CN110113168A - A kind of information authentication method, client, system and computer readable storage medium - Google Patents

A kind of information authentication method, client, system and computer readable storage medium Download PDF

Info

Publication number
CN110113168A
CN110113168A CN201910264064.5A CN201910264064A CN110113168A CN 110113168 A CN110113168 A CN 110113168A CN 201910264064 A CN201910264064 A CN 201910264064A CN 110113168 A CN110113168 A CN 110113168A
Authority
CN
China
Prior art keywords
cryptographic hash
information
certified
raw
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910264064.5A
Other languages
Chinese (zh)
Other versions
CN110113168B (en
Inventor
赵毅峰
宋禹廷
曾志胤
曾建晟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Calendar Technology Service Co Ltd
Original Assignee
Xiamen Calendar Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Calendar Technology Service Co Ltd filed Critical Xiamen Calendar Technology Service Co Ltd
Priority to CN201910264064.5A priority Critical patent/CN110113168B/en
Publication of CN110113168A publication Critical patent/CN110113168A/en
Application granted granted Critical
Publication of CN110113168B publication Critical patent/CN110113168B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to technical field of data security, provide a kind of information authentication method, and the method includes step: determining the corresponding processing strategie of information to be certified;An at least data file is extracted from the information to be certified based on the processing strategie to be packaged;Data file after calculating the packing obtains the cryptographic Hash to be certified of the information to be certified;Relationship based on the cryptographic Hash to be certified with the first cryptographic Hash and the second cryptographic Hash that pre-save, determines whether the information to be certified and raw information are consistent.By the above method, the difficulty of altered data can be increased, promote the safety of verification process, guarantee the accuracy of certification.In addition, the present invention also provides a kind of authentification of message client and system and a kind of computer readable storage mediums.

Description

A kind of information authentication method, client, system and computer readable storage medium
Technical field
The present invention relates to technical field of data security more particularly to a kind of information authentication method, client, system and calculating Machine readable storage medium storing program for executing.
Background technique
In people's daily life, handling for various businesses is often touched, during handling these business, First and second liang of sides respectively save the contract and associated materials of signing, when on the scene if necessary to the third party with public credibility, third party Also it needs to get all the associated materials ready, but during business handling and material preservation, there is the risk being tampered, while to verify The business validity is more difficult and process is many and diverse.
With the popularization of Internet application, in order to promote business handling speed and user experience, more and more business It handles and is all completed by being applied on line, although using may be implemented being quickly shared for data on line, the problem of data safety, Also following, especially in some pairs of higher application fields of security request data, how effect is carried out to business datum Card, avoids data from being tampered, is the project studied always in industry.
Summary of the invention
For the studies above project, the embodiment of the present invention provides a kind of information authentication method, and the method includes step It is rapid: to determine the corresponding processing strategie of information to be certified;It is extracted at least from the information to be certified based on the processing strategie One data file is packaged;Data file after calculating the packing obtains the cryptographic Hash to be certified of the information to be certified; Relationship based on the cryptographic Hash to be certified with the first cryptographic Hash and the second cryptographic Hash that pre-save, determines the letter to be certified It ceases whether consistent with raw information.
In one embodiment, the generation method of first cryptographic Hash pre-saved and the second cryptographic Hash includes: When getting the raw information, the corresponding processing strategie of the raw information is determined;Based on the processing strategie from the original An at least raw data file is extracted in beginning information to be packaged;Raw data file after calculating the packing obtains institute State the original cryptographic Hash of raw information;The original cryptographic Hash is uploaded respectively and is guaranteed in server database and block chain In, first cryptographic Hash and second cryptographic Hash are generated with corresponding.
In one embodiment, when the original cryptographic Hash being uploaded and being saved into the block chain, the block chain Saving the original cryptographic Hash is second cryptographic Hash, and returns to corresponding extraction information;Save second cryptographic Hash pair The extraction information answered generates mapping relations into the server database, and with first cryptographic Hash.
In one embodiment, the block chain is ether mill side chain.
In one embodiment, raw data file after saving the packing is to cloud storage service device.
In one embodiment, described to be breathed out based on the cryptographic Hash to be certified and the first cryptographic Hash pre-saved and second The relationship of uncommon value, determine the information to be certified and raw information whether unanimously include: be based on the information to be certified from described First cryptographic Hash is obtained in server database;Judge the cryptographic Hash to be certified whether with the first cryptographic Hash phase Together;The corresponding extraction information of second cryptographic Hash is then obtained based on first cryptographic Hash if they are the same, and is based on the extraction Information extracts second cryptographic Hash from the block chain;Judge the cryptographic Hash to be certified whether with second cryptographic Hash It is identical;If they are the same, it is determined that the information to be certified is consistent with the raw information.
In one embodiment, the corresponding processing strategie of determination information to be certified includes: being based on the letter to be certified Business information included in breath obtains the corresponding processing strategie from the processing strategie file pre-saved.
Information authentication method provided by the present invention can be according to preset processing strategie, by the different business etc. of traffic differentiation Grade, and handled each file for process of handling according to the grade of service, finally corresponding information is saved respectively to server Database, block chain and cloud storage service device.When to authenticate the business procedure, need to only be calculated based on corresponding processing strategie Corresponding cryptographic Hash, and be compared with two cryptographic Hash for depositing card.In the process, it if any step is tampered, counts The cryptographic Hash obtained will be different from the cryptographic Hash for depositing card, then can assert authentification failure, improve business procedure safety and Confidence level, while improving business authentication speed and efficiency.
In the embodiment of the present invention, a kind of authentification of message client is additionally provided, includes a program mould in the client Block, described program module realize above- mentioned information authentication method for running.
The embodiments of the present invention also provide a kind of authentification of message system, the system includes above-mentioned client and difference The background server and block chain being connect with the client communication, wherein number of the client from the background server First cryptographic Hash is obtained according to library, and obtains second cryptographic Hash from the block chain.
In addition, the embodiment of the present invention more provides a kind of computer readable storage medium, it is stored with computer program, it is described The information authentication method in above-described embodiment is realized when computer program is executed by processor.
Detailed description of the invention
One or more embodiments are illustrated by the picture in corresponding attached drawing, these are exemplary Illustrate not constitute the restriction to embodiment, the element in attached drawing with same reference numbers label is expressed as similar member Part, unless there are special statement, composition does not limit the figure in attached drawing.
Fig. 1 is painted a kind of information authentication method flow chart provided by first embodiment of the invention;
Fig. 2 is painted the generation method flow chart of the first cryptographic Hash described in embodiment illustrated in fig. 1 Yu the second cryptographic Hash;
Fig. 3, which is painted described in embodiment illustrated in fig. 1, determines information and the whether consistent method method of raw information to be certified Flow chart;
Fig. 4 is painted authentification of message system structure diagram provided by second embodiment of the invention.
Specific embodiment
To keep the purposes, technical schemes and advantages of embodiment of the present invention clearer, below in conjunction with attached drawing to this hair Bright each embodiment is explained in detail.However, it will be understood by those skilled in the art that in each implementation of the invention In mode, in order to make the reader understand this application better, many technical details are proposed.But it is even if thin without these technologies Section and various changes and modifications based on the following respective embodiments, also may be implemented the application technical solution claimed.
First embodiment provided by the present invention is a kind of information authentication method, can be based on operating in computer electronic equipment On program module realize, by setting data processing policy, introduce the means of multiple cryptographic Hash verifications, Lai Zengjia data are usurped Change difficulty, promotes the validity of authentification of message, specifically please refer to Fig. 1.
Fig. 1 is painted a kind of information authentication method process provided by first embodiment of the invention.As shown in Figure 1, the letter Ceasing authentication method specifically includes step:
Step 101, the corresponding processing strategie of information to be certified is determined.
Specifically, needing first to collect relevant documents, body according to practical business demand during business handling Part information, business information etc. are saved as raw information and (namely deposit card), subsequent if desired to grasp to this business Make, it may be necessary to upload respective file information again and be authenticated, then the file information of the secondary upload is exactly above-mentioned to be certified Information.
In the present embodiment, processing strategie can be in advance based on practical business demand and be configured, and save, every processing strategie It can specifically include the grade of service, grade criterion and processing mode, wherein processing mode can specifically include the class of packaging file Type and file packing manner.
It, need to be first based on institute in information to be certified during determining processing strategie corresponding based on the information to be certified The related service information for including obtains corresponding processing strategie from the processing strategie file pre-saved.
Step 102, an at least data file is extracted from information to be certified based on processing strategie to be packaged.
It, can be according in processing strategie after step 101 has determined the corresponding processing strategie of this information to be certified Particular content is treated authentication information and is handled.
It specifically may include that based on corresponding processing mode in processing strategie, extracting from information to be certified need to be packaged File, and be packaged, to obtain a packaging file.
Step 103, the data file after being packaged is calculated, the cryptographic Hash to be certified of information to be certified is obtained.
Based on hash function, such as MD5 Message Digest 5 (MD5Message-Digest Algorithm) or SHA-1, SHA-2, SHA-256, SHA-512 scheduling algorithm calculate the cryptographic Hash of packaging file.
All hash functions are all just like next fundamental characteristics: if two hashed values (cryptographic Hash) are different (roots According to Same Function), then being originally inputted for the two hashed values is also different.This characteristic makes hash function have determination The result of property.On the other hand, hash function output and input be not it is one-to-one, if two hashed values are identical, two Input value is identical (in the case where the Hash collision for minimum probability do not occur).
Step 104, the relationship based on cryptographic Hash to be certified with the first cryptographic Hash and the second cryptographic Hash that pre-save determines Whether information to be certified is consistent with raw information.
Specifically, the first cryptographic Hash and the second cryptographic Hash are generated and saved during depositing card, figure is please referred to 2。
Fig. 2 is painted the generation method of the first cryptographic Hash and the second cryptographic Hash in embodiment illustrated in fig. 1.
As shown in Fig. 2, the generation method (depositing card method) of the first cryptographic Hash and the second cryptographic Hash specifically includes:
Step 201, when getting raw information, the corresponding processing strategie of raw information is determined.
Determine the specific method of the corresponding processing strategie of raw information processing strategie side corresponding with information to be certified is determined Method is identical, can refer to the explanation of step 101.
Step 202, an at least raw data file is extracted from raw information based on processing strategie to be packaged.
Likewise, being based on corresponding processing strategie, the processing mode to raw information would know that, comprising from raw information The raw data file for needing to be packaged is extracted, packing processing is carried out.
Step 203, the raw data file after being packaged is calculated, the original cryptographic Hash of raw information is obtained.
Based on same hash function, the hashed value of packaging file is calculated, to obtain original cryptographic Hash.
Step 204, original cryptographic Hash is uploaded respectively and is guaranteed in server database and block chain, generated with corresponding First cryptographic Hash and the second cryptographic Hash.
After obtaining original cryptographic Hash, to reinforce Information Security, after the original cryptographic Hash upload can be stored in respectively In the database of platform server and on block chain, thus obtain the first cryptographic Hash for being stored in server database and The second cryptographic Hash being stored in block chain.
When original cryptographic Hash being uploaded and being saved into block chain, it is the second cryptographic Hash that block chain, which saves original cryptographic Hash, And corresponding extraction information is returned, the corresponding extraction information of the second cryptographic Hash is saved into server database, and is breathed out with first Uncommon value generates mapping relations.In other words, in server database, the first cryptographic Hash is not only preserved, can also correspond to conservation zone The extraction information that block chain returns.
Preferably, in an embodiment of the present invention, ether mill side chain can be selected in above-mentioned block chain, ether mill is used in scheme Side chain.The advantages of side chain, is that node is few, transactions velocity is fast, privacy is preferable, guarantees the privacy of inside data of enterprise with this, Prevent data to outward leakage.
It is worth noting that, raw information can be uploaded to cloud storage server, saved, for subsequent examination, with complete Pairs of raw information deposits card.Raw information is uploaded to cloud storage service device, can not only prevent raw information from passing through local system System is tampered, and promotes the safety that data save, and can be relieved the storage pressure of local system.
It is above-mentioned to deposit card method, first raw information is handled based on preconfigured processing strategie, that is, is chosen specific Data file is packaged, then is calculated based on hash function the file after packing, and the corresponding Hash of raw information is obtained Value, and the cryptographic Hash is stored in background server database and in block chain respectively, different business not only may be implemented Demand classification processing increases file and is cracked difficulty, and the preservation by carrying out different modes to original cryptographic Hash, and can be into One step avoid individually storing after equipment is broken into caused by incipient fault for data security, increase data tampering difficulty.
It please return the step 104 in embodiment illustrated in fig. 1.
Specifically, the relationship based on cryptographic Hash to be certified with the first cryptographic Hash and the second cryptographic Hash that pre-save, really Fixed information to be certified and the whether consistent method of raw information can refer to Fig. 3.
As shown in figure 3, the method can include the following steps:
Step 301, the first cryptographic Hash is obtained from server database based on information to be certified.
Step 302, judge whether cryptographic Hash to be certified is identical as the first cryptographic Hash;If they are the same, step 303 is executed, if not Together, then it can determine that information to be certified is inconsistent with raw information, authentication authorization and accounting is invalid.
Step 303, the corresponding extraction information of the second cryptographic Hash is obtained based on the first cryptographic Hash, and is based on extracting information from area Block chain
The second cryptographic Hash of upper extraction.
Step 304, judge whether cryptographic Hash to be certified is identical as the second cryptographic Hash:
If they are the same, it is determined that information to be certified is consistent with raw information, authenticates successfully;If not identical, authentification failure.
It can be seen that embodiment provided by the present invention combines block chain with business handling process, one kind is proposed Graduation dual factor anthentication process regimes based on block chain.According to preset processing strategie, by the different processing of traffic differentiation Grade, and handled each file for process of handling according to state of affairs grade, finally corresponding information is saved respectively to service Device database, block chain and cloud storage service device.When to authenticate the business procedure, need to only be calculated based on corresponding processing strategie Corresponding cryptographic Hash out, and be compared with two cryptographic Hash for depositing card.In the process, if any step is tampered, The cryptographic Hash being calculated will be different from the cryptographic Hash for depositing card, then can assert authentification failure, improve the safety of business procedure And confidence level, while improving business authentication speed and efficiency.
Above-described embodiment is illustrated in order to clearer, carries out example below in conjunction with the process that banking is handled Explanation.
Firstly, corresponding processing strategie text can be generated inside bank according to different service types and corresponding processing mode Part.For example, the judgment criteria and threshold value n of a settable grade of service, if the small amount transfers grade of service is 1, large loan industry Business grade is that m (m < n) for the different grades of service can set corresponding processing mode, when such as business state of affairs grade being 1, Single factor in identity information, facial image, GPS data is packaged;When state of affairs grade is m, by identity information, face Certain m factor in image, GPS data, documentary evidence etc. is packaged;When state of affairs grade equals or exceeds threshold value n, then need The all materials such as identity information, facial image, GPS data are subjected to uniform packing simultaneously, obtain an overall packaging file.
During depositing card, business applicant is handled by terminal device or by Receptionist assist correlation When business, relevant documentation need to be provided according to business demand, specifically may include identity card electronic document, all kinds of application forms Electronic document page, the electronics shelves of all kinds of documentary evidences and recognition of face message file, the GPS (Global for handling place Positioning System, global positioning system) information, record the service class handling the video file of process and being handled The raw informations such as type, business tine.And those raw informations are submitted by client.
Those raw informations can be uploaded in cloud storage service device by client after receiving raw information, and be based on The information such as type of service obtain corresponding processing strategie from the processing strategie file pre-saved, and according to processing strategie In requirement compression packing is carried out to corresponding data file, calculate the cryptographic Hash of the file after being packaged, and upload to block Chain.
Cryptographic Hash is stored in the database of background server simultaneously, the corresponding also block chain saved returns together Extract information.To complete to deposit card process.
In verification process, likewise, business applicant need to submit corresponding information to be certified to client, can specifically it wrap Electronic document containing identity card, all kinds of application form electronic document pages, the electronics shelves of all kinds of documentary evidences and recognition of face information text Part, GPS (Global Positioning System, the global positioning system) information for handling place, record handle the view of process Frequency file and the type of service handled, business tine etc..
Client is after receiving information to be certified, based on information such as types of service, from the processing strategie text pre-saved Corresponding processing strategie is obtained in part, and compression packing is carried out to corresponding data file according to the requirement in processing strategie, Calculate the cryptographic Hash to be certified of the file after being packaged.Corresponding cryptographic Hash is searched from database again, is compared, if not It is identical, then authentification failure.If identical, continue through extraction information and extract corresponding cryptographic Hash from block chain, and is another Secondary to be compared, if not identical, authentification failure then authenticates success if they are the same.
It is understood that the setting of processing strategie, can set, the particular content of setting can according to practical business demand It is determined according to actual needs, above-described embodiment provides only one kind and illustrates.
Based on same inventive concept, the present invention also provides a kind of authentification of message client and include the information of the client Verification System, referring to figure 4..
Fig. 4 is painted authentification of message system provided by second embodiment of the invention.As shown in figure 4, the system 400 includes Client 410 and the background server 420 and block chain 430 communicated to connect respectively with client 410.
Wherein, client 410 can be used for acquiring raw information and information to be certified, and locally preserve processing strategie text Part, client 410 can be by running a program module, method provided by Lai Shixian above-described embodiment, and is based on above- mentioned information Authentication method authenticates collected information to be certified.
Background server 420 provides system for client and supports, comprising accessing database, database for client 410 In preserve client 410 upload the first cryptographic Hash and corresponding block chain extract information.
The second cryptographic Hash of the upload of client 410 is preserved in block chain 430, and in the upload for receiving the second cryptographic Hash Extraction information is generated when request feeds back to client 410.
Client 410 is based on collected each raw information and generates corresponding first cryptographic Hash and the second cryptographic Hash, and It is uploaded to background server 420 and block chain 430 respectively, and during treating authentication information and being authenticated, is taken from backstage The database of business device 420 obtains the first cryptographic Hash, and obtains the second cryptographic Hash for authentification of message from block chain 430.
Further, system 400 further includes cloud storage service device 440, for receiving the original letter of the upload of client 410 Breath, and save.
Authentification of message system provided by the embodiment of the present invention, by incorporating background server, block chain and cloud storage Server and client, to realize information authentication method jointly, by respectively storing the corresponding Hash Distribution value of raw information In background server and block chain, to guarantee the safety of data, and the difficulty distorted, also Synchronous lifting authentification of message Accuracy.
Further, by the way that raw information is stored in cloud storage platform, not only raw information provide it is safer Storage mode, and can pole significantly alleviate the storage pressure of client, guarantee the smooth operation of client.
In addition, carrying out raw information by presetting processing strategie and information to be certified carrying out classification processing, also to a certain degree On ensure that the safety of verification process.
Further embodiment of this invention is related to a kind of computer readable storage medium, is stored with computer program.Computer journey When sequence is executed by processor, above method embodiment is realized.
It will be understood by those skilled in the art that implementing the method for the above embodiments is that can pass through Program is completed to instruct relevant hardware, which is stored in a storage medium, including some instructions are used so that one A equipment (can be single-chip microcontroller, chip etc.) or processor (processor) execute the whole of each embodiment method of the application Or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of information authentication method, which is characterized in that the method includes step:
Determine the corresponding processing strategie of information to be certified;
An at least data file is extracted from the information to be certified based on the processing strategie to be packaged;
Data file after calculating the packing obtains the cryptographic Hash to be certified of the information to be certified;
Relationship based on the cryptographic Hash to be certified with the first cryptographic Hash and the second cryptographic Hash that pre-save determines described wait recognize It demonstrate,proves information and whether raw information is consistent.
2. the method as described in claim 1, which is characterized in that first cryptographic Hash pre-saved and the second cryptographic Hash Generation method includes:
When getting the raw information, the corresponding processing strategie of the raw information is determined;
An at least raw data file is extracted from the raw information based on the processing strategie to be packaged;
Raw data file after calculating the packing obtains the original cryptographic Hash of the raw information;
The original cryptographic Hash is uploaded respectively and is guaranteed in server database and block chain, generates described first with corresponding Cryptographic Hash and second cryptographic Hash.
3. method according to claim 2, which is characterized in that upload the original cryptographic Hash and save to the block chain When middle, it is second cryptographic Hash that the block chain, which saves the original cryptographic Hash, and returns to corresponding extraction information;
The corresponding extraction information of second cryptographic Hash is saved into the server database, and raw with first cryptographic Hash At mapping relations.
4. method according to claim 2, which is characterized in that the block chain is ether mill side chain.
5. method according to claim 2, which is characterized in that raw data file to the cloud storage after saving the packing takes Business device.
6. method as claimed in claim 3, which is characterized in that it is described based on the cryptographic Hash to be certified with pre-save the The relationship of one cryptographic Hash and the second cryptographic Hash, determine the information to be certified and raw information whether unanimously include:
First cryptographic Hash is obtained from the server database based on the information to be certified;
Judge whether the cryptographic Hash to be certified is identical as first cryptographic Hash;
The corresponding extraction information of second cryptographic Hash is then obtained based on first cryptographic Hash if they are the same, and is based on the extraction Information extracts second cryptographic Hash from the block chain;
Judge whether the cryptographic Hash to be certified is identical as second cryptographic Hash;
If they are the same, it is determined that the information to be certified is consistent with the raw information.
7. the method as described in claim 1, which is characterized in that the corresponding processing strategie of the determination information to be certified includes:
Based on business information included in the information to be certified from the processing strategie file pre-saved, it is described right to obtain The processing strategie answered.
8. a kind of authentification of message client, which is characterized in that include a program module in the client, described program module is used Method described in described any one of claims 1 to 7 is realized in operation.
9. a kind of authentification of message system, which is characterized in that the system include client according to any one of claims 8 and respectively with The background server and block chain of the client communication connection, wherein data of the client from the background server Library obtains first cryptographic Hash, and second cryptographic Hash is obtained from the block chain.
10. a kind of computer readable storage medium, is stored with computer program, which is characterized in that the computer program is located Reason device realizes information authentication method described in any one of claims 1 to 7 when executing.
CN201910264064.5A 2019-04-03 2019-04-03 Information authentication method, client, system and computer readable storage medium Active CN110113168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910264064.5A CN110113168B (en) 2019-04-03 2019-04-03 Information authentication method, client, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910264064.5A CN110113168B (en) 2019-04-03 2019-04-03 Information authentication method, client, system and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110113168A true CN110113168A (en) 2019-08-09
CN110113168B CN110113168B (en) 2022-04-22

Family

ID=67485062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910264064.5A Active CN110113168B (en) 2019-04-03 2019-04-03 Information authentication method, client, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110113168B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110706100A (en) * 2019-08-21 2020-01-17 北京邮电大学 Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency
CN111930890A (en) * 2020-07-28 2020-11-13 深圳市梦网科技发展有限公司 Information sending method and device, terminal equipment and storage medium
CN113141351A (en) * 2021-03-23 2021-07-20 重庆扬成大数据科技有限公司 Multi-department combined auditing and authenticating working method for government affair big data

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150356523A1 (en) * 2014-06-07 2015-12-10 ChainID LLC Decentralized identity verification systems and methods
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN106559220A (en) * 2016-10-25 2017-04-05 中国建设银行股份有限公司 A kind of processing method and relevant device of guaranty
CN106877998A (en) * 2017-01-11 2017-06-20 裘羽 electronic evidence management method and system
CN107239954A (en) * 2017-06-07 2017-10-10 北京汇通金财信息科技有限公司 It is a kind of to improve the method and device that block produces speed
CN107659579A (en) * 2017-10-20 2018-02-02 国信嘉宁数据技术有限公司 Deposit card method, equipment and related deposit system in a kind of scene
CN108009646A (en) * 2017-11-30 2018-05-08 深圳市轱辘车联数据技术有限公司 Vehicle data processing method and server
US20180152304A1 (en) * 2015-05-05 2018-05-31 ShoCard, Inc. User Identification Management System and Method
CN108269187A (en) * 2018-01-29 2018-07-10 深圳壹账通智能科技有限公司 Verification method, device, equipment and the computer storage media of financial business
CN108449568A (en) * 2018-01-31 2018-08-24 苏州科达科技股份有限公司 Identity identifying method and device for video conference
CN109088865A (en) * 2018-08-02 2018-12-25 京东方科技集团股份有限公司 Method for authenticating user identity, device, readable storage medium storing program for executing and computer equipment
CN109413086A (en) * 2018-11-16 2019-03-01 阿里巴巴集团控股有限公司 Line coker tests the method and device of identity information

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150356523A1 (en) * 2014-06-07 2015-12-10 ChainID LLC Decentralized identity verification systems and methods
US20180152304A1 (en) * 2015-05-05 2018-05-31 ShoCard, Inc. User Identification Management System and Method
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN106559220A (en) * 2016-10-25 2017-04-05 中国建设银行股份有限公司 A kind of processing method and relevant device of guaranty
CN106877998A (en) * 2017-01-11 2017-06-20 裘羽 electronic evidence management method and system
CN107239954A (en) * 2017-06-07 2017-10-10 北京汇通金财信息科技有限公司 It is a kind of to improve the method and device that block produces speed
CN107659579A (en) * 2017-10-20 2018-02-02 国信嘉宁数据技术有限公司 Deposit card method, equipment and related deposit system in a kind of scene
CN108009646A (en) * 2017-11-30 2018-05-08 深圳市轱辘车联数据技术有限公司 Vehicle data processing method and server
CN108269187A (en) * 2018-01-29 2018-07-10 深圳壹账通智能科技有限公司 Verification method, device, equipment and the computer storage media of financial business
CN108449568A (en) * 2018-01-31 2018-08-24 苏州科达科技股份有限公司 Identity identifying method and device for video conference
CN109088865A (en) * 2018-08-02 2018-12-25 京东方科技集团股份有限公司 Method for authenticating user identity, device, readable storage medium storing program for executing and computer equipment
CN109413086A (en) * 2018-11-16 2019-03-01 阿里巴巴集团控股有限公司 Line coker tests the method and device of identity information

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110706100A (en) * 2019-08-21 2020-01-17 北京邮电大学 Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency
CN110706100B (en) * 2019-08-21 2022-07-26 北京邮电大学 Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency
CN111930890A (en) * 2020-07-28 2020-11-13 深圳市梦网科技发展有限公司 Information sending method and device, terminal equipment and storage medium
CN113141351A (en) * 2021-03-23 2021-07-20 重庆扬成大数据科技有限公司 Multi-department combined auditing and authenticating working method for government affair big data

Also Published As

Publication number Publication date
CN110113168B (en) 2022-04-22

Similar Documents

Publication Publication Date Title
CN111859348B (en) Identity authentication method and device based on user identification module and block chain technology
US10652018B2 (en) Methods and apparatus for providing attestation of information using a centralized or distributed ledger
US20210279736A1 (en) Blockchain secure transaction method and device based on biomarker authentication
US11824851B2 (en) Identification document database
CA2925325C (en) Document authentication based on expected wear
US7690032B1 (en) Method and system for confirming the identity of a user
CN108540449B (en) Intelligent seal control method and system and computer storage medium
CN108009445B (en) Semi-centralized trusted data management system
CN108964925A (en) A kind of document authentication device, method, device, equipment and readable medium
US11443382B1 (en) Systems and methods for providing a persistent state
WO2019072823A1 (en) Method and system for asynchronous traceable data sharing in a communication network
CN110113168A (en) A kind of information authentication method, client, system and computer readable storage medium
WO2019127893A1 (en) Electronic signature method, electronic device, and computer readable storage medium
WO2023207086A1 (en) Blockchain-based user data transfer method, apparatus and device
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
CN110969531A (en) Borrowing deposit verification and online checking method and system
CN111914231A (en) Block chain-based identity authentication method, system, equipment and storage medium
CN105323355A (en) Android privacy protection system based on palm print recognition
US11968526B2 (en) Identity management on a mobile device
WO2024001600A1 (en) Identity verification for non-natural person entity operator
CN108090372A (en) A kind of date storage method and device
CN111753156A (en) Remote self-service file query system
EP2254093A1 (en) Method and system for confirming the identity of a user background of the invention
Singhal Security analysis of aadhaar authentication process and way forward
Blue et al. A review of identity, identification and authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant