CN109493058A - A kind of personal identification method and relevant device based on block chain - Google Patents
A kind of personal identification method and relevant device based on block chain Download PDFInfo
- Publication number
- CN109493058A CN109493058A CN201811533089.2A CN201811533089A CN109493058A CN 109493058 A CN109493058 A CN 109493058A CN 201811533089 A CN201811533089 A CN 201811533089A CN 109493058 A CN109493058 A CN 109493058A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- identification
- block chain
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
This application discloses a kind of personal identification method and relevant device based on block chain, the described method includes: obtaining userspersonal information, user's electronic identity is generated according to the userspersonal information, and is stored in block chain after the userspersonal information is encrypted by key;When user's electronic identity is identified equipment identification, the personal information for identifying equipment and obtaining the corresponding userspersonal information of user's electronic identity and being stored on block chain;When the corresponding userspersonal information of user's electronic identity of acquisition matches with the personal information stored on block chain, identification record information is generated, and be stored in block chain after the identification record information is encrypted by key.The application is by, in block chain, generating electronic identity according to personal information, and according to identification record information update electronic identity, thus avoid electronic identity from being tampered and cause user's property loss for personal information storage.
Description
Technical field
This application involves information security field, in particular to a kind of personal identification method and correlation based on block chain is set
It is standby.
Background technique
As science and technology constantly develops, people's lives are more and more convenient, and intelligent and electronization is future direction, such as
Stored value card, electronic ID card etc..By Web bank and mobile-phone payment, people can not have to band wallet again and go out, and pass through
Scanning payment two dimensional code can easily realize on-line payment, can not have to band identity card again by electronic ID card people and go out,
By the electronic ID card on scanning user mobile phone, user identity can be easily obtained, identity is authenticated.But wallet and
The above-mentioned article such as identity card is related to the privacy and safety of user, if electronic, by criminal may distort and
It forges, brings loss to the property of user, although the unique of user's electronic identity may be implemented by two dimensional code at present, not
It is evitable to be forged by people.And memory space of the block chain as a safety, the characteristic that has encryption and can not distort, therefore
It can be by cooperating the prior art to solve the above problems using the characteristic.
Summary of the invention
The purpose of the application be to provide in view of the deficiencies of the prior art a kind of personal identification method based on block chain and
Relevant device generates electronic identity according to personal information, and will identify every time by the way that personal information is stored encrypted in block chain
Record information is stored encrypted in block chain, according to identification record information update electronic identity, thus avoids electronic identity due to quilt
It distorts or forges and cause user's property loss.
In order to achieve the above objectives, the technical solution of the application provides a kind of personal identification method and correlation based on block chain
Equipment.
This application discloses a kind of personal identification methods based on block chain, comprising the following steps:
Userspersonal information is obtained, user's electronic identity is generated according to the userspersonal information, and the user is a
People's information is stored in block chain after encrypting by key;
When user's electronic identity is identified equipment identification, the identification equipment obtains user's electronic identity pair
The userspersonal information answered and the personal information being stored on block chain;
As the corresponding userspersonal information of user's electronic identity and the individual being stored on block chain of acquisition
When information matches, identification record information is generated, and be stored in block chain after the identification record information is encrypted by key.
Preferably, described when user's electronic identity is identified equipment identification, the identification equipment obtains the use
Personal information family electronic identity corresponding userspersonal information and be stored on block chain, comprising:
When user's electronic identity is identified equipment identification, the identification equipment sends userspersonal information to user
Request;
After the user receives userspersonal information request, the userspersonal information is sent to the identification
Equipment.
Preferably, described when user's electronic identity is identified equipment identification, the identification equipment obtains the use
Personal information family electronic identity corresponding userspersonal information and be stored on block chain, comprising:
After the identification equipment receives user's electronic identity corresponding userspersonal information, the identification equipment to
Block chain sends userspersonal information's request;
After the block chain receives userspersonal information request, the userspersonal information is inquired, and will inquiry
To the userspersonal information be sent to the identification equipment.
Preferably, described when user's electronic identity is identified equipment identification, the identification equipment obtains the use
Personal information family electronic identity corresponding userspersonal information and be stored on block chain, comprising:
When user's electronic identity is identified equipment identification, identification equipment generation public key and private key, and to
Family sends the public key and cipher key request information;
After the user receives the public key and cipher key request information, by the key by being sent out after the public key encryption
Give the identification equipment;
After the identification equipment receives the key after public key encryption, added to described through public key by the private key
Key after close is decrypted.
Preferably, it is described after the identification equipment receives the key after public key encryption, pass through the private key pair
After the key after public key encryption is decrypted, comprising:
After the identification equipment is to the key successful decryption after public key encryption, individual subscriber is sent to block chain
Information request;
After the block chain receives userspersonal information request, the userspersonal information of encryption is sent to
The identification equipment;
After the identification equipment receives the userspersonal information of the encryption, pass through the use of encryption described in the key pair
Family personal information is decrypted.
Preferably, described when the corresponding userspersonal information of user's electronic identity obtained is stored in block with described
When personal information on chain matches, identification record information is generated, and store after the identification record information is encrypted by key
After block chain, comprising:
According to user's electronic identity described in the identification record information update;
When user's electronic identity, which is identified equipment, to be again identified that, the identification equipment sends individual subscriber to user
Information and identification record information request.
Preferably, described when the corresponding userspersonal information of user's electronic identity obtained is stored in block with described
When personal information on chain matches, identification record information is generated, and store after the identification record information is encrypted by key
After block chain, comprising:
Identification success message is sent to user;
After the user receives the identification success message, according to user's electronics described in the identification record information update
Identity.
Disclosed herein as well is a kind of identity recognition device based on block chain, described device includes:
Identity information acquisition module: being set as obtaining userspersonal information, generates user according to the userspersonal information
Electronic identity, and block chain is stored in after the userspersonal information is encrypted by key;
Identity information identification module: it is set as when user's electronic identity is identified equipment identification, the identification is set
The standby personal information for obtaining the corresponding userspersonal information of user's electronic identity and being stored on block chain;
Identity information update module: it is set as the corresponding userspersonal information of user's electronic identity and institute obtained
It states and stores in the personal information matching on block chain, generate identification record information, and by the identification record information by close
Block chain is stored in after key encryption.
Disclosed herein as well is a kind of computer equipment, including memory and processor, meter is stored in the memory
Calculation machine readable instruction, when the computer-readable instruction is executed by the processor, so that processor execution is described above
The step of method.
Disclosed herein as well is a kind of storage medium for being stored with computer-readable instruction, the computer-readable instruction quilt
When one or more processors execute, so that the step of one or more processors execute method described above.
The beneficial effect of the application is: the application is by being stored encrypted in block chain for personal information, according to personal information
Electronic identity is generated, and each identification record information is stored encrypted in block chain, according to identification record information update electronics body
Part, thus avoid electronic identity from causing user's property loss due to being tampered or forging.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 2 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 3 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 4 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 5 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 6 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 7 is a kind of flow diagram of personal identification method based on block chain of the embodiment of the present application;
Fig. 8 is a kind of identity recognition device structural schematic diagram based on block chain of the embodiment of the present application.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and
It is not used in restriction the application.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in the description of the present application
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.
A kind of personal identification method process based on block chain of the embodiment of the present application is as described in Figure 1, and the present embodiment includes
Following steps:
Step s101 obtains userspersonal information, generates user's electronic identity according to the userspersonal information, and by institute
It states after userspersonal information is encrypted by key and is stored in block chain;
Specifically, the userspersonal information is directed to the personal relevant information of user, individual's biology including user
Information and personal characteristic information, the personal biological information includes the personal information of some static state, such as name, nationality, household register
Location, identification card number etc., and the personal characteristic information includes some information of user's dynamic generation in daily life, for example disappears
Take record, authentication record and access record etc..
Specifically, the personal information can be implemented by two dimensional code or bar code generating at electronic identity in the present invention
In example, preferably two dimensional code;Wherein, during generating two dimensional code, it can generate one by way of encryption and prevent
Pseudo- two dimensional code, subsequent in this way when identifying to two dimensional code identity, two dimensional code identification equipment also needs to have corresponding anti-
Antiforge system just can be carried out identification, guarantee the safety of information transmission.
Specifically, each user can safeguard public key, private key and key on block chain, wherein key is used for storage
Therefore data progress encryption and decryption on block chain in embodiments of the present invention, generates electronics body when passing through the personal information
After part, it is stored on block chain after being encrypted by key pair personal information.Since key is in user hand, and block chain
What upper current Encryption Algorithm can not substantially be cracked, therefore can guarantee the safety of data, only user oneself or
The personnel of user's authorization are just accessible;The key of the user can be regularly replaced or update, and guarantee the peace of user data
Entirely.
Step s102, when user's electronic identity is identified equipment identification, the identification equipment obtains the user
Personal information electronic identity corresponding userspersonal information and be stored on block chain;
Specifically, user's electronic identity can be scanned equipment identification, such as the barcode scanning equipment of trade company, can also be tested
Demonstrate,prove equipment identification, such as access control system.Such as when user wants to enter certain region, need to safety check Jing Guo access control system, that is, examine use
The identity at family, at this moment user can show the electronic identity on the mobile terminals such as mobile phone or tablet computer, when body in access control system
Part verifying equipment is verified the electronic identity of user, and user is allowed for access.
Specifically, when the identification equipment identifies the electronic identity of user, since usual user passes through mobile phone
Etc. mobile devices show electronic identity, therefore the identification equipment can send public key to mobile devices such as the mobile phones of user,
In the embodiment of the present invention, each equipment can safeguard a pair of of public key and private key after block chain is added, and wherein public key and private key are to match
Pair, after the mobile devices such as the mobile phone of user receive public key, is encrypted according to key of the public key to user, then sent
To the identification equipment, it is possible thereby to which key is avoided to obtain to unauthorized person.But it is also possible to during sending public key
It is obtained by unauthorized person, therefore the enciphering and deciphering algorithm in the embodiment of the present invention is using asymmetric encryption, it can use public key
Encryption, but public key decryptions cannot be used, it is necessary to it is decrypted using with the private key that public key matches, and private key is not sent, only
In local preservation, it is ensured that by the safety of the data of public key encryption.
Specifically, the identification equipment can be to user when user's electronic identity is identified by the identification equipment
Userspersonal information's request is sent, after the user receives userspersonal information request, can be set to the identification
Preparation send the personal information of the user, i.e., available when the identification equipment identifies the electronic identity of user
To the corresponding personal information of electronic identity of user, wherein userspersonal information includes personal biological information and the individual spy of user
Reference breath.
Specifically, after the identification equipment receives user's electronic identity corresponding userspersonal information, the knowledge
Other equipment can send userspersonal information's request to block chain, since the identification equipment has received the electronics of the user
The corresponding personal information of identity, but in order to verify the true and false, it is also necessary to and the personal letter for the user being stored on block chain
Breath is compared, it is therefore desirable to send userspersonal information's request message to block chain, is stored on block chain with obtaining
Userspersonal information.
Specifically, when the identification equipment receive it is close after public key encryption transmitted by the mobile devices such as user mobile phone
After key, the data for containing key are decrypted by private key, correct key is got after decryption, then passes through
The userspersonal information that user described in the key pair is stored on block chain is decrypted;Since the data on block chain can be with
It is set as open or privacy, i.e. the public can consult and can not consult, and the part that the public can consult is not required to any public visit
It authorizes, does not also need key, and the part that can not be consulted is the part by user encryption, only just by the authorization of user
It can be accessed;Wherein, the data that the public can consult and can not consult can not all distort, and difference is that the public can consult
Be it is unclassified, the data that can not be consulted be secrecy.
Specifically, user is found according to the identification card number of the unique sequence numbers of user, such as user on block chain,
It can be when block chain be added in user, as user generates electronic identity and by electronic identity personal information storage in block chain
When, a global unique sequence numbers are distributed, the sequence number and identity card can be different, but need to guarantee uniqueness, just as
IP address in internet is the same, and the sequence number consulting on block chain is ensured that in this way through the sequence number
Find user.
Step s103, when the corresponding userspersonal information of user's electronic identity of acquisition is stored in block chain with described
On personal information matching when, generate identification record information, and by the identification record information by key encryption after be stored in
Block chain.
Specifically, when identification equipment gets the corresponding personal information of user's electronic identity by the equipment of user, and
It, can be to above-mentioned two individual subscriber after the encryption userspersonal information being stored on block chain by key pair is decrypted
Information is compared, since userspersonal information includes personal biological information and personal characteristic information, to individual subscriber life
Object information and personal characteristic information will be compared.
Specifically, because what individual subscriber biological information included is static information, as name, home address, phone with
And nationality etc., it can be obtained by the collection of information, safety is not high;And what individual subscriber characteristic information included is user's dynamic
Information, such as access record, authentication record, such as certain year is in such a month, and on such a day, and user enters certain after somewhere is by authentication
Region, this dynamically recording have randomness, and after carrying out encryption storage, unauthorized person be it is very unobtainable, have very
High safety.
Specifically, if, authentication success, the mobile devices such as mobile phone of user can be according to this when after comparing
Validation task, generate this identification record information, the validation task can be authentication tasks, such as customs, bank,
The window-units such as airport carry out authentication when handling affairs, are also possible to access task, as user enter certain region when into
Capable authentication, the identification record information include this electronic identity verifying time, place, scanning device number and
The information such as the device type of user.
Specifically, after the personal biological information and personal characteristic information of user all matches, illustrating this after by comparing
The authentication of user passes through, then can be stored on block chain after the identification record information encryption to this, this adds
Close is also to be encrypted using identification record information described in key pair, and the identification record information includes that this electronic identity is tested
Time of card, place, scanning device number and user the information such as device type, it is non-per saving a personal characteristic information more
Method personnel are just more difficult to forge electronic identity, and the electronic identity verifying of user is safer.
Specifically, can send identification success message after the verifying identity of user passes through and be moved to mobile phone of user etc.
Dynamic equipment can also send recognition failures message, or do not send message if verifying is unsuccessful.
Specifically, being decrypted to the encryption personal information being stored on block chain, and identification record information is encrypted
After be stored in after block chain, the key that user sends need to be deleted, guarantee that user is stored in the personal letter on block chain
Cease data safety.
Specifically, regenerating one two after the identification record information can merge with existing userspersonal information
Tie up code or bar code electronic identity;In addition, the identification record information also may belong to personal characteristic information, therefore can also be with
Information update is carried out to existing user's electronic identity, updated user's electronic identity includes this identification record information.
When user electronic identity is identified by other identification equipment next time again, what the identification equipment obtained is exactly comprising last time identification
The userspersonal information of record, and these information are difficult to be obtained or forged by unauthorized person.
Specifically, updating for user's electronic identity can be after receiving the identification success message that identification equipment is sent, i.e.,
After the verifying identity of user passes through, identification equipment can send identification success message to the equipment of user, when the equipment of user
After receiving the identification success message, the electronic identity of user can be updated;The update of user's electronic identity can also
To be carried out automatically after identification equipment identifies the electronic identity of user, i.e., when the equipment of user detects identified equipment
When verifying electronic identity, it can store and identify the information such as device number, user device type, this verification time, place, and according to
The update of these identification record information progress electronic identity.
In the present embodiment, by the way that userspersonal information is stored encrypted in block chain, is generated and used according to userspersonal information
Family electronic identity, and each identification record information is stored encrypted in block chain, according to identification record information update electronic identity,
Thus user's electronic identity is avoided to cause user's property loss due to being tampered or forging.
Fig. 2 is a kind of personal identification method flow diagram based on block chain of the embodiment of the present application, as shown, institute
Step s102 is stated, when user's electronic identity is identified equipment identification, the identification equipment obtains user's electronics body
Personal information part corresponding userspersonal information and be stored on block chain, comprising:
Step s201, when user's electronic identity is identified equipment identification, the identification equipment sends to user and uses
Family personal information request;
Specifically, the identification equipment can be to user when user's electronic identity is identified by the identification equipment
Userspersonal information's request is sent, to obtain the corresponding userspersonal information of user's electronic identity.
Step s202 sends the userspersonal information after user receives userspersonal information request
To the identification equipment.
Specifically, can be sent to the identification equipment after user receives userspersonal information request
The personal information of the user, i.e., it is available to arrive user when the identification equipment identifies the electronic identity of user
The corresponding personal information of electronic identity, wherein userspersonal information include user personal biological information and personal characteristics letter
Breath.
In the present embodiment, by sending personal information request to user, it is corresponding that user's electronic identity can be obtained
Personal information, to identify that equipment carries out authentication.
Fig. 3 is a kind of personal identification method flow diagram based on block chain of the embodiment of the present application, as shown, institute
Step s102 is stated, when user's electronic identity is identified equipment identification, the identification equipment obtains user's electronics body
Personal information part corresponding userspersonal information and be stored on block chain, comprising:
Step s301, it is described after the identification equipment receives user's electronic identity corresponding userspersonal information
Identify that equipment sends userspersonal information's request to block chain;
Specifically, after the identification equipment receives user's electronic identity corresponding userspersonal information, the knowledge
Other equipment can send userspersonal information's request to block chain, since the identification equipment has received the electronics of the user
The corresponding personal information of identity, but in order to verify the true and false, it is also necessary to and the personal letter for the user being stored on block chain
Breath is compared, it is therefore desirable to send userspersonal information's request message to block chain, is stored on block chain with obtaining
Userspersonal information.
Step s302 inquires the userspersonal information after block chain receives userspersonal information request,
And the userspersonal information inquired is sent to the identification equipment.
Specifically, after the block chain receives userspersonal information request, it can be on block chain according to user
Unique sequence numbers, such as the identification card number of user finds user, can also be when block chain be added in user, such as user
It generates electronic identity and by electronic identity personal information storage when block chain, distributes a global unique sequence numbers, it should
Sequence number and identity card can be different, but need to guarantee uniqueness, and just as the IP address in internet, the sequence number is in area
Consulting on block chain ensures that find user by the sequence number in this way.
Specifically, after finding the userspersonal information on the block chain, the user that can will inquire
Personal information is sent to the identification equipment.
In the present embodiment, by sending userspersonal information's request to block chain, the userspersonal information is obtained, it can be with
Achieve the purpose that userspersonal information's verifying corresponding with user's electronic identity.
Fig. 4 is a kind of personal identification method flow diagram based on block chain of the embodiment of the present application, as shown, institute
Step s102 is stated, when user's electronic identity is identified equipment identification, the identification equipment obtains user's electronics body
Personal information part corresponding userspersonal information and be stored on block chain, comprising:
Step s401, when user's electronic identity is identified equipment identification, the identification equipment generates public key and private
Key, and the public key and cipher key request information are sent to user;
Specifically, when the identification equipment identifies the electronic identity of user, since usual user passes through mobile phone
Etc. mobile devices show electronic identity, therefore the identification equipment can send public key to mobile devices such as the mobile phones of user,
In the embodiment of the present invention, each equipment can safeguard a pair of of public key and private key after block chain is added, and wherein public key and private key are to match
Pair.
Specifically, cipher key request information can also be sent while the identification equipment sends public key, to request user
Key is sent, the key is for decrypting the userspersonal information being stored on block chain.
The key is passed through the public affairs after user receives the public key and cipher key request information by step s402
The identification equipment is sent to after key encryption;
Specifically, after the mobile devices such as the mobile phone of user receive public key and cipher key request information, it can be according to public key
The key of user is encrypted, the identification equipment is then sent to, it is possible thereby to which key is avoided to obtain to unauthorized person.But
It is to be also possible to be obtained by unauthorized person during sending public key, therefore the enciphering and deciphering algorithm in the embodiment of the present invention uses
Be asymmetric encryption, it can use public key encryption, but cannot use public key decryptions, it is necessary to using and the private key that matches of public key into
Row decryption, and private key is not sent, only in local preservation, it is ensured that by the safety of the data of public key encryption.
Step s403, after the identification equipment receives the key after public key encryption, by the private key to institute
The key after public key encryption is stated to be decrypted.
Specifically, when the identification equipment receive it is close after public key encryption transmitted by the mobile devices such as user mobile phone
After key, the data for containing key are decrypted by private key, correct key is got after decryption, then passes through
The userspersonal information that user described in the key pair is stored on block chain is decrypted;Since the data on block chain can be with
It is set as open or privacy, i.e. the public can consult and can not consult, and the part that the public can consult is not required to any public visit
It authorizes, does not also need key, and the part that can not be consulted is the part by user encryption, only just by the authorization of user
It can be accessed;Wherein, the data that the public can consult and can not consult can not all distort, and difference is that the public can consult
Be it is unclassified, the data that can not be consulted be secrecy.
In the present embodiment, key is obtained by asymmetric encryption, key can be safely and effectively obtained, be deposited with this to decrypt
Store up the userspersonal information on block chain.
Fig. 5 is a kind of personal identification method flow diagram based on block chain of the embodiment of the present application, as shown, institute
Step s403 is stated, after the identification equipment receives the key after public key encryption, by the private key to described through public affairs
After the encrypted key of key is decrypted, comprising:
Step s501 is sent out after the identification equipment is to the key successful decryption after public key encryption to block chain
Userspersonal information is sent to request;
Specifically, when the identification equipment decrypts the key after public key encryption by the private key, and decrypt
After success, userspersonal information's request can be sent to block chain, userspersonal information's request to block chain for requesting
The userspersonal information being stored on block chain described in transmission, the key is for decrypting the individual subscriber being stored on block chain
Information.
Step s502, after the block chain receives userspersonal information request, by the individual subscriber of encryption
Information is sent to the identification equipment;
Specifically, when the block chain receive the userspersonal information request after, can be inquired on block chain described in
The personal information of user, after inquiring the personal information of the user, since the personal information of the user is by encryption
, therefore the userspersonal information of the encryption can be sent to the identification equipment, guarantee the userspersonal information not
It is stolen and distorts.
Step s503 passes through the key pair institute after identification equipment receives the userspersonal information of the encryption
The userspersonal information for stating encryption is decrypted.
Specifically, after the identification equipment receives the userspersonal information of the encryption, it can be according to the key pair
The userspersonal information of the encryption is decrypted.
In the present embodiment, by requesting the userspersonal information not decrypted to block chain, and the user not decrypted is being received
Local decryption is carried out after personal information, guarantees the transmission safety of userspersonal information.
Fig. 6 is a kind of personal identification method flow diagram based on block chain of the embodiment of the present application, as shown, institute
Step s103 is stated, as the corresponding userspersonal information of user's electronic identity and being stored on block chain of acquisition
When people's information matches, identification record information is generated, and be stored in block chain after the identification record information is encrypted by key
Later, comprising:
Step s601, according to user's electronic identity described in the identification record information update;
Specifically, regenerating one two after the identification record information can merge with existing userspersonal information
Tie up code or bar code electronic identity;In addition, the identification record information also may belong to personal characteristic information, therefore can also be with
Information update is carried out to existing user's electronic identity, updated user's electronic identity includes this identification record information.
When user electronic identity is identified by other identification equipment next time again, what the identification equipment obtained is exactly comprising last time identification
The userspersonal information of record, and these information are difficult to be obtained or forged by unauthorized person.
Step s602, when user's electronic identity, which is identified equipment, to be again identified that, the identification equipment is sent out to user
Send userspersonal information and identification record information request.
Specifically, the identification equipment can be to user when user's electronic identity is identified equipment and again identifies that
Userspersonal information and identification record information request are sent, since user's electronic identity has been updated, comprising old
Userspersonal information and identification record information, therefore can be asked respectively by userspersonal information and identification record information request
Ask userspersonal information and identification record information.
In the present embodiment, by requesting userspersonal information and identification record information to user, the peace of verifying can be improved
Quan Xing prevents lawless people spurious information bring from losing.
Fig. 7 is a kind of personal identification method flow diagram based on block chain of the embodiment of the present application, as shown, institute
Step s103 is stated, as the corresponding userspersonal information of user's electronic identity and being stored on block chain of acquisition
When people's information matches, identification record information is generated, and be stored in block chain after the identification record information is encrypted by key
Later, comprising:
Step s701 sends identification success message to user;
Specifically, can send identification success message after the verifying identity of user passes through and be moved to mobile phone of user etc.
Dynamic equipment can also send recognition failures message, or do not send message if verifying is unsuccessful.
Step s702, after the user receives the identification success message, according to the identification record information update institute
State user's electronic identity.
Specifically, updating for user's electronic identity can be after receiving the identification success message that identification equipment is sent, i.e.,
After the verifying identity of user passes through, identification equipment can send identification success message to the equipment of user, when the equipment of user
After receiving the identification success message, the electronic identity of user can be updated;The update of user's electronic identity can also
To be carried out automatically after identification equipment identifies the electronic identity of user, i.e., when the equipment of user detects identified equipment
When verifying electronic identity, it can store and identify the information such as device number, user device type, this verification time, place, and according to
The update of these identification record information progress electronic identity.
It, can be to avoid by updating the electronic identity of the user after in subscriber authentication in the present embodiment
User's electronic identity is updated in the case where authentication failure, is improved efficiency.
A kind of identity recognition device structure based on block chain of the embodiment of the present application is as shown in Figure 8, comprising:
Identity information acquisition module 801, identity information identification module 802 and identity information update module 803;Wherein,
Identity information acquisition module 801 is connected with identity information identification module 802, and identity information identification module 802 and identity information are more
New module 803 is connected;Identity information acquisition module 801 is set as obtaining userspersonal information, according to the userspersonal information
User's electronic identity is generated, and is stored in block chain after the userspersonal information is encrypted by key;Identity information identification
Module 802 is set as when user's electronic identity is identified equipment identification, and the identification equipment obtains user's electronics
Personal information identity corresponding userspersonal information and be stored on block chain;Identity information update module 803 is set as working as
The corresponding userspersonal information of user's electronic identity obtained stores with described when the personal information on block chain matches,
Identification record information is generated, and is stored in block chain after the identification record information is encrypted by key.
