CN112887254A - Personal information confirmation method, device, system and storage medium - Google Patents

Personal information confirmation method, device, system and storage medium Download PDF

Info

Publication number
CN112887254A
CN112887254A CN201911195645.4A CN201911195645A CN112887254A CN 112887254 A CN112887254 A CN 112887254A CN 201911195645 A CN201911195645 A CN 201911195645A CN 112887254 A CN112887254 A CN 112887254A
Authority
CN
China
Prior art keywords
information
personal information
block
nodes
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911195645.4A
Other languages
Chinese (zh)
Inventor
卢毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201911195645.4A priority Critical patent/CN112887254A/en
Publication of CN112887254A publication Critical patent/CN112887254A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a block chain technology-based personal information verification method, a personal information verification device, a personal information verification system, and a storage medium. The block verification method comprises a block chain network and a plurality of nodes on the block chain network, wherein personal information of an individual associated with first information capable of uniquely determining the individual is received at any one of the nodes, the personal information is encrypted by using the first information, summary data for block verification is generated based on the encrypted personal information through Hash operation, at least the first information and the summary data in the first information, the encrypted personal information and the summary data are packaged into a block, the block is sent to the nodes on the block chain network to perform block verification aiming at the block based on the summary data, and the block is saved in the block chain network when the block verification is successful.

Description

Personal information confirmation method, device, system and storage medium
Technical Field
The present invention relates to a block chain technology-based personal information verification method, a personal information verification device, a personal information verification system, and a storage medium.
Background
In recent years, a block chain (Blockchain) technique, which is a distributed data storage technique, has been developed, and various attempts have been made in different technical fields. For example, blockchain techniques are applied to information notarization, trading assets, digital currency issuance and management, academic certification, and community resource sharing, among others. The block chain technology processes data of each node by adopting point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, so that the block chain technology has the characteristics of decentralization for realizing information self-verification, transmission and management, openness for highly transparent information of any node, independence based on specification and protocol consistency, and safety for avoiding artificial data change. With the development of the blockchain technology, the above features are also applied to the field of confirmation (right confirmation) of ownership of personal information.
Generally, a citizen person (hereinafter, also simply referred to as a person) generally has all ownership and use rights of personal information as a holder and a producer of the personal information. In the personal information of the citizen, identity information, physiological characteristic information, social information, video and audio data and the like are recorded, and extremely high requirements exist in terms of security protection and authenticity guarantee, so that the personal information cannot be stolen and rewritten by others at will.
Disclosure of Invention
In the prior art, in order to ensure the authenticity of personal information, a manual review method is generally adopted to confirm (confirm) the ownership of the personal information of citizens. However, since the efficiency of manual review is limited and a huge labor cost needs to be paid, the personal information confirmation in the prior art has problems of low efficiency and high cost. On the other hand, in the case of adopting the manual audit method, it is inevitable that the personal information is manually leaked or rewritten by the auditor, and there is still a risk that the security of the personal information is difficult to be ensured. Further, when security of personal information is not sufficiently ensured, if dispute or infringement occurs in ownership of personal information, the problem can be solved by a lawsuit procedure, but the lawsuit procedure is very complicated and the maintenance cost is high, and a citizen person having ownership of personal information has to give up the maintenance of the ownership of personal information.
The present invention has been made to solve the above-described problems, and an object thereof is to provide a personal information verification method, a personal information verification apparatus, a personal information verification system, and a storage medium, which can efficiently record personal information and effectively ensure authenticity and security of personal information verification.
According to claim 1 of the present invention, there is provided a personal information confirmation method applied to a personal information confirmation system including a blockchain network and a plurality of nodes on the blockchain network, wherein,
at any one of the plurality of nodes,
receiving personal information of an individual associated with first information capable of uniquely determining the individual, wherein the first information is data information of a public key of a key pair composed of a public key and a private key generated for the individual based on an asymmetric cryptographic algorithm, wherein the public key and the private key of the key pair are capable of decrypting each other,
encrypting the personal information using the first information,
generating digest data for block verification based on the encrypted personal information by a hash operation,
packaging at least the first information and the digest data of the first information, the encrypted personal information, and the digest data into a block, sending to the plurality of nodes on a blockchain network for block verification for the block based on the digest data,
if the block verification is successful, saving the block into the blockchain network.
According to claim 2 of the present invention, in the personal information confirmation method according to claim 1,
the encrypted personal information is acquired and,
and decrypting the encrypted personal information by using second information which is data information of the private key.
According to claim 3 of the present invention, there is provided a personal information confirmation method applied to a personal information confirmation system including a blockchain network and a plurality of nodes on the blockchain network, wherein,
at any one of the plurality of nodes,
receiving personal information of an individual associated with first information capable of uniquely determining the individual, wherein the first information is data information of a public key of a key pair composed of the public key and a private key generated for the individual based on an asymmetric cryptographic algorithm,
encrypting the personal information with third information which is password information different from the first information and second information which is data information of the private key,
encrypting the third information using the first information to generate fourth information,
generating digest data for block verification based on the encrypted personal information by a hash operation,
packaging at least the first information, the fourth information, the encrypted personal information, and the digest data of the first information, the fourth information, the encrypted personal information, and the digest data into a block, sending to the plurality of nodes on a blockchain network for block verification for the block based on the digest data,
if the block verification is successful, saving the block into the blockchain network.
According to claim 4 of the present invention, in the personal information confirmation method according to claim 3,
acquiring the fourth information and the encrypted personal information,
decrypting the fourth information using the second information to generate the third information,
and decrypting the encrypted personal information by using the generated third information.
According to claim 5 of the present invention, in the personal information confirmation method according to claim 3,
the encrypted personal information is acquired and,
and decrypting the encrypted personal information by using the third information.
According to claim 6 of the present invention, in the personal information confirmation method according to any one of claims 1 to 5,
determining, in a case where the block verification is successful, a longest block chain record having a longest block chain length of a block chain record, among a plurality of block chain records respectively held at the plurality of nodes,
determining, for each of the plurality of nodes, whether a blockchain length of a blockchain record stored at the node is less than the length of the longest blockchain record or equal to the length of the longest blockchain record,
replacing the blockchain record stored at the node with the longest blockchain record and storing the block into the blockchain record of the node under the condition that the block is judged to be smaller than the longest blockchain length,
and if the block is judged to be equal to the length of the longest blockchain record, saving the block into the blockchain record of the node.
According to claim 7 of the present invention, in the personal information confirmation method according to any one of claims 1 to 5,
each of the plurality of nodes respectively determines whether a storage format of the summary data and/or the encrypted personal information in the block meets a preset standard when the block verification is performed on the block,
in the case of a match, the block verification at the node is successful,
in the event of a non-compliance determination, the block validation at the node is unsuccessful.
According to claim 8 of the present invention, in the personal information confirmation method according to any one of claims 1 to 5,
at each of the plurality of nodes, a display interface is configured for inputting and displaying personal information, the personal information is received from the display interface,
and responding to the input of password information different from the first information, the second information and the third information in the display interface, and displaying personal information in the display interface.
According to claim 9 of the present invention, in the personal information confirmation method according to any one of claims 1 to 5,
the personal information confirmation system further includes a personal information storage unit for storing personal information,
wherein the encrypted personal information is not packed into the block but is stored in the personal information storage unit,
the encrypted personal information is acquired from the personal information storage unit to be decrypted.
According to claim 10 of the present invention, in the personal information confirmation method according to any one of claims 1 to 5,
the personal information includes first identity information including an individual's identification number, driver's license number, signature, eye pupil information, DNA, and fingerprint,
the personal information further includes second identity information for assisting the first identity information, the second identity information including a name, a gender, a ethnicity, a birth date, a family condition, a wedding condition, a native place, an occupation, an income, a health condition, an hobby, a travel record, a eating habit, a property condition, a criminal record, and an academic achievement of the individual,
the personal information also comprises third identity information used for recording life information of the person, and the third identity information comprises copyright contents of pictures, audio, video and characters of the person.
According to claim 11 of the present invention, there is provided a personal information verification system including a blockchain network and a plurality of nodes on the blockchain network, wherein,
at any one of the plurality of nodes,
receiving personal information of an individual associated with first information capable of uniquely determining the individual, wherein the first information is data information of a public key of a key pair composed of a public key and a private key generated for the individual based on an asymmetric cryptographic algorithm, wherein the public key and the private key of the key pair are capable of decrypting each other,
encrypting the personal information using the first information,
generating digest data for block verification based on the encrypted personal information by a hash operation,
packaging at least the first information and the digest data of the first information, the encrypted personal information, and the digest data into a block, sending to the plurality of nodes on a blockchain network for block verification for the block based on the digest data,
if the block verification is successful, saving the block into the blockchain network.
According to claim 12 of the present invention, there is provided a personal information verification system including a blockchain network and a plurality of nodes on the blockchain network, wherein,
at any one of the plurality of nodes,
receiving personal information of an individual associated with first information capable of uniquely determining the individual, wherein the first information is data information of a public key of a key pair composed of the public key and a private key generated for the individual based on an asymmetric cryptographic algorithm,
encrypting the personal information with third information which is password information different from the first information and second information which is data information of the private key,
encrypting the third information using the first information to generate fourth information,
generating digest data for block verification based on the encrypted personal information by a hash operation,
packaging at least the first information, the fourth information, the encrypted personal information, and the digest data of the first information, the fourth information, the encrypted personal information, and the digest data into a block, sending to the plurality of nodes on a blockchain network for block verification for the block based on the digest data,
if the block verification is successful, saving the block into the blockchain network.
According to claim 13 of the present invention, there is provided a personal information confirmation apparatus connected to a block chain network and another node on the block chain network, wherein,
receiving personal information of an individual associated with first information capable of uniquely determining the individual, wherein the first information is data information of a public key of a key pair composed of a public key and a private key generated for the individual based on an asymmetric cryptographic algorithm, wherein the public key and the private key of the key pair are capable of decrypting each other,
encrypting the personal information using the first information,
generating digest data for block verification based on the encrypted personal information by a hash operation,
packaging at least the first information and the digest data of the first information, the encrypted personal information, and the digest data into a block, sending to the plurality of nodes on a blockchain network for block verification for the block based on the digest data,
if the block verification is successful, saving the block into the blockchain network.
According to claim 14 of the present invention, there is provided a personal information confirmation apparatus connected to a block chain network and another node on the block chain network, wherein,
at any one of the plurality of nodes,
receiving personal information of an individual associated with first information capable of uniquely determining the individual, wherein the first information is data information of a public key of a key pair composed of the public key and a private key generated for the individual based on an asymmetric cryptographic algorithm,
encrypting the personal information with third information which is password information different from the first information and second information which is data information of the private key,
encrypting the third information using the first information to generate fourth information,
generating digest data for block verification based on the encrypted personal information by a hash operation,
packaging at least the first information, the fourth information, the encrypted personal information, and the digest data of the first information, the fourth information, the encrypted personal information, and the digest data into a block, sending to the plurality of nodes on a blockchain network for block verification for the block based on the digest data,
if the block verification is successful, saving the block into the blockchain network.
According to claim 15 of the present invention, there is provided a computer-readable storage medium including computer-executable instructions that, when executed by one or more processors, cause the processors to perform the personal information confirmation method according to any one of claims 1 to 10.
According to the invention, the authenticity of the personal information during recording confirmation can be ensured by utilizing the characteristics that the block chain can not be forged and falsified, is public and transparent, and is effective for a long time, and the public key with the function of uniquely identifying the citizen is arranged for the citizen and is used for encrypting the personal information of the citizen, so that the public key is disclosed to all people, thereby being convenient for any organization to record the personal information for the citizen, and simultaneously, the personal information encrypted by the public key can only be decrypted by the private key corresponding to the public key, thereby ensuring the safety of the personal information. Thus, the present invention realizes a process for confirming personal information with both authenticity and security.
According to the present invention, in addition to the above-described personal information confirmation process that can achieve both authenticity and security, the personal information of the citizen individual is encrypted by the fact that another person having the authority to access the personal information of the citizen individual has the encryption information different from the public key and the private key of the citizen individual, and the encryption information is encrypted by the public key, so that the other person having the authority to access the personal information of the citizen individual can decrypt the personal information encrypted by the encryption information by using the encryption information to access the personal information of the citizen individual having the access authority of the other person, and local access of the personal information of the citizen individual by the other person can be achieved, thereby making access for personal information confirmation more flexible.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The present disclosure may be more clearly understood from the following detailed description with reference to the accompanying drawings, in which:
fig. 1 is a schematic diagram showing the configuration of a personal information confirmation system 10 of the present invention.
Fig. 2 is a flowchart showing a first example of the personal information confirmation processing in the personal information confirmation system 10 of the present invention.
Fig. 3 is a flowchart showing a second example of the personal information confirmation processing in the personal information confirmation system 10 of the present invention.
Fig. 4 is a schematic hardware configuration diagram showing a node in the personal information confirmation system 10 of the present invention.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
(configuration of information control System 10)
Fig. 1 is a schematic diagram showing the configuration of a personal information confirmation system 10 of the present invention.
As shown in FIG. 1, the personal information verification system 10 of the present invention includes a plurality of nodes 111-11 n and a block chain network 12.
The personal information confirmation system 10 is, for example, a system that performs overall control of inputting, receiving, storing, acquiring, verifying, right confirmation, right use, right maintenance, and the like of personal information of citizens, and is, for example, a block chain platform.
The nodes 111 to 11n are, for example, nodes that can perform part or all of functions of inputting, receiving, storing, acquiring, verifying, right confirming, right using, right maintaining of personal information of citizens, such as various fixed-type terminals or mobile-type terminals as a blockchain client, e.g., a computer, a notebook, a tablet, a smart phone, a smart wearable device, and more particularly, for example, the terminal device may be a user terminal device personally owned by a citizen, an administrative terminal device configured at an administrative institution such as a public security bureau, an education certification center, and an archive center for inputting personal information of the citizen having legal effectiveness, a social institution terminal device configured at a social institution such as a hospital, a school, and a bank for inputting personal information, or an enterprise terminal device configured at a service enterprise such as an interactive network television IPTV platform for recording personal information. Note that the nodes are not necessarily independent hardware devices, and may be processing resources such as virtual systems, containers, and the like that are distributed in the system and that enable personal information to be confirmed, or may be collectively controlled by a plurality of nodes forming one node group.
More specifically, the nodes 111-11 n include, for example, a communication module, a storage module, and a processing module. The communication module is capable of communicating with each other with each node on the blockchain network 12, for example, transmitting blockchain records regarding the blockchain network, personal information of an individual, cipher data information related to encryption and decryption, and various data generated in the blockchain network, and the like. The storage module can store, for example, personal information of citizens' individuals received at the node, various encryption algorithms, cryptographic data information, blockchain records regarding blockchain networks, and various data generated in blockchain networks, and the like. The processing module is capable of performing a personal information confirmation process, and includes, for example: an acquisition unit that receives and acquires personal information of a citizen person associated with information that can uniquely identify the person; an encryption unit that encrypts the personal information; a calculation unit that generates digest data for block verification based on the personal information from the encrypted personal information by hash calculation; and a block chaining part, which packs the data into blocks and sends the blocks to each node on the block chain network to verify the blocks, and if the block verification is successful, the blocks are stored in the block chain network.
The block chain network 12 is, for example, a distributed database network of memory blocks formed by a plurality of nodes 111 to 11n connected to each other as nodes. For example, in the present embodiment, a block in which encrypted personal information, cipher data information, digest data based on the personal information, and the like are packaged is stored in the blockchain network 12.
In addition, in the present embodiment, the personal information confirmation system 10 may further include a personal information storage unit 13 for storing personal information of a person. In the present embodiment, the explanation is given taking an example in which the encrypted personal information is packaged together with the digest data into a block and stored in the blockchain network 12, and the personal information is acquired from the block stored in the blockchain network 12, but it is also possible to store the personal information in the personal information storage unit 13 without packaging it into a block, and acquire the encrypted personal information from the personal information storage unit 13. The personal information storage unit 13 may be a storage device independent of the plurality of nodes 111 to 11n and the blockchain network 12, may be configured by storage modules of some nodes in the plurality of nodes 111 to 11n in the blockchain network 12 in a distributed manner, or may be a combination of the independent storage device and the storage modules of the nodes.
(first example of personal-information confirmation processing in the personal-information confirmation system 10)
Hereinafter, a flow of a first example of the personal information confirmation process in the personal information confirmation system 10 of the present invention will be described with reference to fig. 2.
First, in step S201, for example, at the node 111, personal information P1 associated with the public key PK1 related to the citizen' S personal P input by the user, the administrative or social institution, the enterprise, or the like is received. Here, a key pair including a public key (public key, in this embodiment, PK1) and a private key (private key, in this embodiment, PK2) is generated in advance by a national information authority (for example, public security bureau) for each citizen. And, the public key PK1 in the key pair serves as an identifier for uniquely identifying the citizen's individual P. The generation of the key pair may be performed by periodically generating the key pair in advance and transmitting the key pair to the individual, may be performed by randomly generating the key pair by a key pair generation device that is capable of randomly generating the key pair and communicates with the national information authority at any time and any place, or may be performed by communicating with the national information authority by a social institution or a business and generating the key pair in advance or randomly in association with each social institution or business. In addition, for the generation of the key pair, an asymmetric cryptographic algorithm (asymmetric cryptographic algorithm) such as an RSA algorithm, an Elgamal algorithm, a knapsack algorithm, a Rabin algorithm, a D-H algorithm, and an ECC (elliptic curve cryptography algorithm) is used. Wherein the public key PK1 and the private key PK2 in the key pair can be decrypted with each other. The public key generated for each citizen individual is not limited to a fixed one, and may be a plurality of public keys as long as the citizen individual can be uniquely identified or identified. In addition, it is generally assumed that the private key is grasped by the citizen individual and the national information authority, so that only the citizen individual and the national information authority can acquire the original personal information encrypted by the public key. Therefore, in the present embodiment, the public key PK1 functions not only as a key for encrypting personal information or other information but also as an identifier for uniquely identifying an individual. Therefore, the public key and the personal identifier uniqueness can be combined, the personal information of the citizen can be encrypted while the citizen is determined by using one piece of data, and then the personal information is decrypted by the citizen or the national information authority with the private key, so that the security is ensured while the personal information is effectively confirmed.
Then, in step S202, the personal information P1 is encrypted based on the public key PK1 of the citizen person P, and encrypted personal information P2 is generated.
Then, in step S203, digest data D for block verification is generated based on the encrypted personal information P2 by Hash operation based on a Hash function (Hash function).
Then, in step S204, the public key PK1, the encrypted personal information P2, and at least the public key PK1 of the digest data D and the digest data D are packaged into a block C, and transmitted to the plurality of nodes 111 to 11n on the block chain network 12 for block verification for the block C based on the digest data D. When each of the plurality of nodes 111-11 n performs block verification on the block C, it is determined whether the storage format of the digest data D and/or the encrypted personal information P2 in the block C meets a preset standard. If the storage format of the digest data D and/or the encrypted personal information P2 in the block C block is determined to meet the preset standard, the block verification at the node is successful, and if the storage format of the digest data D and/or the encrypted personal information P2 in the block C block is determined to not meet the preset standard, the block verification at the node is unsuccessful.
Then, in step S205, the block C is saved in the blockchain network 12 according to the block verification result of the plurality of nodes 111-11 n under the condition that the block verification is successful based on the consensus mechanism. More specifically, among a plurality of blockchain records respectively held in memory modules at a plurality of nodes 111-11 n, the longest blockchain record LCR having the longest blockchain length of the blockchain records is determined. Then, for each of the plurality of nodes 111-11 n, it is determined whether the blockchain length of the blockchain record stored at the node is less than the length LCR of the longest blockchain record or equal to the length LCR of the longest blockchain record. And under the condition that the length of the longest blockchain record LCR is judged to be equal to the length of the longest blockchain record LCR, the blockchain record stored at the node is replaced by the longest blockchain record LCR, the block C is stored in the blockchain record of the node, and under the condition that the length of the blockchain record LCR is judged to be equal to the length of the longest blockchain record LCR, the block C is stored in the blockchain record of the node.
Then, when the citizen person P or the national information authority wants to acquire the personal information P1 of the citizen person P, the encrypted personal information P2 is acquired, and the encrypted personal information P2 is decrypted by using the corresponding private key PK2 of the citizen person P, which can be decrypted with the public key PK1, so that the original personal information P1 is acquired. In the present embodiment, the encrypted personal information P2 is acquired from the tile C stored in the tile chain network 12, but may be acquired from the personal information storage unit 13 when the encrypted personal information P2 is not stored in the tile C but stored in the personal information storage unit 13.
According to the present invention, personal information P1 of an individual associated with a public key PK1 (first information) capable of uniquely determining a citizen's personal P is received at any one of a plurality of nodes 111 to 11n, wherein the public key PK1 is data information of a public key PK1 of a key pair composed of a public key PK1 and a private key PK2 (second information) generated for the citizen's personal P based on an asymmetric encryption algorithm, wherein the public key PK1 and the private key PK2 of the key pair are capable of decrypting each other, the personal information P1 is encrypted with the public key PK1, digest data D for block verification is generated based on the encrypted personal information P2 by a hash operation, the PK1, the encrypted personal information P2 and the digest data D are packed into a block C, and transmitted to the plurality of nodes 111 to 11n on a block chain network 12 for block verification for the block C based on the digest data D, in the event that the block verification is successful, block C is saved into the blockchain network 12. Then, the citizen person P or the national information authority having the private key PK2 can acquire the encrypted personal information P2 and decrypt the encrypted personal information P2 using the private key PK 2. Therefore, the authenticity of the personal information during recording confirmation can be ensured by utilizing the characteristics that the block chain can not be forged and falsified, is public and transparent and is effective for a long time, a public key with the function of uniquely identifying the citizen is arranged on the citizen, and the personal information of the citizen is encrypted by utilizing the public key, so that the public key is disclosed to all people, the personal information can be conveniently recorded for the citizen by any mechanism, and meanwhile, the personal information encrypted by the public key can only be decrypted by a private key corresponding to the public key, so that the safety of the personal information is ensured. Thus, the present invention realizes a process for confirming personal information with both authenticity and security.
(second example of personal information confirmation processing in the personal information confirmation system 10)
Hereinafter, a flow of a second example of the personal information confirmation process in the personal information confirmation system 10 of the present invention will be described with reference to fig. 3. In the above description, terms having the same meanings as those in the first example are denoted by the same reference symbols, and are not repeated.
First, in step S301, for example, at the node 111, personal information P1 related to the public key P1, which is input by a user, an administrative or social institution, a business, or the like, is received in association with the citizen' S person P. Here, a key pair including a public key (PK 1 in the present embodiment) and a private key (PK 2 in the present embodiment) is generated for each citizen.
Then, in step S302, the personal information P1 is encrypted using the password information PK3 to generate encrypted personal information P2, and the password information PK3 is encrypted using the public key PK1 of the citizen' S person P to generate encrypted password information PK 4. The encrypted information PK3 is encrypted data different from the public key PK1 and the private key PK2, and may be generated by, for example, any third party such as a social institution, an enterprise, or the like, but is not limited thereto, as long as the third party such as a social institution, an enterprise, or the like having access rights to the individual information can grasp the encrypted information PK3, and for example, the third party such as a social institution, an enterprise, or the like can decrypt the obtained encrypted individual information with the use of the encrypted information PK3 to access the individual information.
Then, in step S303, digest data D for block verification is generated based on the encrypted personal information P2 by a hash operation.
Then, in step S304, the public key PK1, the encrypted password information PK4, the encrypted personal information P2, and at least the public key PK1, the encrypted password information PK4, and the digest data D of the digest data D are packaged into a block C, and transmitted to the plurality of nodes 111 to 11n on the block chain network 12 to perform block authentication for the block C based on the digest data D. When each of the plurality of nodes 111-11 n performs block verification on the block C, it is determined whether the storage format of the digest data D and/or the encrypted personal information P2 in the block C meets a preset standard. If the storage format of the digest data D and/or the encrypted personal information P2 in the block C block is determined to meet the preset standard, the block verification at the node is successful, and if the storage format of the digest data D and/or the encrypted personal information P2 in the block C block is determined to not meet the preset standard, the block verification at the node is unsuccessful.
Then, in step S305, based on the block verification results of the plurality of nodes 111-11 n, if the block verification based on the consensus mechanism is successful, the block C is saved in the blockchain network 12. More specifically, among a plurality of blockchain records respectively held in memory modules at a plurality of nodes 111-11 n, the longest blockchain record LCR having the longest blockchain length of the blockchain records is determined. Then, for each of the plurality of nodes 111-11 n, it is determined whether the blockchain length of the blockchain record stored at the node is less than the length LCR of the longest blockchain record or equal to the length LCR of the longest blockchain record. And under the condition that the length of the longest blockchain record LCR is judged to be equal to the length of the longest blockchain record LCR, the blockchain record stored at the node is replaced by the longest blockchain record LCR, the block C is stored in the blockchain record of the node, and under the condition that the length of the blockchain record LCR is judged to be equal to the length of the longest blockchain record LCR, the block C is stored in the blockchain record of the node.
Then, when the citizen person P or the national information authority wants to acquire the personal information P1 of the citizen person P, the encrypted password information PK4 in the block C is decrypted by using the corresponding private key PK2 of the citizen person P, which can be decrypted with the public key PK1, to obtain the password information PK 3. Then, the encrypted personal information P2 is decrypted using the obtained password information PK3, thereby obtaining the original personal information P1. When a third party such as a social institution or a business having the password information PK3 wants to access the personal information P1 of the citizen's person P, the encrypted personal information P2 may be decrypted directly using the password information PK3 to obtain the original personal information P1. In the present embodiment, the encrypted personal information P2 is acquired from the tile C stored in the tile chain network 12, but may be acquired from the personal information storage unit 13 when the encrypted personal information P2 is not stored in the tile C but stored in the personal information storage unit 13.
According to the present invention, personal information P1 of a citizen's individual P associated with a public key PK1 capable of uniquely identifying an individual is received at any one of a plurality of nodes 111 to 11n, wherein the public key PK1 is data information of a public key PK1 in a key pair composed of a public key PK1 and a private key PK2 (second information) generated for the citizen's individual P based on an asymmetric encryption algorithm, the personal information P1 is encrypted using cipher information PK3 (third information), the third information PK3 is cipher information different from the public key PK1 and the private key PK2, the cipher information PK3 is encrypted using the public key PK1 to generate encrypted cipher information PK4 (fourth information), digest data for block verification is generated based on the encrypted personal information P2 by a hash operation, the encrypted cipher information PK1, the encrypted cipher information PK4, the encrypted digest information P2 and the encrypted data D are packed into a public key C block, and sending the data to a plurality of nodes 111-11 n on the blockchain network 12 to perform block verification for the block C based on the summary data D, and saving the block C in the blockchain network 12 when the block verification is successful. Then, the citizen person P or the national information authority having the private key PK2 can acquire the encrypted password information PK4 and the encrypted personal information P2, decrypt the encrypted password information PK4 with the private key PK2 to generate password information PK3, and decrypt the encrypted personal information P2 with the generated password information PK 3. Further, a third party who has access right to the personal information P1 of the citizen person P and who grasps the password information PK3 can acquire the encrypted personal information P2 and decrypt the encrypted personal information P2 by directly using the grasped password information PK 3. According to the present invention, in addition to the above-described personal information confirmation process that can achieve both authenticity and security, the personal information of the citizen individual is encrypted by the fact that another person having the authority to access the personal information of the citizen individual has the encryption information different from the public key and the private key of the citizen individual, and the encryption information is encrypted by the public key, so that the other person having the authority to access the personal information of the citizen individual can decrypt the personal information encrypted by the encryption information by using the encryption information to access the personal information of the citizen individual having the access authority of the other person, and local access of the personal information of the citizen individual by the other person can be achieved, thereby making access for personal information confirmation more flexible.
(modification example)
In the present embodiment, as described above, the explanation will be made by taking an example in which the encrypted personal information P1 is packaged together with the digest data D into the blob C and stored in the blob chain network 12, and the personal information P1 is acquired from the blob C stored in the blob chain network 12. However, it is also possible to save the encrypted personal information P2 in the personal-information storage unit 13 of the personal-information confirmation system 10 without being packed in the block C and acquire the encrypted personal information P2 from the personal-information storage unit 13. This can reduce the storage pressure of the block chain network 12, and can realize centralized management of storage of personal information of citizens, thereby further enhancing security.
Alternatively, the personal information may include, for example, first identity information including, for example, an identity number of the individual, a driver license number, a signature, eye pupil information, DNA, a fingerprint.
Optionally, the personal information may further include, for example, second identity information for assisting the first identity information, the second identity information including, for example, a name, a gender, a ethnicity, a birth date, a family condition, a wedding condition, a native place, a occupation, an income, a health condition, an interest, a travel record, a eating habit, a property condition, a criminal record, an academic achievement, and the like of the individual.
Optionally, the personal information may further include third identity information for recording life information of the citizen, such as picture, audio, video, text and other copyright contents of the person. For example, in the case of application to an IPTV platform system, an individual may upload copyrighted content to the IPTV platform system first to complete confirmation of personal information, so that copyright confirmation can be achieved for private content or content that is temporarily unpublished.
Optionally, the information input side of the first identity information is authenticated by an administrative authority.
Optionally, one of the nodes in the blockchain network 12 is similar and different from the other nodes.
Optionally, at each of the plurality of nodes 111-11 n, a display interface for inputting and displaying personal information is configured, from which the personal information is received. Further, for example, it is necessary to input a password different from the public key PK1, the private key PK2, the password information PK3, and the like of the citizen person P, and the personal information can be displayed on the display interface for the citizen person P. That is, in response to the input of a password different from the public key PK1, the private key PK2, the password information PK3, and the like of the citizen person P on the display interface, the personal information is displayed on the citizen person P on the display interface. This can further prevent leakage of personal information of the citizen, and improve the security of the entire personal information verification system 10.
(hardware construction of node)
Next, referring to fig. 4, a schematic hardware configuration of a node in the personal information confirmation system 10 of the present invention is explained.
The node comprises at least a processor 1101, a memory 1102, a storage device 1103, a communication device 1104, a bus 1105.
The processor 1101 may be, for example, a Central Processing Unit (CPU) or a Digital Signal Processor (DSP), and may include circuitry such as an Integrated Circuit (IC), an Application Specific Integrated Circuit (ASIC), portions or circuitry of individual processor cores, an entire processor core, individual processors, a programmable hardware device such as a Field Programmable Gate Array (FPGA), and/or a system including multiple processors.
The memory 1102 includes, for example, a Random Access Memory (RAM) and a Read Only Memory (ROM), and stores various data and programs executed by the processor 1101. The storage device 1103 may include a storage medium such as a semiconductor memory and a hard disk.
The communication device 1104 may be a communication device based on a wired system or a communication device based on a wireless communication system, and includes, for example, a network adapter, a network transceiver, a multiplexer, a repeater, a hub, a bridge, a switch, a router, a gateway, and the like. The communication device 1104 can communicate with each node, for example, and transmit and receive various information data.
The bus 1105 connects the processor 1101, the memory 1102, the storage device 1103, and the communication device 1104 to each other. The bus 1105 may include two or more buses (such as a high speed bus and a low speed bus) each having a different speed.
It should be appreciated that reference throughout this specification to "an embodiment" or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, appearances of the phrases "in embodiments of the present disclosure" and similar language throughout this specification do not necessarily all refer to the same embodiment.
One skilled in the art will appreciate that the present disclosure can be implemented as a system, apparatus, method, or computer-readable medium (e.g., non-transitory storage medium) as a computer program product. Accordingly, the present disclosure may be embodied in various forms, such as an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-program code, etc.) or an embodiment combining software and hardware aspects that may all be referred to hereinafter as a "circuit," module "or" system. Furthermore, the present disclosure may also be embodied in any tangible media as a computer program product having computer usable program code stored thereon.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of systems, apparatuses, methods and computer program products according to specific embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and any combination of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be executed by a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, implement the functions or acts specified in the flowchart and/or block diagram block or blocks.
Flowcharts and block diagrams of the architecture, functionality, and operation in which systems, apparatuses, methods and computer program products according to various embodiments of the present disclosure may be implemented are shown in the accompanying drawings. Accordingly, each block in the flowchart or block diagrams may represent a module, segment, or portion of program code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in the drawings may be executed substantially concurrently, or in some cases, in the reverse order from the drawing depending on the functions involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Having described embodiments of the present disclosure, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or technical improvements to the market technology, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (15)

1. A personal information confirmation method applied to a personal information confirmation system including a blockchain network and a plurality of nodes on the blockchain network, wherein,
at any one of the plurality of nodes,
receiving personal information of an individual associated with first information capable of uniquely determining the individual, wherein the first information is data information of a public key of a key pair composed of a public key and a private key generated for the individual based on an asymmetric cryptographic algorithm, wherein the public key and the private key of the key pair are capable of decrypting each other,
encrypting the personal information using the first information,
generating digest data for block verification based on the encrypted personal information by a hash operation,
packaging at least the first information and the digest data of the first information, the encrypted personal information, and the digest data into a block, sending to the plurality of nodes on a blockchain network for block verification for the block based on the digest data,
if the block verification is successful, saving the block into the blockchain network.
2. The personal information confirmation method according to claim 1,
the encrypted personal information is acquired and,
and decrypting the encrypted personal information by using second information which is data information of the private key.
3. A personal information confirmation method applied to a personal information confirmation system including a blockchain network and a plurality of nodes on the blockchain network, wherein,
at any one of the plurality of nodes,
receiving personal information of an individual associated with first information capable of uniquely determining the individual, wherein the first information is data information of a public key of a key pair composed of the public key and a private key generated for the individual based on an asymmetric cryptographic algorithm,
encrypting the personal information with third information which is password information different from the first information and second information which is data information of the private key,
encrypting the third information using the first information to generate fourth information,
generating digest data for block verification based on the encrypted personal information by a hash operation,
packaging at least the first information, the fourth information, the encrypted personal information, and the digest data of the first information, the fourth information, the encrypted personal information, and the digest data into a block, sending to the plurality of nodes on a blockchain network for block verification for the block based on the digest data,
if the block verification is successful, saving the block into the blockchain network.
4. The personal information confirmation method according to claim 3,
acquiring the fourth information and the encrypted personal information,
decrypting the fourth information using the second information to generate the third information,
and decrypting the encrypted personal information by using the generated third information.
5. The personal information confirmation method according to claim 3,
the encrypted personal information is acquired and,
and decrypting the encrypted personal information by using the third information.
6. The personal information confirmation method according to any one of claims 1 to 5,
determining, in a case where the block verification is successful, a longest block chain record having a longest block chain length of a block chain record, among a plurality of block chain records respectively held at the plurality of nodes,
determining, for each of the plurality of nodes, whether a blockchain length of a blockchain record stored at the node is less than the length of the longest blockchain record or equal to the length of the longest blockchain record,
replacing the blockchain record stored at the node with the longest blockchain record and storing the block into the blockchain record of the node under the condition that the block is judged to be smaller than the longest blockchain length,
and if the block is judged to be equal to the length of the longest blockchain record, saving the block into the blockchain record of the node.
7. The personal information confirmation method according to any one of claims 1 to 5,
each of the plurality of nodes respectively determines whether a storage format of the summary data and/or the encrypted personal information in the block meets a preset standard when the block verification is performed on the block,
in the case of a match, the block verification at the node is successful,
in the event of a non-compliance determination, the block validation at the node is unsuccessful.
8. The personal information confirmation method according to any one of claims 1 to 5,
at each of the plurality of nodes, a display interface is configured for inputting and displaying personal information, the personal information is received from the display interface,
and responding to the input of password information different from the first information, the second information and the third information in the display interface, and displaying personal information in the display interface.
9. The personal information confirmation method according to any one of claims 1 to 5,
the personal information confirmation system further includes a personal information storage unit for storing personal information,
wherein the encrypted personal information is not packed into the block but is stored in the personal information storage unit,
the encrypted personal information is acquired from the personal information storage unit to be decrypted.
10. The personal information confirmation method according to any one of claims 1 to 5,
the personal information includes first identity information including an individual's identification number, driver's license number, signature, eye pupil information, DNA, and fingerprint,
the personal information further includes second identity information for assisting the first identity information, the second identity information including a name, a gender, a ethnicity, a birth date, a family condition, a wedding condition, a native place, an occupation, an income, a health condition, an hobby, a travel record, a eating habit, a property condition, a criminal record, and an academic achievement of the individual,
the personal information also comprises third identity information used for recording life information of the person, and the third identity information comprises copyright contents of pictures, audio, video and characters of the person.
11. A personal information confirmation system comprising a blockchain network and a plurality of nodes on the blockchain network, wherein,
at any one of the plurality of nodes,
receiving personal information of an individual associated with first information capable of uniquely determining the individual, wherein the first information is data information of a public key of a key pair composed of a public key and a private key generated for the individual based on an asymmetric cryptographic algorithm, wherein the public key and the private key of the key pair are capable of decrypting each other,
encrypting the personal information using the first information,
generating digest data for block verification based on the encrypted personal information by a hash operation,
packaging at least the first information and the digest data of the first information, the encrypted personal information, and the digest data into a block, sending to the plurality of nodes on a blockchain network for block verification for the block based on the digest data,
if the block verification is successful, saving the block into the blockchain network.
12. A personal information confirmation system comprising a blockchain network and a plurality of nodes on the blockchain network, wherein,
at any one of the plurality of nodes,
receiving personal information of an individual associated with first information capable of uniquely determining the individual, wherein the first information is data information of a public key of a key pair composed of the public key and a private key generated for the individual based on an asymmetric cryptographic algorithm,
encrypting the personal information with third information which is password information different from the first information and second information which is data information of the private key,
encrypting the third information using the first information to generate fourth information,
generating digest data for block verification based on the encrypted personal information by a hash operation,
packaging at least the first information, the fourth information, the encrypted personal information, and the digest data of the first information, the fourth information, the encrypted personal information, and the digest data into a block, sending to the plurality of nodes on a blockchain network for block verification for the block based on the digest data,
if the block verification is successful, saving the block into the blockchain network.
13. A personal information confirmation apparatus connected to a blockchain network and other nodes on the blockchain network, wherein,
receiving personal information of an individual associated with first information capable of uniquely determining the individual, wherein the first information is data information of a public key of a key pair composed of a public key and a private key generated for the individual based on an asymmetric cryptographic algorithm, wherein the public key and the private key of the key pair are capable of decrypting each other,
encrypting the personal information using the first information,
generating digest data for block verification based on the encrypted personal information by a hash operation,
packaging at least the first information and the digest data of the first information, the encrypted personal information, and the digest data into a block, sending to the plurality of nodes on a blockchain network for block verification for the block based on the digest data,
if the block verification is successful, saving the block into the blockchain network.
14. A personal information confirmation apparatus connected to a blockchain network and other nodes on the blockchain network, wherein,
at any one of the plurality of nodes,
receiving personal information of an individual associated with first information capable of uniquely determining the individual, wherein the first information is data information of a public key of a key pair composed of the public key and a private key generated for the individual based on an asymmetric cryptographic algorithm,
encrypting the personal information with third information which is password information different from the first information and second information which is data information of the private key,
encrypting the third information using the first information to generate fourth information,
generating digest data for block verification based on the encrypted personal information by a hash operation,
packaging at least the first information, the fourth information, the encrypted personal information, and the digest data of the first information, the fourth information, the encrypted personal information, and the digest data into a block, sending to the plurality of nodes on a blockchain network for block verification for the block based on the digest data,
if the block verification is successful, saving the block into the blockchain network.
15. A computer-readable storage medium comprising computer-executable instructions that, when executed by one or more processors, cause the processors to perform a personal information confirmation method as claimed in any one of claims 1 to 10.
CN201911195645.4A 2019-11-29 2019-11-29 Personal information confirmation method, device, system and storage medium Pending CN112887254A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911195645.4A CN112887254A (en) 2019-11-29 2019-11-29 Personal information confirmation method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911195645.4A CN112887254A (en) 2019-11-29 2019-11-29 Personal information confirmation method, device, system and storage medium

Publications (1)

Publication Number Publication Date
CN112887254A true CN112887254A (en) 2021-06-01

Family

ID=76038865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911195645.4A Pending CN112887254A (en) 2019-11-29 2019-11-29 Personal information confirmation method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN112887254A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113706047A (en) * 2021-09-03 2021-11-26 北京十速网络科技有限公司 Personal credit information authenticity evaluation method and system based on block chain technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101753311A (en) * 2010-01-14 2010-06-23 杨筑平 Information privacy and identity authentication method and digital signature program
CN108390894A (en) * 2018-04-20 2018-08-10 黄绍进 A kind of personal information based on block chain really weighs method and block chain client
CN108600227A (en) * 2018-04-26 2018-09-28 众安信息技术服务有限公司 A kind of medical data sharing method and device based on block chain
CN109617698A (en) * 2019-01-09 2019-04-12 腾讯科技(深圳)有限公司 Provide the method for digital certificate, digital certificate issues center and medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101753311A (en) * 2010-01-14 2010-06-23 杨筑平 Information privacy and identity authentication method and digital signature program
CN108390894A (en) * 2018-04-20 2018-08-10 黄绍进 A kind of personal information based on block chain really weighs method and block chain client
CN108600227A (en) * 2018-04-26 2018-09-28 众安信息技术服务有限公司 A kind of medical data sharing method and device based on block chain
CN109617698A (en) * 2019-01-09 2019-04-12 腾讯科技(深圳)有限公司 Provide the method for digital certificate, digital certificate issues center and medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113706047A (en) * 2021-09-03 2021-11-26 北京十速网络科技有限公司 Personal credit information authenticity evaluation method and system based on block chain technology

Similar Documents

Publication Publication Date Title
US20190074968A1 (en) Method, apparatus and system for data encryption and decryption
US10003582B2 (en) Technologies for synchronizing and restoring reference templates
US10437469B2 (en) Secure interactions involving superimposing image of a virtual keypad over image of a touchscreen keypad
US20210246824A1 (en) Method and apparatus for securing communications using multiple encryption keys
JP6543040B2 (en) System and method for remote access, remote digital signature
EP3509006A1 (en) Information sharing system
CN104935553B (en) Unified identity authentication platform and authentication method
NO20093259A1 (en) encryption
US9230133B2 (en) Secure access for sensitive digital information
US8220040B2 (en) Verifying that group membership requirements are met by users
US20220005039A1 (en) Delegation method and delegation request managing method
KR20130129478A (en) Method for securely drawing up a virtual multiparty contract capable of being physically represented
CN109495497A (en) Based on the management of credit worthiness dynamic and domestic cryptographic algorithm privacy information encrypted transmission method
US20100005519A1 (en) System and method for authenticating one-time virtual secret information
US10956909B2 (en) Systems and methods for identity atomization and usage
CN112699353A (en) Financial information transmission method and financial information transmission system
CN110365472B (en) Quantum communication service station digital signature method and system based on asymmetric key pool pair
CN112699390B (en) Data processing method, device, electronic equipment, storage medium and program product
CN106027254A (en) Secret key use method for identity card reading terminal in identity card authentication system
CN108365952A (en) A kind of method of registration, system and intelligent key safety equipment
CN112887254A (en) Personal information confirmation method, device, system and storage medium
CN104820807B (en) A kind of intelligent card data processing method
CN106027474A (en) Identity card reading terminal in identity card authentication system
CN117370673B (en) Data management method and device for algorithm recommendation service
TWM579789U (en) Electronic contract signing device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210601