网络技术(北京)有限公司 Method and apparatus for authentication information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375317A (en) * 2016-08-31 2017-02-01 北京明朝万达科技股份有限公司 Block chain-based big data security authentication method and system
WO2018046009A1 (en) * 2016-09-12 2018-03-15 上海鼎利信息科技有限公司 Block chain identity system
CN107426157A (en) * 2017-04-21 2017-12-01 杭州趣链科技有限公司 A kind of alliance's chain authority control method based on digital certificate and ca authentication system
CN108551437A (en) * 2018-03-13 2018-09-18 百度在线网络技术(北京)有限公司 Method and apparatus for authentication information

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110060060B (en) * 2019-03-01 2023-03-31 创新先进技术有限公司 Security control method and device, electronic equipment and computer readable storage medium
CN110060060A (en) * 2019-03-01 2019-07-26 阿里巴巴集团控股有限公司 Method of controlling security, device, electronic equipment and computer readable storage medium
US10791122B2 (en) 2019-07-04 2020-09-29 Alibaba Group Holding Limited Blockchain user account data
WO2021000578A1 (en) * 2019-07-04 2021-01-07 创新先进技术有限公司 Method, device and apparatus for creating user in chained-block account book
CN110443624A (en) * 2019-07-31 2019-11-12 中国工商银行股份有限公司 Shou Dan trade company checking method and node apparatus based on block chain
CN110473102A (en) * 2019-08-15 2019-11-19 广州蚁比特区块链科技有限公司 Transaction processing method, device and block chain node
CN110599190A (en) * 2019-09-27 2019-12-20 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain
CN110599190B (en) * 2019-09-27 2022-10-21 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain
CN111444271A (en) * 2020-03-05 2020-07-24 链农(深圳)信息科技有限公司 Information collection and judgment method and system based on block chain
CN112134883A (en) * 2020-09-22 2020-12-25 北京八分量信息科技有限公司 Method and device for quickly authenticating trust relationship between nodes based on trusted computing and related products
CN112134883B (en) * 2020-09-22 2023-05-30 北京八分量信息科技有限公司 Method, device and related product for carrying out rapid authentication on trust relationship between nodes based on trusted computing
CN112115523A (en) * 2020-09-30 2020-12-22 海南大学 Data self-destruction encryption storage device
CN113190813A (en) * 2021-05-25 2021-07-30 数字广东网络建设有限公司 Dual-authentication processing method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN109255619A (en) A kind of identity identifying method and equipment based on block chain
CN108780390B (en) System and method for providing identity scores
US10965668B2 (en) Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification
Pasdar et al. Connect API with blockchain: A survey on blockchain oracle implementation
KR102009160B1 (en) Information trust engine system based on block-chain
KR102131292B1 (en) Method for managing trust information based on block-chain
US20150106239A1 (en) Tokenization revocation list
US20210357927A1 (en) Transaction authentication system and related methods
US20120159590A1 (en) Methods, systems, and computer program products for authenticating an identity of a user by generating a confidence indicator of the identity of the user based on a combination of multiple authentication techniques
CN111034114A (en) Block chain structure with recording safety
CN105719172A (en) Information issuing method and device
WO2015158874A1 (en) Method and system for user authentication
CN108352021A (en) The method and system collected and reported for authentication data associated with online transaction
CN105763547B (en) Third party's authorization method and third party's authoring system
JP2016521932A (en) Terminal identification method, and method, system, and apparatus for registering machine identification code
CN108418808A (en) Identity information changes method, apparatus, terminal device and storage medium
CN113987080A (en) Block chain excitation method and device based on reputation consensus and related products
WO2020047116A1 (en) Techniques for data access control utilizing blockchains
CN112700250A (en) Identity authentication method, device and system in financial scene
CN108352010A (en) Method and system for administrative authentication services client data
Nabi Comparative study on identity management methods using blockchain
CN110020869A (en) For generating the method, apparatus and system of block chain authorization message
CN112862589A (en) Identity verification method, device and system in financial scene
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN115277122A (en) Cross-border data flow and supervision system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200113

Address after: Room 0112-168, 01 Floor, 26 Shangdi Information Road, Haidian District, Beijing 100084

Applicant after: Asian Union Innovation Technology Co.,Ltd.

Address before: 100088 Floor 1206, Block B, Building 8, Guanchengyuan, Haidian District, Beijing

Applicant before: BEIJING AFCA STAR INFORMATION TECHNOLOGY Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190122