The embodiment of the present application also discloses a kind of computer equipment, the computer equipment include memory, processor and
It is stored in the computer-readable instruction that can be run on the memory and on the processor, the computer-readable instruction quilt
The processor makes the processor execute the step in personal identification method described in the various embodiments described above when executing.
The embodiment of the present application also discloses a kind of storage medium for being stored with computer-readable instruction, described computer-readable
When instruction is executed by one or more processors, so that one or more processors execute identification described in above-described embodiment
Step in method.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, which can be stored in a computer-readable storage and be situated between
In matter, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, storage medium above-mentioned can be
The non-volatile memory mediums such as magnetic disk, CD, read-only memory (Read-Only Memory, ROM) or random storage note
Recall body (Random Access Memory, RAM) etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
The limitation to the application the scope of the patents therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the concept of this application, various modifications and improvements can be made, these belong to the guarantor of the application
Protect range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of personal identification method based on block chain, which comprises the following steps:
Userspersonal information is obtained, user's electronic identity is generated according to the userspersonal information, and the individual subscriber is believed
Breath is stored in block chain after encrypting by key;
When user's electronic identity is identified equipment identification, it is corresponding that the identification equipment obtains user's electronic identity
Userspersonal information and the personal information being stored on block chain;
The corresponding userspersonal information of user's electronic identity and the personal information being stored on block chain when acquisition
When matching, identification record information is generated, and be stored in block chain after the identification record information is encrypted by key.
2. the personal identification method as described in claim 1 based on block chain, which is characterized in that described to work as user's electronics
When identity is identified equipment identification, the identification equipment obtains the corresponding userspersonal information of user's electronic identity and storage
Personal information on block chain, comprising:
When user's electronic identity is identified equipment identification, the identification equipment sends userspersonal information to user and asks
It asks;
After the user receives userspersonal information request, the userspersonal information is sent to the identification and is set
It is standby.
3. the personal identification method as described in claim 1 based on block chain, which is characterized in that described to work as user's electronics
When identity is identified equipment identification, the identification equipment obtains the corresponding userspersonal information of user's electronic identity and storage
Personal information on block chain, comprising:
After the identification equipment receives user's electronic identity corresponding userspersonal information, the identification equipment is to block
Chain sends userspersonal information's request;
It after the block chain receives userspersonal information request, inquires the userspersonal information, and will inquire
The userspersonal information is sent to the identification equipment.
4. the personal identification method as described in claim 1 based on block chain, which is characterized in that described to work as user's electronics
When identity is identified equipment identification, the identification equipment obtains the corresponding userspersonal information of user's electronic identity and storage
Personal information on block chain, comprising:
When user's electronic identity is identified equipment identification, the identification equipment generates public key and private key, and sends out to user
Send the public key and cipher key request information;
After the user receives the public key and cipher key request information, by the key by being sent to after the public key encryption
The identification equipment;
After the identification equipment receives the key after public key encryption, by the private key to described after public key encryption
Key be decrypted.
5. the personal identification method as claimed in claim 4 based on block chain, which is characterized in that described to work as the identification equipment
After receiving the key after public key encryption, it is decrypted to the key after public key encryption by the private key
Afterwards, comprising:
After the identification equipment is to the key successful decryption after public key encryption, userspersonal information is sent to block chain
Request;
After the block chain receives userspersonal information request, the userspersonal information of encryption is sent to described
Identify equipment;
After the identification equipment receives the userspersonal information of the encryption, pass through the user of encryption described in the key pair
People's information is decrypted.
6. the personal identification method as described in claim 1 based on block chain, which is characterized in that described when the use obtained
Electronic identity corresponding userspersonal information in family stores with described when the personal information on block chain matches, and generates identification record
Information, and be stored in after block chain after the identification record information is encrypted by key, comprising:
According to user's electronic identity described in the identification record information update;
When user's electronic identity, which is identified equipment, to be again identified that, the identification equipment sends userspersonal information to user
And identification record information request.
7. the personal identification method as described in claim 1 based on block chain, which is characterized in that described when the use obtained
Electronic identity corresponding userspersonal information in family stores with described when the personal information on block chain matches, and generates identification record
Information, and be stored in after block chain after the identification record information is encrypted by key, comprising:
Identification success message is sent to user;
After the user receives the identification success message, according to user's electronics body described in the identification record information update
Part.
8. a kind of identity recognition device based on block chain, which is characterized in that described device includes:
Identity information acquisition module: being set as obtaining userspersonal information, generates user's electronics according to the userspersonal information
Identity, and block chain is stored in after the userspersonal information is encrypted by key;
Identity information identification module: it is set as when user's electronic identity is identified equipment identification, the identification equipment obtains
The personal information for taking the corresponding userspersonal information of user's electronic identity and being stored on block chain;
Identity information update module: it is set as depositing as the corresponding userspersonal information of user's electronic identity obtained with described
It stores up in the personal information matching on block chain, generates identification record information, and the identification record information is added by key
Block chain is stored in after close.
9. a kind of computer equipment, including memory and processor, it is stored with computer-readable instruction in the memory, it is described
When computer-readable instruction is executed by the processor, so that the processor executes such as any one of claims 1 to 7 right
It is required that the step of the method.
10. a kind of storage medium for being stored with computer-readable instruction, the computer-readable instruction is handled by one or more
When device executes, so that one or more processors execute the step such as any one of claims 1 to 7 claim the method
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811533089.2A CN109493058A (en) | 2018-12-14 | 2018-12-14 | A kind of personal identification method and relevant device based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811533089.2A CN109493058A (en) | 2018-12-14 | 2018-12-14 | A kind of personal identification method and relevant device based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109493058A true CN109493058A (en) | 2019-03-19 |
Family
ID=65710291
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811533089.2A Pending CN109493058A (en) | 2018-12-14 | 2018-12-14 | A kind of personal identification method and relevant device based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109493058A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109862041A (en) * | 2019-03-27 | 2019-06-07 | 深圳市网心科技有限公司 | A kind of digital identification authentication method, unit, system and storage medium |
CN110336832A (en) * | 2019-07-24 | 2019-10-15 | 深圳传音控股股份有限公司 | A kind of information encryption and decryption method, device, terminal and storage medium |
CN111143474A (en) * | 2019-12-31 | 2020-05-12 | 浙江工业大学 | One-key mobile phone number binding changing method based on block chain technology |
CN111371808A (en) * | 2020-03-26 | 2020-07-03 | 国金公用通链(海南)信息科技有限公司 | Universal block chain identity recognition technology |
CN111914231A (en) * | 2020-07-23 | 2020-11-10 | 中国联合网络通信集团有限公司 | Block chain-based identity authentication method, system, equipment and storage medium |
CN112287393A (en) * | 2020-11-24 | 2021-01-29 | 国网新疆电力有限公司信息通信公司 | Credible identity authentication method and device based on Internet of things and block chain |
CN112308060A (en) * | 2020-11-20 | 2021-02-02 | 上海技术交易所有限公司 | Identity certificate generation and identification method, system, computer equipment and storage medium |
CN112328997A (en) * | 2020-11-26 | 2021-02-05 | 安徽继远软件有限公司 | Credible identity recognition method and system based on block chain |
CN112615891A (en) * | 2019-09-18 | 2021-04-06 | 华为技术有限公司 | Pairing method and device |
CN112801253A (en) * | 2021-01-14 | 2021-05-14 | 山大地纬软件股份有限公司 | Multi-scene one-code communication control method and platform based on block chain |
JP2022525211A (en) * | 2019-03-20 | 2022-05-11 | キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー | Use of non-contact cards to securely share personal data stored on the blockchain |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200427284A (en) * | 2003-05-23 | 2004-12-01 | Hsiang-Tsung Kung | Personal authentication device and system and method thereof |
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CA2931469A1 (en) * | 2016-03-27 | 2017-09-27 | Sal Khan | Portable verifiable credentials and methods thereof |
CN107257340A (en) * | 2017-06-19 | 2017-10-17 | 阿里巴巴集团控股有限公司 | A kind of authentication method, authentication data processing method and equipment based on block chain |
WO2017215504A1 (en) * | 2016-06-12 | 2017-12-21 | 杨鹏 | Identity recognition and social information recording method and system based on biological information |
US20170366348A1 (en) * | 2016-06-17 | 2017-12-21 | Capital One Services, Llc | Blockchain systems and methods for user authentication |
CN107786547A (en) * | 2017-09-30 | 2018-03-09 | 厦门快商通信息技术有限公司 | A kind of auth method based on block chain, device and computer-readable recording medium |
WO2018046009A1 (en) * | 2016-09-12 | 2018-03-15 | 上海鼎利信息科技有限公司 | Block chain identity system |
CN108512660A (en) * | 2018-03-28 | 2018-09-07 | 湖南东方华龙信息科技有限公司 | The verification method of virtual card |
CN108564353A (en) * | 2018-04-27 | 2018-09-21 | 数字乾元科技有限公司 | Payment system based on block chain and method |
CN108769057A (en) * | 2018-06-15 | 2018-11-06 | 北京奇虎科技有限公司 | Personal identification method based on block chain and device |
-
2018
- 2018-12-14 CN CN201811533089.2A patent/CN109493058A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200427284A (en) * | 2003-05-23 | 2004-12-01 | Hsiang-Tsung Kung | Personal authentication device and system and method thereof |
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CA2931469A1 (en) * | 2016-03-27 | 2017-09-27 | Sal Khan | Portable verifiable credentials and methods thereof |
WO2017215504A1 (en) * | 2016-06-12 | 2017-12-21 | 杨鹏 | Identity recognition and social information recording method and system based on biological information |
US20170366348A1 (en) * | 2016-06-17 | 2017-12-21 | Capital One Services, Llc | Blockchain systems and methods for user authentication |
WO2018046009A1 (en) * | 2016-09-12 | 2018-03-15 | 上海鼎利信息科技有限公司 | Block chain identity system |
CN107257340A (en) * | 2017-06-19 | 2017-10-17 | 阿里巴巴集团控股有限公司 | A kind of authentication method, authentication data processing method and equipment based on block chain |
CN107786547A (en) * | 2017-09-30 | 2018-03-09 | 厦门快商通信息技术有限公司 | A kind of auth method based on block chain, device and computer-readable recording medium |
CN108512660A (en) * | 2018-03-28 | 2018-09-07 | 湖南东方华龙信息科技有限公司 | The verification method of virtual card |
CN108564353A (en) * | 2018-04-27 | 2018-09-21 | 数字乾元科技有限公司 | Payment system based on block chain and method |
CN108769057A (en) * | 2018-06-15 | 2018-11-06 | 北京奇虎科技有限公司 | Personal identification method based on block chain and device |
Non-Patent Citations (1)
Title |
---|
宋宪荣;张猛;: "网络可信身份认证技术问题研究", 网络空间安全, no. 03 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2022525211A (en) * | 2019-03-20 | 2022-05-11 | キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー | Use of non-contact cards to securely share personal data stored on the blockchain |
JP7230235B2 (en) | 2019-03-20 | 2023-02-28 | キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー | Using Contactless Cards to Securely Share Personal Data Stored on Blockchain |
CN109862041A (en) * | 2019-03-27 | 2019-06-07 | 深圳市网心科技有限公司 | A kind of digital identification authentication method, unit, system and storage medium |
CN109862041B (en) * | 2019-03-27 | 2021-06-15 | 深圳市网心科技有限公司 | Digital identity authentication method, equipment, device, system and storage medium |
CN110336832A (en) * | 2019-07-24 | 2019-10-15 | 深圳传音控股股份有限公司 | A kind of information encryption and decryption method, device, terminal and storage medium |
CN110336832B (en) * | 2019-07-24 | 2023-11-03 | 深圳传音控股股份有限公司 | Information encryption and decryption methods, devices and terminals |
CN112615891A (en) * | 2019-09-18 | 2021-04-06 | 华为技术有限公司 | Pairing method and device |
CN111143474A (en) * | 2019-12-31 | 2020-05-12 | 浙江工业大学 | One-key mobile phone number binding changing method based on block chain technology |
CN111143474B (en) * | 2019-12-31 | 2022-07-19 | 浙江工业大学 | One-key binding changing method for mobile phone number based on block chain technology |
CN111371808A (en) * | 2020-03-26 | 2020-07-03 | 国金公用通链(海南)信息科技有限公司 | Universal block chain identity recognition technology |
CN111914231A (en) * | 2020-07-23 | 2020-11-10 | 中国联合网络通信集团有限公司 | Block chain-based identity authentication method, system, equipment and storage medium |
CN112308060A (en) * | 2020-11-20 | 2021-02-02 | 上海技术交易所有限公司 | Identity certificate generation and identification method, system, computer equipment and storage medium |
CN112287393A (en) * | 2020-11-24 | 2021-01-29 | 国网新疆电力有限公司信息通信公司 | Credible identity authentication method and device based on Internet of things and block chain |
CN112328997A (en) * | 2020-11-26 | 2021-02-05 | 安徽继远软件有限公司 | Credible identity recognition method and system based on block chain |
CN112801253A (en) * | 2021-01-14 | 2021-05-14 | 山大地纬软件股份有限公司 | Multi-scene one-code communication control method and platform based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109493058A (en) | A kind of personal identification method and relevant device based on block chain | |
EP3556069B1 (en) | System and method for securely processing an electronic identity | |
US11824991B2 (en) | Securing transactions with a blockchain network | |
EP2731040A1 (en) | Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method | |
CN102123143B (en) | Method for storing data in network safely | |
CN101529791A (en) | A method and apparatus to provide authentication and privacy with low complexity devices | |
US8694801B2 (en) | Method and computer program for securely storing data | |
JP2009510644A (en) | Method and configuration for secure authentication | |
CN101401341A (en) | Secure data parser method and system | |
JPWO2003069489A1 (en) | Identification method | |
US20140258718A1 (en) | Method and system for secure transmission of biometric data | |
CN110290134A (en) | A kind of identity identifying method, device, storage medium and processor | |
US20230259899A1 (en) | Method, participant unit, transaction register and payment system for managing transaction data sets | |
CN106992851A (en) | TrustZone-based database file password encryption and decryption method and device and terminal equipment | |
CN109492424A (en) | Data assets management method, data assets managing device and computer-readable medium | |
Hamed et al. | Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption. | |
Goel et al. | LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks | |
CN102752112A (en) | Authority control method and device based on signed message 1 (SM1)/SM2 algorithm | |
CN106789963A (en) | Asymmetric whitepack cipher encrypting method and device and equipment | |
CN107733936A (en) | A kind of encryption method of mobile data | |
Kuppuswamy et al. | Preventing and securing data from cyber crime using new authentication method based on block cipher scheme | |
CN115694921B (en) | Data storage method, device and medium | |
KR20030097550A (en) | Authorization Key Escrow Service System and Method | |
CN109660490A (en) | Data processing method, device, system and storage medium | |
Rizvi et al. | Protecting financial transactions through networks and point of sales |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |