CN111371808A - Universal block chain identity recognition technology - Google Patents
Universal block chain identity recognition technology Download PDFInfo
- Publication number
- CN111371808A CN111371808A CN202010222074.5A CN202010222074A CN111371808A CN 111371808 A CN111371808 A CN 111371808A CN 202010222074 A CN202010222074 A CN 202010222074A CN 111371808 A CN111371808 A CN 111371808A
- Authority
- CN
- China
- Prior art keywords
- information
- block chain
- electronic
- data
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a general block chain identity recognition technology, which is characterized in that: the method comprises the following steps: s1, applying for joining in a block chain system, inputting human body information, and matching with the identity card number of the user for data storage; s2, encrypting your personal information, generating a unique ID and recording; s3, determining information through the block chain for different networks; authorization is carried out after the ID is determined; s4, after authorized use, generating records and storing, analyzing personal information, commodities and areas where the commodities are used when you log in through big data, verifying accuracy of the information, ensuring normal data determination, ensuring safety and uniqueness due to the fact that an ID is the only one, and a block chain cannot be tampered, providing a transparent mechanism for information flow, logistics and fund flow of the commodities from an algorithm level, performing cloud storage on the generated records, performing backup and ensuring safety of the data.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a general block chain identity recognition technology.
Background
The block chain is a term in the technical field of information, and essentially, the block chain is a shared database, data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'open transparency', 'collective maintenance' and the like, and based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has a wide application prospect;
however, the general block chain identification technology in the current market is not unique enough for identifying multiple networks, so that data confusion and data loss are caused, and the accuracy of the data cannot be correctly ensured.
Disclosure of Invention
The invention provides a universal block chain identity recognition technology, which can effectively solve the problems that the universal block chain identity recognition technology in the current market is not unique enough for recognizing multiple networks, so that data is disordered and lost, and the accuracy of the data cannot be correctly ensured.
In order to achieve the purpose, the invention provides the following technical scheme: a general block chain identity recognition technology is characterized in that: the method comprises the following steps:
s1, applying for joining in a block chain system, inputting human body information, and matching with the identity card number of the user for data storage;
s2, encrypting your personal information, generating a unique ID and recording;
s3, for different networks, after information is determined through the block chain, authorization is performed after ID determination;
and S4, generating a record and storing the record after the authorized use.
According to the technical scheme, the human body information in the step S1 comprises fingerprints, palm prints, pupils, veins and self-set 9-bit passwords, the first information is filled by the user or a guardian, and then the personal information of the user, the commodity in which the user logs in and the area where the user is located are analyzed through big data, so that the accuracy of the information of the user is verified.
According to the above technical solution, the ID in the step S2 is only one and cannot be changed.
According to the technical scheme, the block chain in the step S3 is not tampered, and a transparent mechanism is provided for information flow, logistics and fund flow of commodities from an algorithm level.
According to the above technical solution, the ID in the step S2 includes an electronic signature, a digital certificate, and an electronic authentication service;
the electronic signature is data which is contained in an electronic form in a data message, attached to the data message and used for identifying the identity of a signer and indicating that the signer approves the content of the data message;
the digital signature is that a pair of uniquely matched asymmetric keys, namely a public key and a private key, is established through a mathematical operation, and signature and verification are realized by encrypting and decrypting a data message by using an asymmetric cipher encryption system;
the digital certificate is a data message or other electronic files containing public key data and identity information of the electronic signer, and the relation between the electronic signer and the private key is established through a corresponding relation between the public key and the private key;
the electronic authentication service is an activity for providing certification for the authenticity and the reliability of the electronic signature, and comprises three parts of authenticity authentication of the identity of a signer, reliability authentication of a signature process and integrity authentication of a data message.
According to the above technical solution, the generated record is cloud-saved and backed up in step S4.
Compared with the prior art, the invention has the beneficial effects that: the invention has scientific and reasonable structure and safe and convenient use, analyzes personal information of the user, the commodity logged in for use and the area where the commodity is located through big data, thereby verifying the accuracy of the personal information, ensuring normal data determination, ensuring the safety and uniqueness of the commodity due to the unique ID, preventing the block chain from being tampered, providing a transparent mechanism for information flow, logistics and fund flow of the commodity from the aspect of algorithm, performing cloud storage on the generated records, performing backup and ensuring the safety of the data.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
In the drawings:
FIG. 1 is a schematic view of the flow structure of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example (b): as shown in fig. 1, the present invention provides a technical solution, a general block chain identification technology, which is characterized in that: the method comprises the following steps:
s1, applying for joining in a block chain system, inputting human body information, and matching with the identity card number of the user for data storage;
s2, encrypting your personal information, generating a unique ID and recording;
s3, for different networks, after information is determined through the block chain, authorization is performed after ID determination;
and S4, generating a record and storing the record after the authorized use.
According to the technical scheme, the human body information in the step S1 comprises fingerprints, palm prints, pupils, veins and self-set 9-bit passwords, the first-time information is filled by the user or a guardian, and then the personal information of the user, the commodities and the area where the user logs in are analyzed through big data, so that the accuracy of the information of the user is verified.
According to the above technical solution, the ID in step S2 is unique and cannot be changed.
According to the technical scheme, the block chain in the step S3 can not be tampered, and a transparent mechanism is provided for information flow, logistics and fund flow of commodities from the aspect of algorithm.
According to the above technical solution, the ID in step S2 includes an electronic signature, a digital certificate, and an electronic authentication service;
the electronic signature is data which is contained in an electronic form in a data message, attached to the data message and used for identifying the identity of a signer and indicating that the signer approves the content of the data message;
the digital signature is that a pair of uniquely matched asymmetric keys, namely a public key and a private key, are established through a mathematical operation, and signature and verification are realized by encrypting and decrypting a data message by using an asymmetric cipher encryption system;
the digital certificate is a data message or other electronic files containing public key data and identity information of the electronic signer, and the relation between the electronic signer and the private key is established through a corresponding relation between the public key and the private key;
the electronic authentication service is an activity for proving the authenticity and the reliability of the electronic signature, and comprises three parts of authenticity authentication of the identity of a signer, reliability authentication of a signature process and integrity authentication of a data message.
According to the above technical solution, the generated record is cloud-saved and backed up in step S4.
Compared with the prior art, the invention has the beneficial effects that: the invention has scientific and reasonable structure and safe and convenient use, analyzes personal information of the user, the commodity logged in for use and the area where the commodity is located through big data, thereby verifying the accuracy of the personal information, ensuring normal data determination, ensuring the safety and uniqueness of the commodity due to the unique ID, preventing the block chain from being tampered, providing a transparent mechanism for information flow, logistics and fund flow of the commodity from the aspect of algorithm, performing cloud storage on the generated records, performing backup and ensuring the safety of the data.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (6)
1. A general block chain identity recognition technology is characterized in that: the method comprises the following steps:
s1, applying for joining in a block chain system, inputting human body information, and matching with the identity card number of the user for data storage;
s2, encrypting your personal information, generating a unique ID and recording;
s3, for different networks, after information is determined through the block chain, authorization is performed after ID determination;
and S4, generating a record and storing the record after the authorized use.
2. The universal blockchain identification technology according to claim 1, wherein the personal information in step S1 includes fingerprints, palm prints, pupils, veins and self-set 9-bit passwords, and the first information is filled by the user or guardian, and then the personal information and the commodity and the area where you log in for use are analyzed through big data, so as to verify the accuracy of your information.
3. The technique of claim 1, wherein the ID in step S2 is unique and cannot be changed.
4. The universal blockchain identity recognition technique according to claim 1, wherein the blockchain in step S3 is not tampered, and a transparent mechanism is provided for information flow, logistics and fund flow of the commodity from an algorithm level.
5. The universal blockchain identification technology according to claim 1, wherein the ID in step S2 includes an electronic signature, a digital certificate and an electronic authentication service;
the electronic signature is data which is contained in an electronic form in a data message, attached to the data message and used for identifying the identity of a signer and indicating that the signer approves the content of the data message;
the digital signature is that a pair of uniquely matched asymmetric keys, namely a public key and a private key, is established through a mathematical operation, and signature and verification are realized by encrypting and decrypting a data message by using an asymmetric cipher encryption system;
the digital certificate is a data message or other electronic files containing public key data and identity information of the electronic signer, and the relation between the electronic signer and the private key is established through a corresponding relation between the public key and the private key;
the electronic authentication service is an activity for providing certification for the authenticity and the reliability of the electronic signature, and comprises three parts of authenticity authentication of the identity of a signer, reliability authentication of a signature process and integrity authentication of a data message.
6. The technique for identifying a universal blockchain identity according to claim 1, wherein the generated records are cloud-saved and backed up in step S4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010222074.5A CN111371808A (en) | 2020-03-26 | 2020-03-26 | Universal block chain identity recognition technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010222074.5A CN111371808A (en) | 2020-03-26 | 2020-03-26 | Universal block chain identity recognition technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111371808A true CN111371808A (en) | 2020-07-03 |
Family
ID=71211239
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010222074.5A Pending CN111371808A (en) | 2020-03-26 | 2020-03-26 | Universal block chain identity recognition technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111371808A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113641968A (en) * | 2021-08-14 | 2021-11-12 | 永旗(北京)科技有限公司 | Identity verification method based on block chain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180253539A1 (en) * | 2017-03-05 | 2018-09-06 | Ronald H. Minter | Robust system and method of authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates. |
CN108833114A (en) * | 2018-06-13 | 2018-11-16 | 上海交通大学 | A kind of decentralization identity authorization system and method based on block chain |
CN109493058A (en) * | 2018-12-14 | 2019-03-19 | 深圳壹账通智能科技有限公司 | A kind of personal identification method and relevant device based on block chain |
CN109687965A (en) * | 2019-02-18 | 2019-04-26 | 哈尔滨工业大学(深圳) | The real name identification method of subscriber identity information in a kind of protection network |
-
2020
- 2020-03-26 CN CN202010222074.5A patent/CN111371808A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180253539A1 (en) * | 2017-03-05 | 2018-09-06 | Ronald H. Minter | Robust system and method of authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates. |
CN108833114A (en) * | 2018-06-13 | 2018-11-16 | 上海交通大学 | A kind of decentralization identity authorization system and method based on block chain |
CN109493058A (en) * | 2018-12-14 | 2019-03-19 | 深圳壹账通智能科技有限公司 | A kind of personal identification method and relevant device based on block chain |
CN109687965A (en) * | 2019-02-18 | 2019-04-26 | 哈尔滨工业大学(深圳) | The real name identification method of subscriber identity information in a kind of protection network |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113641968A (en) * | 2021-08-14 | 2021-11-12 | 永旗(北京)科技有限公司 | Identity verification method based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8447991B2 (en) | Card authentication system | |
US6871278B1 (en) | Secure transactions with passive storage media | |
US7526653B1 (en) | Method of data protection | |
US11095646B2 (en) | Method and system for data security within independent computer systems and digital networks | |
CN109639651A (en) | Contract based on living body authentication and block chain technology signs authentication method and its system online | |
US20030101348A1 (en) | Method and system for determining confidence in a digital transaction | |
CN107819587A (en) | Authentication method and user equipment and certificate server based on full homomorphic cryptography | |
CN109768983A (en) | Dynamic and Multi dimensional personal identification method, apparatus and system based on block chain | |
CN108009445B (en) | Semi-centralized trusted data management system | |
CN105264537A (en) | System and method for biometric authentication with device attestation | |
WO2003007527A2 (en) | Biometrically enhanced digital certificates and system and method for making and using | |
WO2011025352A2 (en) | Method for producing an electro-biometric signature allowing legal interaction between and identification of persons | |
CN106899551A (en) | Authentication method, certification terminal and system | |
Cavoukian et al. | Advances in biometric encryption: Taking privacy by design from academic research to deployment | |
US11288349B2 (en) | System and method for authentication using biometric hash strings | |
CN113472521A (en) | Block chain-based real-name digital identity management method, signature device and verification device | |
WO2020000777A1 (en) | Method and apparatus for acquiring individual credit information on the basis of block chain, and computer device | |
CN108540447A (en) | A kind of certification authentication method and system based on block chain | |
CN103368736A (en) | Business information encryption and decryption method and device | |
CN111371808A (en) | Universal block chain identity recognition technology | |
CN104751042A (en) | Credibility detection method based on password hash and biometric feature recognition | |
US11729159B2 (en) | System security infrastructure facilitating protecting against fraudulent use of individual identity credentials | |
Chao et al. | Biometric-based personal identity-authentication system and security analysis | |
Kannavara et al. | Topics in biometric human-machine interaction security | |
CN114387137A (en) | Block chain-based electronic contract signing method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200703 |