CN110113168B - Information authentication method, client, system and computer readable storage medium - Google Patents
Information authentication method, client, system and computer readable storage medium Download PDFInfo
- Publication number
- CN110113168B CN110113168B CN201910264064.5A CN201910264064A CN110113168B CN 110113168 B CN110113168 B CN 110113168B CN 201910264064 A CN201910264064 A CN 201910264064A CN 110113168 B CN110113168 B CN 110113168B
- Authority
- CN
- China
- Prior art keywords
- information
- hash value
- authenticated
- original
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to the technical field of data security, and provides an information authentication method, which comprises the following steps: determining a processing strategy corresponding to the information to be authenticated; extracting at least one data file from the information to be authenticated based on the processing strategy and packaging the data file; calculating the packed data file to obtain a hash value to be authenticated of the information to be authenticated; and determining whether the information to be authenticated is consistent with the original information or not based on the relation between the hash value to be authenticated and the first hash value and the second hash value which are stored in advance. By the method, the difficulty of data tampering can be increased, the safety of the authentication process is improved, and the accuracy of authentication is ensured. In addition, the invention also provides an information authentication client, an information authentication system and a computer readable storage medium.
Description
Technical Field
The present invention relates to the field of data security technologies, and in particular, to an information authentication method, a client, a system, and a computer-readable storage medium.
Background
In the daily life of people, people often touch the handling of various businesses, in the process of handling the businesses, a party A and a party B respectively store signed contracts and related materials, if a third party with public trust is needed, the third party also needs to prepare the related materials, but in the process of handling the businesses and storing the materials, the risk of tampering exists, and meanwhile, the process of verifying the business effectiveness is difficult and complicated.
With the popularization of internet application, in order to improve business handling speed and user experience, more and more business handling is completed by means of online application, and although the online application can realize rapid sharing of data, the problem of data security also comes along, especially in some application fields with high requirements on data security, how to effectively verify business data and avoid data tampering is a subject of continuous research in the industry.
Disclosure of Invention
In view of the above-mentioned research subject, an embodiment of the present invention provides an information authentication method, including: determining a processing strategy corresponding to the information to be authenticated; extracting at least one data file from the information to be authenticated based on the processing strategy and packaging the data file; calculating the packed data file to obtain a hash value to be authenticated of the information to be authenticated; and determining whether the information to be authenticated is consistent with the original information or not based on the relation between the hash value to be authenticated and the first hash value and the second hash value which are stored in advance.
In one embodiment, the method for generating the first hash value and the second hash value that are saved in advance includes: when the original information is acquired, determining a processing strategy corresponding to the original information; extracting at least one original data file from the original information based on the processing strategy and packaging the original data file; calculating the packed original data file to obtain an original hash value of the original information; and uploading the original hash values respectively and ensuring the original hash values in a server database and a block chain so as to generate the first hash value and the second hash value correspondingly.
In an embodiment, when the original hash value is uploaded and stored into the block chain, the block chain stores the original hash value as the second hash value and returns corresponding extracted information; and storing the extracted information corresponding to the second hash value into the server database, and generating a mapping relation with the first hash value.
In one embodiment, the blockchain is an etherhouse sidechain.
In an embodiment, the packaged original data file is saved to a cloud storage server.
In an embodiment, the determining whether the information to be authenticated and the original information are consistent based on the relationship between the hash value to be authenticated and the first hash value and the second hash value stored in advance includes: acquiring the first hash value from the server database based on the information to be authenticated; judging whether the hash value to be authenticated is the same as the first hash value or not; if the two hash values are the same, acquiring extraction information corresponding to the second hash value based on the first hash value, and extracting the second hash value from the block chain based on the extraction information; judging whether the hash value to be authenticated is the same as the second hash value; and if the information to be authenticated is the same as the original information, determining that the information to be authenticated is consistent with the original information.
In an embodiment, the determining a processing policy corresponding to information to be authenticated includes: and acquiring the corresponding processing strategy from a processing strategy file saved in advance based on the service information contained in the information to be authenticated.
The information authentication method provided by the invention can distinguish different service grades of the service according to a preset processing strategy, processes each file in the handling process according to the service grades, and finally respectively stores the corresponding information to the server database, the block chain and the cloud storage server. When the business process needs to be authenticated, the corresponding hash value is calculated only based on the corresponding processing strategy, and is compared with the two hash values for storing the certificate. In the process, if any step is tampered, the calculated hash value is different from the certified hash value, authentication failure can be determined, the safety and the reliability of the business process are improved, and meanwhile the speed and the efficiency of the business authentication are improved.
The embodiment of the invention also provides an information authentication client, which comprises a program module, wherein the program module is used for running and realizing the information authentication method.
The embodiment of the invention also provides an information authentication system, which comprises the client, a background server and a block chain, wherein the background server and the block chain are respectively in communication connection with the client, and the client acquires the first hash value from a database of the background server and acquires the second hash value from the block chain.
Furthermore, an embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the information authentication method in the above-described embodiment.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a flow chart illustrating an information authentication method according to a first embodiment of the invention;
FIG. 2 is a flowchart illustrating a method for generating the first hash value and the second hash value according to the embodiment shown in FIG. 1;
FIG. 3 is a flowchart illustrating a method for determining whether the information to be authenticated is consistent with the original information in the embodiment shown in FIG. 1;
fig. 4 is a schematic structural diagram of an information authentication system according to a second embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
A first embodiment of the present invention is an information authentication method, which can be implemented based on a program module running on an electronic device of a computer, and increases data tampering difficulty and improves effectiveness of information authentication by setting a data processing policy and introducing a plurality of hash value verification means, as shown in fig. 1.
Fig. 1 shows a flow of an information authentication method according to a first embodiment of the present invention. As shown in fig. 1, the information authentication method specifically includes the steps of:
Specifically, in the process of transaction, it is necessary to collect relevant document materials, identity information, service information, and the like as original information according to actual service requirements to store (i.e., store a certificate), and subsequently, if the service needs to be operated, it may be necessary to upload corresponding document information again to perform authentication, so that the uploaded document information is the information to be authenticated.
In this embodiment, the processing policies may be configured in advance based on actual service requirements and stored, and each processing policy may specifically include a service level, a level determination criterion, and a processing manner, where the processing manner may specifically include a type of a packed file and a file packing manner.
In the process of determining the processing policy corresponding to the information to be authenticated, the corresponding processing policy needs to be obtained from a processing policy file stored in advance based on the related service information contained in the information to be authenticated.
And 102, extracting at least one data file from the information to be authenticated based on the processing strategy and packaging the data file.
After the processing policy corresponding to the information to be authenticated is determined in step 101, the information to be authenticated can be processed according to the specific content in the processing policy.
Specifically, the method may include extracting a file to be packaged from the information to be authenticated based on a corresponding processing manner in the processing policy, and packaging the file to obtain a packaged file.
And 103, calculating the packed data file to obtain the hash value to be authenticated of the information to be authenticated.
The hash value for the packed file is computed based on a hash function, such as the MD5Message Digest Algorithm (MD5Message-Digest Algorithm) or SHA-1, SHA-2, SHA-256, SHA-512, or the like.
All hash functions have the following basic characteristics: if two hash values (hash values) are not identical (according to the same function), then the original inputs of the two hash values are also not identical. This property gives the hash function a deterministic result. On the other hand, the input and output of the hash function are not one-to-one, and if two hash values are identical, the two input values are identical (in the case where there is no extremely small probability of hash collision).
And 104, determining whether the information to be authenticated is consistent with the original information or not based on the relation between the hash value to be authenticated and the first hash value and the second hash value which are stored in advance.
Specifically, the first hash value and the second hash value are generated and stored in the process of storing the certificate, please refer to fig. 2.
FIG. 2 is a diagram illustrating a method for generating a first hash value and a second hash value according to the embodiment shown in FIG. 1.
As shown in fig. 2, the method for generating the first hash value and the second hash value (i.e. the evidence storing method) specifically includes:
The specific method for determining the processing policy corresponding to the original information is the same as the method for determining the processing policy corresponding to the information to be authenticated, and reference may be made to the description of step 101.
Similarly, based on the corresponding processing policy, the processing mode of the original information can be obtained, including extracting the original data file to be packaged from the original information and performing packaging processing.
Based on the same hash function, a hash value of the packed file is calculated to obtain an original hash value.
And 204, uploading the original hash values respectively and ensuring the original hash values in a server database and a block chain so as to generate a first hash value and a second hash value correspondingly.
After the original hash value is obtained, in order to enhance data security, the original hash value may be uploaded and stored in a database of the background server and on the block chain, respectively, so as to obtain a first hash value stored in the server database and a second hash value stored in the block chain.
And when the original hash value is uploaded and stored into the block chain, the block chain stores the original hash value as a second hash value, returns corresponding extraction information, stores the extraction information corresponding to the second hash value into the server database, and generates a mapping relation with the first hash value. In other words, the server database stores not only the first hash value but also the extracted information returned by the block chain.
Preferably, in the embodiment of the present invention, the blockchain may be an etherhouse sidechain, and the etherhouse sidechain is used in the scheme. The side chain has the advantages of few nodes, high transaction speed and good privacy, so that the privacy of the data inside the enterprise is guaranteed, and the data is prevented from being leaked outwards.
It should be noted that the original information may be uploaded to the cloud storage server for storage for subsequent verification to complete the storage of the original information. The original information is uploaded to the cloud storage server, so that the original information can be prevented from being tampered through a local system, the safety of data storage is improved, and the storage pressure of the local system can be relieved.
According to the evidence storage method, the original information is processed based on the pre-configured processing strategy, namely, a specific data file is selected for packaging, the packaged file is calculated based on the hash function, the hash value corresponding to the original information is obtained, and the hash value is stored in the background server database and the block chain respectively, so that the classification processing of different business requirements can be realized, the file cracking difficulty is increased, the original hash value is stored in different modes, the data safety hidden danger caused by the fact that a single storage device is invaded can be further avoided, and the data tampering difficulty is increased.
Please return to step 104 in the embodiment shown in fig. 1.
Specifically, a method for determining whether the information to be authenticated is consistent with the original information based on a relationship between the hash value to be authenticated and the first hash value and the second hash value stored in advance may refer to fig. 3.
As shown in fig. 3, the method may comprise the steps of:
And extracting the second hash value.
if the authentication information is the same as the original information, the information to be authenticated is determined to be consistent with the original information, and the authentication is successful; if not, the authentication fails.
Therefore, the embodiment provided by the invention combines the block chain with the business handling process, and provides a hierarchical multi-factor authentication process scheme based on the block chain. And according to a preset processing strategy, the service is distinguished into different processing grades, each file in the handling process is processed according to the situation grade, and finally, corresponding information is respectively stored in a server database, a block chain and a cloud storage server. When the business process needs to be authenticated, the corresponding hash value is calculated only based on the corresponding processing strategy, and is compared with the two hash values for storing the certificate. In the process, if any step is tampered, the calculated hash value is different from the certified hash value, authentication failure can be determined, the safety and the reliability of the business process are improved, and meanwhile the speed and the efficiency of the business authentication are improved.
For a clearer explanation of the above embodiments, the following description will be made in conjunction with the process of banking.
Firstly, the bank can generate corresponding processing strategy files according to different service types and corresponding processing modes. For example, a judgment standard and a threshold n of a service level may be set, for example, the small amount transfer service level is 1, the large amount loan service level is m (m < n), and for different service levels, a corresponding processing mode may be set, for example, when the service state level is 1, a single factor in the identity information, the face image, and the GPS data is packaged; when the state grade is m, packing certain m factors in identity information, face images, GPS data, certification documents and the like; when the situation level is equal to or exceeds the threshold value n, all materials such as the identity information, the face image, the GPS data and the like need to be packed uniformly at the same time, and an overall packed file is obtained.
In the process of storing the certificate, when a business applicant transacts the related business through terminal equipment or is assisted by counter personnel, related file data needs to be provided according to business requirements, and the related file data specifically comprises an identity card electronic file, various application form electronic version files, electronic files of various certificate files, a face recognition information file, Global Positioning System (GPS) information of a transaction location, and a video file in the transaction process, the transacted business type, the business content and other original information. And submitting the original information through the client.
After receiving the original information, the client can upload the original information to the cloud storage server, acquire a corresponding processing strategy from a pre-stored processing strategy file based on information such as a service type, compress and package a corresponding data file according to requirements in the processing strategy, calculate a hash value of the packaged file, and upload the hash value to the block chain.
And meanwhile, the hash value is stored in a database of a background server, and the hash value and the extraction information returned by the block chain are correspondingly stored. Thereby completing the evidence storage process.
In the authentication process, the service applicant needs to submit corresponding information to be authenticated to the client, which may specifically include electronic documents of the identification card, electronic version documents of various application forms, electronic files of various certification documents, face recognition information documents, GPS (Global Positioning System) information of the transaction location, and record video files of the transaction process, the transaction type, the service content, and the like.
After receiving the information to be authenticated, the client acquires a corresponding processing strategy from a pre-stored processing strategy file based on information such as a service type and the like, compresses and packages a corresponding data file according to requirements in the processing strategy, and calculates a hash value to be authenticated of the packaged file. And searching the corresponding hash value from the database, comparing, and if the hash values are different, failing to authenticate. If the hash values are the same, the corresponding hash values are continuously extracted from the block chain through the extraction information and are compared again, if the hash values are different, the authentication fails, and if the hash values are the same, the authentication succeeds.
It is understood that the setting of the processing policy may be set according to actual business requirements, and the specific content of the setting may be determined according to actual requirements, and the above embodiment provides only an example.
Based on the same inventive concept, the invention also provides an information authentication client and an information authentication system comprising the same, please refer to fig. 4.
Fig. 4 shows an information authentication system according to a second embodiment of the present invention. As shown in fig. 4, the system 400 includes a client 410, and a background server 420 and a blockchain 430 communicatively coupled to the client 410, respectively.
The client 410 may be configured to collect original information and information to be authenticated, and locally store a processing policy file, and the client 410 may implement the method provided in the foregoing embodiment by running a program module, and authenticate the collected information to be authenticated based on the information authentication method.
The background server 420 provides system support for the client, and includes a database for the client 410 to access, where the database stores the first hash value and the corresponding blockchain extraction information uploaded by the client 410.
The blockchain 430 stores the second hash value uploaded by the client 410, and generates extraction information to feed back to the client 410 when receiving an upload request of the second hash value.
The client 410 generates a corresponding first hash value and a corresponding second hash value based on each piece of acquired original information, uploads the first hash value and the second hash value to the background server 420 and the block chain 430 respectively, and acquires the first hash value from the database of the background server 420 and the second hash value from the block chain 430 for information authentication in the process of authenticating the information to be authenticated.
Further, the system 400 further includes a cloud storage server 440 for receiving and storing the original information uploaded by the client 410.
The information authentication system provided by the embodiment of the invention integrates the background server, the block chain, the cloud storage server and the client to realize the information authentication method together, and the hash values corresponding to the original information are respectively distributed and stored in the background server and the block chain to ensure the safety of data and the difficulty of tampering, thereby synchronously improving the accuracy of information authentication.
Furthermore, the original information is stored in the cloud storage platform, so that a safer storage mode is provided for the original information, the storage pressure of the client can be greatly relieved, and the smooth operation of the client is ensured.
In addition, the original information and the information to be authenticated are subjected to grading processing through a preset processing strategy, and the safety of the authentication process is also ensured to a certain extent.
Yet another embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program, when executed by a processor, implements the above-described method embodiments.
Those skilled in the art can understand that all or part of the steps in the method according to the above embodiments may be implemented by a program to instruct related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, etc.) or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (7)
1. An information authentication method, comprising the steps of:
determining a processing strategy corresponding to the information to be authenticated;
extracting at least one data file from the information to be authenticated based on the processing strategy and packaging the data file;
calculating the packed data file to obtain a hash value to be authenticated of the information to be authenticated;
determining whether the information to be authenticated is consistent with the original information or not based on the relation between the hash value to be authenticated and a first hash value and a second hash value which are stored in advance;
the method for generating the pre-stored first hash value and the pre-stored second hash value comprises the following steps:
when the original information is acquired, determining a processing strategy corresponding to the original information;
extracting at least one original data file from the original information based on the processing strategy and packaging the original data file;
calculating the packed original data file to obtain an original hash value of the original information;
uploading the original hash values respectively and ensuring the original hash values in a server database and a block chain so as to generate the first hash value and the second hash value correspondingly;
when the original hash value is uploaded and stored into the block chain, the block chain stores the original hash value as the second hash value and returns corresponding extraction information;
storing the extracted information corresponding to the second hash value into the server database, and generating a mapping relation with the first hash value;
determining whether the information to be authenticated and the original information are consistent based on the relation between the hash value to be authenticated and the first hash value and the second hash value which are stored in advance comprises:
acquiring the first hash value from the server database based on the information to be authenticated;
judging whether the hash value to be authenticated is the same as the first hash value or not;
if the two hash values are the same, acquiring extraction information corresponding to the second hash value based on the first hash value, and extracting the second hash value from the block chain based on the extraction information;
judging whether the hash value to be authenticated is the same as the second hash value;
and if the information to be authenticated is the same as the original information, determining that the information to be authenticated is consistent with the original information.
2. The method of claim 1, wherein the blockchain is an etherhouse sidechain.
3. The method of claim 1, wherein the packaged raw data file is saved to a cloud storage server.
4. The method of claim 1, wherein the determining the processing policy corresponding to the information to be authenticated comprises:
and acquiring the corresponding processing strategy from a processing strategy file saved in advance based on the service information contained in the information to be authenticated.
5. An information authentication client, characterized in that the client comprises a program module for executing a method according to any one of claims 1 to 4.
6. An information authentication system, comprising the client as claimed in claim 5, and a background server and a blockchain communicatively connected to the client, respectively, wherein the client obtains the first hash value from a database of the background server and obtains the second hash value from the blockchain.
7. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the information authentication method according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910264064.5A CN110113168B (en) | 2019-04-03 | 2019-04-03 | Information authentication method, client, system and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910264064.5A CN110113168B (en) | 2019-04-03 | 2019-04-03 | Information authentication method, client, system and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110113168A CN110113168A (en) | 2019-08-09 |
CN110113168B true CN110113168B (en) | 2022-04-22 |
Family
ID=67485062
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910264064.5A Active CN110113168B (en) | 2019-04-03 | 2019-04-03 | Information authentication method, client, system and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110113168B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110706100B (en) * | 2019-08-21 | 2022-07-26 | 北京邮电大学 | Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency |
CN111930890A (en) * | 2020-07-28 | 2020-11-13 | 深圳市梦网科技发展有限公司 | Information sending method and device, terminal equipment and storage medium |
CN113141351B (en) * | 2021-03-23 | 2022-09-20 | 重庆扬成大数据科技有限公司 | Multi-department combined auditing and authenticating working method for government affair big data |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209877A (en) * | 2016-07-19 | 2016-12-07 | 井创(北京)科技有限公司 | A kind of be certification core with block chain backstage false-proof authentication system |
CN106559220A (en) * | 2016-10-25 | 2017-04-05 | 中国建设银行股份有限公司 | A kind of processing method and relevant device of guaranty |
CN106877998A (en) * | 2017-01-11 | 2017-06-20 | 裘羽 | electronic evidence management method and system |
CN107239954A (en) * | 2017-06-07 | 2017-10-10 | 北京汇通金财信息科技有限公司 | It is a kind of to improve the method and device that block produces speed |
CN107659579A (en) * | 2017-10-20 | 2018-02-02 | 国信嘉宁数据技术有限公司 | Deposit card method, equipment and related deposit system in a kind of scene |
CN108009646A (en) * | 2017-11-30 | 2018-05-08 | 深圳市轱辘车联数据技术有限公司 | Vehicle data processing method and server |
CN108269187A (en) * | 2018-01-29 | 2018-07-10 | 深圳壹账通智能科技有限公司 | Verification method, device, equipment and the computer storage media of financial business |
CN108449568A (en) * | 2018-01-31 | 2018-08-24 | 苏州科达科技股份有限公司 | Identity identifying method and device for video conference |
CN109088865A (en) * | 2018-08-02 | 2018-12-25 | 京东方科技集团股份有限公司 | Method for authenticating user identity, device, readable storage medium storing program for executing and computer equipment |
CN109413086A (en) * | 2018-11-16 | 2019-03-01 | 阿里巴巴集团控股有限公司 | Line coker tests the method and device of identity information |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150356523A1 (en) * | 2014-06-07 | 2015-12-10 | ChainID LLC | Decentralized identity verification systems and methods |
US9876646B2 (en) * | 2015-05-05 | 2018-01-23 | ShoCard, Inc. | User identification management system and method |
-
2019
- 2019-04-03 CN CN201910264064.5A patent/CN110113168B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209877A (en) * | 2016-07-19 | 2016-12-07 | 井创(北京)科技有限公司 | A kind of be certification core with block chain backstage false-proof authentication system |
CN106559220A (en) * | 2016-10-25 | 2017-04-05 | 中国建设银行股份有限公司 | A kind of processing method and relevant device of guaranty |
CN106877998A (en) * | 2017-01-11 | 2017-06-20 | 裘羽 | electronic evidence management method and system |
CN107239954A (en) * | 2017-06-07 | 2017-10-10 | 北京汇通金财信息科技有限公司 | It is a kind of to improve the method and device that block produces speed |
CN107659579A (en) * | 2017-10-20 | 2018-02-02 | 国信嘉宁数据技术有限公司 | Deposit card method, equipment and related deposit system in a kind of scene |
CN108009646A (en) * | 2017-11-30 | 2018-05-08 | 深圳市轱辘车联数据技术有限公司 | Vehicle data processing method and server |
CN108269187A (en) * | 2018-01-29 | 2018-07-10 | 深圳壹账通智能科技有限公司 | Verification method, device, equipment and the computer storage media of financial business |
CN108449568A (en) * | 2018-01-31 | 2018-08-24 | 苏州科达科技股份有限公司 | Identity identifying method and device for video conference |
CN109088865A (en) * | 2018-08-02 | 2018-12-25 | 京东方科技集团股份有限公司 | Method for authenticating user identity, device, readable storage medium storing program for executing and computer equipment |
CN109413086A (en) * | 2018-11-16 | 2019-03-01 | 阿里巴巴集团控股有限公司 | Line coker tests the method and device of identity information |
Also Published As
Publication number | Publication date |
---|---|
CN110113168A (en) | 2019-08-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11186111B1 (en) | Digitally encoded seal for document verification | |
CN107342867B (en) | Signature verification method and device | |
JP6703539B2 (en) | Device verification method and device | |
CN110113168B (en) | Information authentication method, client, system and computer readable storage medium | |
US20180152304A1 (en) | User Identification Management System and Method | |
CA2925325C (en) | Document authentication based on expected wear | |
KR20180110670A (en) | System and method for verifying authenticity of document information | |
EP4007984A1 (en) | Self-sovereign identity systems and methods for identification documents | |
US9600690B2 (en) | Secure access for sensitive digital information | |
US20180365447A1 (en) | System and Method for Signing and Authentication of Documents | |
CN109391621B (en) | Public cloud storage data integrity checking method based on block chain | |
CN108964925A (en) | A kind of document authentication device, method, device, equipment and readable medium | |
CN110032846B (en) | Identity data anti-misuse method and device and electronic equipment | |
CN113472521A (en) | Block chain-based real-name digital identity management method, signature device and verification device | |
US20200334430A1 (en) | Self-sovereign identity systems and methods for identification documents | |
CN112862589A (en) | Identity verification method, device and system in financial scene | |
CN110223075B (en) | Identity authentication method and device, computer equipment and storage medium | |
US20220294635A1 (en) | Method for proving original of data, and apparatus therefor | |
CN112685795A (en) | Digital deposit certificate creating method, digital deposit certificate verifying method and digital deposit certificate system | |
CN115150150B (en) | Information recording method based on block chain technology | |
CN111985004A (en) | Method for judging information integrity and computer system thereof | |
CN116579026A (en) | Cloud data integrity auditing method, device, equipment and storage medium | |
CN112307445B (en) | Identity management method and device based on block chain | |
CN114511431A (en) | Service processing method, device and medium based on block chain | |
CN113849555A (en) | Non-invasive method, server and medium for combining block chain and application system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |