CN107181765A - Network digital identity identifying method based on block chain technology - Google Patents
Network digital identity identifying method based on block chain technology Download PDFInfo
- Publication number
- CN107181765A CN107181765A CN201710610171.XA CN201710610171A CN107181765A CN 107181765 A CN107181765 A CN 107181765A CN 201710610171 A CN201710610171 A CN 201710610171A CN 107181765 A CN107181765 A CN 107181765A
- Authority
- CN
- China
- Prior art keywords
- user
- digital
- block chain
- service
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention is a kind of network digital identity identifying method based on block chain technology, including 1)User's registration, carries out identity authentication service using vLink protocol views, block chain is uploaded if legal, block chain broadcasts the user profile to the whole network, and each node is added to the user profile between corresponding block, block and is relatively checking;2)The information of user is obtained, searching user's information is carried out by the service of vKey attribute authorities, the user name of user is returned, sex returns to a specific openid, to distinguish different users while age information;3)During the digital identification authentication using above-mentioned piece of chain technology, data are handled by signature.The present invention solves the information leakage occurred now, network fraudulent act by the way that users personal data is stored in into block chain from root, it is ensured that the security of data;Handled in data transmission procedure using digital signature, sensitive information is not tampered with the transmission of digital signature.
Description
Technical field
The present invention relates to computer networking technology, more particularly, to network digital Identity Management system, complete to set networking
The processes such as standby registration, login, certification and transmission.
Background technology
When we carry out more convenient operation using some networked devices, it is required for by various network identities
The process such as registration, login, certification and transmission.Our network identity all basic systems of real name now, wherein containing me
Important essential information.
The illegal activities related to identity such as the network swindle, the infringement that occurred in recent years, are badly in need of structure complete set feasible
Digital identity management system, to protect the information and property safety of citizen.The behind of some similar network trading application scenarios
Have an entity, how to allow its it is corresponding with network identity be digital identity management system category, not no good solution,
The problem of just occurring a series of relevant with network identity.
Authentication:Authentication is also referred to as " authentication " or " identity discriminating ", refers in computer and computer network
The process of operator's identity is confirmed in network system, so that it is determined that whether the user has access and the right to use to certain resource
Limit, and then the access strategy of cyber-net system is reliably and efficiently performed, prevent attacker from palming off validated user
Obtain the access rights of resource, it is ensured that the safety of system and data, and authorize the legitimate interests of visitor.
Block chain refer to by decentralization and go trust in the way of collective safeguard an authentic data storehouse technical scheme, its
Process of exchange is as follows:
The first step:Owner a signs a digital signature using her private key to preceding once transaction and next bit owner b, and
This signature is attached to the end of this piece of currency, trading card is fabricated to;
Second step:A broadcasts trading card to the whole network, and bit coin has been transmitted to b, and each node receives the Transaction Information received
Enter a block;
3rd step:Each node so as to go to obtain the right for creating new block, and is striven for obtaining bit by solving one of mathematical problem
The reward of coin(New bit coin can be produced in the process);
4th step:When a node finds solution, all lid timestamps that it just broadcasts block record to the whole network are merchandised, and right
Other node checks of the whole network;
5th step:They are by after the legal region after the correctness of other node checks of the whole network block book keeping operation, no mistake
Next block is competed, material is thus formed the block chain of a legal book keeping operation.
A kind of data platform based on block chain technology how is set up, information leakage, network swindle are solved from root
Behavior, it is ensured that the security of data is the task of top priority.
The content of the invention
The purpose of the present invention is to propose to a kind of digital identification authentication system based on block chain technology, provided to different application
Authentication data memory etc. is serviced, and it has merged block chain, and the security of information has been effectively ensured.Available for the users such as client letter
The business such as breath storage.
In order to realize the purpose of the present invention, using following technical scheme:
A kind of network digital identity identifying method based on block chain technology, it is characterised in that described method includes:
1)User's registration, fills in complete personal information, and identity authentication service is carried out using vLink protocol views, if closed
Rule uploads block chain, and block chain broadcasts the user profile to the whole network, and the user profile is added to correspondence by each node
Block, be relatively checking between block;If not conforming to rule registration failure;
2)The information of user is obtained, searching user's information is carried out by the service of vKey attribute authorities, the user name of user, property is returned
Not, an openid is returned to while age information, each user is labeled a specific openid, different to distinguish
User;
3)During the digital identification authentication using above-mentioned piece of chain technology, data are handled by signature.
Described data signature processing method specific absolutely is as follows:
1)The source language message is carried out Hash operation by originating party A, obtains a cryptographic Hash i.e. digital digest MD;
2)Originating party A using asymmetric RSA Algorithm, is encrypted to digital digest MD with the private key PVA of oneself, is produced digital label
Name DS;
3)The originating party A public key PBA of symmetry algorithm DES symmetric key SK to the source language message, digital signature SD and originating party A certificates
Encrypted using symmetry algorithm, obtain encryption information E;
4)Originating party debit B public key PBB, is encrypted using RSA Algorithm to symmetric key SK, is formed digital envelope DE, is just looked like
Symmetric key SK has been attached in an envelope with debit's public key encryption;
5)Encryption information E and digital envelope DE are sent jointly to debit B by originating party A;
6)Debit B is received after digital envelope DE, decrypts digital envelope with the private key PVB of oneself first, takes out symmetric key SK;
7)Debit B decrypts encryption information E with symmetric key SK by DES algorithms, restores the source language message, digital signature SD and hair
The public key PBA of square A certificates;
8)Debit B verifies digital signature, first obtains digital digest MD with originating party A public key decryptions digital signature;
9)Debit B tries to achieve a new digital digest MD ' simultaneously by the source language message with same Hash operation;
10)Two digital digests MD and MD ' are compared, whether checking original text is changed.If the two is equal, illustrate data
It is not tampered with, is secrecy transmission, signature is real, then agrees to that the data transfer is gone over;Otherwise the signature, data are refused
Bust this.
The user includes natural person user, legal person user and equipment user;The service provided takes including authentication
Business, attribute authority service, Digital signature service, credit third party " he demonstrate,proves ", user " from demonstrate,proving " and public's " card altogether ".
The identity authentication service carries out identity authentication service using vLink protocol agreements, it is ensured that legal user
Add;One user, which is linked to after checking in block chain, to be permanently stored;Recorded information field is associated with generation timestamp
And correspondingly, with uniqueness and can not tamper;The attribute authority service is provided in authentication after, and mandate includes
The attribute information of name and sex;Transmission is encrypted to the user profile according to digital signature in Digital signature service, it is ensured that its safety
Property.
The block chain uses Smart Data Engine, is worked on the basis of bit coin POW using kinematic nonlinearity
Proof mechanism is measured, the degree of difficulty that each miner is elected as verifier is adjusted, it is to avoid tends to the possibility of exclusive checking, solves
The problem of 51% attack, the acknowledging time of average block is shortened, the performance of operation per second is significantly improved.
Identity registration service, signature/inquiry service, attribute management/mandate are provided using Personal Data Storage
Service, identity recovers service, attribute witness service;By Block Chain base powers, by core of block chain, there is provided body
Part daily record, property logs, signing messages service.
The credit third party " he demonstrate,proves " be on the basis of using the digital identification authentication based on block chain technology there is provided
The API that third party logs in, the digital identification authentication center based on block chain technology will return to an openid to indicate the use
The uniqueness at family;The user " from demonstrate,proving " is to carry out user from demonstrate,proving using vLink protocol agreements, is first inquired about before registration
Whether there is the user in block chain, if there is no can then register, if there is then registration failure, point out the user to note
Volume;The public " card altogether " can be shared by increasing income for block chain, each may participate on distributed network other users whole
The running of individual system, it is each to participate in safeguarding that node replicate the copy for obtaining a full database, so as to other users
Confirmed.
The present invention digital identification authentication system by the way that users personal data is stored in into block chain rather than server,
On the premise of without personal authorize, any focal pointe can not obtain my data, and present appearance is solved from root
Information leakage, network fraudulent act, it is ensured that the security of data;
Handled in data transmission procedure using digital signature, sensitive information is not tampered with the transmission of digital signature, without
Certification and the people authorized, do not see original data, serve the privacy functions to sensitive data in digital signature transmission.
Brief description of the drawings
Fig. 1 is the digital identification authentication architectural framework based on block chain technology;
Fig. 2 is data encryption and the flow for authenticating ID of the present invention.
Embodiment
For the object, technical solutions and advantages of the present invention are more clearly understood, below in conjunction with the drawings and specific embodiments,
The present invention is described in more detail.
Fig. 1 is the digital identification authentication main frame based on block chain technology, as shown in the figure.Number based on block chain technology
Word authentication is recorded mainly for natural person user, legal person user, equipment user's three major types on our distributed network
All subscriber datas, it is main at present that identity authentication service, attribute authority service, Digital signature service, credit third party " he are provided
Card ", user " from demonstrate,proving ", public's " card altogether " etc..The authentication center also incorporates the identity daily record of block chain, property logs, signature
The functions such as information.
Identity authentication service:Identity authentication service is carried out using vLink protocol agreements, it is ensured that there was only legal use
Family, which can just be added, to be come;One user is linked to after checking in block chain, permanent will be stored;Data on block chain
Storehouse can not be destroyed, and recorded information field is associated and corresponding with generation timestamp, is just had uniqueness, can not be distorted
Property, it is ensured that the authenticity of identity, uniqueness.
Attribute authority is serviced:Authentication can authorize some attribute informations, such as after:Name, gender information
Deng.Application layer is contributed to obtain more data messages.
Digital signature service:Transmission is encrypted to the user profile according to digital signature, it is ensured that its security.
Smart Data Engine:CPOW common recognitions are refered in particular to, the common recognition is non-using dynamic on the basis of bit coin POW
Linear work amount proves mechanism, adjusts the degree of difficulty that each miner is elected as verifier, it is to avoid tend to the possibility of exclusive checking,
The problem of solving 51% attack.And the acknowledging time of average block is shortened, target block creation time is 15s, and bit
The average block creation time of coin is 10 minutes, significantly improves the performance of operation per second, per second equivalent to script bit coin
40 times of transaction.
Personal Data Storage:Identity registration service, signature/inquiry service, attribute management/mandate clothes are provided
Business, identity recovers service, attribute witness service.
Block Chain base powers:By core of block chain there is provided identity daily record, property logs, the clothes such as signing messages
Business.
Credit third party " he demonstrate,proves ":If using the digital identification authentication based on block chain technology, it will thus provide third party steps on
The API of record, if using the service, the digital identification authentication center based on block chain technology, it will return an openid with
Indicate the uniqueness of the user.
User " from demonstrate,proving ":User is carried out from demonstrate,proving using vLink protocol agreements, first inquired about in block chain before registration
Whether there is the user, if there is no can then register, if there is then registration failure, point out the user registered.
Public's " card altogether ":Increasing income for block chain can be shared, and other users on distributed network is each may participate in whole system
The running of system, it is each to participate in safeguarding that node replicate the copy for obtaining a full database, so as to be carried out to other users
Confirm.
Fig. 2 is data encryption and the flow for authenticating ID of the present invention, and its operating mechanism is as follows:1st, first, user has needed
Into registration, personal information completely fill in out, identity authentication service is carried out using vLink protocol agreements, if closed
Rule uploads block chain, and block chain broadcasts the user profile to the whole network, each node will be added to the user profile
Corresponding block.If not conforming to rule registration failure.Due to being relatively checking between block, it is impossible to distort some letter
Cease the data of block.
2nd, if it is intended to obtaining the information of user, then searching user's information can be carried out by the service of vKey attribute authorities, will
It can return to the user name of user, sex, the information such as age, while returning to an openid, each user is labeled a spy
Fixed openid, to distinguish different users, helps to apply to use.
3rd, the digital identification authentication based on block chain technology is during use, and data are handled by signature,
Its detailed process is as follows:
1)The source language message is carried out Hash operation by originating party A, obtains a cryptographic Hash i.e. digital digest MD;
2)Originating party A using asymmetric RSA Algorithm, is encrypted to digital digest MD with the private key PVA of oneself, is produced digital label
Name DS;
3)The originating party A public key PBA of symmetry algorithm DES symmetric key SK to the source language message, digital signature SD and originating party A certificates
Encrypted using symmetry algorithm, obtain encryption information E;
4)Originating party debit B public key PBB, is encrypted using RSA Algorithm to symmetric key SK, is formed digital envelope DE, is just looked like
Symmetric key SK has been attached in an envelope with debit's public key encryption;
5)Encryption information E and digital envelope DE are sent jointly to debit B by originating party A;
6)Debit B is received after digital envelope DE, decrypts digital envelope with the private key PVB of oneself first, takes out symmetric key SK;
7)Debit B decrypts encryption information E with symmetric key SK by DES algorithms, restores the source language message, digital signature SD and hair
The public key PBA of square A certificates;
8)Debit B verifies digital signature, first obtains digital digest MD with originating party A public key decryptions digital signature;
9)Debit B tries to achieve a new digital digest MD ' simultaneously by the source language message with same Hash operation;
10)Two digital digests MD and MD ' are compared, whether checking original text is changed.If the two is equal, illustrate data
It is not tampered with, is secrecy transmission, signature is real, then agrees to that the data transfer is gone over;Otherwise the signature, data are refused
Bust this.
A set of digital identification authentication system is set up based on block chain technology, to ensure the security of data, this system is carried
User profile is handled for the sdk used for third party, user profile is stored in block chain rather than server, keep away
The generation of data leak is exempted from, has been conducive to protecting privacy of user.
First, the personal information of user is ensured, the problem of so easily information leakage will not occur;Secondly,
Ensure that information authenticity, can not random alterability;Data distribution can prevent corruption, and you in many block chains
Identity data hardly possible be tampered.
Particular embodiments described above, has been carried out further to the purpose of the present invention, technical scheme and beneficial effect
Describe in detail, should be understood that the specific embodiment that the foregoing is only the present invention, be not intended to limit the invention,
Within the spirit and principles of the invention, any modification, equivalent substitution and improvements done etc., should be included in the present invention's
Within protection domain.
Claims (7)
1. a kind of network digital identity identifying method based on block chain technology, it is characterised in that described method includes:
1)User's registration, fills in complete personal information, and identity authentication service is carried out using vLink protocol views, if closed
Rule uploads block chain, and block chain broadcasts the user profile to the whole network, and the user profile is added to correspondence by each node
Block, be relatively checking between block;If not conforming to rule registration failure;
2)The information of user is obtained, searching user's information is carried out by the service of vKey attribute authorities, the user name of user, property is returned
Not, an openid is returned to while age information, each user is labeled a specific openid, different to distinguish
User;
3)During the digital identification authentication using above-mentioned piece of chain technology, data are handled by signature.
2. network digital identity identifying method according to claim 1, it is characterised in that described data signature processing side
Method is as follows:
1)The source language message is carried out Hash operation by originating party A, obtains a cryptographic Hash i.e. digital digest MD;
2)Originating party A using asymmetric RSA Algorithm, is encrypted to digital digest MD with the private key PVA of oneself, is produced digital label
Name DS;
3)The originating party A public key PBA of symmetry algorithm DES symmetric key SK to the source language message, digital signature SD and originating party A certificates
Encrypted using symmetry algorithm, obtain encryption information E;
4)Originating party debit B public key PBB, is encrypted using RSA Algorithm to symmetric key SK, is formed digital envelope DE, is just looked like
Symmetric key SK has been attached in an envelope with debit's public key encryption;
5)Encryption information E and digital envelope DE are sent jointly to debit B by originating party A;
6)Debit B is received after digital envelope DE, decrypts digital envelope with the private key PVB of oneself first, takes out symmetric key SK;
7)Debit B decrypts encryption information E with symmetric key SK by DES algorithms, restores the source language message, digital signature SD and hair
The public key PBA of square A certificates;
8)Debit B verifies digital signature, first obtains digital digest MD with originating party A public key decryptions digital signature;
9)Debit B tries to achieve a new digital digest MD ' simultaneously by the source language message with same Hash operation;
10)Two digital digests MD and MD ' are compared, whether checking original text is changed;
If the two is equal, illustrate that data are not tampered with, be secrecy transmission, signature is real, then agree to that the data are passed
The defeated past;Otherwise the signature, data transmission fails are refused.
3. network digital identity identifying method according to claim 2, it is characterised in that the user uses including natural person
Family, legal person user and equipment user;The service provided includes identity authentication service, attribute authority service, Digital signature service, credit
Third party's " he demonstrate,proves ", user " from demonstrate,proving " and public's " card altogether ".
4. network digital identity identifying method according to claim 2, it is characterised in that the identity authentication service is used
VLink protocol agreements carry out identity authentication service, it is ensured that legal user adds;One user links after checking
Permanently stored into block chain;Recorded information field and the association of generation timestamp are simultaneously corresponding, with uniqueness and can not distorting
Property;The attribute authority service is provided in authentication after, and mandate includes name and the attribute information of sex;Signature clothes
Transmission is encrypted to the user profile according to digital signature in business, it is ensured that its security.
5. network digital identity identifying method according to claim 4, it is characterised in that the block chain uses Smart
Data Engine, use kinematic nonlinearity proof of work mechanism on the basis of bit coin POW, adjust each miner and are selected
For the degree of difficulty of verifier, it is to avoid tend to the possibility of exclusive checking, the problem of solving 51% attack shortens average block
Acknowledging time, significantly improve the performance of operation per second.
6. network digital identity identifying method according to claim 5, it is characterised in that use Personal Data
Storage provides identity registration service, and signature/inquiry service, attribute management/authorization service, identity recovers service, attribute witness
Service;By Block Chain base powers, by core of block chain there is provided identity daily record, property logs, signing messages clothes
Business.
7. network digital identity identifying method according to claim 6, it is characterised in that the credit third party " he demonstrate,proves "
It is there is provided the API that third party logs on the basis of using the digital identification authentication based on block chain technology, based on block chain skill
The digital identification authentication center of art will return to an openid to indicate the uniqueness of the user;The user " from demonstrate,proving " is to adopt
User is carried out with vLink protocol agreements from card, whether in block chain have the user, if do not deposited if first being inquired about before registration
It can then register, if there is then registration failure, point out the user registered;Public's " card altogether " is by block chain
Increasing income to share, and other users on distributed network is each may participate in the running of whole system, each to participate in safeguarding node
Reproducible obtains the copy of a full database, so as to confirm to other users.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710610171.XA CN107181765A (en) | 2017-07-25 | 2017-07-25 | Network digital identity identifying method based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710610171.XA CN107181765A (en) | 2017-07-25 | 2017-07-25 | Network digital identity identifying method based on block chain technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107181765A true CN107181765A (en) | 2017-09-19 |
Family
ID=59837688
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710610171.XA Pending CN107181765A (en) | 2017-07-25 | 2017-07-25 | Network digital identity identifying method based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107181765A (en) |
Cited By (83)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107517221A (en) * | 2017-09-29 | 2017-12-26 | 北京计算机技术及应用研究所 | A kind of acentric secure and trusted auditing system |
CN107657553A (en) * | 2017-09-21 | 2018-02-02 | 浙江惠码科技有限公司 | A kind of electronic contract generation method based on alliance's chain, information anti-fake method of tracing to the source |
CN107733892A (en) * | 2017-10-17 | 2018-02-23 | 光载无限(北京)科技有限公司 | Link network system and link network individual's operation flow based on the control of intelligent contract |
CN107888382A (en) * | 2017-11-24 | 2018-04-06 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of methods, devices and systems of the digital identity checking based on block chain |
CN107947922A (en) * | 2017-11-29 | 2018-04-20 | 中国科学院合肥物质科学研究院 | A kind of digital archives management method and system based on block chain technology |
CN108229962A (en) * | 2018-01-04 | 2018-06-29 | 众安信息技术服务有限公司 | Right management method and system based on block chain |
CN108234515A (en) * | 2018-01-25 | 2018-06-29 | 中国科学院合肥物质科学研究院 | A kind of Self-certified digital identity management system and its method based on intelligent contract |
CN108320143A (en) * | 2018-02-05 | 2018-07-24 | 中国地质大学(武汉) | A kind of guard method of password currency private key |
CN108365949A (en) * | 2018-03-09 | 2018-08-03 | 北京阿尔山金融科技有限公司 | Client's system of real name approaches to IM, apparatus and system |
CN108390894A (en) * | 2018-04-20 | 2018-08-10 | 黄绍进 | A kind of personal information based on block chain really weighs method and block chain client |
CN108540447A (en) * | 2018-03-05 | 2018-09-14 | 深圳市海云天科技股份有限公司 | A kind of certification authentication method and system based on block chain |
CN108566395A (en) * | 2018-04-20 | 2018-09-21 | 济南浪潮高新科技投资发展有限公司 | A kind of document transmission method, apparatus and system based on block chain |
CN108595126A (en) * | 2018-04-27 | 2018-09-28 | 腾讯科技(深圳)有限公司 | Data-storage system, querying method, inquiry unit, server and storage medium |
CN108614878A (en) * | 2018-04-27 | 2018-10-02 | 腾讯科技(深圳)有限公司 | protocol data management method, device, storage medium and system |
CN108681963A (en) * | 2018-03-29 | 2018-10-19 | 深圳市网心科技有限公司 | Multi-tiling chain integral traffic control method, system, electronic device and storage medium |
CN108702622A (en) * | 2017-11-30 | 2018-10-23 | 深圳前海达闼云端智能科技有限公司 | Mobile network's access authentication method, device, storage medium and block chain node |
CN108737419A (en) * | 2018-05-22 | 2018-11-02 | 北京航空航天大学 | Trusted identities life cycle management device and method based on block chain |
CN108768608A (en) * | 2018-05-25 | 2018-11-06 | 电子科技大学 | The secret protection identity identifying method of thin-client is supported at block chain PKI |
CN108769057A (en) * | 2018-06-15 | 2018-11-06 | 北京奇虎科技有限公司 | Personal identification method based on block chain and device |
CN108777673A (en) * | 2018-04-12 | 2018-11-09 | 三维通信股份有限公司 | One kind carrying out Bidirectional identity authentication method in block chain |
CN108810895A (en) * | 2018-07-12 | 2018-11-13 | 西安电子科技大学 | Wireless Mesh netword identity identifying method based on block chain |
CN108833081A (en) * | 2018-06-22 | 2018-11-16 | 中国人民解放军国防科技大学 | Block chain-based equipment networking authentication method |
CN108848079A (en) * | 2018-05-31 | 2018-11-20 | 腾讯科技(深圳)有限公司 | Realize method, system, device and the computer system of Information Authentication |
CN108848111A (en) * | 2018-08-06 | 2018-11-20 | 杭州云象网络技术有限公司 | A kind of decentralization Virtual Private Network construction method based on block chain technology |
CN108881287A (en) * | 2018-07-18 | 2018-11-23 | 电子科技大学 | A kind of Internet of things node identity identifying method based on block chain |
CN108960832A (en) * | 2018-08-09 | 2018-12-07 | 全链通有限公司 | The method for secret protection and system of block chain real name communication |
CN109040139A (en) * | 2018-10-12 | 2018-12-18 | 重庆邮电大学 | A kind of identity authorization system and method based on block chain and intelligent contract |
CN109104285A (en) * | 2018-07-24 | 2018-12-28 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN109102404A (en) * | 2018-08-09 | 2018-12-28 | 全链通有限公司 | The method for secret protection and system of block chain real name communication |
CN109194708A (en) * | 2018-07-24 | 2019-01-11 | 哈尔滨工程大学 | A kind of distributed memory system and its identity identifying method based on block chain technology |
CN109286616A (en) * | 2018-09-10 | 2019-01-29 | 湖南智慧政务区块链科技有限公司 | Authorization check method and device based on block chain technology |
CN109286497A (en) * | 2018-09-06 | 2019-01-29 | 贵阳信息技术研究院(中科院软件所贵阳分部) | A method of secret ballot and many condition count of votes based on block chain |
CN109391611A (en) * | 2018-08-17 | 2019-02-26 | 深圳壹账通智能科技有限公司 | Userspersonal information's encryption and authorization method, device, equipment and readable storage medium storing program for executing |
CN109492993A (en) * | 2018-10-19 | 2019-03-19 | 平安科技(深圳)有限公司 | Date storage method, electronic device and the storage medium of social platform |
CN109522698A (en) * | 2018-10-11 | 2019-03-26 | 平安科技(深圳)有限公司 | User authen method and terminal device based on block chain |
CN109587154A (en) * | 2018-12-14 | 2019-04-05 | 金蝶软件(中国)有限公司 | Digital identity verification method, device, computer equipment and storage medium |
CN109617692A (en) * | 2018-12-13 | 2019-04-12 | 郑州师范学院 | A kind of anonymous login method and system based on block chain |
CN109660485A (en) * | 2017-10-10 | 2019-04-19 | 中兴通讯股份有限公司 | A kind of authority control method and system based on the transaction of block chain |
CN109729041A (en) * | 2017-10-27 | 2019-05-07 | 上海策赢网络科技有限公司 | A kind of publication of encrypted content and acquisition methods and device |
CN109741063A (en) * | 2019-01-10 | 2019-05-10 | 众安信息技术服务有限公司 | Digital signature method and device based on block chain |
CN109816386A (en) * | 2019-01-24 | 2019-05-28 | 杭州趣链科技有限公司 | Data get through method on a kind of chain of the unified identity authentication based on block chain |
CN109862041A (en) * | 2019-03-27 | 2019-06-07 | 深圳市网心科技有限公司 | A kind of digital identification authentication method, unit, system and storage medium |
CN109858262A (en) * | 2019-01-17 | 2019-06-07 | 平安科技(深圳)有限公司 | Workflow examination and approval method, apparatus, system and storage medium based on block catenary system |
CN109961290A (en) * | 2017-12-26 | 2019-07-02 | 重庆云创科技有限公司 | A kind of user information safety management method based on block chain technology |
CN109981675A (en) * | 2019-04-04 | 2019-07-05 | 西安电子科技大学 | A kind of identity information guard method of digital identification authentication and encryption attribute |
CN110245955A (en) * | 2019-05-27 | 2019-09-17 | 众安信息技术服务有限公司 | A kind of block chain account attributes management method and system based on intelligent contract |
CN110362626A (en) * | 2019-06-13 | 2019-10-22 | 中电万维信息技术有限责任公司 | One kind being based on the convenience-for-people inquiry system of block chain network and application method |
CN110430061A (en) * | 2019-07-19 | 2019-11-08 | 东南大学 | A kind of car networking equipment identities authentication method based on block chain technology |
WO2019213869A1 (en) * | 2018-05-09 | 2019-11-14 | 合肥达朴汇联科技有限公司 | Method and device for blockchain node |
CN110535913A (en) * | 2019-07-31 | 2019-12-03 | 苏州白杨软件有限公司 | A kind of user's authorization based on block chain and really weigh method |
CN110572392A (en) * | 2019-09-09 | 2019-12-13 | 河南戎磐网络科技有限公司 | Identity authentication method based on HyperLegger network |
CN110598376A (en) * | 2019-09-26 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Copyright authentication method, device and equipment based on block chain and storage medium |
CN110602083A (en) * | 2019-09-10 | 2019-12-20 | 上海黔易数据科技有限公司 | Secure transmission and storage method of digital identity authentication data |
CN110636040A (en) * | 2019-08-05 | 2019-12-31 | 南京中诚区块链研究院有限公司 | Information flow authentication system and method based on block chain communication |
CN110708269A (en) * | 2018-07-10 | 2020-01-17 | 北京京东尚科信息技术有限公司 | Block chain data transmission method, block chain node and computer readable storage medium |
CN110929275A (en) * | 2019-11-14 | 2020-03-27 | 上海金桥信息股份有限公司 | Block chain data security method based on multiple signatures |
CN110932859A (en) * | 2018-09-20 | 2020-03-27 | 北大方正集团有限公司 | User information processing method, device and equipment and readable storage medium |
CN111131164A (en) * | 2019-11-27 | 2020-05-08 | 山东爱城市网信息技术有限公司 | Block chain-based digital identity implementation method, equipment and medium |
CN111245830A (en) * | 2020-01-10 | 2020-06-05 | 成都中科合迅科技有限公司 | Non-centralized user authentication and authorization method for asymmetric encryption |
CN111274612A (en) * | 2018-12-04 | 2020-06-12 | 北京京东尚科信息技术有限公司 | Practitioner trust verification method and system, witness service system and storage medium |
CN111400772A (en) * | 2020-03-06 | 2020-07-10 | 厦门区块链云科技有限公司 | Distributed digital identity system based on block chain |
CN111538973A (en) * | 2020-03-26 | 2020-08-14 | 成都云巢智联科技有限公司 | Personal authorization access control system based on state cryptographic algorithm |
CN111566647A (en) * | 2018-01-22 | 2020-08-21 | 捷德移动安全有限责任公司 | Identity recognition system based on block chain |
CN111819817A (en) * | 2018-03-08 | 2020-10-23 | 区块链控股有限公司 | Method and system for block chain implementation for bilinear mapping accumulator-based authorization |
CN111930854A (en) * | 2020-10-10 | 2020-11-13 | 北京福佑多多信息技术有限公司 | Intention prediction method and device |
CN112016119A (en) * | 2020-08-10 | 2020-12-01 | 四川九洲电器集团有限责任公司 | Autonomous identity management method based on block chain |
CN112507352A (en) * | 2020-11-30 | 2021-03-16 | 中国联合网络通信集团有限公司 | Data sharing method and system based on block chain |
CN112688786A (en) * | 2021-03-19 | 2021-04-20 | 中企链信(北京)科技有限公司 | Evidence construction and real-name identity authentication method based on block chain |
CN113039748A (en) * | 2018-11-16 | 2021-06-25 | Abcd技术有限公司 | Nerve block chain |
CN113114728A (en) * | 2021-03-22 | 2021-07-13 | 南京航空航天大学 | Body area network identity authentication method and system based on editable block chain |
CN113221189A (en) * | 2021-04-29 | 2021-08-06 | 华中科技大学 | Identity authentication system, authentication method, medium and terminal based on block chain |
CN113259311A (en) * | 2021-03-17 | 2021-08-13 | 西安电子科技大学 | Decentralized identity authentication system based on block chain |
WO2021180991A1 (en) | 2020-03-13 | 2021-09-16 | Jauregui Navarro Inaki | Method of digital recognition of the declaration of age and legal capacity to access information and digital content |
CN113434913A (en) * | 2021-07-08 | 2021-09-24 | 德州豪艺电子信息科技有限公司 | Automatic safety encryption device for computer data interface |
CN113572717A (en) * | 2020-04-29 | 2021-10-29 | 青岛海尔滚筒洗衣机有限公司 | Communication connection establishing method, washing and protecting equipment and server |
US11232445B2 (en) | 2018-08-30 | 2022-01-25 | Bank Of America Corporation | Intelligent dynamic authentication and event processing system |
CN114360118A (en) * | 2022-02-15 | 2022-04-15 | 上海万向区块链股份公司 | Access control system based on block chain and processing method |
CN114465729A (en) * | 2021-12-16 | 2022-05-10 | 浙商银行股份有限公司 | Internet of things data management method and system based on block chain technology |
CN114844700A (en) * | 2022-04-28 | 2022-08-02 | 三峡星未来数据科技(宜昌)有限公司 | Identity authentication method, system, equipment and storage medium based on trusted storage in distributed environment |
CN116170156A (en) * | 2023-02-23 | 2023-05-26 | 郑州信大云谷科技有限公司 | Trust computing system and method capable of defining behaviors |
CN117744051A (en) * | 2023-12-21 | 2024-03-22 | 江苏云工场信息技术有限公司 | Digital person identity right-determining method |
CN118174902A (en) * | 2024-02-27 | 2024-06-11 | 珞微科技(杭州)有限公司 | Distributed equipment authentication method and system based on embedded security asymmetric key |
CN116170156B (en) * | 2023-02-23 | 2024-11-19 | 郑州信大云谷科技有限公司 | Trust computing system and method capable of defining behaviors |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104486300A (en) * | 2014-11-29 | 2015-04-01 | 中国航空工业集团公司第六三一研究所 | Aviation exchange system and method based on virtual machine |
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
KR101637868B1 (en) * | 2016-02-22 | 2016-07-08 | 주식회사 코인플러그 | Financial institution document verification system that is based on the block chain |
CN106453407A (en) * | 2016-11-23 | 2017-02-22 | 江苏通付盾科技有限公司 | Identity authentication method based on block chain, authentication server and user terminal |
CN106453271A (en) * | 2016-09-21 | 2017-02-22 | 江苏通付盾科技有限公司 | Identity registration method and system, identity authentication method and system |
CN106534160A (en) * | 2016-12-02 | 2017-03-22 | 江苏通付盾科技有限公司 | Identity authentication method and system based on block chain |
-
2017
- 2017-07-25 CN CN201710610171.XA patent/CN107181765A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104486300A (en) * | 2014-11-29 | 2015-04-01 | 中国航空工业集团公司第六三一研究所 | Aviation exchange system and method based on virtual machine |
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
KR101637868B1 (en) * | 2016-02-22 | 2016-07-08 | 주식회사 코인플러그 | Financial institution document verification system that is based on the block chain |
CN106453271A (en) * | 2016-09-21 | 2017-02-22 | 江苏通付盾科技有限公司 | Identity registration method and system, identity authentication method and system |
CN106453407A (en) * | 2016-11-23 | 2017-02-22 | 江苏通付盾科技有限公司 | Identity authentication method based on block chain, authentication server and user terminal |
CN106534160A (en) * | 2016-12-02 | 2017-03-22 | 江苏通付盾科技有限公司 | Identity authentication method and system based on block chain |
Cited By (129)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107657553A (en) * | 2017-09-21 | 2018-02-02 | 浙江惠码科技有限公司 | A kind of electronic contract generation method based on alliance's chain, information anti-fake method of tracing to the source |
CN107517221A (en) * | 2017-09-29 | 2017-12-26 | 北京计算机技术及应用研究所 | A kind of acentric secure and trusted auditing system |
CN107517221B (en) * | 2017-09-29 | 2021-03-02 | 北京计算机技术及应用研究所 | Centerless safe and trusted auditing method |
CN109660485A (en) * | 2017-10-10 | 2019-04-19 | 中兴通讯股份有限公司 | A kind of authority control method and system based on the transaction of block chain |
CN107733892A (en) * | 2017-10-17 | 2018-02-23 | 光载无限(北京)科技有限公司 | Link network system and link network individual's operation flow based on the control of intelligent contract |
CN109729041B (en) * | 2017-10-27 | 2022-03-18 | 上海策赢网络科技有限公司 | Method and device for issuing and acquiring encrypted content |
CN109729041A (en) * | 2017-10-27 | 2019-05-07 | 上海策赢网络科技有限公司 | A kind of publication of encrypted content and acquisition methods and device |
CN107888382A (en) * | 2017-11-24 | 2018-04-06 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of methods, devices and systems of the digital identity checking based on block chain |
CN107888382B (en) * | 2017-11-24 | 2019-11-19 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of methods, devices and systems of the digital identity verifying based on block chain |
CN107947922A (en) * | 2017-11-29 | 2018-04-20 | 中国科学院合肥物质科学研究院 | A kind of digital archives management method and system based on block chain technology |
CN107947922B (en) * | 2017-11-29 | 2020-07-21 | 中国科学院合肥物质科学研究院 | Digital file management method and system based on block chain technology |
CN108702622A (en) * | 2017-11-30 | 2018-10-23 | 深圳前海达闼云端智能科技有限公司 | Mobile network's access authentication method, device, storage medium and block chain node |
CN109961290A (en) * | 2017-12-26 | 2019-07-02 | 重庆云创科技有限公司 | A kind of user information safety management method based on block chain technology |
CN108229962A (en) * | 2018-01-04 | 2018-06-29 | 众安信息技术服务有限公司 | Right management method and system based on block chain |
CN108229962B (en) * | 2018-01-04 | 2021-04-06 | 众安信息技术服务有限公司 | Permission management method and system based on block chain |
CN111566647A (en) * | 2018-01-22 | 2020-08-21 | 捷德移动安全有限责任公司 | Identity recognition system based on block chain |
CN111566647B (en) * | 2018-01-22 | 2023-05-30 | 捷德移动安全有限责任公司 | Identity recognition system based on block chain |
CN108234515A (en) * | 2018-01-25 | 2018-06-29 | 中国科学院合肥物质科学研究院 | A kind of Self-certified digital identity management system and its method based on intelligent contract |
CN108234515B (en) * | 2018-01-25 | 2020-07-24 | 中国科学院合肥物质科学研究院 | Self-authentication digital identity management system and method based on intelligent contract |
CN108320143A (en) * | 2018-02-05 | 2018-07-24 | 中国地质大学(武汉) | A kind of guard method of password currency private key |
CN108320143B (en) * | 2018-02-05 | 2022-03-11 | 中国地质大学(武汉) | Method for protecting cipher currency private key |
CN108540447A (en) * | 2018-03-05 | 2018-09-14 | 深圳市海云天科技股份有限公司 | A kind of certification authentication method and system based on block chain |
CN108540447B (en) * | 2018-03-05 | 2020-09-18 | 深圳市海云天科技股份有限公司 | Block chain-based certificate verification method and system |
CN111819817A (en) * | 2018-03-08 | 2020-10-23 | 区块链控股有限公司 | Method and system for block chain implementation for bilinear mapping accumulator-based authorization |
CN108365949B (en) * | 2018-03-09 | 2021-03-23 | 北京阿尔山金融科技有限公司 | Client real-name system information management method, device and system |
CN108365949A (en) * | 2018-03-09 | 2018-08-03 | 北京阿尔山金融科技有限公司 | Client's system of real name approaches to IM, apparatus and system |
CN108681963A (en) * | 2018-03-29 | 2018-10-19 | 深圳市网心科技有限公司 | Multi-tiling chain integral traffic control method, system, electronic device and storage medium |
CN108681963B (en) * | 2018-03-29 | 2020-07-31 | 深圳市网心科技有限公司 | Multi-block chain integration control method, system, electronic device and storage medium |
CN108777673B (en) * | 2018-04-12 | 2020-09-15 | 三维通信股份有限公司 | Bidirectional identity authentication method in block chain |
CN108777673A (en) * | 2018-04-12 | 2018-11-09 | 三维通信股份有限公司 | One kind carrying out Bidirectional identity authentication method in block chain |
CN108566395A (en) * | 2018-04-20 | 2018-09-21 | 济南浪潮高新科技投资发展有限公司 | A kind of document transmission method, apparatus and system based on block chain |
CN108390894A (en) * | 2018-04-20 | 2018-08-10 | 黄绍进 | A kind of personal information based on block chain really weighs method and block chain client |
CN108614878B (en) * | 2018-04-27 | 2023-01-10 | 腾讯科技(深圳)有限公司 | Protocol data management method, device, storage medium and system |
CN108595126B (en) * | 2018-04-27 | 2022-09-02 | 腾讯科技(深圳)有限公司 | Data storage system, query method, query device, server, and storage medium |
CN108614878A (en) * | 2018-04-27 | 2018-10-02 | 腾讯科技(深圳)有限公司 | protocol data management method, device, storage medium and system |
CN108595126A (en) * | 2018-04-27 | 2018-09-28 | 腾讯科技(深圳)有限公司 | Data-storage system, querying method, inquiry unit, server and storage medium |
WO2019213869A1 (en) * | 2018-05-09 | 2019-11-14 | 合肥达朴汇联科技有限公司 | Method and device for blockchain node |
US11799630B2 (en) | 2018-05-09 | 2023-10-24 | Hefei Dappworks Technology Co., Ltd. | Method and device for blockchain nodes |
CN108737419B (en) * | 2018-05-22 | 2020-05-22 | 北京航空航天大学 | Trusted identifier life cycle management device and method based on block chain |
CN108737419A (en) * | 2018-05-22 | 2018-11-02 | 北京航空航天大学 | Trusted identities life cycle management device and method based on block chain |
CN108768608B (en) * | 2018-05-25 | 2020-05-12 | 电子科技大学 | Privacy protection identity authentication method supporting thin client under block chain PKI |
CN108768608A (en) * | 2018-05-25 | 2018-11-06 | 电子科技大学 | The secret protection identity identifying method of thin-client is supported at block chain PKI |
CN108848079B (en) * | 2018-05-31 | 2021-05-11 | 腾讯科技(深圳)有限公司 | Method, system, device and computer system for realizing information verification |
CN108848079A (en) * | 2018-05-31 | 2018-11-20 | 腾讯科技(深圳)有限公司 | Realize method, system, device and the computer system of Information Authentication |
CN108769057A (en) * | 2018-06-15 | 2018-11-06 | 北京奇虎科技有限公司 | Personal identification method based on block chain and device |
CN108833081A (en) * | 2018-06-22 | 2018-11-16 | 中国人民解放军国防科技大学 | Block chain-based equipment networking authentication method |
CN108833081B (en) * | 2018-06-22 | 2021-01-05 | 中国人民解放军国防科技大学 | Block chain-based equipment networking authentication method |
CN110708269A (en) * | 2018-07-10 | 2020-01-17 | 北京京东尚科信息技术有限公司 | Block chain data transmission method, block chain node and computer readable storage medium |
CN110708269B (en) * | 2018-07-10 | 2022-04-12 | 北京京东尚科信息技术有限公司 | Block chain data transmission method, block chain node and computer readable storage medium |
CN108810895A (en) * | 2018-07-12 | 2018-11-13 | 西安电子科技大学 | Wireless Mesh netword identity identifying method based on block chain |
CN108881287A (en) * | 2018-07-18 | 2018-11-23 | 电子科技大学 | A kind of Internet of things node identity identifying method based on block chain |
CN109104285B (en) * | 2018-07-24 | 2021-01-26 | 中国联合网络通信集团有限公司 | Block chain real-name authentication method, device, equipment and storage medium |
CN109104285A (en) * | 2018-07-24 | 2018-12-28 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN109194708A (en) * | 2018-07-24 | 2019-01-11 | 哈尔滨工程大学 | A kind of distributed memory system and its identity identifying method based on block chain technology |
CN109194708B (en) * | 2018-07-24 | 2021-07-13 | 哈尔滨工程大学 | Distributed storage system based on block chain technology and identity authentication method thereof |
CN108848111B (en) * | 2018-08-06 | 2021-09-10 | 杭州云象网络技术有限公司 | Decentralized virtual private network building method based on block chain technology |
CN108848111A (en) * | 2018-08-06 | 2018-11-20 | 杭州云象网络技术有限公司 | A kind of decentralization Virtual Private Network construction method based on block chain technology |
CN109102404B (en) * | 2018-08-09 | 2021-07-30 | 全链通有限公司 | Privacy protection method and system for block chain real-name communication |
CN108960832A (en) * | 2018-08-09 | 2018-12-07 | 全链通有限公司 | The method for secret protection and system of block chain real name communication |
CN108960832B (en) * | 2018-08-09 | 2021-07-30 | 全链通有限公司 | Privacy protection method and system for block chain real-name communication |
CN109102404A (en) * | 2018-08-09 | 2018-12-28 | 全链通有限公司 | The method for secret protection and system of block chain real name communication |
CN109391611A (en) * | 2018-08-17 | 2019-02-26 | 深圳壹账通智能科技有限公司 | Userspersonal information's encryption and authorization method, device, equipment and readable storage medium storing program for executing |
US11232445B2 (en) | 2018-08-30 | 2022-01-25 | Bank Of America Corporation | Intelligent dynamic authentication and event processing system |
CN109286497B (en) * | 2018-09-06 | 2021-04-09 | 贵阳信息技术研究院(中科院软件所贵阳分部) | Anonymous voting and multi-condition vote counting method based on block chain |
CN109286497A (en) * | 2018-09-06 | 2019-01-29 | 贵阳信息技术研究院(中科院软件所贵阳分部) | A method of secret ballot and many condition count of votes based on block chain |
CN109286616B (en) * | 2018-09-10 | 2021-04-16 | 湖南智慧政务区块链科技有限公司 | Permission verification method and device based on block chain technology |
CN109286616A (en) * | 2018-09-10 | 2019-01-29 | 湖南智慧政务区块链科技有限公司 | Authorization check method and device based on block chain technology |
CN110932859B (en) * | 2018-09-20 | 2021-06-15 | 北大方正集团有限公司 | User information processing method, device and equipment and readable storage medium |
CN110932859A (en) * | 2018-09-20 | 2020-03-27 | 北大方正集团有限公司 | User information processing method, device and equipment and readable storage medium |
CN109522698A (en) * | 2018-10-11 | 2019-03-26 | 平安科技(深圳)有限公司 | User authen method and terminal device based on block chain |
CN109040139A (en) * | 2018-10-12 | 2018-12-18 | 重庆邮电大学 | A kind of identity authorization system and method based on block chain and intelligent contract |
CN109040139B (en) * | 2018-10-12 | 2021-05-18 | 重庆邮电大学 | Identity authentication system and method based on block chain and intelligent contract |
CN109492993A (en) * | 2018-10-19 | 2019-03-19 | 平安科技(深圳)有限公司 | Date storage method, electronic device and the storage medium of social platform |
CN113039748B (en) * | 2018-11-16 | 2024-03-22 | Abcd技术有限公司 | Computer-implemented systems and methods based on neural blockchain |
CN113039748A (en) * | 2018-11-16 | 2021-06-25 | Abcd技术有限公司 | Nerve block chain |
CN111274612A (en) * | 2018-12-04 | 2020-06-12 | 北京京东尚科信息技术有限公司 | Practitioner trust verification method and system, witness service system and storage medium |
CN109617692A (en) * | 2018-12-13 | 2019-04-12 | 郑州师范学院 | A kind of anonymous login method and system based on block chain |
CN109617692B (en) * | 2018-12-13 | 2022-04-26 | 郑州师范学院 | Anonymous login method and system based on block chain |
CN109587154A (en) * | 2018-12-14 | 2019-04-05 | 金蝶软件(中国)有限公司 | Digital identity verification method, device, computer equipment and storage medium |
CN109587154B (en) * | 2018-12-14 | 2021-10-15 | 金蝶软件(中国)有限公司 | Digital identity verification method, device, computer equipment and storage medium |
CN109741063A (en) * | 2019-01-10 | 2019-05-10 | 众安信息技术服务有限公司 | Digital signature method and device based on block chain |
WO2020147383A1 (en) * | 2019-01-17 | 2020-07-23 | 平安科技(深圳)有限公司 | Process examination and approval method, device and system employing blockchain system, and non-volatile storage medium |
CN109858262A (en) * | 2019-01-17 | 2019-06-07 | 平安科技(深圳)有限公司 | Workflow examination and approval method, apparatus, system and storage medium based on block catenary system |
CN109816386A (en) * | 2019-01-24 | 2019-05-28 | 杭州趣链科技有限公司 | Data get through method on a kind of chain of the unified identity authentication based on block chain |
CN109862041B (en) * | 2019-03-27 | 2021-06-15 | 深圳市网心科技有限公司 | Digital identity authentication method, equipment, device, system and storage medium |
CN109862041A (en) * | 2019-03-27 | 2019-06-07 | 深圳市网心科技有限公司 | A kind of digital identification authentication method, unit, system and storage medium |
CN109981675A (en) * | 2019-04-04 | 2019-07-05 | 西安电子科技大学 | A kind of identity information guard method of digital identification authentication and encryption attribute |
CN109981675B (en) * | 2019-04-04 | 2021-10-26 | 西安电子科技大学 | Identity information protection method for digital identity authentication and attribute encryption |
CN110245955A (en) * | 2019-05-27 | 2019-09-17 | 众安信息技术服务有限公司 | A kind of block chain account attributes management method and system based on intelligent contract |
CN110362626A (en) * | 2019-06-13 | 2019-10-22 | 中电万维信息技术有限责任公司 | One kind being based on the convenience-for-people inquiry system of block chain network and application method |
CN110430061A (en) * | 2019-07-19 | 2019-11-08 | 东南大学 | A kind of car networking equipment identities authentication method based on block chain technology |
CN110430061B (en) * | 2019-07-19 | 2021-08-06 | 东南大学 | Vehicle networking equipment identity authentication method based on block chain technology |
CN110535913A (en) * | 2019-07-31 | 2019-12-03 | 苏州白杨软件有限公司 | A kind of user's authorization based on block chain and really weigh method |
CN110636040A (en) * | 2019-08-05 | 2019-12-31 | 南京中诚区块链研究院有限公司 | Information flow authentication system and method based on block chain communication |
CN110636040B (en) * | 2019-08-05 | 2021-03-26 | 南京中诚区块链研究院有限公司 | Information flow authentication system and method based on block chain communication |
CN110572392A (en) * | 2019-09-09 | 2019-12-13 | 河南戎磐网络科技有限公司 | Identity authentication method based on HyperLegger network |
CN110602083A (en) * | 2019-09-10 | 2019-12-20 | 上海黔易数据科技有限公司 | Secure transmission and storage method of digital identity authentication data |
CN110602083B (en) * | 2019-09-10 | 2022-04-29 | 上海黔易数据科技有限公司 | Secure transmission and storage method of digital identity authentication data |
CN110598376A (en) * | 2019-09-26 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Copyright authentication method, device and equipment based on block chain and storage medium |
CN110929275B (en) * | 2019-11-14 | 2023-03-24 | 上海金桥信息股份有限公司 | Block chain data security method based on multiple signatures |
CN110929275A (en) * | 2019-11-14 | 2020-03-27 | 上海金桥信息股份有限公司 | Block chain data security method based on multiple signatures |
CN111131164A (en) * | 2019-11-27 | 2020-05-08 | 山东爱城市网信息技术有限公司 | Block chain-based digital identity implementation method, equipment and medium |
CN111245830A (en) * | 2020-01-10 | 2020-06-05 | 成都中科合迅科技有限公司 | Non-centralized user authentication and authorization method for asymmetric encryption |
CN111400772A (en) * | 2020-03-06 | 2020-07-10 | 厦门区块链云科技有限公司 | Distributed digital identity system based on block chain |
WO2021180991A1 (en) | 2020-03-13 | 2021-09-16 | Jauregui Navarro Inaki | Method of digital recognition of the declaration of age and legal capacity to access information and digital content |
CN111538973A (en) * | 2020-03-26 | 2020-08-14 | 成都云巢智联科技有限公司 | Personal authorization access control system based on state cryptographic algorithm |
CN113572717A (en) * | 2020-04-29 | 2021-10-29 | 青岛海尔滚筒洗衣机有限公司 | Communication connection establishing method, washing and protecting equipment and server |
CN113572717B (en) * | 2020-04-29 | 2024-02-20 | 青岛海尔洗涤电器有限公司 | Communication connection establishment method, washing and protecting equipment and server |
CN112016119B (en) * | 2020-08-10 | 2022-02-15 | 四川九洲电器集团有限责任公司 | Autonomous identity management method based on block chain |
CN112016119A (en) * | 2020-08-10 | 2020-12-01 | 四川九洲电器集团有限责任公司 | Autonomous identity management method based on block chain |
CN111930854A (en) * | 2020-10-10 | 2020-11-13 | 北京福佑多多信息技术有限公司 | Intention prediction method and device |
CN112507352A (en) * | 2020-11-30 | 2021-03-16 | 中国联合网络通信集团有限公司 | Data sharing method and system based on block chain |
CN112507352B (en) * | 2020-11-30 | 2023-01-17 | 中国联合网络通信集团有限公司 | Data sharing method and system based on block chain |
CN113259311B (en) * | 2021-03-17 | 2022-07-12 | 西安电子科技大学 | Decentralized identity authentication system based on block chain |
CN113259311A (en) * | 2021-03-17 | 2021-08-13 | 西安电子科技大学 | Decentralized identity authentication system based on block chain |
CN112688786A (en) * | 2021-03-19 | 2021-04-20 | 中企链信(北京)科技有限公司 | Evidence construction and real-name identity authentication method based on block chain |
CN112688786B (en) * | 2021-03-19 | 2021-06-22 | 中企链信(北京)科技有限公司 | Evidence construction and real-name identity authentication method based on block chain |
CN113114728A (en) * | 2021-03-22 | 2021-07-13 | 南京航空航天大学 | Body area network identity authentication method and system based on editable block chain |
CN113221189B (en) * | 2021-04-29 | 2022-05-03 | 华中科技大学 | Identity authentication system, authentication method, medium and terminal based on block chain |
CN113221189A (en) * | 2021-04-29 | 2021-08-06 | 华中科技大学 | Identity authentication system, authentication method, medium and terminal based on block chain |
CN113434913A (en) * | 2021-07-08 | 2021-09-24 | 德州豪艺电子信息科技有限公司 | Automatic safety encryption device for computer data interface |
CN114465729A (en) * | 2021-12-16 | 2022-05-10 | 浙商银行股份有限公司 | Internet of things data management method and system based on block chain technology |
CN114465729B (en) * | 2021-12-16 | 2024-07-26 | 浙商银行股份有限公司 | Internet of things data management method and system based on blockchain technology |
CN114360118A (en) * | 2022-02-15 | 2022-04-15 | 上海万向区块链股份公司 | Access control system based on block chain and processing method |
CN114844700A (en) * | 2022-04-28 | 2022-08-02 | 三峡星未来数据科技(宜昌)有限公司 | Identity authentication method, system, equipment and storage medium based on trusted storage in distributed environment |
CN116170156A (en) * | 2023-02-23 | 2023-05-26 | 郑州信大云谷科技有限公司 | Trust computing system and method capable of defining behaviors |
CN116170156B (en) * | 2023-02-23 | 2024-11-19 | 郑州信大云谷科技有限公司 | Trust computing system and method capable of defining behaviors |
CN117744051A (en) * | 2023-12-21 | 2024-03-22 | 江苏云工场信息技术有限公司 | Digital person identity right-determining method |
CN118174902A (en) * | 2024-02-27 | 2024-06-11 | 珞微科技(杭州)有限公司 | Distributed equipment authentication method and system based on embedded security asymmetric key |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107181765A (en) | Network digital identity identifying method based on block chain technology | |
CN112487778B (en) | Multi-user online signing system and method | |
CN111046352B (en) | Identity information security authorization system and method based on block chain | |
US11095646B2 (en) | Method and system for data security within independent computer systems and digital networks | |
CN106934605B (en) | User identity management method and system in digital currency | |
CN109005036B (en) | Block chain member management method and system based on identification cipher algorithm | |
CN109194708A (en) | A kind of distributed memory system and its identity identifying method based on block chain technology | |
CN106789090A (en) | Public key infrastructure system and semi-random participating certificate endorsement method based on block chain | |
CN109962890B (en) | Block chain authentication service device and node admission and user authentication method | |
CN107301521A (en) | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain | |
CN109417549A (en) | The method and apparatus of information proof is provided using centralization or distributed ledger | |
CN106878318A (en) | A kind of block chain real time polling cloud system | |
CN106778343A (en) | It is a kind of that the data sharing method of private data is related to based on block chain | |
JPH10336169A (en) | Authenticating method, authenticating device, storage medium, authenticating server and authenticating terminal | |
CN109687965A (en) | The real name identification method of subscriber identity information in a kind of protection network | |
FI86486B (en) | FOERFARANDE FOER ATT ARRANGERA TELEROESTNINGEN PAO ETT SAEKERT SAETT. | |
Zhu et al. | Secure Online Examination with Biometric Authentication and Blockchain‐Based Framework | |
CN109447809A (en) | A kind of video active identification method of combination block chain | |
CN105554018A (en) | Network real name verification method | |
CN108876375B (en) | Block chain real name participation method and system | |
Srivastava et al. | Attack resistant blockchain-based healthcare record system using modified RSA Algorithm | |
CN108667801A (en) | A kind of Internet of Things access identity safety certifying method and system | |
CN108777673A (en) | One kind carrying out Bidirectional identity authentication method in block chain | |
US11729159B2 (en) | System security infrastructure facilitating protecting against fraudulent use of individual identity credentials | |
Chen et al. | CallChain: Identity authentication based on blockchain for telephony networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180322 Address after: 475300 west side science and Technology Museum of Jiyang Avenue in Lankao County, Henan Applicant after: Lankao Tongxin interconnected data management Co., Ltd. Address before: 100036 floor 1 office building No. 1, No. 56, No. 56, West eight Li Zhuang, Beijing Applicant before: Unlimited (Beijing) Technology Co., Ltd. |
|
TA01 | Transfer of patent application right | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170919 |
|
RJ01 | Rejection of invention patent application after publication |