CN111371808A - Universal block chain identity recognition technology - Google Patents

Universal block chain identity recognition technology Download PDF

Info

Publication number
CN111371808A
CN111371808A CN202010222074.5A CN202010222074A CN111371808A CN 111371808 A CN111371808 A CN 111371808A CN 202010222074 A CN202010222074 A CN 202010222074A CN 111371808 A CN111371808 A CN 111371808A
Authority
CN
China
Prior art keywords
information
block chain
electronic
data
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010222074.5A
Other languages
Chinese (zh)
Inventor
张伟
彭京健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guojin Public Link Hainan Information Technology Co ltd
Original Assignee
Guojin Public Link Hainan Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guojin Public Link Hainan Information Technology Co ltd filed Critical Guojin Public Link Hainan Information Technology Co ltd
Priority to CN202010222074.5A priority Critical patent/CN111371808A/en
Publication of CN111371808A publication Critical patent/CN111371808A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a general block chain identity recognition technology, which is characterized in that: the method comprises the following steps: s1, applying for joining in a block chain system, inputting human body information, and matching with the identity card number of the user for data storage; s2, encrypting your personal information, generating a unique ID and recording; s3, determining information through the block chain for different networks; authorization is carried out after the ID is determined; s4, after authorized use, generating records and storing, analyzing personal information, commodities and areas where the commodities are used when you log in through big data, verifying accuracy of the information, ensuring normal data determination, ensuring safety and uniqueness due to the fact that an ID is the only one, and a block chain cannot be tampered, providing a transparent mechanism for information flow, logistics and fund flow of the commodities from an algorithm level, performing cloud storage on the generated records, performing backup and ensuring safety of the data.

Description

Universal block chain identity recognition technology
Technical Field
The invention relates to the technical field of block chains, in particular to a general block chain identity recognition technology.
Background
The block chain is a term in the technical field of information, and essentially, the block chain is a shared database, data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'open transparency', 'collective maintenance' and the like, and based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has a wide application prospect;
however, the general block chain identification technology in the current market is not unique enough for identifying multiple networks, so that data confusion and data loss are caused, and the accuracy of the data cannot be correctly ensured.
Disclosure of Invention
The invention provides a universal block chain identity recognition technology, which can effectively solve the problems that the universal block chain identity recognition technology in the current market is not unique enough for recognizing multiple networks, so that data is disordered and lost, and the accuracy of the data cannot be correctly ensured.
In order to achieve the purpose, the invention provides the following technical scheme: a general block chain identity recognition technology is characterized in that: the method comprises the following steps:
s1, applying for joining in a block chain system, inputting human body information, and matching with the identity card number of the user for data storage;
s2, encrypting your personal information, generating a unique ID and recording;
s3, for different networks, after information is determined through the block chain, authorization is performed after ID determination;
and S4, generating a record and storing the record after the authorized use.
According to the technical scheme, the human body information in the step S1 comprises fingerprints, palm prints, pupils, veins and self-set 9-bit passwords, the first information is filled by the user or a guardian, and then the personal information of the user, the commodity in which the user logs in and the area where the user is located are analyzed through big data, so that the accuracy of the information of the user is verified.
According to the above technical solution, the ID in the step S2 is only one and cannot be changed.
According to the technical scheme, the block chain in the step S3 is not tampered, and a transparent mechanism is provided for information flow, logistics and fund flow of commodities from an algorithm level.
According to the above technical solution, the ID in the step S2 includes an electronic signature, a digital certificate, and an electronic authentication service;
the electronic signature is data which is contained in an electronic form in a data message, attached to the data message and used for identifying the identity of a signer and indicating that the signer approves the content of the data message;
the digital signature is that a pair of uniquely matched asymmetric keys, namely a public key and a private key, is established through a mathematical operation, and signature and verification are realized by encrypting and decrypting a data message by using an asymmetric cipher encryption system;
the digital certificate is a data message or other electronic files containing public key data and identity information of the electronic signer, and the relation between the electronic signer and the private key is established through a corresponding relation between the public key and the private key;
the electronic authentication service is an activity for providing certification for the authenticity and the reliability of the electronic signature, and comprises three parts of authenticity authentication of the identity of a signer, reliability authentication of a signature process and integrity authentication of a data message.
According to the above technical solution, the generated record is cloud-saved and backed up in step S4.
Compared with the prior art, the invention has the beneficial effects that: the invention has scientific and reasonable structure and safe and convenient use, analyzes personal information of the user, the commodity logged in for use and the area where the commodity is located through big data, thereby verifying the accuracy of the personal information, ensuring normal data determination, ensuring the safety and uniqueness of the commodity due to the unique ID, preventing the block chain from being tampered, providing a transparent mechanism for information flow, logistics and fund flow of the commodity from the aspect of algorithm, performing cloud storage on the generated records, performing backup and ensuring the safety of the data.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
In the drawings:
FIG. 1 is a schematic view of the flow structure of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example (b): as shown in fig. 1, the present invention provides a technical solution, a general block chain identification technology, which is characterized in that: the method comprises the following steps:
s1, applying for joining in a block chain system, inputting human body information, and matching with the identity card number of the user for data storage;
s2, encrypting your personal information, generating a unique ID and recording;
s3, for different networks, after information is determined through the block chain, authorization is performed after ID determination;
and S4, generating a record and storing the record after the authorized use.
According to the technical scheme, the human body information in the step S1 comprises fingerprints, palm prints, pupils, veins and self-set 9-bit passwords, the first-time information is filled by the user or a guardian, and then the personal information of the user, the commodities and the area where the user logs in are analyzed through big data, so that the accuracy of the information of the user is verified.
According to the above technical solution, the ID in step S2 is unique and cannot be changed.
According to the technical scheme, the block chain in the step S3 can not be tampered, and a transparent mechanism is provided for information flow, logistics and fund flow of commodities from the aspect of algorithm.
According to the above technical solution, the ID in step S2 includes an electronic signature, a digital certificate, and an electronic authentication service;
the electronic signature is data which is contained in an electronic form in a data message, attached to the data message and used for identifying the identity of a signer and indicating that the signer approves the content of the data message;
the digital signature is that a pair of uniquely matched asymmetric keys, namely a public key and a private key, are established through a mathematical operation, and signature and verification are realized by encrypting and decrypting a data message by using an asymmetric cipher encryption system;
the digital certificate is a data message or other electronic files containing public key data and identity information of the electronic signer, and the relation between the electronic signer and the private key is established through a corresponding relation between the public key and the private key;
the electronic authentication service is an activity for proving the authenticity and the reliability of the electronic signature, and comprises three parts of authenticity authentication of the identity of a signer, reliability authentication of a signature process and integrity authentication of a data message.
According to the above technical solution, the generated record is cloud-saved and backed up in step S4.
Compared with the prior art, the invention has the beneficial effects that: the invention has scientific and reasonable structure and safe and convenient use, analyzes personal information of the user, the commodity logged in for use and the area where the commodity is located through big data, thereby verifying the accuracy of the personal information, ensuring normal data determination, ensuring the safety and uniqueness of the commodity due to the unique ID, preventing the block chain from being tampered, providing a transparent mechanism for information flow, logistics and fund flow of the commodity from the aspect of algorithm, performing cloud storage on the generated records, performing backup and ensuring the safety of the data.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (6)

1. A general block chain identity recognition technology is characterized in that: the method comprises the following steps:
s1, applying for joining in a block chain system, inputting human body information, and matching with the identity card number of the user for data storage;
s2, encrypting your personal information, generating a unique ID and recording;
s3, for different networks, after information is determined through the block chain, authorization is performed after ID determination;
and S4, generating a record and storing the record after the authorized use.
2. The universal blockchain identification technology according to claim 1, wherein the personal information in step S1 includes fingerprints, palm prints, pupils, veins and self-set 9-bit passwords, and the first information is filled by the user or guardian, and then the personal information and the commodity and the area where you log in for use are analyzed through big data, so as to verify the accuracy of your information.
3. The technique of claim 1, wherein the ID in step S2 is unique and cannot be changed.
4. The universal blockchain identity recognition technique according to claim 1, wherein the blockchain in step S3 is not tampered, and a transparent mechanism is provided for information flow, logistics and fund flow of the commodity from an algorithm level.
5. The universal blockchain identification technology according to claim 1, wherein the ID in step S2 includes an electronic signature, a digital certificate and an electronic authentication service;
the electronic signature is data which is contained in an electronic form in a data message, attached to the data message and used for identifying the identity of a signer and indicating that the signer approves the content of the data message;
the digital signature is that a pair of uniquely matched asymmetric keys, namely a public key and a private key, is established through a mathematical operation, and signature and verification are realized by encrypting and decrypting a data message by using an asymmetric cipher encryption system;
the digital certificate is a data message or other electronic files containing public key data and identity information of the electronic signer, and the relation between the electronic signer and the private key is established through a corresponding relation between the public key and the private key;
the electronic authentication service is an activity for providing certification for the authenticity and the reliability of the electronic signature, and comprises three parts of authenticity authentication of the identity of a signer, reliability authentication of a signature process and integrity authentication of a data message.
6. The technique for identifying a universal blockchain identity according to claim 1, wherein the generated records are cloud-saved and backed up in step S4.
CN202010222074.5A 2020-03-26 2020-03-26 Universal block chain identity recognition technology Pending CN111371808A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010222074.5A CN111371808A (en) 2020-03-26 2020-03-26 Universal block chain identity recognition technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010222074.5A CN111371808A (en) 2020-03-26 2020-03-26 Universal block chain identity recognition technology

Publications (1)

Publication Number Publication Date
CN111371808A true CN111371808A (en) 2020-07-03

Family

ID=71211239

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010222074.5A Pending CN111371808A (en) 2020-03-26 2020-03-26 Universal block chain identity recognition technology

Country Status (1)

Country Link
CN (1) CN111371808A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113641968A (en) * 2021-08-14 2021-11-12 永旗(北京)科技有限公司 Identity verification method based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180253539A1 (en) * 2017-03-05 2018-09-06 Ronald H. Minter Robust system and method of authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates.
CN108833114A (en) * 2018-06-13 2018-11-16 上海交通大学 A kind of decentralization identity authorization system and method based on block chain
CN109493058A (en) * 2018-12-14 2019-03-19 深圳壹账通智能科技有限公司 A kind of personal identification method and relevant device based on block chain
CN109687965A (en) * 2019-02-18 2019-04-26 哈尔滨工业大学(深圳) The real name identification method of subscriber identity information in a kind of protection network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180253539A1 (en) * 2017-03-05 2018-09-06 Ronald H. Minter Robust system and method of authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates.
CN108833114A (en) * 2018-06-13 2018-11-16 上海交通大学 A kind of decentralization identity authorization system and method based on block chain
CN109493058A (en) * 2018-12-14 2019-03-19 深圳壹账通智能科技有限公司 A kind of personal identification method and relevant device based on block chain
CN109687965A (en) * 2019-02-18 2019-04-26 哈尔滨工业大学(深圳) The real name identification method of subscriber identity information in a kind of protection network

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113641968A (en) * 2021-08-14 2021-11-12 永旗(北京)科技有限公司 Identity verification method based on block chain

Similar Documents

Publication Publication Date Title
US8447991B2 (en) Card authentication system
US6871278B1 (en) Secure transactions with passive storage media
US7526653B1 (en) Method of data protection
US11095646B2 (en) Method and system for data security within independent computer systems and digital networks
CN109639651A (en) Contract based on living body authentication and block chain technology signs authentication method and its system online
US20030101348A1 (en) Method and system for determining confidence in a digital transaction
CN107819587A (en) Authentication method and user equipment and certificate server based on full homomorphic cryptography
CN109768983A (en) Dynamic and Multi dimensional personal identification method, apparatus and system based on block chain
CN108009445B (en) Semi-centralized trusted data management system
CN105264537A (en) System and method for biometric authentication with device attestation
WO2003007527A2 (en) Biometrically enhanced digital certificates and system and method for making and using
WO2011025352A2 (en) Method for producing an electro-biometric signature allowing legal interaction between and identification of persons
CN106899551A (en) Authentication method, certification terminal and system
Cavoukian et al. Advances in biometric encryption: Taking privacy by design from academic research to deployment
US11288349B2 (en) System and method for authentication using biometric hash strings
CN113472521A (en) Block chain-based real-name digital identity management method, signature device and verification device
WO2020000777A1 (en) Method and apparatus for acquiring individual credit information on the basis of block chain, and computer device
CN108540447A (en) A kind of certification authentication method and system based on block chain
CN103368736A (en) Business information encryption and decryption method and device
CN111371808A (en) Universal block chain identity recognition technology
CN104751042A (en) Credibility detection method based on password hash and biometric feature recognition
US11729159B2 (en) System security infrastructure facilitating protecting against fraudulent use of individual identity credentials
Chao et al. Biometric-based personal identity-authentication system and security analysis
Kannavara et al. Topics in biometric human-machine interaction security
CN114387137A (en) Block chain-based electronic contract signing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200703