[go: up one dir, main page]

CN106100847B - Method and device for verifying identity information of asymmetric encryption block chain - Google Patents

Method and device for verifying identity information of asymmetric encryption block chain Download PDF

Info

Publication number
CN106100847B
CN106100847B CN201610413635.3A CN201610413635A CN106100847B CN 106100847 B CN106100847 B CN 106100847B CN 201610413635 A CN201610413635 A CN 201610413635A CN 106100847 B CN106100847 B CN 106100847B
Authority
CN
China
Prior art keywords
block
identity information
block chain
information
asymmetric encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610413635.3A
Other languages
Chinese (zh)
Other versions
CN106100847A (en
Inventor
李立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhong Business Consultants Beijing Co ltd
Original Assignee
Huizhong Business Consultants Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhong Business Consultants Beijing Co ltd filed Critical Huizhong Business Consultants Beijing Co ltd
Priority to CN201610413635.3A priority Critical patent/CN106100847B/en
Publication of CN106100847A publication Critical patent/CN106100847A/en
Application granted granted Critical
Publication of CN106100847B publication Critical patent/CN106100847B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

An authentication method for the identity information of an asymmetric encryption block chain is characterized in that: the method comprises the following steps: the transaction information is broadcast to all nodes; the node collects transaction information in a block; the node starts to continuously generate a random character string and calculates a random number answer; when the answer obtained by one node is matched with the random number, the generated block is broadcasted to all other nodes; and the other nodes verify the transaction, and when the transaction contained in the block is determined to be valid, the other nodes accept the block. All other nodes start creating new blocks and add the cryptographic hash of the just accepted block. The blocks are randomly hashed and linked into a chain of blocks. The cryptographic hash formed from the previous block is used to connect the blocks together, in the order of the past transactions. The transaction is further confirmed after the block link has to be linked to the previous block.

Description

Method and device for verifying identity information of asymmetric encryption block chain
Technical Field
The application relates to the technical field of block chains, in particular to an identity information verification method and device for an asymmetric encryption block chain.
Background
The TCP/IP protocol of the Internet enables us to enter the era of free information transfer, and the innovation of the block chain brings us into the era of free notarization of information! The block chain accounts through the whole network, and P2P collaboratively establishes 'credit', which is the fourth milestone after the evolution history of human credit, including blood affinity credit, noble metal credit and compulsory bank note credit, is hopeful to relieve the social pain point of the current scarce public credit of China, and has wide and deep application scenes in various fields of global market collection, intellectual property protection, property micro notarization, Internet of things finance, intelligent protocols and the like.
Existing blockchain links allow the information content to be viewed by encrypting the information content and sending it to a particular holder, who then decrypts the encryption with the key held.
The content of the information is often encrypted and information of the last transaction, time stamp, random number and address information.
The verification information and the verification mode are single, and the protection of transaction information and the development of a block chain technology are not facilitated.
With the development of technology, the difficulty of deciphering the password is smaller and smaller, and the simple random encryption of the information cannot meet the requirement of information security, so that more secure authentication information needs to be set.
Disclosure of Invention
The application aims to provide an asymmetric encryption block chain identity information verification method and device, and the method and device are used for authenticating by taking behavior characteristics as transaction information, and if abnormity is found, biological characteristics are used as supplementary authentication.
In order to solve the technical problem, the technical scheme is adopted in the application:
an authentication method for the identity information of an asymmetric encryption block chain is characterized in that:
the method comprises the following steps:
the transaction information is broadcast to all nodes;
the node collects transaction information in a block;
the node starts to continuously generate a random character string and calculates a random number answer;
when one node gets an answer that matches the random number, it broadcasts the generated tile to all other nodes.
And the other nodes verify the transaction, and when the transaction contained in the block is determined to be valid, the other nodes accept the block.
All other nodes start creating new blocks and add the cryptographic hash of the just accepted block.
The blocks are randomly hashed and linked into a chain of blocks.
The cryptographic hash formed from the previous block is used to connect the blocks together, in the order of the past transactions.
The transaction is further confirmed after the block link has to be linked to the previous block.
The authentication includes a key pair.
The key pair comprises a public key and a private key;
the public key has public property and is used for encrypting a piece of information and proving the authenticity of the information;
the private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key;
the information encrypted by the public key can be decrypted only by a person with a corresponding private key.
The public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key;
the private key signs information, and the public key verifies the signature;
the information verified by the public key signature is confirmed to be sent out by the holder of the private key;
the public key is issued for the last block and the private key is owned by the holder of the next block.
The key pair encryption method includes a hash encryption method, a DES encryption method, an RSA encryption method, an Elgamal encryption method, a matrix encryption method, an elliptic curve encryption method, and a combination thereof.
The block includes the following three parts: information, a cryptographic hash formed of the previous block, a random number.
The information further comprises behavioral characteristics and biometric characteristics;
the behavior characteristics are as follows: including paths, regions, WiFi, daily locations, consumption behaviors, consumption preferences, consumption units, consumption habits, and timestamps;
the biometric features include hand shape, palm print, fingerprint, face, iris, retina, pulse, vein, pinna, odor, and DNA.
The transaction also comprises a private key of both transaction parties, the transaction amount and a digital signature of the electronic currency.
Preferably, the verification adopts the behavior feature verification, and when the behavior feature verification is abnormal, the biometric feature secondary verification is adopted.
An asymmetric encryption block chain identity information verifying device is characterized in that: the system comprises a terminal, transmission equipment and a network server.
The terminal collects the behavior characteristics and the biological characteristics and sends the behavior characteristics and the biological characteristics to the network server through the transmission equipment;
and the network server verifies the behavior characteristics and the biological characteristics acquired by the terminal through the block chain.
The terminal comprises a consumption terminal, a mobile terminal and a geographical position information device;
the network server comprises a block linking unit, a block creating unit and a block storing unit;
the block linking unit verifies that blocks are linked with each other, the block creating unit creates a new block through verification transaction, and the block storing unit stores the newly created block.
The block linking unit comprises a random number generation unit, a random number verification unit, a time stamp unit, a password generation unit and a password decryption unit.
The behavior characteristics comprise paths, regions, WiFi, daily positions, consumption behaviors, consumption preferences, consumption amount, consumption habits and timestamps.
The biometric features include hand shape, palm print, fingerprint, face, iris, retina, pulse, vein, pinna, odor, and DNA.
When a transaction is to take place at the terminal,
the transaction information is broadcast to all network servers.
The network server collects transaction information in a block.
And the network server starts to continuously generate random character strings and calculates the answers of the random numbers.
When one web server gets an answer that matches the random number, it broadcasts the generated tile to all other web servers.
And the other network servers verify the transaction, and when the transaction contained in the block is determined to be valid, the other network servers accept the block.
All other network servers start creating new tiles and add cryptographic hashes of the just accepted tiles.
The blocks are randomly hashed and linked into a chain of blocks.
The cryptographic hash formed by the previous block is used to connect the blocks together to achieve the sequential arrangement of past transactions.
The transaction is further confirmed after the block link has to be linked to the previous block.
The authentication comprises a key pair;
the key pair comprises a public key and a private key;
the public key is public and is used for encrypting a piece of information and proving the authenticity of the information.
The private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key;
the information encrypted by the public key can be decrypted only by a person with a corresponding private key;
the public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key;
the private key signs information, and the public key verifies the signature.
The information verified by the public key signature is confirmed to be sent out by the holder of the private key;
the public key is issued for the last block, and the private key is owned by the next block.
The key pair encryption method includes a hash encryption method, a DES encryption method, an RSA encryption method, an Elgamal encryption method, a matrix encryption method, an elliptic curve encryption method, and a combination thereof.
The block includes the following three parts: information, a cryptographic hash formed of the previous block, a random number.
The information also includes behavioral characteristics and biometric characteristics.
Preferably, the verification adopts the behavior feature verification, and when the behavior feature verification is abnormal, the biometric feature secondary verification is adopted.
Compared with the prior art: 1. and the double information verification of the behavior characteristic and the biological characteristic is adopted, so that the verification safety is enhanced. Stability; 2. the behavior characteristic verification is preferentially adopted, so that the convenience and the continuity of the operation are enhanced; 3. the information is encrypted by adopting an asymmetric encryption method, a timestamp, an address and a random number are supplemented, and multi-dimensional encryption is adopted, so that the verification safety is comprehensively improved, and the attack can be defended.
Drawings
Fig. 1 is a schematic diagram of an embodiment of an authentication method for an asymmetric encryption block chain according to the present application.
FIG. 2 is a schematic diagram of an embodiment of block chaining according to the present application.
Fig. 3 is a schematic diagram of an embodiment of a block key of the present application.
Fig. 4 is a schematic diagram of another embodiment of a block key of the present application.
Fig. 5 is a schematic diagram of an embodiment of block information of the present application.
Fig. 6 is a schematic diagram of an embodiment of an apparatus for verifying identity information of an asymmetric encryption block chain according to the present application.
Fig. 7 is a schematic diagram of another embodiment of an apparatus for verifying identity information of an asymmetric encryption block chain according to the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, embodiments accompanying the present application are described in detail below with reference to the accompanying drawings.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is capable of embodiments in many different forms than those described herein and of being similarly generalized by those skilled in the art without departing from the spirit and scope of the application, and is therefore not limited to the specific embodiments disclosed below and the specific drawings.
Example one
As shown in fig. 1, transaction information is broadcast to all nodes;
the node collects transaction information in a block;
the node starts to continuously generate a random character string and calculates a random number answer;
when the answer obtained by one node is matched with the random number, the generated block is broadcasted to all other nodes;
and the other nodes verify the transaction, and when the transaction contained in the block is determined to be valid, the other nodes accept the block.
All other nodes start creating new blocks and add the cryptographic hash of the just accepted block.
Example two
As shown in fig. 2, the blocks are randomly hashed and linked into a chain of blocks.
The cryptographic hash formed by the previous block is used to connect the blocks together to achieve the sequential arrangement of past transactions.
The transaction is further confirmed after the block link has to be linked to the previous block.
EXAMPLE III
As shown in fig. 3, the authentication includes a key pair;
the key pair comprises a public key and a private key;
the public key has public property and is used for encrypting a piece of information and proving the authenticity of the information;
the private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key;
the information encrypted by the public key can be decrypted only by a person with a corresponding private key;
the public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key;
the private key signs information, and the public key verifies the signature;
the information verified by the public key signature is confirmed to be sent out by the holder of the private key;
the public key is issued for the last block and the private key is owned by the holder of the next block.
Example four
As shown in fig. 1, 2, 3, 4, 5, 6, and 7, an asymmetric encryption block chain identity information verification apparatus is characterized in that: the system comprises a terminal, transmission equipment and a network server;
the terminal collects the behavior characteristics and the biological characteristics and sends the behavior characteristics and the biological characteristics to the network server through the transmission equipment;
the terminal comprises a consumption terminal, a mobile terminal and a geographical position information device;
the network server comprises a block linking unit, a block creating unit and a block storing unit;
the block linking unit verifies the mutual linking of the blocks, the block creating unit creates a new block through verification transaction, and the block storing unit stores the newly created block.
The block linking unit comprises a random number generation unit, a random number verification unit, a time stamp unit, a password generation unit and a password decryption unit;
the behavior characteristics comprise paths, regions, WiFi, daily positions, consumption behaviors, consumption preferences, consumption amount, consumption habits and timestamps.
The biometric features include hand shape, palm print, fingerprint, face, iris, retina, pulse, vein, pinna, odor, and DNA.
When a transaction is to take place at the terminal,
the transaction information is broadcast to all network servers;
the network server collects transaction information in a block;
the network server starts to continuously generate random character strings and calculates answers of random numbers;
when one web server gets an answer that matches the random number, it broadcasts the generated tile to all other web servers.
And the other network servers verify the transaction, and when the transaction contained in the block is determined to be valid, the other network servers accept the block.
All other network servers start creating new tiles and add cryptographic hashes of the just accepted tiles.
The blocks are randomly hashed and linked into a chain of blocks.
The cryptographic hash formed by the previous block is used to connect the blocks together to achieve the sequential arrangement of past transactions.
The transaction is further confirmed after the block link has to be linked to the previous block.
The authentication comprises a key pair;
the key pair comprises a public key and a private key;
the public key has public property and is used for encrypting a piece of information and proving the authenticity of the information;
the private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key.
The information encrypted by the public key can be decrypted only by a person with a corresponding private key;
the public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key;
the private key signs information, and the public key verifies the signature;
the information verified by the public key signature is confirmed to be sent out by the holder of the private key;
the public key is issued for the last block and the private key is owned by the holder of the next block.
The key pair encryption method includes a hash encryption method, a DES encryption method, an RSA encryption method, an Elgamal encryption method, a matrix encryption method, an elliptic curve encryption method, and a combination thereof.
The block includes the following three parts: information, a cryptographic hash formed of the previous block, a random number.
The information also includes behavioral characteristics and biometric characteristics.
Preferably, the verification adopts the behavior feature verification, and when the behavior feature verification is abnormal, the biometric feature secondary verification is adopted.
Although the preferred embodiments of the present invention have been disclosed in the foregoing description, it should be understood that they are not intended to limit the scope of the claims so far, and that possible variations and modifications may be made by those skilled in the art without departing from the spirit and scope of the present invention.

Claims (41)

1. An authentication method for the identity information of an asymmetric encryption block chain is characterized in that: the method comprises the following steps:
the transaction information is broadcast to all nodes;
the node collects transaction information in a block;
the node starts to continuously generate a random character string to obtain a random number answer;
when the answer obtained by one node is matched with the random number, the generated block is broadcasted to all other nodes;
the other nodes verify the transaction, and when the transaction contained in the block is determined to be valid, the other nodes accept the block;
all other nodes start to create a new block and add the encryption hash of the block which is just accepted;
the block comprises information, a cryptographic hash formed by the previous block and a random number;
the information includes behavioral characteristics and biometric characteristics.
2. The method for verifying the identity information of the asymmetric encryption block chain according to claim 1, wherein:
the blocks are randomly hashed and linked into a chain of blocks.
3. The method for verifying the identity information of the asymmetric encryption block chain according to claim 2, wherein:
the cryptographic hash formed from the previous block is used to connect the blocks together, in the order of the past transactions.
4. The method for verifying the identity information of the asymmetrically encrypted block chain according to any one of claims 1 to 3, wherein:
the transaction is further confirmed after the block link has to be linked to the previous block.
5. The method for verifying the identity information of the asymmetric encryption block chain according to claim 1, wherein:
the authentication includes a key pair.
6. The method for verifying the identity information of the asymmetric encryption block chain according to claim 5, wherein:
the key pair includes a public key and a private key.
7. The method for verifying the identity information of the asymmetrically encrypted block chain according to claim 6, wherein:
the public key is public and is used for encrypting a piece of information and proving the authenticity of the information.
8. The method for verifying the identity information of the asymmetrically encrypted block chain according to claim 6, wherein:
the private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key.
9. The method for verifying the identity information of the asymmetrically encrypted block chain according to claim 6 or 7, wherein:
the information encrypted by the public key can be decrypted only by a person with a corresponding private key.
10. The method for verifying the identity information of the asymmetrically encrypted block chain according to claim 6, wherein:
the public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key.
11. The method for verifying the identity information of the asymmetrically encrypted block chain according to claim 6 or 10, wherein:
the private key signs information, and the public key verifies the signature.
12. The method for verifying the identity information of the asymmetrically encrypted block chain according to claim 11, wherein:
and confirming the signature information passing the public key verification as the private key holder to send.
13. The method for verifying the identity information of the asymmetrically encrypted block chain according to claim 11, wherein:
the public key is issued for the last block and the private key is owned by the holder of the next block.
14. The method for verifying the identity information of the asymmetric encryption block chain according to claim 5, wherein:
the key pair encryption method includes a hash encryption method, a DES encryption method, an RSA encryption method, an Elgamal encryption method, a matrix encryption method, an elliptic curve encryption method, and a combination thereof.
15. The method for verifying the identity information of the asymmetric encryption block chain according to claim 1, wherein:
the behavior characteristics are as follows: including path, area, WiFi, daily location, consumption behavior, consumption preferences, consumption units, consumption habits, and timestamps.
16. The method for verifying the identity information of the asymmetric encryption block chain according to claim 1, wherein:
the biometric features include hand shape, palm print, fingerprint, face, iris, retina, pulse, vein, pinna, odor, and DNA.
17. The method for verifying the identity information of the asymmetric encryption block chain according to claim 1, wherein:
the transaction information also comprises private keys of both transaction parties, transaction quantity and digital signatures of electronic money.
18. The method for verifying the identity information of the asymmetric encryption block chain according to claim 1, wherein:
and the verification adopts the behavior characteristic verification.
19. The method for authenticating identity information of an asymmetrically encrypted blockchain as claimed in claim 18, wherein:
and when the behavior characteristic verification is abnormal, adopting the biological characteristic for secondary verification.
20. An authentication method for the identity information of an asymmetric encryption block chain is characterized in that: applied to a server, comprising:
the transaction information is broadcast to all network servers;
the network server collects transaction information in a block;
the network server starts to continuously generate a random character string to obtain a random number answer;
when the answer obtained by one network server is matched with the random number, the generated block is broadcasted to all other network servers;
the other network servers verify the transaction, and when the transaction contained in the block is determined to be valid, the other network servers receive the block;
all other network servers begin to create new blocks and add the encrypted hash of the block just accepted;
the block comprises information, a cryptographic hash formed by the previous block and a random number;
the information includes behavioral characteristics and biometric characteristics.
21. An asymmetric encryption block chain identity information verifying device is characterized in that:
the system comprises a terminal, transmission equipment and a network server;
the terminal collects the behavior characteristics and the biological characteristics and sends the behavior characteristics and the biological characteristics to the network server through the transmission equipment;
and the network server verifies the behavior characteristics and the biological characteristics acquired by the terminal through the block chain.
22. The asymmetric encryption block chain identity information authentication device as in claim 21, wherein:
the terminal comprises a consumption terminal, a mobile terminal and a geographical position information device.
23. The asymmetric encryption block chain identity information authentication device as in claim 21, wherein:
the network server comprises a block linking unit, a block creating unit and a block storing unit.
24. The asymmetric encryption block chain identity information authentication device as in claim 23, wherein:
the block linking unit verifies that blocks are linked with each other, the block creating unit creates a new block through verification transaction, and the block storing unit stores the newly created block.
25. The asymmetric encryption block chain identity information authentication device as in claim 24, wherein:
the block linking unit comprises a random number generation unit, a random number verification unit, a time stamp unit, a password generation unit and a password decryption unit.
26. The asymmetric encryption block chain identity information authentication device as in claim 21, wherein:
the behavior characteristics comprise paths, regions, WiFi, daily positions, consumption behaviors, consumption preferences, consumption amount, consumption habits and timestamps.
27. The asymmetric encryption block chain identity information authentication device as in claim 21, wherein:
the biometric features include hand shape, palm print, fingerprint, face, iris, retina, pulse, vein, pinna, odor, and DNA.
28. The asymmetric encryption block chain identity information authentication device as in claim 21, wherein:
the authentication includes a key pair.
29. The asymmetric encryption block chain identity information verification apparatus as in claim 28, wherein:
the key pair includes a public key and a private key.
30. The asymmetric encryption block chain identity information authentication device as in claim 29, wherein:
the public key is public and is used for encrypting a piece of information and proving the authenticity of the information.
31. The asymmetric encryption block chain identity information authentication device as in claim 29, wherein:
the private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key.
32. The asymmetric encryption block chain identity information authentication device as claimed in claim 29 or 30, wherein:
the information encrypted by the public key can be decrypted only by a person with a corresponding private key.
33. The asymmetric encryption block chain identity information authentication device as in claim 29, wherein:
the public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key.
34. The asymmetric encryption block chain identity information authentication device as claimed in claim 29 or 33, wherein:
the private key signs information, and the public key verifies the signature.
35. The asymmetric encryption block chain identity information authentication device of claim 34, wherein:
and confirming the signature information passing the public key verification as the private key holder to send.
36. The asymmetric encryption block chain identity information authentication device of claim 34, wherein:
the public key is issued for the last block and the private key is owned by the holder of the next block.
37. The asymmetric encryption block chain identity information verification apparatus as in claim 28, wherein:
the key pair encryption method includes a hash encryption method, a DES encryption method, an RSA encryption method, an Elgamal encryption method, a matrix encryption method, an elliptic curve encryption method, and a combination thereof.
38. The asymmetric encryption block chain identity information authentication device of claim 36, wherein:
the block includes the following three parts: information, a cryptographic hash formed of the previous block, a random number.
39. The asymmetric encryption block chain identity information authentication device of claim 25, wherein:
the transaction information also comprises private keys of both transaction parties, transaction quantity and digital signatures of electronic money.
40. The asymmetric encryption block chain identity information authentication device as in claim 21, wherein:
and the verification adopts the behavior characteristic verification.
41. The asymmetric encryption block chain identity information authentication device of claim 40, wherein:
and when the behavior characteristic verification is abnormal, adopting the biological characteristic for secondary verification.
CN201610413635.3A 2016-06-14 2016-06-14 Method and device for verifying identity information of asymmetric encryption block chain Expired - Fee Related CN106100847B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610413635.3A CN106100847B (en) 2016-06-14 2016-06-14 Method and device for verifying identity information of asymmetric encryption block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610413635.3A CN106100847B (en) 2016-06-14 2016-06-14 Method and device for verifying identity information of asymmetric encryption block chain

Publications (2)

Publication Number Publication Date
CN106100847A CN106100847A (en) 2016-11-09
CN106100847B true CN106100847B (en) 2021-10-26

Family

ID=57846333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610413635.3A Expired - Fee Related CN106100847B (en) 2016-06-14 2016-06-14 Method and device for verifying identity information of asymmetric encryption block chain

Country Status (1)

Country Link
CN (1) CN106100847B (en)

Families Citing this family (72)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116957790A (en) * 2016-02-23 2023-10-27 区块链控股有限公司 Method and system for realizing universal certification of exchange on blockchain
CN108075895B (en) * 2016-11-15 2020-03-24 深圳银链科技有限公司 Node permission method and system based on block chain
CN106548397A (en) * 2016-11-22 2017-03-29 天津米游科技有限公司 A kind of block chain common recognition mechanism
CN106991334B (en) 2016-11-24 2021-03-02 创新先进技术有限公司 Data access method, system and device
CN106407481B (en) * 2016-11-30 2019-12-03 福州微启迪物联科技有限公司 Ecological environment supervising system and its implementation based on block chain framework
CN106534160B (en) * 2016-12-02 2020-02-21 江苏通付盾科技有限公司 Identity authentication method and system based on block chain
CN107016542A (en) * 2016-12-06 2017-08-04 阿里巴巴集团控股有限公司 A kind of business data processing method, verification method, apparatus and system
US10715331B2 (en) * 2016-12-28 2020-07-14 MasterCard International Incorported Method and system for providing validated, auditable, and immutable inputs to a smart contract
WO2018119930A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Transaction verification processing method, apparatus and node device
WO2018126340A1 (en) * 2017-01-03 2018-07-12 华为技术有限公司 Blockchain-based data processing method, device and system
CN106982203B (en) * 2017-01-06 2020-05-22 中国银联股份有限公司 Robust ATM network system based on block chain technology and information processing method thereof
CN106686555A (en) * 2017-01-12 2017-05-17 算丰科技(北京)有限公司 Data block broadcasting method and device and electronic equipment
CN106790253A (en) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Authentication method and device based on block chain
GB201701360D0 (en) * 2017-01-27 2017-03-15 Nchain Holdings Ltd Computer implemented method and system
CN107086909B (en) * 2017-03-07 2021-01-12 创新先进技术有限公司 Identity information generation method and device and identity verification method and device
CN107016543A (en) * 2017-03-29 2017-08-04 宁夏煜隆科技有限公司 The method of commerce and system of model adaptation in e-commerce platform
CN106980980A (en) * 2017-03-29 2017-07-25 宁夏宁信信息科技有限公司 Method of commerce and system based on block chain technology in e-commerce platform
CN106971342A (en) * 2017-03-29 2017-07-21 宁夏凯速德科技有限公司 Method of commerce and system based on block chain technology in the e-commerce platform of decentralization
CN106991569B (en) * 2017-03-29 2018-07-31 宁夏灵智科技有限公司 The method of commerce and system that big data calculates in e-commerce platform
GB201705749D0 (en) * 2017-04-10 2017-05-24 Nchain Holdings Ltd Computer-implemented system and method
CN107172016B (en) * 2017-04-25 2021-05-18 中国联合网络通信集团有限公司 Security trust processing method and device
CN107301546B (en) * 2017-05-03 2020-10-16 北京众享比特科技有限公司 Random number generation and application method and device
CN107147652B (en) * 2017-05-18 2019-08-09 电子科技大学 A secure fusion authentication method for user multi-modal identity based on blockchain
CN110663054B (en) * 2017-05-22 2024-06-18 区块链控股有限公司 Copying a smart contract with a termination condition
CN107104977B (en) * 2017-05-23 2020-07-31 北京天德科技有限公司 Block chain data secure transmission method based on SCTP
CN108064440B (en) * 2017-05-25 2021-04-09 达闼机器人有限公司 Blockchain-based FIDO authentication method, device and system
CN107423978A (en) * 2017-06-16 2017-12-01 郑州大学 A kind of distributed energy business confirmation method based on alliance's block chain
EP3419210B1 (en) * 2017-06-22 2025-09-03 ALMA GmbH Method for generating a transaction of a blockchain and method for validating a block of a blockchain
CN107241196A (en) * 2017-06-30 2017-10-10 杰创智能科技股份有限公司 Digital signature method and system based on block chain technology
CN107506661B (en) * 2017-08-15 2020-04-24 河南真二互联网科技有限公司 Method for generating house historical record based on block chain
EP3444997A1 (en) * 2017-08-18 2019-02-20 Siemens Aktiengesellschaft Devices to provide a quantity of cryptographically protected and filtered as well as sorted transaction datasets of a link of a block chain
CN107480559B (en) * 2017-08-25 2019-08-20 北京中星仝创科技有限公司 A kind of safe storage system and method for the block chain from chain data
CN107656812A (en) * 2017-09-27 2018-02-02 咪咕文化科技有限公司 block chain processing method, system, node device, terminal and storage medium
CN107528688B (en) * 2017-09-30 2020-04-21 矩阵元技术(深圳)有限公司 A blockchain key storage and recovery method and device based on encryption entrustment technology
CN107749848B (en) * 2017-10-23 2020-04-07 中国联合网络通信集团有限公司 Internet of things data processing method and device and Internet of things system
CN107994991B (en) * 2017-10-31 2021-06-11 深圳市轱辘车联数据技术有限公司 Data processing method, data processing server and storage medium
CN107682364B (en) * 2017-11-03 2019-12-03 杭州秘猿科技有限公司 A kind of license chain privacy method of commerce
CN107993359B (en) * 2017-11-23 2021-01-19 浙江大学 Block chain-based end-to-end bicycle sharing system and method
CN107888384B (en) * 2017-11-30 2020-11-27 中链科技有限公司 An identity data management method, system and computer-readable storage medium
CN118967246A (en) * 2017-12-01 2024-11-15 快特网络有限公司 Blockchain communication and sequencing
CN108270571B (en) * 2017-12-08 2019-10-11 西安电子科技大学 Blockchain-based Internet of Things identity authentication system and its method
GB201721021D0 (en) * 2017-12-15 2018-01-31 Nchain Holdings Ltd Computer-implemented methods and systems
US9990504B1 (en) * 2017-12-18 2018-06-05 Northern Trust Corporation Systems and methods for generating and maintaining immutable digital meeting records within distributed network nodes
CN108334553B (en) * 2017-12-29 2020-07-10 北京欧链科技有限公司 Data screening method and device based on block chain
CN108320228A (en) * 2018-03-07 2018-07-24 物数(上海)信息科技有限公司 Transregional piece of chain transaction in assets method, platform, equipment and storage medium
CN108596608A (en) * 2018-04-28 2018-09-28 比飞力(深圳)科技有限公司 A kind of method and device of digital wallet transaction
CN108737108A (en) * 2018-05-09 2018-11-02 合肥达朴汇联科技有限公司 A kind of computer-readable medium including block chain node
JP7371015B2 (en) * 2018-05-14 2023-10-30 エヌチェーン ライセンシング アーゲー Computer-implemented systems and methods for performing atomic swaps using blockchain
CN108712429B (en) * 2018-05-24 2020-07-10 西安电子科技大学 Privacy protection method based on blockchain cloud outsourcing computing data
CN108737430B (en) * 2018-05-25 2020-07-17 全链通有限公司 Encryption communication method and system for block chain node
CN108876332B (en) * 2018-06-04 2020-09-22 清华大学 A blockchain security transaction method and device based on biometric signature authentication
CN108737114A (en) * 2018-06-19 2018-11-02 天津中兴云链技术有限公司 A kind of endorsement method and device of the block catenary system based on quantum key distribution
CN108846108B (en) * 2018-06-22 2020-07-07 苏州得尔达国际物流有限公司 Unmanned aerial vehicle route distribution system based on block chain technology
CN108847046A (en) * 2018-07-03 2018-11-20 中钞信用卡产业发展有限公司杭州区块链技术研究院 Parking management method, equipment and medium based on block chain technology
CN109039645A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A kind of system and method signed using digital signature to block chain affairs
CN108833438B (en) * 2018-07-18 2020-04-14 电子科技大学 A method for secure storage of industrial Internet of Things information based on blockchain
CN109166021A (en) * 2018-07-26 2019-01-08 阿里巴巴集团控股有限公司 Bookkeeping methods, device and business finance integral system
CN109118655A (en) * 2018-07-31 2019-01-01 温州市图盛科技有限公司 A kind of electrical energy measurement and transaction terminal of block chain technology
CN109067741A (en) * 2018-08-01 2018-12-21 佛山市苔藓云链科技有限公司 A kind of server of reception and storage terminal block chain data
CN109150542A (en) * 2018-08-15 2019-01-04 杭州链汇通区块链科技有限公司 Hardware signature method, hardware stamped signature verification method, sealing system and storage medium
CN109213914A (en) * 2018-08-28 2019-01-15 蔡捷 The network search engines based on block chain technology are logged in using living body biological identity
CN109067529A (en) * 2018-09-09 2018-12-21 成都量安区块链科技有限公司 A kind of production method of block chain private key for user
CN109257179A (en) * 2018-10-09 2019-01-22 北京网录科技有限公司 A kind of signature generating method and the block chain account management method using this method
CN109040139B (en) * 2018-10-12 2021-05-18 重庆邮电大学 Identity authentication system and method based on block chain and intelligent contract
CN109347868B (en) * 2018-11-27 2021-06-08 咪咕文化科技有限公司 Information verification method, device and storage medium
CN109862006A (en) * 2019-01-29 2019-06-07 济南浪潮高新科技投资发展有限公司 A kind of block catenary system cut-in method, apparatus and system
CN110086780B (en) * 2019-03-26 2021-11-02 北京百度网讯科技有限公司 Method, device and storage medium for processing tampered transactions based on Ethereum
GB2582978B (en) * 2019-04-12 2022-05-04 Nchain Holdings Ltd Methods and devices for propagating blocks in a blockchain network
CN112532394B (en) * 2020-11-26 2022-05-06 中国电子科技集团公司第五十四研究所 A certificate-free blind signature generation method with anti-signature traceability in blockchain
CN113610526A (en) * 2021-08-24 2021-11-05 上海点融信息科技有限责任公司 Data trust method and device, electronic equipment and storage medium
CN113886778B (en) * 2021-09-24 2025-04-22 杭州电子科技大学 A Regulatable Approach to Dynamic Self-Sovereign Identity Generation
CN116471030B (en) * 2022-09-19 2025-12-30 湖南湘科智慧科技有限公司 A smart locker linkage control system for the entry and exit of seized property

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104735164A (en) * 2015-04-10 2015-06-24 网易(杭州)网络有限公司 Method and device for saving file information
CN105488665A (en) * 2015-11-25 2016-04-13 布比(北京)网络技术有限公司 Decentralized transaction method
CN105573828A (en) * 2015-12-17 2016-05-11 布比(北京)网络技术有限公司 Operation processing method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9876775B2 (en) * 2012-11-09 2018-01-23 Ent Technologies, Inc. Generalized entity network translation (GENT)

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104735164A (en) * 2015-04-10 2015-06-24 网易(杭州)网络有限公司 Method and device for saving file information
CN105488665A (en) * 2015-11-25 2016-04-13 布比(北京)网络技术有限公司 Decentralized transaction method
CN105573828A (en) * 2015-12-17 2016-05-11 布比(北京)网络技术有限公司 Operation processing method and device

Also Published As

Publication number Publication date
CN106100847A (en) 2016-11-09

Similar Documents

Publication Publication Date Title
CN106100847B (en) Method and device for verifying identity information of asymmetric encryption block chain
CN109768988B (en) Decentralized Internet of things security authentication system, equipment registration and identity authentication method
CN109756485B (en) Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
US11228582B2 (en) Digital certificate with software enabling indication
CN107851253B (en) Contract consent method, consent verification method, contract consent system, consent verification device, contract consent device, computer readable recording medium
CN109687965B (en) Real-name authentication method for protecting user identity information in network
EP3360279B1 (en) Public key infrastructure&method of distribution
Jiang et al. Cryptanalysis of smart‐card‐based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
CN107579817A (en) User ID authentication method, apparatus and system based on block chain
CN109003083A (en) A kind of ca authentication method, apparatus and electronic equipment based on block chain
CN106797311A (en) Method for secure password generation
JP2007049708A (en) System and method for updating keys used for public key cryptography
UA128523C2 (en) METHOD OF GENERATION OF A BLOCKCHAIN TRANSACTION AND METHOD OF CHECKING THE VALIDITY OF A BLOCK OF BLOCKCHAIN
CN112231769A (en) Blockchain-based numerical verification method, device, computer equipment and medium
CN114692218A (en) Electronic signature method, equipment and system for individual user
CN114257376B (en) Digital certificate updating method, device, computer equipment and storage medium
WO2008031301A1 (en) A method for the point to point online identity authenticaiton
CN109687977A (en) Anti- quantum calculation digital signature method and anti-quantum calculation digital signature system based on multiple pool of keys
CN108777673B (en) Bidirectional identity authentication method in block chain
León-Coca et al. Authentication systems using ID Cards over NFC links: the Spanish experience using DNIe
JP2010231404A (en) Secret information management system, secret information management method, and secret information management program
CN112272088A (en) Auditable signature method based on multiple secure parties and related components
Kwon et al. Certificate transparency with enhanced privacy
CN113849797A (en) Method, device, equipment and storage medium for repairing data security vulnerability
CN106027254A (en) Secret key use method for identity card reading terminal in identity card authentication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20211026

CF01 Termination of patent right due to non-payment of annual fee