CN109522698A - User authen method and terminal device based on block chain - Google Patents

User authen method and terminal device based on block chain Download PDF

Info

Publication number
CN109522698A
CN109522698A CN201811182177.2A CN201811182177A CN109522698A CN 109522698 A CN109522698 A CN 109522698A CN 201811182177 A CN201811182177 A CN 201811182177A CN 109522698 A CN109522698 A CN 109522698A
Authority
CN
China
Prior art keywords
user
identity information
cryptographic hash
information
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811182177.2A
Other languages
Chinese (zh)
Inventor
吴超勇
陈仕财
陈亚殊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811182177.2A priority Critical patent/CN109522698A/en
Priority to PCT/CN2018/124343 priority patent/WO2020073513A1/en
Publication of CN109522698A publication Critical patent/CN109522698A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention is suitable for computer application technology, provide a kind of user authen method based on block chain, terminal device and computer readable storage medium, it include: that user certificate is generated by the identity information previously according to user, and unique corresponding public private key pair is generated using rivest, shamir, adelman, Hash operation is carried out to user certificate by private key and obtains data of endorsing, user is obtained in the data of endorsing for logging in the chain equipment in block catenary system, and solution label are carried out to the data of endorsing by the corresponding public key of chain equipment and obtain cryptographic Hash, the cryptographic Hash that solution label obtain is compared with preset cryptographic Hash, whether the identity information for verifying the user is correct, it ensure that the privacy of the identity information of user, also improve the safety of equipment.

Description

User authen method and terminal device based on block chain
Technical field
The invention belongs to computer application technology more particularly to a kind of user authen methods based on block chain, end End equipment and computer readable storage medium.
Background technique
As science and technology is constantly progressive, the mode of intelligence transmission is also constantly upgrading, and the transfer mode of value also synchronizes to obtain Development.From telegram, phone, then internet is arrived, people enter the information age comprehensively.Internet realizes entire communication network The efficient transmitting of information, but lack the inherent mechanism of effective protection information security, people can not also transmit point-to-pointly With seised information, copy, the cost propagated or even distort an information are almost nil on network.A little traditional industries because This is by great impact, although national governments continue to increase network information copyright protection dynamics, is still difficult to from technology layer On the problem of preventing information security and data safety.
Landing approach in the prior art is commonly username and password and logs in, and this landing approach faces many potential Risk, such as: password is stolen, password is kidnapped, password multimachine device uses the safety problems such as easily detected, weak password is easily attacked.
Summary of the invention
In view of this, the embodiment of the invention provides it is a kind of by the user authen method of block chain, terminal device and based on Calculation machine readable storage medium storing program for executing, the safety to solve the problems, such as login mode in the prior art are lower.
The first aspect of the embodiment of the present invention provides a kind of user authen method based on block chain, comprising:
Obtain the data of endorsing that user generates when logging in the chain equipment in block catenary system;The data of endorsing are by adopting The cryptographic Hash of the identity information of the user is encrypted to obtain with the chain equipment corresponding private key;
The cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The cryptographic Hash prestored is based on the chain and sets Standby corresponding preset identity information obtains;
Solution label are carried out using endorse data of the public key to the acquisition, the identity information for obtaining the user is corresponding Cryptographic Hash, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user;
If the corresponding cryptographic Hash verification of the identity information of the user passes through, authorizes the user to log in the chain and set It is standby.
The second aspect of the embodiment of the present invention provides a kind of terminal device, including memory, processor and is stored in In the memory and the computer program that can run on the processor, when the processor executes the computer program It performs the steps of
Obtain the data of endorsing that user generates when logging in the chain equipment in block catenary system;The data of endorsing are by adopting The cryptographic Hash of the identity information of the user is encrypted to obtain with the chain equipment corresponding private key;
The cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The cryptographic Hash prestored is based on the chain and sets Standby corresponding preset identity information obtains;
Solution label are carried out using endorse data of the public key to the acquisition, the identity information for obtaining the user is corresponding Cryptographic Hash, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user;
If the corresponding cryptographic Hash verification of the identity information of the user passes through, authorizes the user to log in the chain and set It is standby.
The third aspect of the embodiment of the present invention provides a kind of terminal device, comprising:
First acquisition unit, the data of endorsing generated for obtaining user when logging in the chain equipment in block catenary system; The data of endorsing encrypt the cryptographic Hash of the identity information of the user by using the corresponding private key of the chain equipment It obtains;
Second acquisition unit, the cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;It is described to prestore Cryptographic Hash is obtained based on the corresponding preset identity information of the chain equipment;
Data processing unit obtains the use for carrying out solution label to the data of endorsing of the acquisition using the public key The corresponding cryptographic Hash of the identity information at family, and the cryptographic Hash prestored described in use verifies the corresponding Kazakhstan of identity information of the user Uncommon value;
Information checking unit, if the corresponding cryptographic Hash verification of identity information for the user passes through, described in authorization User logs in the chain equipment.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer storage medium It is stored with computer program, the computer program includes program instruction, and described program instruction makes institute when being executed by a processor State the method that processor executes above-mentioned first aspect.
Existing beneficial effect is the embodiment of the present invention compared with prior art:
The embodiment of the present invention generates user certificate by the identity information previously according to user, and is calculated using asymmetric encryption Method generates unique corresponding public private key pair, carries out Hash operation to user certificate by private key and obtains data of endorsing, obtains user The data of endorsing are carried out in the data of endorsing for logging in the chain equipment in block catenary system, and by the corresponding public key of chain equipment Solution label obtain cryptographic Hash, and the cryptographic Hash that solution label obtain is compared with preset cryptographic Hash, verifies the identity information of the user It is whether correct, it ensure that the privacy of the identity information of user, also improve the safety of equipment.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the flow chart for the user authen method based on block chain that the embodiment of the present invention one provides;
Fig. 2 is the flow chart of the user authen method provided by Embodiment 2 of the present invention based on block chain;
Fig. 3 is the schematic diagram for the terminal device that the embodiment of the present invention three provides;
Fig. 4 is the schematic diagram for the terminal device that the embodiment of the present invention four provides.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
It is the flow chart for the user authen method based on block chain that the embodiment of the present invention one provides referring to Fig. 1, Fig. 1.This The executing subject of user authen method based on block chain in embodiment is terminal.Terminal includes but is not limited to smart phone, puts down The mobile terminals such as plate computer, wearable device can also be desktop computer etc..User authentication based on block chain as shown in the figure Method may comprise steps of:
S101: the data of endorsing that user inputs when logging in the chain equipment in block catenary system are obtained;The data of endorsing The cryptographic Hash of the identity information of the user is encrypted to obtain by using the chain equipment corresponding private key.
As science and technology is constantly progressive, the mode of intelligence transmission is also constantly upgrading, and the transfer mode of value also synchronizes to obtain Development.From telegram, phone, then internet is arrived, people enter the information age comprehensively.Internet realizes entire communication network The efficient transmitting of information, but lack the inherent mechanism of effective protection information security, people can not also transmit point-to-pointly With seised information, copy, the cost propagated or even distort an information are almost nil on network.A little traditional industries because This is by great impact, although national governments continue to increase network information copyright protection dynamics, is still difficult to from technology layer On the problem of preventing information security and data safety.Landing approach in the prior art is commonly username and password and logs in, this Kind landing approach faces many potential risks, such as: password is stolen, password is kidnapped, password multimachine device uses and is easily detected, is weak Password such as is easily attacked at the safety problems.
In the present embodiment, user has just known the data of endorsing of oneself before Login chain equipment.Data of endorsing are According to the identity information of user, carries out Hash operation and asymmetric encryption obtains.Wherein, the identity information of user can be user The information such as ID number, ID card No. or biological characteristic are inputted, can be one such, is also possible to much information synthesis and exists Together.Further, the identity information of the user in the present embodiment can be divided into living things feature recognition and behavioural characteristic identification two Kind.Biological characteristic can include but is not limited to fingerprint recognition, iris, palm line, face etc.;Behavioural characteristic may include but unlimited Identification in terms of speech recognition, signature and keyboard hammer action.
When obtaining endorsing data, the identity information of user is first obtained, according to the identity information of user and preset certificate Format obtains user certificate, generates the cryptographic Hash of the user certificate, and by the private key of the user to the cryptographic Hash of user certificate It is encrypted, obtains data of endorsing, which is that user oneself is exclusive, not known to other people.
By carrying out Hash operation with the exclusive identity information of user in advance, unique cryptographic Hash of user information is obtained, is used The user information of the user information of active user and other users is distinguished in expression.Hash operation is the data random length It is compressed into the string of regular length.Hash function in the present embodiment can use (the Secure Hash of secure hash algorithm 1 Algorithm 1, SHA-1) or Message Digest Algorithm 5 (Message Digest AlgorithmMD5, MD5) etc., It can also be using other Hash operation methods herein without limitation.
After obtaining cryptographic Hash by Hash operation, which is added by the corresponding private key of chain equipment It is close.Wherein the corresponding private key of chain equipment is the private key of the prespecified user of the chain equipment, and the mode of encryption can be symmetrical add Close mode is also possible to the mode of asymmetric encryption, herein without limitation.Symmetric encipherment algorithm is used in encryption and decryption Be the same code key;And rivest, shamir, adelman needs two keys to be encrypted and decrypted, the two code keys are private keys And private key.Public key and private key are a pair, if encrypted with public key to data, could only be decrypted with corresponding private key;Such as Fruit encrypts data with private key, then could only be decrypted with corresponding public key.Because encryption and decryption use two A different key.For asymmetric encryption compared with symmetric cryptography, safety is more preferable: the communicating pair of symmetric cryptography uses identical Code key, if the code key of a side is revealed, entire communication will be cracked.And asymmetric encryption uses a pair of of code key, One is used to encrypt, and one is used to decrypt, and public key be it is disclosed, code key is that oneself is saved, and is not needed as symmetric cryptography First to synchronize code key before a communication like that.Rivest, shamir, adelman can be Elgamal, knapsack algorithm, elliptic curve cryptography Algorithm etc., herein without limitation.
It should be noted that in the present embodiment, chain equipment can correspond to a user, can also correspond to and multiple use Family uses.When being used by multiple users there are chain equipment, by identifying that the user information of the user determines its corresponding public key, It is verified with the identity information to the user.
S102: the cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The cryptographic Hash prestored is based on institute The corresponding preset identity information of chain equipment is stated to obtain.
In the present embodiment, each chain equipment has its corresponding user, user by input oneself endorse data into Row certification and login.Therefore, each chain equipment in the present embodiment has its corresponding public key, for recognizing user information Card.Wherein, which can be stored in chain equipment, can be stored in the database of server, herein without limitation. The identity information of user can be the certificate information of user, biological information of user etc..
It when calculating the cryptographic Hash of the chain equipment, is breathed out by the identity information based on the corresponding threshold value of chain equipment What uncommon operation obtained.In the present embodiment, each chain equipment has its corresponding using user, the identity information of the user i.e. with The chain equipment is corresponding, therefore, carries out Hash operation to the identity information of the user and obtains cryptographic Hash, and by the cryptographic Hash store to In corresponding chain equipment, attempted to log on to this by the cryptographic Hash that this is prestored when thering is user to log in the chain equipment The user identity of the user of chain equipment is verified.
S103: solution label are carried out to the data of endorsing of the acquisition using the public key, obtain the identity information of the user Corresponding cryptographic Hash, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user.
Getting data of endorsing, corresponding public key of chain equipment that user generates when logging in the chain equipment in block chain And after the cryptographic Hash that prestores of the chain equipment, solution label is carried out to data of endorsing by the public key, obtain the body of the login user The corresponding cryptographic Hash of part information.Specifically, adding when data of endorsing carry out solution label according in the cryptographic Hash to identity information Encryption method when close, is decrypted by public key, obtains the corresponding cryptographic Hash of identity information of the user.
In practical applications, the signature of party A-subscriber only has the public key of party A-subscriber that could solve label, and such chain equipment just can confirm that this A identity information is strictly what party A-subscriber sent.Therefore, in the present embodiment, by the way that the cryptographic Hash and preset Kazakhstan that label obtain will be solved Uncommon value compares, and whether the identity information for verifying the user is correct.
S104: it if the corresponding cryptographic Hash verification of the identity information of the user passes through, authorizes described in user's login Chain equipment.
After the corresponding cryptographic Hash of identity information using the cryptographic Hash prestored verification user, if the Hash that solution label obtain Value is identical as preset cryptographic Hash, then illustrates that the user information currently logged in is correct, which is corresponding with the chain equipment Correct user then authorizes the user to log in the chain equipment.
If the cryptographic Hash that solution label obtain is different from preset cryptographic Hash, illustrate that the user information currently logged in is wrong, it can It can be that user endorses the input error of information, the notice that re-enter information can be sent to chain equipment in this case;If working as The user information of preceding login is wrong, then may be that there are malicious users to log in the chain equipment, in such case then to chain equipment Warning message is sent, prevents user from making the operation for damaging equipment or whole system.
Above scheme, the data of endorsing generated by obtaining user when logging in the chain equipment in block catenary system;It obtains The cryptographic Hash chain equipment corresponding public key and prestored;It is corresponding preset that the cryptographic Hash prestored is based on the chain equipment Identity information obtain;Solution label are carried out using endorse data of the public key to the acquisition, obtain the identity letter of the user Corresponding cryptographic Hash is ceased, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user;If institute The corresponding cryptographic Hash verification of identity information for stating user passes through, then the user is authorized to log in the chain equipment.It is used by obtaining Family log in block catenary system in chain equipment data of endorsing, and by the corresponding public key of chain equipment to this endorse data into Row solution label obtain cryptographic Hash, and the cryptographic Hash that solution label obtain is compared with preset cryptographic Hash, verify the identity letter of the user Whether breath is correct, ensure that user login information is not stolen or distorts, also improves the safety of equipment.
Referring to fig. 2, Fig. 2 is the flow chart of the user authen method provided by Embodiment 2 of the present invention based on block chain.This The executing subject of user authen method based on block chain in embodiment is terminal.Terminal includes but is not limited to smart phone, puts down The mobile terminals such as plate computer, wearable device can also be desktop computer etc..User authentication based on block chain as shown in the figure Method may comprise steps of:
S201: the identity information of registration user is obtained, and user certificate is generated according to the identity information of the registration user.
Before user logs in the various chain equipment of block catenary system, need first to obtain some information of user, to this The user information inputted when user logs in is verified.In the present embodiment, the user information of user can be first obtained, And registered, to realize that the user information of user is filed.
Specifically, the step S201 in the present embodiment can specifically include step S2011~S2012:
S2011: the identity information of user is obtained;The identity information include but is not limited to one of following information or At least two combination: user account, identification card number or biological characteristic.
The identity information of user can include but is not limited in the present embodiment: user account, identification card number or biology are special Sign.Wherein biological characteristic can include but is not limited to the intrinsic physiological characteristic or behavioural characteristic of human body, for example, fingerprint, iris, Face phase, gait, keystroke habit etc..It should be noted that the subscriber identity information obtained in the present embodiment may include the above letter Breath one of, in order to guarantee the comprehensive of user information and can not tamper, at least two be also possible in information above The combination of information.
In practical applications, biological identification technology carries out a kind of technology of authentication using human body biological characteristics.More A bit, biometrics identification technology is exactly to pass through computer and optics, acoustics, biosensor and biostatistics principle etc. to body High-tech means is intimately associated, and the identification of personal identification is carried out using the intrinsic physiological property of human body and behavioural characteristic.Biology Identifying system is sampled to biological characteristic, is extracted its unique feature and is converted to digital code, and further by this Feature templates made of a little code combinations.When people carry out authentication with identifying system interaction, identifying system obtains its feature And with data can in feature templates be compared, to determine whether to match, thus determine accept or reject the people.Biological characteristic The biological characteristic of including but not limited to bio-identification has hand shape, fingerprint, the shape of face, iris, retina, pulse, auricle etc., and behavior is special Sign has signature, sound, keystroke dynamics etc..Wherein, individual iris structure is unique, does not have heredity, even making same ovum Twins' iris is also different, and from after childhood, just no longer changes substantially, so that it is highly suitable to be applied for biological knowledge Not.There is statistics to show up to the present, the error rate of iris recognition is minimum in various living things feature recognitions.
2012: the identity information is audited, if audit passes through, is based on block chain distribution account book technology, it will The identity information inputs in preset certification hierarchy, obtains the user certificate.
After getting the identity information of user, which is audited.The content wherein audited include but Be not limited to: whether the format of the identity information meets preset data format, whether the data integrity of the identity information reaches Whether the data newness degree in preset integrity demands, the identity information meets preset data generation time interval.
Illustratively, when obtaining identity information of the ID Card Image as user, need to audit the effective of the identity card Whether the date is qualified;When obtaining the finger print information of user, it is whether complete etc. to need to audit accessed finger print information.
Further, step S201 can also include:
The identity information of user is obtained, and verifies the identity information whether within preset term of validity;
If the identity information generates user certificate within the term of validity, according to the identity information;
If the identity information obtains the new identity information of user not within the term of validity, and according to described New identity information generates new user certificate, and the user certificate before replacement.
Specifically, in practical applications, if some identity information is used for a long time, then being easy to distort, Bu Nengbao The safety of identity information is demonstrate,proved, therefore, a term of validity is set in the present embodiment, if the time that the identity information uses reaches It when the term of validity, then needs to obtain new identity information to replace old identity information, guarantees the safety and private of identity information Close property.
After the identity information got is qualified, according to preset certification hierarchy, which is inputted into the certificate In structure, user certificate is obtained.
Illustratively, user certificate can be obtained according to the identity information of the predefined structure typing of X.509 certificate. It X.509 is the digital certificate standard formulated by International Telecommunication Union.In X.509 system, e-business certification authorized organization The certificate that (Certificate Authority, CA) is signed and issued according to management X.500, be bundled with one it is unique screen name, can be with Comprising multiple fields and value, alias can also be supported.One trusted root certificate of tissue can be distributed in need use and be The employee of system is on hand.Major browsers can install a part of root certificate in advance, these root certificates are all trusted certificate verifications Mechanism CA, in this way their certificates for issuing, browser can directly trust.Although user can delete or disable these roots Certificate, but in fact, user seldom does so.In newest Microsoft platform, or even the root disposed in advance can be removed in user After certificate, when user visits again these deleted root certificate websites, these root certificates can be restored to trust automatically In list.
S202: unique key pair is generated using rivest, shamir, adelman;The key pair includes public key and private key, described Private key and the public key uniquely correspond to.
The software or hardware module of realization asymmetric cryptographic functions generally all have the generation and protective capability of private key.? In the case where having the encryption safes hardware such as smart card, the generation and protection of private key can be inside these hardware.Private key and safety When hardware binding, user is readily appreciated that and implements the management requirement to these security credences in kind for having private key.Do not having When external secure hardware, encryption software packet utilizes the resource of local computing platform, generates key pair and protection private key.This file Form stores private key, will receive the threat of the malicious code on computer, requirement of the safety to user is relatively high.
Symmetric encipherment algorithm itself does not constrain the value of key, although we can avoid intentionally it is some too regular close Key value.Different from symmetric key, rivest, shamir, adelman cannot use any Bit String as key.Used in asymmetric encryption Key is the especially big number for meeting algorithm principle requirement.For example, the key of RSA Algorithm is from two big prime numbers.It is asymmetric Private key does not have key to exchange and distribute, and asymmetric privacy keys should only generate in the safely controllable environment of expected private key holder. Since without shared with any other people, asymmetric privacy keys are easier to manage.In this way, we can establish the non-right of a safety Claim encryption system, in this system, the only owner of private key can be decrypted and sign operation to expected content.
Illustratively, RSA (Ron Rivest, Adi Shamir, Leonard Adleman) algorithm is to obtain earliest extensively The rivest, shamir, adelman used, difficulty of the RSA Algorithm based on the product for decomposing Big prime.Newer rivest, shamir, adelman It is ECC, ECC is based on dispersed accumulation.It can be consumed with less computing resource reaches and the comparable safety of RSA.This In embodiment, unique public private key pair is generated by rivest, shamir, adelman, wherein private key and public key uniquely correspond to, and private key is used It signs in the identity information to user, public key is for carrying out solution label to signed data.
S203: Hash operation is carried out to the user certificate by the private key and obtains data of endorsing.
Hash operation can be mapped to the input of random length the output of regular length, i.e. hashed value.In the present embodiment In order to realize the digital signature to long file, hash function operation first is carried out to message, then the cryptographic Hash of message is signed Name rather than sign to origination message.Hash function has the characteristics that one-way, anti-collision.
Digital signature, signer handle message, generate the number of segment word string that others can not forge, this number of segment word string It is simultaneously also the valid certificates that message authenticity is sent to the signer of message.Utilize digital signature technology, it can be ensured that The authentication of the integrality, sender of message transmission prevents the denial in transaction from occurring.System is logged in the equipment of the present embodiment It, can be by the way of asymmetric encryption in system.Private key for user in equipment login system, for possessing for the current chain equipment Person, owner must use private key to sign to transaction message, to prove that the publisher of message is all of corresponding chain device address Person.If user cannot give information signature without private key.Public key is used to generate the chain device address of user.
Illustratively, the public key of user is the random number for generating 65 bytes by elliptic curve by private key, using Hash operation generates main information of the eap-message digest of 20 byte lengths as chain device address, then believes in front plus version number Breath adds the address check code of 4 bytes at end, and address check code is obtained by carrying out Hash operation twice to abstract result It arrives, takes preceding four generations of cryptographic Hash, finally version information, main information and address check are piled up and turned at one piece by character Character string easy to identify is changed to as chain device address.Private key is mostly important in block catenary system, once losing, that is, represents this The property of corresponding public key address is also lost together.By utilizing digital signature, block chain equipment login system ensure that message Integrality and non repudiation are that user can be in the secure log system.
S204: the data of endorsing that user generates when logging in the chain equipment in block catenary system are obtained;The data of endorsing The cryptographic Hash of the identity information of the user is encrypted to obtain by using the chain equipment corresponding private key.
The implementation of S101 is identical in S204 embodiment corresponding with Fig. 1 in the present embodiment, specifically refers to The associated description of S101 in the corresponding embodiment of Fig. 1, details are not described herein.
S205: the cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The cryptographic Hash prestored is based on institute The corresponding preset identity information of chain equipment is stated to obtain.
The implementation of S102 is identical in S205 embodiment corresponding with Fig. 1 in the present embodiment, specifically refers to The associated description of S102 in the corresponding embodiment of Fig. 1, details are not described herein.
S206: solution label are carried out to the data of endorsing of the acquisition using the public key, obtain the identity information of the user Corresponding cryptographic Hash, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user.
The implementation of S103 is identical in S206 embodiment corresponding with Fig. 1 in the present embodiment, specifically refers to The associated description of S103 in the corresponding embodiment of Fig. 1, details are not described herein.
S207: it if the corresponding cryptographic Hash verification of the identity information of the user passes through, authorizes described in user's login Chain equipment.
The implementation of S104 is identical in S207 embodiment corresponding with Fig. 1 in the present embodiment, specifically refers to The associated description of S104 in the corresponding embodiment of Fig. 1, details are not described herein.
Further, after step S207, can also include:
Receive the chain equipment transmission logins successfully information;The user logined successfully in information including the user Information;
User right information corresponding with the user information is searched from preset rights database according to user information;
The user right information is sent to chain equipment all in preset device systems;The user right information The operating right of the user is set for the chain equipment.
Specifically, there are many chain equipment, these equipment have respectively in the preset network system based on block chain From corresponding user, and each user has the permission of oneself.Each chain equipment in system is all in accordance with its corresponding user Permission operation, meanwhile, all chain equipment can also get the working method and operational data of other chain equipment.But still So inevitably there are some chain equipment can cross the operation permission of itself.In this case, server reception chain is set After what preparation was sent logins successfully information, according to the user information logined successfully in information, looked into from preset rights database User right corresponding with the user information is looked for, and the user right is sent to the chain equipment, by controlling the chain equipment Operation permission.
Further, user right can also be sent to all chain equipment, with chain equipment all in notice system The authority information of the chain equipment makes other chain equipment that can exercise supervision to the operation of the chain equipment, in this way, can guarantee be Each chain equipment in system can normal, safety operation.
Above scheme generates user certificate by the identity information previously according to user, and uses rivest, shamir, adelman Unique corresponding public private key pair is generated, Hash operation is carried out to user certificate by private key and obtains data of endorsing, user is obtained and exists The data of endorsing of the chain equipment in block catenary system are logged in, and the data of endorsing are solved by the corresponding public key of chain equipment Label obtain cryptographic Hash, the cryptographic Hash that solution label obtain are compared with preset cryptographic Hash, the identity information for verifying the user is It is no correct, it ensure that the privacy of the identity information of user, also improve the safety of equipment.
It is a kind of schematic diagram for terminal device that the embodiment of the present invention three provides referring to Fig. 3, Fig. 3.What terminal device included Each unit is used to execute each step in the corresponding embodiment of FIG. 1 to FIG. 2.Referring specifically to the corresponding implementation of FIG. 1 to FIG. 2 Associated description in example.For ease of description, only the parts related to this embodiment are shown.The terminal device of the present embodiment 300 include:
First acquisition unit 301, the number of endorsing generated for obtaining user when logging in the chain equipment in block catenary system According to;The data of endorsing add the cryptographic Hash of the identity information of the user by using the corresponding private key of the chain equipment It is close to obtain;
Second acquisition unit 302, the cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;It is described to prestore Cryptographic Hash obtained based on the corresponding preset identity information of the chain equipment;
Data processing unit 303 obtains described for carrying out solution label to the data of endorsing of the acquisition using the public key The corresponding cryptographic Hash of the identity information of user, and the cryptographic Hash that prestores described in using verify the user identity information it is corresponding Cryptographic Hash;
Information checking unit 304 authorizes institute if the corresponding cryptographic Hash verification of identity information for the user passes through It states user and logs in the chain equipment.
Further, the terminal device can also include:
First generation unit, for obtaining the identity information of registration user, and according to the identity information of the registration user Generate user certificate;
Key generating unit, for generating unique key pair using rivest, shamir, adelman;The key pair includes public affairs Key and private key, the private key and the public key uniquely correspond to;
Hash operation unit obtains data of endorsing for carrying out Hash operation to the user certificate by the private key.
Further, first generation unit may include:
Third acquiring unit, for obtaining the identity information of user;The identity information includes but is not limited to following information One of or at least two combination: user account, identification card number or biological characteristic;
Second generation unit, it is distributed based on block chain if audit passes through for being audited to the identity information The identity information is inputted in preset certification hierarchy, obtains the user certificate by account book technology.
Further, first generation unit may include:
Information detecting unit for obtaining the identity information of user, and detects whether the identity information has preset It imitates within the time limit;
Third generation unit, if for the identity information within the term of validity, according to the identity information Generate user certificate;
Data updating unit, if reacquiring the use not within the term of validity for the identity information The identity information at family, and new user certificate is generated according to new identity information, and described in the new user certificate replacement User certificate.
Further, the terminal device can also include:
4th acquiring unit logins successfully information for receive that the chain equipment sends;It is described to login successfully in information User information including the user;
Permission determination unit, for being searched from preset rights database according to user information and the user information pair The user right information answered;
Permission transmission unit is set for the user right information to be sent to chain all in preset device systems It is standby;The operating right of the user is arranged for the chain equipment for the user right information.
Above scheme generates user certificate by the identity information previously according to user, and uses rivest, shamir, adelman Unique corresponding public private key pair is generated, Hash operation is carried out to user certificate by private key and obtains data of endorsing, user is obtained and exists The data of endorsing of the chain equipment in block catenary system are logged in, and the data of endorsing are solved by the corresponding public key of chain equipment Label obtain cryptographic Hash, the cryptographic Hash that solution label obtain are compared with preset cryptographic Hash, the identity information for verifying the user is It is no correct, it ensure that the privacy of the identity information of user, also improve the safety of equipment.
Fig. 4 is the schematic diagram for the terminal device that the embodiment of the present invention four provides.As shown in figure 4, the terminal of the embodiment is set Standby 4 include: processor 40, memory 41 and are stored in the meter that can be run in the memory 41 and on the processor 40 Calculation machine program 42.The processor 40 realizes the above-mentioned user authen method based on block chain when executing the computer program 42 Step in embodiment, such as step 101 shown in FIG. 1 is to 104.Alternatively, the processor 40 executes the computer program The function of each module/unit in above-mentioned each Installation practice, such as the function of unit 301 to 304 shown in Fig. 3 are realized when 42.
Illustratively, the computer program 42 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the present invention.Described one A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for Implementation procedure of the computer program 42 in the terminal device 4 is described.
The terminal device 4 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set It is standby.The terminal device may include, but be not limited only to, processor 40, memory 41.It will be understood by those skilled in the art that Fig. 4 The only example of terminal device 4 does not constitute the restriction to terminal device 4, may include than illustrating more or fewer portions Part perhaps combines certain components or different components, such as the terminal device can also include input-output equipment, net Network access device, bus etc..
Alleged processor 40 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 41 can be the internal storage unit of the terminal device 4, such as the hard disk or interior of terminal device 4 It deposits.The memory 41 is also possible to the External memory equipment of the terminal device 4, such as be equipped on the terminal device 4 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card, FC) etc..Further, the memory 41 can also have been deposited both the inside including the terminal device 4 Storage unit also includes External memory equipment.The memory 41 is for storing the computer program and terminal device institute Other programs and data needed.The memory 41 can be also used for temporarily storing the number that has exported or will export According to.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of user authen method based on block chain characterized by comprising
Obtain the data of endorsing that user generates when logging in the chain equipment in block catenary system;The data of endorsing are by using institute It states chain equipment corresponding private key the cryptographic Hash of the identity information of the user is encrypted to obtain;
The cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The cryptographic Hash prestored is based on the chain equipment pair The preset identity information answered obtains;
Solution label are carried out using endorse data of the public key to the acquisition, obtain the corresponding Hash of identity information of the user Value, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user;
If the corresponding cryptographic Hash verification of the identity information of the user passes through, the user is authorized to log in the chain equipment.
2. the user authen method as described in claim 1 based on block chain, which is characterized in that described to obtain the chain equipment Before corresponding public key and the cryptographic Hash prestored, further includes:
The identity information of registration user is obtained, and user certificate is generated according to the identity information of the registration user;
Unique key pair is generated using rivest, shamir, adelman;The key pair includes public key and private key, the private key and institute Public key is stated uniquely to correspond to;
Hash operation is carried out to the user certificate by the private key and obtains the cryptographic Hash prestored.
3. the user authen method as claimed in claim 2 based on block chain, which is characterized in that described to obtain registration user's Identity information, and user certificate is generated according to the identity information of the registration user, comprising:
Obtain the identity information of user;The identity information includes but is not limited to one of following information or at least two In conjunction with: user account, identification card number or biological characteristic;
The identity information is audited, if audit passes through, block chain distribution account book technology is based on, the identity is believed Breath inputs in preset certification hierarchy, obtains the user certificate.
4. the user authen method as claimed in claim 2 or claim 3 based on block chain, which is characterized in that the acquisition registration is used The identity information at family, and user certificate is generated according to the identity information of the registration user, comprising:
The identity information of user is obtained, and detects the identity information whether within preset term of validity;
If the identity information generates user certificate within the term of validity, according to the identity information;
If the identity information reacquires the identity information of the user, and according to new not within the term of validity Identity information generate new user certificate, and replace the user certificate with the new user certificate.
5. the user authen method as described in any one of claims 1-3 based on block chain, which is characterized in that if described The corresponding cryptographic Hash verification of the identity information of user passes through, then after authorizing the user to log in the chain equipment, further includes:
Receive the chain equipment transmission logins successfully information;The user logined successfully in information including the user believes Breath;
User right information corresponding with the user information is searched from preset rights database according to user information;
The user right information is sent to chain equipment all in preset device systems;The user right information is used for The operating right of the user is arranged in the chain equipment.
6. a kind of terminal device, which is characterized in that including memory and processor, being stored in the memory can be described The computer program run on processor, which is characterized in that when the processor executes the computer program, realize following step It is rapid:
Obtain the data of endorsing that user generates when logging in the chain equipment in block catenary system;The data of endorsing are by using institute It states chain equipment corresponding private key the cryptographic Hash of the identity information of the user is encrypted to obtain;
The cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The cryptographic Hash prestored is based on the chain equipment pair The preset identity information answered obtains;
Solution label are carried out using endorse data of the public key to the acquisition, obtain the corresponding Hash of identity information of the user Value, and the cryptographic Hash prestored described in use verifies the corresponding cryptographic Hash of identity information of the user;
If the corresponding cryptographic Hash verification of the identity information of the user passes through, the user is authorized to log in the chain equipment.
7. terminal device as claimed in claim 6, which is characterized in that the chain for obtaining user in login block catenary system Before the data of endorsing generated when equipment, further includes:
The identity information of registration user is obtained, and user certificate is generated according to the identity information of the registration user;
Unique key pair is generated using rivest, shamir, adelman;The key pair includes public key and private key, the private key and institute Public key is stated uniquely to correspond to;
Hash operation is carried out to the user certificate by the private key and obtains data of endorsing.
8. terminal device as claimed in claim 7, which is characterized in that the identity information for obtaining registration user, and according to The identity information of the registration user generates user certificate, comprising:
Obtain the identity information of user;The identity information includes but is not limited to one of following information or at least two In conjunction with: user account, identification card number or biological characteristic;
The identity information is audited, if audit passes through, block chain distribution account book technology is based on, the identity is believed Breath inputs in preset certification hierarchy, obtains the user certificate.
9. a kind of terminal device characterized by comprising
First acquisition unit, the data of endorsing generated for obtaining user when logging in the chain equipment in block catenary system;It is described Data of endorsing are encrypted to obtain by using the corresponding private key of the chain equipment to the cryptographic Hash of the identity information of the user;
Second acquisition unit, the cryptographic Hash for obtaining the corresponding public key of the chain equipment and prestoring;The Hash prestored Value is obtained based on the corresponding preset identity information of the chain equipment;
Data processing unit obtains the user's for carrying out solution label to the data of endorsing of the acquisition using the public key The corresponding cryptographic Hash of identity information, and the cryptographic Hash prestored described in use verifies the corresponding Hash of identity information of the user Value;
Information checking unit authorizes the user if the corresponding cryptographic Hash verification of identity information for the user passes through Log in the chain equipment.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of any one of such as claim 1 to 5 of realization the method.
CN201811182177.2A 2018-10-11 2018-10-11 User authen method and terminal device based on block chain Pending CN109522698A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811182177.2A CN109522698A (en) 2018-10-11 2018-10-11 User authen method and terminal device based on block chain
PCT/CN2018/124343 WO2020073513A1 (en) 2018-10-11 2018-12-27 Blockchain-based user authentication method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811182177.2A CN109522698A (en) 2018-10-11 2018-10-11 User authen method and terminal device based on block chain

Publications (1)

Publication Number Publication Date
CN109522698A true CN109522698A (en) 2019-03-26

Family

ID=65770875

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811182177.2A Pending CN109522698A (en) 2018-10-11 2018-10-11 User authen method and terminal device based on block chain

Country Status (2)

Country Link
CN (1) CN109522698A (en)
WO (1) WO2020073513A1 (en)

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995537A (en) * 2019-05-22 2019-07-09 杭州云象网络技术有限公司 A method of it is encrypted based on Lorentz-logic mapping algorithm block chain
CN110602455A (en) * 2019-09-10 2019-12-20 腾讯科技(深圳)有限公司 Video storage system, video processing method, device, equipment and storage medium
CN110781140A (en) * 2019-09-06 2020-02-11 平安科技(深圳)有限公司 Method and device for data signature in block chain, computer equipment and storage medium
CN110943976A (en) * 2019-11-08 2020-03-31 中国电子科技网络信息安全有限公司 Password-based user signature private key management method
CN110990484A (en) * 2019-11-27 2020-04-10 深圳前海环融联易信息科技服务有限公司 Block chain based information storage method and system, computer equipment and storage medium
CN111027099A (en) * 2019-12-09 2020-04-17 北京海益同展信息科技有限公司 Identity verification method, device, system and computer readable storage medium
CN111031475A (en) * 2019-12-19 2020-04-17 达闼科技成都有限公司 Method for collecting terminal position information, terminal, position collecting terminal and storage medium
CN111132155A (en) * 2019-12-30 2020-05-08 江苏全链通信息科技有限公司 5G secure communication method, equipment and storage medium
CN111131269A (en) * 2019-12-27 2020-05-08 中国银行股份有限公司 User information verification method and device based on block chain
CN111193743A (en) * 2019-12-31 2020-05-22 浪潮电子信息产业股份有限公司 Identity authentication method, system and related device of storage system
CN111241492A (en) * 2019-12-27 2020-06-05 武汉烽火信息集成技术有限公司 Product multi-tenant secure credit granting method, system and electronic equipment
CN111241594A (en) * 2020-01-06 2020-06-05 平安科技(深圳)有限公司 Method and device for signing transaction information, computer equipment and storage medium
CN111291398A (en) * 2020-03-04 2020-06-16 恒安嘉新(北京)科技股份公司 Block chain-based authentication method and device, computer equipment and storage medium
CN111416809A (en) * 2020-03-13 2020-07-14 国网河北省电力有限公司信息通信分公司 Continuous authentication method and device based on keystroke recognition
CN111475845A (en) * 2020-04-13 2020-07-31 中国工商银行股份有限公司 Unstructured data identity authorization access system and method
CN111859348A (en) * 2020-07-31 2020-10-30 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology
CN111949953A (en) * 2020-06-23 2020-11-17 卓尔智联(武汉)研究院有限公司 Identity authentication method, system and device based on block chain and computer equipment
CN112035814A (en) * 2020-07-21 2020-12-04 杜晓楠 Method and computer readable medium for generating distributed identities based on iris recognition in blockchains
CN112446701A (en) * 2019-09-03 2021-03-05 上海唯链信息科技有限公司 Identity authentication method, equipment and storage device based on block chain
CN112597117A (en) * 2020-12-26 2021-04-02 讯飞智元信息科技有限公司 File sharing method, related device and file sharing system
CN112866241A (en) * 2021-01-15 2021-05-28 迅鳐成都科技有限公司 Block chain-based digital identity updating method, equipment and storage medium
CN113067704A (en) * 2021-03-29 2021-07-02 安徽慧可科技有限公司 Data right determining method, system and equipment based on block chain
CN113420273A (en) * 2021-06-28 2021-09-21 国网山东省电力公司电力科学研究院 Multi-feature acquisition identity verification method and system based on Internet of things
CN113452504A (en) * 2020-03-24 2021-09-28 山东爱城市网信息技术有限公司 Data decryption method and device
CN113656785A (en) * 2021-07-30 2021-11-16 中金金融认证中心有限公司 Method for identity authentication and authentication service of bank user and related product
CN114499859A (en) * 2022-03-22 2022-05-13 深圳壹账通智能科技有限公司 Password verification method, device, equipment and storage medium
WO2022179115A1 (en) * 2021-02-25 2022-09-01 深圳壹账通智能科技有限公司 User authentication method and apparatus, server and storage medium
WO2022189865A1 (en) * 2021-03-08 2022-09-15 Alipay Labs (singapore) Pte. Ltd. Methods and devices for verifying data integrity
CN115118516A (en) * 2022-07-18 2022-09-27 浪潮卓数大数据产业发展有限公司 Method, system and medium for integrated resource management
CN115459920A (en) * 2022-08-25 2022-12-09 浪潮云信息技术股份公司 Certificateless alliance chain identity authentication method and system based on intelligent contract
CN116933232A (en) * 2023-08-23 2023-10-24 上海合芯数字科技有限公司 BMC-based server password security management method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110941668B (en) * 2019-11-08 2022-09-16 中国电子科技网络信息安全有限公司 Block chain-based unified identity management and authentication method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN107493273A (en) * 2017-08-02 2017-12-19 深圳市易成自动驾驶技术有限公司 Identity identifying method, system and computer-readable recording medium
CN108599954A (en) * 2018-03-16 2018-09-28 西安电子科技大学 Auth method based on distributed account book

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022035A (en) * 2016-05-03 2016-10-12 识益生物科技(北京)有限公司 Method and system for electronic signature
KR101818601B1 (en) * 2016-09-12 2018-01-16 주식회사 코인플러그 Method for providing identity verification using card base on near field communication, card, verification terminal, verification support server and identity verification server using the same
US11115418B2 (en) * 2016-12-23 2021-09-07 Cloudminds (Shanghai) Robotics Co., Ltd. Registration and authorization method device and system
CN108566395A (en) * 2018-04-20 2018-09-21 济南浪潮高新科技投资发展有限公司 A kind of document transmission method, apparatus and system based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107493273A (en) * 2017-08-02 2017-12-19 深圳市易成自动驾驶技术有限公司 Identity identifying method, system and computer-readable recording medium
CN108599954A (en) * 2018-03-16 2018-09-28 西安电子科技大学 Auth method based on distributed account book

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995537A (en) * 2019-05-22 2019-07-09 杭州云象网络技术有限公司 A method of it is encrypted based on Lorentz-logic mapping algorithm block chain
CN112446701A (en) * 2019-09-03 2021-03-05 上海唯链信息科技有限公司 Identity authentication method, equipment and storage device based on block chain
CN112446701B (en) * 2019-09-03 2024-04-05 上海唯链信息科技有限公司 Identity authentication method, equipment and storage device based on blockchain
CN110781140A (en) * 2019-09-06 2020-02-11 平安科技(深圳)有限公司 Method and device for data signature in block chain, computer equipment and storage medium
CN110781140B (en) * 2019-09-06 2023-08-18 平安科技(深圳)有限公司 Method, device, computer equipment and storage medium for signing data in blockchain
CN110602455A (en) * 2019-09-10 2019-12-20 腾讯科技(深圳)有限公司 Video storage system, video processing method, device, equipment and storage medium
CN110602455B (en) * 2019-09-10 2021-06-18 腾讯科技(深圳)有限公司 Video storage system, video processing method, device, equipment and storage medium
CN110943976A (en) * 2019-11-08 2020-03-31 中国电子科技网络信息安全有限公司 Password-based user signature private key management method
CN110943976B (en) * 2019-11-08 2022-01-18 中国电子科技网络信息安全有限公司 Password-based user signature private key management method
CN110990484A (en) * 2019-11-27 2020-04-10 深圳前海环融联易信息科技服务有限公司 Block chain based information storage method and system, computer equipment and storage medium
CN110990484B (en) * 2019-11-27 2023-10-24 深圳前海环融联易信息科技服务有限公司 Information storage method, system, computer equipment and storage medium based on block chain
CN111027099B (en) * 2019-12-09 2022-04-26 京东科技信息技术有限公司 Identity verification method, device, system and computer readable storage medium
CN111027099A (en) * 2019-12-09 2020-04-17 北京海益同展信息科技有限公司 Identity verification method, device, system and computer readable storage medium
CN111031475A (en) * 2019-12-19 2020-04-17 达闼科技成都有限公司 Method for collecting terminal position information, terminal, position collecting terminal and storage medium
CN111241492A (en) * 2019-12-27 2020-06-05 武汉烽火信息集成技术有限公司 Product multi-tenant secure credit granting method, system and electronic equipment
CN111131269A (en) * 2019-12-27 2020-05-08 中国银行股份有限公司 User information verification method and device based on block chain
CN111132155B (en) * 2019-12-30 2023-11-17 江苏全链通信息科技有限公司 5G secure communication method, device and storage medium
CN111132155A (en) * 2019-12-30 2020-05-08 江苏全链通信息科技有限公司 5G secure communication method, equipment and storage medium
CN111193743A (en) * 2019-12-31 2020-05-22 浪潮电子信息产业股份有限公司 Identity authentication method, system and related device of storage system
CN111241594B (en) * 2020-01-06 2023-10-13 平安科技(深圳)有限公司 Method, device, computer equipment and storage medium for signing transaction information
CN111241594A (en) * 2020-01-06 2020-06-05 平安科技(深圳)有限公司 Method and device for signing transaction information, computer equipment and storage medium
CN111291398B (en) * 2020-03-04 2022-09-20 恒安嘉新(北京)科技股份公司 Block chain-based authentication method and device, computer equipment and storage medium
CN111291398A (en) * 2020-03-04 2020-06-16 恒安嘉新(北京)科技股份公司 Block chain-based authentication method and device, computer equipment and storage medium
CN111416809A (en) * 2020-03-13 2020-07-14 国网河北省电力有限公司信息通信分公司 Continuous authentication method and device based on keystroke recognition
CN113452504A (en) * 2020-03-24 2021-09-28 山东爱城市网信息技术有限公司 Data decryption method and device
CN113452504B (en) * 2020-03-24 2023-02-21 浪潮卓数大数据产业发展有限公司 Data decryption method and device
CN111475845A (en) * 2020-04-13 2020-07-31 中国工商银行股份有限公司 Unstructured data identity authorization access system and method
CN111475845B (en) * 2020-04-13 2023-09-22 中国工商银行股份有限公司 Unstructured data identity authorized access system and method
CN111949953A (en) * 2020-06-23 2020-11-17 卓尔智联(武汉)研究院有限公司 Identity authentication method, system and device based on block chain and computer equipment
CN112035814A (en) * 2020-07-21 2020-12-04 杜晓楠 Method and computer readable medium for generating distributed identities based on iris recognition in blockchains
CN112035814B (en) * 2020-07-21 2023-10-24 杜晓楠 Method and computer readable medium for generating distributed identities based on iris recognition in blockchain
CN111859348A (en) * 2020-07-31 2020-10-30 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology
CN111859348B (en) * 2020-07-31 2022-07-19 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology
CN112597117A (en) * 2020-12-26 2021-04-02 讯飞智元信息科技有限公司 File sharing method, related device and file sharing system
CN112866241A (en) * 2021-01-15 2021-05-28 迅鳐成都科技有限公司 Block chain-based digital identity updating method, equipment and storage medium
WO2022179115A1 (en) * 2021-02-25 2022-09-01 深圳壹账通智能科技有限公司 User authentication method and apparatus, server and storage medium
WO2022189865A1 (en) * 2021-03-08 2022-09-15 Alipay Labs (singapore) Pte. Ltd. Methods and devices for verifying data integrity
CN113067704B (en) * 2021-03-29 2022-08-30 安徽慧可科技有限公司 Data right determining method, system and equipment based on block chain
CN113067704A (en) * 2021-03-29 2021-07-02 安徽慧可科技有限公司 Data right determining method, system and equipment based on block chain
CN113420273A (en) * 2021-06-28 2021-09-21 国网山东省电力公司电力科学研究院 Multi-feature acquisition identity verification method and system based on Internet of things
CN113656785A (en) * 2021-07-30 2021-11-16 中金金融认证中心有限公司 Method for identity authentication and authentication service of bank user and related product
CN114499859A (en) * 2022-03-22 2022-05-13 深圳壹账通智能科技有限公司 Password verification method, device, equipment and storage medium
CN115118516A (en) * 2022-07-18 2022-09-27 浪潮卓数大数据产业发展有限公司 Method, system and medium for integrated resource management
CN115459920A (en) * 2022-08-25 2022-12-09 浪潮云信息技术股份公司 Certificateless alliance chain identity authentication method and system based on intelligent contract
CN116933232A (en) * 2023-08-23 2023-10-24 上海合芯数字科技有限公司 BMC-based server password security management method and device

Also Published As

Publication number Publication date
WO2020073513A1 (en) 2020-04-16

Similar Documents

Publication Publication Date Title
CN109522698A (en) User authen method and terminal device based on block chain
CN109687963B (en) Anti-quantum computing alliance chain transaction method and system based on public key pool
Nagaraju et al. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway
Kou Payment technologies for E-commerce
CN109583219A (en) A kind of data signature, encryption and preservation method, apparatus and equipment
Samir et al. DT-SSIM: A decentralized trustworthy self-sovereign identity management framework
JP6906521B2 (en) Biometric Protocol Standard Systems and Methods
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
CN109660345A (en) Anti- quantum calculation block chain method of commerce and system based on unsymmetrical key pool server
CN101739622A (en) Trusted payment computer system
CN109981287A (en) A kind of code signature method and its storage medium
CN110493005B (en) Anti-quantum computing public key pool updating method and system based on alliance chain
CN113239401A (en) Big data analysis system and method based on power Internet of things and computer storage medium
CN114514550A (en) Partitioning requests into blockchains
Albogami et al. Public key infrastructure traditional and modern implementation
Gupta et al. A comparative study on blockchain-based distributed public key infrastructure for IoT applications
CN114417389A (en) Method for storing user asset limit through addition homomorphic encryption in block chain
Reddy et al. Block Chain for Financial Application using IOT
CN101739623A (en) Trusted payment computer system
Aravind et al. Combined Digital Signature with SHA Hashing Technique-based Secure System: An Application of Blockchain using IoT
Maheshwari et al. Secure authentication using biometric templates in Kerberos
Puckett et al. Confidential Computing in the Post-Quantum Era
Goodrich et al. Notarized federated ID management and authentication
Kumar et al. Validation Lamina for Maintaining Confidentiality within the Hadoop
Dinesh Babu Cloud Data security enhancements through the biometric and encryption system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination