CN110113168B - Information authentication method, client, system and computer readable storage medium - Google Patents

Information authentication method, client, system and computer readable storage medium Download PDF

Info

Publication number
CN110113168B
CN110113168B CN201910264064.5A CN201910264064A CN110113168B CN 110113168 B CN110113168 B CN 110113168B CN 201910264064 A CN201910264064 A CN 201910264064A CN 110113168 B CN110113168 B CN 110113168B
Authority
CN
China
Prior art keywords
information
hash value
authenticated
original
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910264064.5A
Other languages
Chinese (zh)
Other versions
CN110113168A (en
Inventor
赵毅峰
宋禹廷
曾志胤
曾建晟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Lisi Technology Services Co ltd
Original Assignee
Xiamen Lisi Technology Services Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Lisi Technology Services Co ltd filed Critical Xiamen Lisi Technology Services Co ltd
Priority to CN201910264064.5A priority Critical patent/CN110113168B/en
Publication of CN110113168A publication Critical patent/CN110113168A/en
Application granted granted Critical
Publication of CN110113168B publication Critical patent/CN110113168B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of data security, and provides an information authentication method, which comprises the following steps: determining a processing strategy corresponding to the information to be authenticated; extracting at least one data file from the information to be authenticated based on the processing strategy and packaging the data file; calculating the packed data file to obtain a hash value to be authenticated of the information to be authenticated; and determining whether the information to be authenticated is consistent with the original information or not based on the relation between the hash value to be authenticated and the first hash value and the second hash value which are stored in advance. By the method, the difficulty of data tampering can be increased, the safety of the authentication process is improved, and the accuracy of authentication is ensured. In addition, the invention also provides an information authentication client, an information authentication system and a computer readable storage medium.

Description

Information authentication method, client, system and computer readable storage medium
Technical Field
The present invention relates to the field of data security technologies, and in particular, to an information authentication method, a client, a system, and a computer-readable storage medium.
Background
In the daily life of people, people often touch the handling of various businesses, in the process of handling the businesses, a party A and a party B respectively store signed contracts and related materials, if a third party with public trust is needed, the third party also needs to prepare the related materials, but in the process of handling the businesses and storing the materials, the risk of tampering exists, and meanwhile, the process of verifying the business effectiveness is difficult and complicated.
With the popularization of internet application, in order to improve business handling speed and user experience, more and more business handling is completed by means of online application, and although the online application can realize rapid sharing of data, the problem of data security also comes along, especially in some application fields with high requirements on data security, how to effectively verify business data and avoid data tampering is a subject of continuous research in the industry.
Disclosure of Invention
In view of the above-mentioned research subject, an embodiment of the present invention provides an information authentication method, including: determining a processing strategy corresponding to the information to be authenticated; extracting at least one data file from the information to be authenticated based on the processing strategy and packaging the data file; calculating the packed data file to obtain a hash value to be authenticated of the information to be authenticated; and determining whether the information to be authenticated is consistent with the original information or not based on the relation between the hash value to be authenticated and the first hash value and the second hash value which are stored in advance.
In one embodiment, the method for generating the first hash value and the second hash value that are saved in advance includes: when the original information is acquired, determining a processing strategy corresponding to the original information; extracting at least one original data file from the original information based on the processing strategy and packaging the original data file; calculating the packed original data file to obtain an original hash value of the original information; and uploading the original hash values respectively and ensuring the original hash values in a server database and a block chain so as to generate the first hash value and the second hash value correspondingly.
In an embodiment, when the original hash value is uploaded and stored into the block chain, the block chain stores the original hash value as the second hash value and returns corresponding extracted information; and storing the extracted information corresponding to the second hash value into the server database, and generating a mapping relation with the first hash value.
In one embodiment, the blockchain is an etherhouse sidechain.
In an embodiment, the packaged original data file is saved to a cloud storage server.
In an embodiment, the determining whether the information to be authenticated and the original information are consistent based on the relationship between the hash value to be authenticated and the first hash value and the second hash value stored in advance includes: acquiring the first hash value from the server database based on the information to be authenticated; judging whether the hash value to be authenticated is the same as the first hash value or not; if the two hash values are the same, acquiring extraction information corresponding to the second hash value based on the first hash value, and extracting the second hash value from the block chain based on the extraction information; judging whether the hash value to be authenticated is the same as the second hash value; and if the information to be authenticated is the same as the original information, determining that the information to be authenticated is consistent with the original information.
In an embodiment, the determining a processing policy corresponding to information to be authenticated includes: and acquiring the corresponding processing strategy from a processing strategy file saved in advance based on the service information contained in the information to be authenticated.
The information authentication method provided by the invention can distinguish different service grades of the service according to a preset processing strategy, processes each file in the handling process according to the service grades, and finally respectively stores the corresponding information to the server database, the block chain and the cloud storage server. When the business process needs to be authenticated, the corresponding hash value is calculated only based on the corresponding processing strategy, and is compared with the two hash values for storing the certificate. In the process, if any step is tampered, the calculated hash value is different from the certified hash value, authentication failure can be determined, the safety and the reliability of the business process are improved, and meanwhile the speed and the efficiency of the business authentication are improved.
The embodiment of the invention also provides an information authentication client, which comprises a program module, wherein the program module is used for running and realizing the information authentication method.
The embodiment of the invention also provides an information authentication system, which comprises the client, a background server and a block chain, wherein the background server and the block chain are respectively in communication connection with the client, and the client acquires the first hash value from a database of the background server and acquires the second hash value from the block chain.
Furthermore, an embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the information authentication method in the above-described embodiment.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a flow chart illustrating an information authentication method according to a first embodiment of the invention;
FIG. 2 is a flowchart illustrating a method for generating the first hash value and the second hash value according to the embodiment shown in FIG. 1;
FIG. 3 is a flowchart illustrating a method for determining whether the information to be authenticated is consistent with the original information in the embodiment shown in FIG. 1;
fig. 4 is a schematic structural diagram of an information authentication system according to a second embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
A first embodiment of the present invention is an information authentication method, which can be implemented based on a program module running on an electronic device of a computer, and increases data tampering difficulty and improves effectiveness of information authentication by setting a data processing policy and introducing a plurality of hash value verification means, as shown in fig. 1.
Fig. 1 shows a flow of an information authentication method according to a first embodiment of the present invention. As shown in fig. 1, the information authentication method specifically includes the steps of:
step 101, determining a processing strategy corresponding to information to be authenticated.
Specifically, in the process of transaction, it is necessary to collect relevant document materials, identity information, service information, and the like as original information according to actual service requirements to store (i.e., store a certificate), and subsequently, if the service needs to be operated, it may be necessary to upload corresponding document information again to perform authentication, so that the uploaded document information is the information to be authenticated.
In this embodiment, the processing policies may be configured in advance based on actual service requirements and stored, and each processing policy may specifically include a service level, a level determination criterion, and a processing manner, where the processing manner may specifically include a type of a packed file and a file packing manner.
In the process of determining the processing policy corresponding to the information to be authenticated, the corresponding processing policy needs to be obtained from a processing policy file stored in advance based on the related service information contained in the information to be authenticated.
And 102, extracting at least one data file from the information to be authenticated based on the processing strategy and packaging the data file.
After the processing policy corresponding to the information to be authenticated is determined in step 101, the information to be authenticated can be processed according to the specific content in the processing policy.
Specifically, the method may include extracting a file to be packaged from the information to be authenticated based on a corresponding processing manner in the processing policy, and packaging the file to obtain a packaged file.
And 103, calculating the packed data file to obtain the hash value to be authenticated of the information to be authenticated.
The hash value for the packed file is computed based on a hash function, such as the MD5Message Digest Algorithm (MD5Message-Digest Algorithm) or SHA-1, SHA-2, SHA-256, SHA-512, or the like.
All hash functions have the following basic characteristics: if two hash values (hash values) are not identical (according to the same function), then the original inputs of the two hash values are also not identical. This property gives the hash function a deterministic result. On the other hand, the input and output of the hash function are not one-to-one, and if two hash values are identical, the two input values are identical (in the case where there is no extremely small probability of hash collision).
And 104, determining whether the information to be authenticated is consistent with the original information or not based on the relation between the hash value to be authenticated and the first hash value and the second hash value which are stored in advance.
Specifically, the first hash value and the second hash value are generated and stored in the process of storing the certificate, please refer to fig. 2.
FIG. 2 is a diagram illustrating a method for generating a first hash value and a second hash value according to the embodiment shown in FIG. 1.
As shown in fig. 2, the method for generating the first hash value and the second hash value (i.e. the evidence storing method) specifically includes:
step 201, when the original information is acquired, determining a processing strategy corresponding to the original information.
The specific method for determining the processing policy corresponding to the original information is the same as the method for determining the processing policy corresponding to the information to be authenticated, and reference may be made to the description of step 101.
Step 202, extracting at least one original data file from the original information based on the processing strategy, and packaging the extracted original data file.
Similarly, based on the corresponding processing policy, the processing mode of the original information can be obtained, including extracting the original data file to be packaged from the original information and performing packaging processing.
Step 203, calculating the packed original data file to obtain the original hash value of the original information.
Based on the same hash function, a hash value of the packed file is calculated to obtain an original hash value.
And 204, uploading the original hash values respectively and ensuring the original hash values in a server database and a block chain so as to generate a first hash value and a second hash value correspondingly.
After the original hash value is obtained, in order to enhance data security, the original hash value may be uploaded and stored in a database of the background server and on the block chain, respectively, so as to obtain a first hash value stored in the server database and a second hash value stored in the block chain.
And when the original hash value is uploaded and stored into the block chain, the block chain stores the original hash value as a second hash value, returns corresponding extraction information, stores the extraction information corresponding to the second hash value into the server database, and generates a mapping relation with the first hash value. In other words, the server database stores not only the first hash value but also the extracted information returned by the block chain.
Preferably, in the embodiment of the present invention, the blockchain may be an etherhouse sidechain, and the etherhouse sidechain is used in the scheme. The side chain has the advantages of few nodes, high transaction speed and good privacy, so that the privacy of the data inside the enterprise is guaranteed, and the data is prevented from being leaked outwards.
It should be noted that the original information may be uploaded to the cloud storage server for storage for subsequent verification to complete the storage of the original information. The original information is uploaded to the cloud storage server, so that the original information can be prevented from being tampered through a local system, the safety of data storage is improved, and the storage pressure of the local system can be relieved.
According to the evidence storage method, the original information is processed based on the pre-configured processing strategy, namely, a specific data file is selected for packaging, the packaged file is calculated based on the hash function, the hash value corresponding to the original information is obtained, and the hash value is stored in the background server database and the block chain respectively, so that the classification processing of different business requirements can be realized, the file cracking difficulty is increased, the original hash value is stored in different modes, the data safety hidden danger caused by the fact that a single storage device is invaded can be further avoided, and the data tampering difficulty is increased.
Please return to step 104 in the embodiment shown in fig. 1.
Specifically, a method for determining whether the information to be authenticated is consistent with the original information based on a relationship between the hash value to be authenticated and the first hash value and the second hash value stored in advance may refer to fig. 3.
As shown in fig. 3, the method may comprise the steps of:
step 301, a first hash value is obtained from a server database based on information to be authenticated.
Step 302, judging whether the hash value to be authenticated is the same as the first hash value; if the two information are the same, step 303 is executed, and if the two information are different, it may be determined that the information to be authenticated is not consistent with the original information, i.e., the authentication is invalid.
Step 303, obtaining extraction information corresponding to the second hash value based on the first hash value, and extracting information from the blockchain based on the extraction information
And extracting the second hash value.
Step 304, determining whether the hash value to be authenticated is the same as the second hash value:
if the authentication information is the same as the original information, the information to be authenticated is determined to be consistent with the original information, and the authentication is successful; if not, the authentication fails.
Therefore, the embodiment provided by the invention combines the block chain with the business handling process, and provides a hierarchical multi-factor authentication process scheme based on the block chain. And according to a preset processing strategy, the service is distinguished into different processing grades, each file in the handling process is processed according to the situation grade, and finally, corresponding information is respectively stored in a server database, a block chain and a cloud storage server. When the business process needs to be authenticated, the corresponding hash value is calculated only based on the corresponding processing strategy, and is compared with the two hash values for storing the certificate. In the process, if any step is tampered, the calculated hash value is different from the certified hash value, authentication failure can be determined, the safety and the reliability of the business process are improved, and meanwhile the speed and the efficiency of the business authentication are improved.
For a clearer explanation of the above embodiments, the following description will be made in conjunction with the process of banking.
Firstly, the bank can generate corresponding processing strategy files according to different service types and corresponding processing modes. For example, a judgment standard and a threshold n of a service level may be set, for example, the small amount transfer service level is 1, the large amount loan service level is m (m < n), and for different service levels, a corresponding processing mode may be set, for example, when the service state level is 1, a single factor in the identity information, the face image, and the GPS data is packaged; when the state grade is m, packing certain m factors in identity information, face images, GPS data, certification documents and the like; when the situation level is equal to or exceeds the threshold value n, all materials such as the identity information, the face image, the GPS data and the like need to be packed uniformly at the same time, and an overall packed file is obtained.
In the process of storing the certificate, when a business applicant transacts the related business through terminal equipment or is assisted by counter personnel, related file data needs to be provided according to business requirements, and the related file data specifically comprises an identity card electronic file, various application form electronic version files, electronic files of various certificate files, a face recognition information file, Global Positioning System (GPS) information of a transaction location, and a video file in the transaction process, the transacted business type, the business content and other original information. And submitting the original information through the client.
After receiving the original information, the client can upload the original information to the cloud storage server, acquire a corresponding processing strategy from a pre-stored processing strategy file based on information such as a service type, compress and package a corresponding data file according to requirements in the processing strategy, calculate a hash value of the packaged file, and upload the hash value to the block chain.
And meanwhile, the hash value is stored in a database of a background server, and the hash value and the extraction information returned by the block chain are correspondingly stored. Thereby completing the evidence storage process.
In the authentication process, the service applicant needs to submit corresponding information to be authenticated to the client, which may specifically include electronic documents of the identification card, electronic version documents of various application forms, electronic files of various certification documents, face recognition information documents, GPS (Global Positioning System) information of the transaction location, and record video files of the transaction process, the transaction type, the service content, and the like.
After receiving the information to be authenticated, the client acquires a corresponding processing strategy from a pre-stored processing strategy file based on information such as a service type and the like, compresses and packages a corresponding data file according to requirements in the processing strategy, and calculates a hash value to be authenticated of the packaged file. And searching the corresponding hash value from the database, comparing, and if the hash values are different, failing to authenticate. If the hash values are the same, the corresponding hash values are continuously extracted from the block chain through the extraction information and are compared again, if the hash values are different, the authentication fails, and if the hash values are the same, the authentication succeeds.
It is understood that the setting of the processing policy may be set according to actual business requirements, and the specific content of the setting may be determined according to actual requirements, and the above embodiment provides only an example.
Based on the same inventive concept, the invention also provides an information authentication client and an information authentication system comprising the same, please refer to fig. 4.
Fig. 4 shows an information authentication system according to a second embodiment of the present invention. As shown in fig. 4, the system 400 includes a client 410, and a background server 420 and a blockchain 430 communicatively coupled to the client 410, respectively.
The client 410 may be configured to collect original information and information to be authenticated, and locally store a processing policy file, and the client 410 may implement the method provided in the foregoing embodiment by running a program module, and authenticate the collected information to be authenticated based on the information authentication method.
The background server 420 provides system support for the client, and includes a database for the client 410 to access, where the database stores the first hash value and the corresponding blockchain extraction information uploaded by the client 410.
The blockchain 430 stores the second hash value uploaded by the client 410, and generates extraction information to feed back to the client 410 when receiving an upload request of the second hash value.
The client 410 generates a corresponding first hash value and a corresponding second hash value based on each piece of acquired original information, uploads the first hash value and the second hash value to the background server 420 and the block chain 430 respectively, and acquires the first hash value from the database of the background server 420 and the second hash value from the block chain 430 for information authentication in the process of authenticating the information to be authenticated.
Further, the system 400 further includes a cloud storage server 440 for receiving and storing the original information uploaded by the client 410.
The information authentication system provided by the embodiment of the invention integrates the background server, the block chain, the cloud storage server and the client to realize the information authentication method together, and the hash values corresponding to the original information are respectively distributed and stored in the background server and the block chain to ensure the safety of data and the difficulty of tampering, thereby synchronously improving the accuracy of information authentication.
Furthermore, the original information is stored in the cloud storage platform, so that a safer storage mode is provided for the original information, the storage pressure of the client can be greatly relieved, and the smooth operation of the client is ensured.
In addition, the original information and the information to be authenticated are subjected to grading processing through a preset processing strategy, and the safety of the authentication process is also ensured to a certain extent.
Yet another embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program, when executed by a processor, implements the above-described method embodiments.
Those skilled in the art can understand that all or part of the steps in the method according to the above embodiments may be implemented by a program to instruct related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, etc.) or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (7)

1. An information authentication method, comprising the steps of:
determining a processing strategy corresponding to the information to be authenticated;
extracting at least one data file from the information to be authenticated based on the processing strategy and packaging the data file;
calculating the packed data file to obtain a hash value to be authenticated of the information to be authenticated;
determining whether the information to be authenticated is consistent with the original information or not based on the relation between the hash value to be authenticated and a first hash value and a second hash value which are stored in advance;
the method for generating the pre-stored first hash value and the pre-stored second hash value comprises the following steps:
when the original information is acquired, determining a processing strategy corresponding to the original information;
extracting at least one original data file from the original information based on the processing strategy and packaging the original data file;
calculating the packed original data file to obtain an original hash value of the original information;
uploading the original hash values respectively and ensuring the original hash values in a server database and a block chain so as to generate the first hash value and the second hash value correspondingly;
when the original hash value is uploaded and stored into the block chain, the block chain stores the original hash value as the second hash value and returns corresponding extraction information;
storing the extracted information corresponding to the second hash value into the server database, and generating a mapping relation with the first hash value;
determining whether the information to be authenticated and the original information are consistent based on the relation between the hash value to be authenticated and the first hash value and the second hash value which are stored in advance comprises:
acquiring the first hash value from the server database based on the information to be authenticated;
judging whether the hash value to be authenticated is the same as the first hash value or not;
if the two hash values are the same, acquiring extraction information corresponding to the second hash value based on the first hash value, and extracting the second hash value from the block chain based on the extraction information;
judging whether the hash value to be authenticated is the same as the second hash value;
and if the information to be authenticated is the same as the original information, determining that the information to be authenticated is consistent with the original information.
2. The method of claim 1, wherein the blockchain is an etherhouse sidechain.
3. The method of claim 1, wherein the packaged raw data file is saved to a cloud storage server.
4. The method of claim 1, wherein the determining the processing policy corresponding to the information to be authenticated comprises:
and acquiring the corresponding processing strategy from a processing strategy file saved in advance based on the service information contained in the information to be authenticated.
5. An information authentication client, characterized in that the client comprises a program module for executing a method according to any one of claims 1 to 4.
6. An information authentication system, comprising the client as claimed in claim 5, and a background server and a blockchain communicatively connected to the client, respectively, wherein the client obtains the first hash value from a database of the background server and obtains the second hash value from the blockchain.
7. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the information authentication method according to any one of claims 1 to 4.
CN201910264064.5A 2019-04-03 2019-04-03 Information authentication method, client, system and computer readable storage medium Active CN110113168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910264064.5A CN110113168B (en) 2019-04-03 2019-04-03 Information authentication method, client, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910264064.5A CN110113168B (en) 2019-04-03 2019-04-03 Information authentication method, client, system and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110113168A CN110113168A (en) 2019-08-09
CN110113168B true CN110113168B (en) 2022-04-22

Family

ID=67485062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910264064.5A Active CN110113168B (en) 2019-04-03 2019-04-03 Information authentication method, client, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110113168B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110706100B (en) * 2019-08-21 2022-07-26 北京邮电大学 Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency
CN111930890A (en) * 2020-07-28 2020-11-13 深圳市梦网科技发展有限公司 Information sending method and device, terminal equipment and storage medium
CN113141351B (en) * 2021-03-23 2022-09-20 重庆扬成大数据科技有限公司 Multi-department combined auditing and authenticating working method for government affair big data

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN106559220A (en) * 2016-10-25 2017-04-05 中国建设银行股份有限公司 A kind of processing method and relevant device of guaranty
CN106877998A (en) * 2017-01-11 2017-06-20 裘羽 electronic evidence management method and system
CN107239954A (en) * 2017-06-07 2017-10-10 北京汇通金财信息科技有限公司 It is a kind of to improve the method and device that block produces speed
CN107659579A (en) * 2017-10-20 2018-02-02 国信嘉宁数据技术有限公司 Deposit card method, equipment and related deposit system in a kind of scene
CN108009646A (en) * 2017-11-30 2018-05-08 深圳市轱辘车联数据技术有限公司 Vehicle data processing method and server
CN108269187A (en) * 2018-01-29 2018-07-10 深圳壹账通智能科技有限公司 Verification method, device, equipment and the computer storage media of financial business
CN108449568A (en) * 2018-01-31 2018-08-24 苏州科达科技股份有限公司 Identity identifying method and device for video conference
CN109088865A (en) * 2018-08-02 2018-12-25 京东方科技集团股份有限公司 Method for authenticating user identity, device, readable storage medium storing program for executing and computer equipment
CN109413086A (en) * 2018-11-16 2019-03-01 阿里巴巴集团控股有限公司 Line coker tests the method and device of identity information

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150356523A1 (en) * 2014-06-07 2015-12-10 ChainID LLC Decentralized identity verification systems and methods
US9876646B2 (en) * 2015-05-05 2018-01-23 ShoCard, Inc. User identification management system and method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN106559220A (en) * 2016-10-25 2017-04-05 中国建设银行股份有限公司 A kind of processing method and relevant device of guaranty
CN106877998A (en) * 2017-01-11 2017-06-20 裘羽 electronic evidence management method and system
CN107239954A (en) * 2017-06-07 2017-10-10 北京汇通金财信息科技有限公司 It is a kind of to improve the method and device that block produces speed
CN107659579A (en) * 2017-10-20 2018-02-02 国信嘉宁数据技术有限公司 Deposit card method, equipment and related deposit system in a kind of scene
CN108009646A (en) * 2017-11-30 2018-05-08 深圳市轱辘车联数据技术有限公司 Vehicle data processing method and server
CN108269187A (en) * 2018-01-29 2018-07-10 深圳壹账通智能科技有限公司 Verification method, device, equipment and the computer storage media of financial business
CN108449568A (en) * 2018-01-31 2018-08-24 苏州科达科技股份有限公司 Identity identifying method and device for video conference
CN109088865A (en) * 2018-08-02 2018-12-25 京东方科技集团股份有限公司 Method for authenticating user identity, device, readable storage medium storing program for executing and computer equipment
CN109413086A (en) * 2018-11-16 2019-03-01 阿里巴巴集团控股有限公司 Line coker tests the method and device of identity information

Also Published As

Publication number Publication date
CN110113168A (en) 2019-08-09

Similar Documents

Publication Publication Date Title
US11186111B1 (en) Digitally encoded seal for document verification
CN107342867B (en) Signature verification method and device
JP6703539B2 (en) Device verification method and device
CN110113168B (en) Information authentication method, client, system and computer readable storage medium
US20180152304A1 (en) User Identification Management System and Method
CA2925325C (en) Document authentication based on expected wear
KR20180110670A (en) System and method for verifying authenticity of document information
EP4007984A1 (en) Self-sovereign identity systems and methods for identification documents
US9600690B2 (en) Secure access for sensitive digital information
US20180365447A1 (en) System and Method for Signing and Authentication of Documents
CN109391621B (en) Public cloud storage data integrity checking method based on block chain
CN108964925A (en) A kind of document authentication device, method, device, equipment and readable medium
CN110032846B (en) Identity data anti-misuse method and device and electronic equipment
CN113472521A (en) Block chain-based real-name digital identity management method, signature device and verification device
US20200334430A1 (en) Self-sovereign identity systems and methods for identification documents
CN112862589A (en) Identity verification method, device and system in financial scene
CN110223075B (en) Identity authentication method and device, computer equipment and storage medium
US20220294635A1 (en) Method for proving original of data, and apparatus therefor
CN112685795A (en) Digital deposit certificate creating method, digital deposit certificate verifying method and digital deposit certificate system
CN115150150B (en) Information recording method based on block chain technology
CN111985004A (en) Method for judging information integrity and computer system thereof
CN116579026A (en) Cloud data integrity auditing method, device, equipment and storage medium
CN112307445B (en) Identity management method and device based on block chain
CN114511431A (en) Service processing method, device and medium based on block chain
CN113849555A (en) Non-invasive method, server and medium for combining block chain and application system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant