[go: up one dir, main page]

CN111738893A - Identity authentication method, device, equipment and medium based on block chain - Google Patents

Identity authentication method, device, equipment and medium based on block chain Download PDF

Info

Publication number
CN111738893A
CN111738893A CN202010688995.0A CN202010688995A CN111738893A CN 111738893 A CN111738893 A CN 111738893A CN 202010688995 A CN202010688995 A CN 202010688995A CN 111738893 A CN111738893 A CN 111738893A
Authority
CN
China
Prior art keywords
identity
authentication
target user
data
authenticator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010688995.0A
Other languages
Chinese (zh)
Other versions
CN111738893B (en
Inventor
肖伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202010688995.0A priority Critical patent/CN111738893B/en
Publication of CN111738893A publication Critical patent/CN111738893A/en
Application granted granted Critical
Publication of CN111738893B publication Critical patent/CN111738893B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses an identity authentication method, device, equipment and medium based on a block chain, relates to the technical field of block chains, and can be applied to cloud computing and cloud services. The specific implementation scheme is as follows: acquiring an identity authentication transaction request initiated by an authentication party for a target user; according to the identity authentication transaction request, acquiring authentication data which is authenticated by the authenticator aiming at the target user; and storing the authentication data into an identity attribute table of the target user, and performing uplink storage on the identity attribute table. The identity authentication of the target user authenticator is realized, the authentication data is linked and stored, the authentication data is prevented from being tampered, and the fairness, the accuracy and the authenticity of the identity authentication are improved.

Description

Identity authentication method, device, equipment and medium based on block chain
Technical Field
The application relates to the technical field of computers, in particular to a block chain technology.
Background
In the current society, the situation of a person needs to be evaluated in many scenes, for example, in the situations of evaluation, promotion, employment and the like, the situation of various aspects of the person needs to be evaluated comprehensively. For example, a person may be evaluated from a variety of aspects, such as educational experiences, professional experiences, prize winning situations, historical performance, and the like.
In the prior art, the identity evaluation of people is easily questioned by fairness, accuracy and authenticity, and no good objective technical means is guaranteed.
Disclosure of Invention
The embodiment of the application provides an identity authentication method, device, equipment and medium based on a block chain.
According to an aspect of the present application, an identity authentication method based on a blockchain is provided, which is applied to a blockchain node, and the method includes:
acquiring an identity authentication transaction request initiated by an authentication party for a target user;
according to the identity authentication transaction request, acquiring authentication data which is authenticated by the authenticator aiming at the target user;
and storing the authentication data into an identity attribute table of the target user, and performing uplink storage on the identity attribute table.
According to another aspect of the present application, there is provided an apparatus for identity authentication based on a blockchain, configured at a blockchain node, the apparatus including:
the request acquisition module is used for acquiring an identity authentication transaction request initiated by an authenticator for a target user;
the data acquisition module is used for acquiring the authentication data which is authenticated by the authenticator aiming at the target user according to the identity authentication transaction request;
a data storage module for storing the authentication data into the identity attribute table of the target user and performing uplink storage on the identity attribute table
According to another aspect of the present application, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the method of any of the embodiments of the present application.
According to another aspect of the present application, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing a computer to perform the method of any of the embodiments of the present application.
According to the technology of the application, the fairness, the accuracy and the authenticity of the identity evaluation of the people are improved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present application, nor do they limit the scope of the present application. Other features of the present application will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
fig. 1 is a schematic flowchart of an identity authentication method based on a blockchain according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of another identity authentication method based on a blockchain according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another identity authentication method based on a blockchain according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another identity authentication method based on a blockchain according to an embodiment of the present application;
fig. 5 is a schematic flowchart of another identity authentication method based on a blockchain according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an identity authentication apparatus based on a block chain according to an embodiment of the present application;
fig. 7 is a block diagram of an electronic device for implementing a blockchain-based identity authentication method according to an embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a schematic flowchart of an identity authentication method based on a blockchain according to an embodiment of the present disclosure, where the method may be implemented by an identity authentication apparatus based on a blockchain, where the apparatus is applied to a blockchain node, may be implemented in a software and/or hardware manner, and may be integrated in an electronic device with specific computing capability. As shown in fig. 1, an identity authentication method based on a block chain provided in this embodiment may include:
s110, acquiring an identity authentication transaction request initiated by the authenticator for the target user.
The authenticator is an authentication person or entity associated with the target user, and may be any person or entity capable of authenticating information and behavior of the user and having authentication qualification, such as a company, school, or training institution of the user, for example, and the target user may be associated with a plurality of authenticators. The identity authentication transaction request refers to a request for identity authentication aiming at an authenticator sending the request, and the authenticator is determined to be the authenticator associated with the target user and used for uplink storage of data of the target user at the authenticator. The identity authentication transaction request is initiated based on data and procedures deployed by the blockchain system, for example, the transaction request may be initiated based on a proprietary and identity authentication intelligent contract. The identity authentication transaction request is obtained by each block link point.
And S120, acquiring authentication data of the target user authenticated by the authentication policy according to the identity authentication transaction request.
And the block chain node responds to the identity authentication transaction request of the authenticator and obtains the authentication data which is uploaded by the authenticator and is about the target user. Authentication data refers to data relating to a target user issued by an authenticator and may indicate the identity of the authenticator. For example, the authenticator is a college, the target user is a student of the college, the content of the authentication data is the school achievement of the target user issued by the college, and the name of the college is indicated in the authentication data. The authentication data obtained by the blockchain node is authenticated data, that is, the authentication data is determined to be data sent by the authenticator. For example, the authenticator may encrypt the authentication data with a key, and if the authentication data can be decrypted with the key of the authenticator, the authentication data is authenticated data. The authenticator may also sign the authentication data, and if the signature matches the correct signature of the authenticator, the authentication data is authenticated data, and the identity of the authenticator may be determined by the signature. If the authentication data is not authenticated, the authentication data is regarded as error data, and therefore, the block link point acquires the authenticated data.
S130, storing the authentication data into an identity attribute table of the target user, and performing uplink storage on the identity attribute table.
After the target users register accounts on the blockchain, identity attribute tables can be obtained, each target user has a unique identity attribute table and is used for recording authentication data of the authenticator for the target users, the identity attribute tables can be in a KV (Key Value) storage format, and the authentication data of a plurality of authenticators can be recorded in the identity attribute table of one target user. And the block chain node stores the authenticated authentication data into the identity attribute table and performs uplink storage on the identity attribute table. For example, the block link stores the examination result of the target user at the end of the school in the identity attribute table as the certification data, stores the training result of the target user in the training institution during the holiday period in the same identity attribute table as the certification data after one month, and retains the certification data of the previous school. After each update of the identity attribute table, the identity attribute table may be updated in the localized data of the blockchain, and the authentication data may be stored in the uplink.
Through the data stored on the chain, each organization is facilitated to evaluate the target user. For example, a comprehensive evaluation model can be established in the universities and colleges, and the comprehensive evaluation model can be set according to requirements and is mainly evaluated based on data users of a block chain, so that scores are directly generated, and the fairness of preferred admission is guaranteed. The data stored on the chain can ensure the correctness, completeness and traceability of the data, so that the evaluation result can be more fair.
One embodiment in the above application has the following advantages or benefits: and obtaining authenticated authentication data by obtaining the identity authentication transaction request, storing the authentication data into an identity attribute table of the target user, and performing uplink storage. The problem that authentication data are easily tampered in the prior art is solved, various information of a target user is stored through the block chain, effective recording is carried out through the unified identity attribute table, accurate and effective source data can be provided when the target user is evaluated, an evaluation result is enabled to be more fair, and fairness, accuracy and authenticity of identity evaluation of the target user are guaranteed.
Fig. 2 is a schematic flow chart of another identity authentication method based on a blockchain according to an embodiment of the present application, which is optimized based on the above embodiment and is used for performing identity authentication on a person, where the method may be performed by an identity authentication apparatus based on a blockchain, and the apparatus may be implemented in a software and/or hardware manner and may be integrated in an electronic device.
In this embodiment, optionally, the operation "store the authentication data in the identity attribute table of the target user" is refined to "store the authentication data in the identity attribute table of the blockchain account of the target user according to at least one table dimension; wherein the table dimension is a partitioning dimension of a sub-table, a row and/or a column of the identity attribute table, and the table dimension includes at least one of: authenticator, authentication data type, and authentication time ".
As shown in fig. 2, an identity authentication method based on a block chain provided in this embodiment may include:
s210, acquiring an identity authentication transaction request initiated by the authenticator for the target user.
S220, according to the identity authentication transaction request, authentication data of the target user authenticated by the authentication policy are obtained.
The block chain node responds to an identity authentication transaction request of an authenticator, acquires authentication data of the authenticator aiming at a target user, and the authentication data is authenticated. The identity of the authenticator uploading the authentication data and the content of the authentication data can be determined through the authentication data, and the content of the authentication data is user information of the target user, for example, the user information can be personal information of the user, and the user information can also be information such as the performance of the user at the authenticator.
In this embodiment, optionally, the authentication data includes at least one of the following: the data processing method comprises the following steps of user living body data, user static attribute data and user behavior data, wherein the user static attribute data comprises at least one of the following data: name, gender, age, home address, and contact; the user behavior data comprises attendance behavior data, donation behavior data, public welfare behavior data, examination behavior data, prize winning behavior data or penalty behavior data and the like.
Specifically, the user living body data and the user static attribute data refer to personal information of the user, and can be used for identifying the identity of the user. The user living body data is information such as a face of a user, is different from a user photo, is three-dimensional data with depth, and can comprise information such as a photo, a name, a gender, an age, a home address and a contact address of the user. When the authenticator uploads the authentication data, the identity of the user can be indicated through the user living body data and the user static attribute data, and the authentication data is prevented from being associated with a wrong target user.
The user behavior data may include attendance behavior data, donation behavior data, commonweal behavior data, examination behavior data, reward behavior data, or penalty behavior data, among others. The attendance behavior data can be the attendance behavior of the target user in learning to punch the card every day, and the authenticator can link the attendance behavior of the target user through the block chain; the donation behavior data can be data such as donation objects, donation amounts, donation dates and the like of the target user which are uplinked by the authenticator; the public welfare behavior data can be information such as attendance and date of target users participating in public welfare activities such as communities or nursing homes and the like, which are linked by the authenticator; the examination behavior data is obtained by linking information of a small examination or a large examination and the like of a target user by an authenticator, and can be used for observing the comprehensive score fluctuation of the target user; the reward and penalty behavior data is for linking reward and penalty data of the target user.
The user identity can be effectively identified through the authentication data, the authentication data of the target user is prevented from being stored in accounts of other users, and the related data of the target user is obtained, so that the related data of the target user can be conveniently sorted and checked.
S230, storing the authentication data into an identity attribute table of a block chain account of the target user according to at least one table dimension, and performing uplink storage on the identity attribute table; wherein, the table dimension is the division dimension of the sub-table, row and/or column of the identity attribute table, and the content of the table dimension comprises at least one of the following: authenticator, authentication data type, and authentication time.
And the authenticator stores the authenticated authentication data into the identity attribute table of the target user according to at least one table dimension. The target user has an identity attribute table after registering the blockchain account for storing data of the target user at each authenticator. The identity attribute table may be partitioned into at least one sub-table, row, and/or column, and the authentication data may be stored in the identity attribute table in the form of a table dimension in the partition dimension of the at least one sub-table, row, and/or column. For example, if a target user learns at institution a and attends an extracurricular training at institution B, institution a and institution B are respectively authenticators of the target user, and the examination scores of the target user at institution a and institution B are authentication data, institution a may store the authentication data of the target user at institution a in the form of a row in the identity attribute table, and institution B may store the authentication data of the target user at institution B in the form of a row below the institution a data. The contents of the table dimension may include authenticator, authentication data type, authentication time, etc., for example, the table dimension in the form of rows may be divided into four columns, and the field names of each column are authenticator, authentication data type, authentication time, and authentication data content, respectively. And after the authentication data is stored in the identity attribute table in a table dimension form, performing uplink storage on the identity attribute table.
By storing the authentication data in the form of table dimension, the data of each authenticator in the identity attribute table is definitely divided, the uniqueness of the identity attribute table is ensured, the confusion of the authentication data is avoided, and the follow-up checking is facilitated.
One embodiment in the above application has the following advantages or benefits: and obtaining authenticated authentication data by obtaining the identity authentication transaction request, storing the authentication data into an identity attribute table of the target user according to the table dimension, and uploading the authentication data for storage. The problem that authentication data are easily tampered in the prior art is solved, various information of a target user is stored through a block chain, effective recording is carried out through a unified identity attribute table, authentication data of all authentication parties in the identity attribute table are definitely divided, accurate and effective source data can be rapidly provided when the target user is evaluated, data query efficiency is improved, evaluation results are enabled to be more fair, and fairness, accuracy and authenticity of identity evaluation of the target user are guaranteed.
Fig. 3 is a schematic flowchart of another identity authentication method based on a blockchain according to an embodiment of the present application, which is optimized based on the above embodiment and is used for performing identity authentication on a person, where the method may be performed by an identity authentication apparatus based on a blockchain, and the apparatus may be implemented in software and/or hardware and may be integrated in an electronic device.
As shown in fig. 3, an identity authentication method based on a block chain provided in this embodiment may include:
s310, acquiring an identity registration transaction request initiated by a target user.
The block chain link point acquires an identity registration transaction request sent by a target user to a block chain, and the identity registration transaction request is used for registering a block chain account of the target user and generating an account identifier of the block chain account.
In this embodiment, optionally, the account identifier of the blockchain account of the target user at least includes: a distributed digital identity identifier, a blockchain network identifier, and a blockchain account identification of the target user.
Specifically, the account id of the blockchain account of the target user may be composed of three parts, which are the distributed digital identity identifier, the blockchain network identifier, and the account id of the blockchain account of the target user. The distributed digital identity identifier is determined by a distributed digital identity standard and is a prefix part of an account identifier, the blockchain network identifier is determined by a blockchain network and is a middle component part of the account identifier, the blockchain account identifier of the target user is an account name character string of the target account, is a suffix part of the account identifier and can be a blockchain account public key of the target user or a character string derived from the public key. Through the account identification of at least three parts, the uniqueness of the account identification of the block chain account of the target user is ensured, and the management of the related data of the user is facilitated.
S320, distributing a distributed digital identity identifier for the target user based on a distributed digital identity standard according to the identity registration transaction request, acquiring a network identifier of the current block chain network to which the target user belongs, and creating a block chain account for the target user.
The block chain node allocates a dedicated identifier for the target user according to the identity registration transaction request, and may allocate a distributed digital identity identifier based on a distributed digital standard. For example, an identifier may be generated for the target user based on a DID (Decentralized ID) criteria as a prefix to the target user blockchain account. The prefix of the blockchain account may not be a fixed string, and different prefixes may be allocated to different distributed digital identity items. For example, if an uport (decentralized identity management application) is employed, the prefix is did: ethr; if Microsoft DID is adopted, the prefix is DID: test or did: ion-test.
And determining the current block chain network, and determining the network identifier according to the block chain network. And generating a block chain account identifier of the target user according to the personal information or the public key and other information of the user. And creating the blockchain account of the target user according to the distributed digital identity identifier, the network identifier and the blockchain account identification.
S330, combining the distributed digital identity identifier, the block chain network identifier and the block chain account identifier as the identity of the target user.
The distributed digital identity identifier, the block chain network identifier and the block chain account identifier are combined into a character string, the distributed digital identity identifier is a prefix, the block chain network identifier is a middle part, and the block chain account identifier is a suffix, so that the account identifier of the block chain account of the target user is obtained and used as the identity identifier of the target user. For example, with microsoft DID, the account identification may be expressed as DID: test: chain-id: and the bs-specific-string is generated based on the underlying zone block chain platform, so that the uniqueness of the whole network is ensured.
S340, creating an identity attribute table of the account for the target user, and recording corresponding to the identity.
After the target user creates the accounts, each account corresponds to one identity attribute table, and the identity attribute tables can record authentication data of the target user at different authenticators corresponding to the identity marks, so that the target user can conveniently view the authentication data. And the identity attribute table is placed in a block chain, and the whole network can be seen, so that the data is disclosed and transparent.
S350, acquiring an identity authentication transaction request initiated by the authenticator for the target user.
And S360, acquiring authentication data of the target user authenticated by the authentication policy according to the identity authentication transaction request.
S370, the authentication data is stored in the identity attribute table of the target user, and the identity attribute table is subjected to uplink storage.
One embodiment in the above application has the following advantages or benefits: in response to an identity registration transaction request of a target user, a unique identity and identity attribute table is created for the target user. And obtaining authenticated authentication data by obtaining the identity authentication transaction request, storing the authentication data into an identity attribute table of the target user according to the table dimension, and uploading the authentication data for storage. The problem that authentication data are easily tampered in the prior art is solved. The unique identity can avoid data confusion among users, and data management is facilitated. Various information of the target user is stored through the block chain, effective recording is carried out through the unified identity attribute table, authentication data of all authentication parties in the identity attribute table are definitely divided, accurate and effective source data can be rapidly provided when the target user is evaluated, the efficiency of data query is improved, the evaluation result is more fair, and the fairness, the accuracy and the authenticity of the identity evaluation of the target user are ensured.
Fig. 4 is a schematic flowchart of another identity authentication method based on a blockchain according to an embodiment of the present application, which is optimized based on the above embodiment and is used for performing identity authentication on a person, where the method may be performed by an identity authentication apparatus based on a blockchain, and the apparatus may be implemented in software and/or hardware and may be integrated in an electronic device.
In this embodiment, optionally, the operation "obtaining the authentication data that the authenticator has authenticated for the target user according to the identity authentication transaction request" is refined into "obtaining the authentication data signed by using the authenticator private key according to the identity authentication transaction request; adopting the public key of the authenticator to carry out signature verification on the authentication data; and if the signature verification passes, confirming the authentication data that the authenticator has authenticated the target user.
As shown in fig. 4, an identity authentication method based on a block chain provided in this embodiment may include:
s410, acquiring an identity authentication transaction request initiated by the authenticator for the target user.
And S420, acquiring the authentication data signed by the private key of the authenticator according to the identity authentication transaction request.
The authenticator sends an identity authentication transaction request to prove the identity of the authenticator, so that the authentication data can be stored and linked up conveniently. The authentication data uploaded by the authenticator is signed by a private key of the authenticator, and the block chain nodes respond to the identity authentication transaction request to obtain the signed authentication data uploaded by the authenticator.
In this embodiment, optionally, the authentication data includes authentication content encrypted by using a private key of the authenticator, and further includes an authenticator identifier, where the authenticator identifier is signed by using the private key of the authenticator.
Specifically, the authentication data may include authentication content and an authenticator identifier, where the authentication content is specific content of the authentication data uploaded by the authenticator for the target user, and may be, for example, an examination score of the target user. The authentication content can be encrypted by a private key of an authenticator, so that the authentication content is prevented from being leaked. The authenticator identification may be a private key signature of the authenticator that indicates the identity of the authenticator.
And S430, signature verification is carried out on the authentication data by adopting the public key of the authenticator.
After the block link point acquires the authentication data of the authenticator, whether the authentication data is sent by the authenticator is determined. And acquiring the public key of the authenticator, and verifying the authenticator identifier, namely the private key signature, in the authentication data by adopting the public key of the authenticator. And determining whether the private key signature is associated with the public key of the authenticator, avoiding other authenticators from stealing the account of the authenticator, and uploading authentication data by adopting the private keys of other authenticators.
And S440, if the signature verification is passed, confirming the authentication data of which the target user is authenticated by the authenticator.
If the identification of the authenticator passes the verification, the identity of the authenticator is confirmed to be correct, the authentication data is authorized to be uploaded, and the authentication data is authenticated and can be stored in an identity attribute table of a target user; if the identification of the authenticator fails to pass the verification, the verification is indicated to fail to upload the authentication data, thereby avoiding the situation that other authenticators steal the identity of the authenticator to upload the authentication data and ensuring the security of the authentication data.
S450, storing the authentication data into an identity attribute table of the target user, and performing uplink storage on the identity attribute table.
One embodiment in the above application has the following advantages or benefits: the authenticated authentication data is obtained by obtaining the identity authentication transaction request, the authentication data is authenticated, the authority for uploading the authentication data is determined to exist in the authentication, and the account of the authenticator is prevented from being stolen. And storing the authenticated authentication data into an identity attribute table of the target user, and uplink storing. The problem that authentication data are easily tampered in the prior art is solved, the safety and the authenticity of the authentication data are guaranteed, various information of a target user is stored through a block chain, effective recording is conducted through a unified identity attribute table, accurate and effective source data can be provided when the target user is evaluated, the evaluation result is enabled to be more fair, and the fairness, the accuracy and the authenticity of identity evaluation of the target user are guaranteed.
Fig. 5 is a schematic flowchart of another identity authentication method based on a blockchain according to an embodiment of the present application, which is optimized based on the above embodiment and is used for performing identity authentication on a person, where the method may be performed by an identity authentication apparatus based on a blockchain, and the apparatus may be implemented in software and/or hardware and may be integrated in an electronic device.
In this embodiment, optionally, the operation "acquiring an identity authentication transaction request initiated by an authenticator for a target user" is refined to "acquiring an identity authentication transaction request automatically initiated by a blockchain lightweight node belonging to the authenticator for the target user; wherein the lightweight node comprises at least one of: attendance machine, camera, user mobile terminal and user fixed terminal ".
As shown in fig. 5, an identity authentication method based on a block chain provided in this embodiment may include:
s510, acquiring an identity authentication transaction request which is automatically initiated by a block chain lightweight node belonging to an authenticator aiming at a target user; wherein the lightweight node comprises at least one of: attendance machine, camera, user mobile terminal and user fixed terminal.
The authentication party can hold at least one blockchain lightweight node, the lightweight node can automatically initiate an identity authentication transaction request based on the collected information, and the time and the period for sending the identity authentication transaction request can be preset, so that the authentication party can automatically send the identity authentication transaction request. The lightweight node can comprise equipment such as an attendance machine, a camera, a user mobile terminal and a user fixed terminal, and the like, so that data of a target user can be acquired, the data can be automatically uploaded according to an identity authentication transaction request, subjective reasons of data acquisition are reduced, namely non-objectivity of human factors is reduced, counterfeiting is avoided, and labor input cost is also reduced. For example, in the aspect of attendance, a camera based on LCV (light Client Validation Technology) Technology may be adopted, and the credibility of acquisition is ensured through face recognition and TEE (trusted execution environment) chip; in the aspect of examination, pictures of test papers are collected through a camera to carry out chain linking, and the fairness of scores is ensured through information such as handwriting and the like; in the aspect of reward, the authenticity of the electronic certificate can be ensured through the authority of the photo and the issuing organization.
S520, according to the identity authentication transaction request, authentication data of the target user authenticated by the authentication policy are obtained.
S530, storing the authentication data into an identity attribute table of the target user, and performing uplink storage on the identity attribute table.
After the authentication data is stored in the identity attribute table, uplink storage is carried out along with the identity attribute table. After the uplink storage is finished, the third party can inquire the authentication data, verify the authentication data and the identity of the authenticator and ensure the authenticity of the authentication data.
In this embodiment, optionally, the method further includes: acquiring an identity authentication request initiated by an authentication party for a target user; inquiring an identity attribute table of a target user in a block chain according to the identity authentication request; and acquiring authentication data from the identity attribute table, and responding to the identity verification request based on the authentication data.
Specifically, the verifier is a third-party organization and can verify the authentication data and the identity of the verifier. And the verification direction block link point sends an authentication request aiming at a target user, wherein the authentication request can be a non-transaction request for local query at the node or a transaction request for query on all node chains. And the block chain node responds to the identity authentication request, acquires the account of the target user from the identity authentication request, and inquires the identity attribute table of the target user from the block chain according to the account of the target user. And acquiring the authentication data of the target user from the identity attribute table so as to be convenient for verification according to the authentication data. By providing the verification function of the verifier, the transparency and the disclosure of the authentication data are realized, and the authenticity and the accuracy of the authentication data are ensured. The specific verification operation may be to feed back part or all of the authentication data in the identity attribute table to the verifier, or may be to feed back the authentication data after performing secondary processing according to requirements.
In this embodiment, optionally, after obtaining the authentication data from the identity attribute table, the method further includes: and verifying the authenticator signature of the authentication data by adopting the authenticator public key corresponding to the authentication data, and executing response operation if the authentication is passed.
Specifically, after the block link point acquires the authentication data, the corresponding authenticator is determined according to the authentication data, and the corresponding authenticator public key is acquired. Verifying the signature of the authenticator in the authentication data by adopting the public key of the authenticator, and if the verification is passed, indicating that the authentication data is uploaded by the corresponding authenticator and executing the response operation of the identity verification request; if the verification fails, the authentication data is wrong, and the target user and the authenticator are prompted to confirm in time. The authentication is carried out through the public key of the authenticator, so that the accuracy of authentication data is ensured, the malicious uploading of wrong data by a person is avoided, and the fairness of the authentication data is realized.
One embodiment in the above application has the following advantages or benefits: and automatically initiating an identity authentication transaction request through the block chain lightweight node to obtain authenticated authentication data, storing the authentication data into an identity attribute table of the target user, and performing uplink storage. The problem that authentication data are easily tampered in the prior art is solved, and the influence of human subjective factors is reduced. Various information of the target user is stored through the block chain, effective recording is carried out through the unified identity attribute table, accurate and effective source data can be provided when the target user is evaluated, the evaluation result is more fair, and the fairness, the accuracy and the authenticity of the identity evaluation of the target user are ensured.
Fig. 6 is a schematic structural diagram of an identity authentication apparatus based on a block chain according to an embodiment of the present disclosure, which is configured at a block chain node, and is capable of executing an identity authentication method based on a block chain according to an embodiment of the present disclosure, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 6, the apparatus 600 may include:
a request obtaining module 601, configured to obtain an identity authentication transaction request initiated by an authenticator for a target user;
a data obtaining module 602, configured to obtain, according to the identity authentication transaction request, authentication data that the authenticator has authenticated the target user;
the data storage module 603 is configured to store the authentication data in the identity attribute table of the target user, and perform uplink storage on the identity attribute table.
Optionally, the data storage module 603 includes:
the table dimension storage unit is used for storing the authentication data into an identity attribute table of the block chain account of the target user according to at least one table dimension; wherein, the table dimension is the division dimension of the sub-table, row and/or column of the identity attribute table, and the content of the table dimension comprises at least one of the following: authenticator, authentication data type, and authentication time.
Optionally, the account identifier of the blockchain account of the target user at least includes: a distributed digital identity identifier, a blockchain network identifier, and a blockchain account identification of the target user.
Optionally, the apparatus 600 further includes:
a registration request acquisition module, configured to acquire an identity registration transaction request initiated by a target user before an identity authentication transaction request initiated by an authenticator for the target user is acquired;
the account creating module is used for distributing a distributed digital identity identifier for the target user based on a distributed digital identity standard according to the identity registration transaction request, acquiring a network identifier of a current affiliated block chain network, and creating a block chain account for the target user;
the identity combining module is used for combining the distributed digital identity identifier, the block chain network identifier and the block chain account identifier as the identity of the target user;
and the attribute table creating module is used for creating an identity attribute table of the account for the target user and recording corresponding to the identity.
Optionally, the data obtaining module 602 includes:
the authentication data acquisition unit is used for acquiring authentication data signed by a private key of an authenticator according to the identity authentication transaction request;
the data verification unit is used for adopting a public key of an authenticator to carry out signature verification on the authentication data;
and the data confirmation unit is used for confirming the authentication data which is authenticated by the authenticator for the target user if the signature verification passes.
Optionally, the authentication data includes authentication content encrypted by using a private key of the authenticator, and further includes an authenticator identifier, and the authenticator identifier is signed by using the private key of the authenticator.
Optionally, the request obtaining module 601 is specifically configured to:
acquiring an identity authentication transaction request automatically initiated by a block chain lightweight node belonging to an authenticator aiming at a target user;
wherein the lightweight node comprises at least one of: attendance machine, camera, user mobile terminal and user fixed terminal.
Optionally, the authentication data includes at least one of:
user living body data, user static attribute data and user behavior data;
wherein the user static attribute data comprises at least one of: name, gender, age, home address, and contact;
the user behavior data comprises attendance behavior data, donation behavior data, public welfare behavior data, examination behavior data, prize winning behavior data or penalty behavior data.
Optionally, the apparatus 600 further includes:
the verification request acquisition module is used for acquiring an identity verification request initiated by a verifier aiming at a target user;
the attribute table query module is used for querying an identity attribute table of a target user in the block chain according to the identity authentication request;
and the verification request response module is used for acquiring the authentication data from the identity attribute table and responding the identity verification request based on the authentication data.
Optionally, the apparatus 600 further includes:
and the signature verification module is used for verifying the authenticator signature of the authentication data by adopting the authenticator public key corresponding to the authentication data after acquiring the authentication data from the identity attribute table, and executing response operation if the authentication is passed.
One embodiment in the above application has the following advantages or benefits: and obtaining authentication data authenticated by the authenticated party by obtaining the identity authentication transaction request, storing the authentication data into an identity attribute table of the target user, and performing uplink storage. The problem that authentication data are easily tampered in the prior art is solved, various information of a target user is stored through the block chain, effective recording is carried out through the unified identity attribute table, accurate and effective source data can be provided when the target user is evaluated, an evaluation result is enabled to be more fair, and fairness, accuracy and authenticity of identity evaluation of the target user are guaranteed.
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided.
Fig. 7 is a block diagram of an electronic device according to an embodiment of the present application, where the electronic device is an identity authentication method based on a block chain. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 7, the electronic apparatus includes: one or more processors 701, a memory 702, and interfaces for connecting the various components, including a high-speed interface and a low-speed interface. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). In fig. 7, one processor 701 is taken as an example.
The memory 702 is a non-transitory computer readable storage medium as provided herein. Wherein the memory stores instructions executable by at least one processor to cause the at least one processor to perform the blockchain based identity authentication method provided herein. The non-transitory computer readable storage medium of the present application stores computer instructions for causing a computer to perform the blockchain-based identity authentication method provided by the present application.
The memory 702, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the block chain based identity authentication method in the embodiments of the present application. The processor 701 executes various functional applications and data processing of the server by running non-transitory software programs, instructions and modules stored in the memory 702, that is, implements the identity authentication method based on the block chain in the above method embodiment.
The memory 702 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the electronic device based on the identity authentication method of the block chain, and the like. Further, the memory 702 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 702 may optionally include memory located remotely from the processor 701, and these remote memories may be connected over a network to an electronic device of the blockchain based identity authentication method. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device of the identity authentication method based on the blockchain may further include: an input device 703 and an output device 704. The processor 701, the memory 702, the input device 703 and the output device 704 may be connected by a bus or other means, and fig. 7 illustrates an example of a connection by a bus.
The input device 703 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic apparatus based on the blockchain-based identity authentication method, such as a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointing stick, one or more mouse buttons, a track ball, a joystick, and the like. The output devices 704 may include a display device, auxiliary lighting devices (e.g., LEDs), and tactile feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
According to the technical scheme of the embodiment of the application, the problem that the authentication data are easily tampered in the prior art is solved, various information of the target user is stored through the block chain, effective recording is carried out through the unified identity attribute table, accurate and effective source data can be provided when the target user is evaluated, the evaluation result is enabled to be more fair, and the fairness, the accuracy and the authenticity of the identity evaluation of the target user are guaranteed.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, and the present invention is not limited thereto as long as the desired results of the technical solutions disclosed in the present application can be achieved.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (22)

1. An identity authentication method based on a block chain is applied to a block chain node, and the method comprises the following steps:
acquiring an identity authentication transaction request initiated by an authentication party for a target user;
according to the identity authentication transaction request, acquiring authentication data which is authenticated by the authenticator aiming at the target user;
and storing the authentication data into an identity attribute table of the target user, and performing uplink storage on the identity attribute table.
2. The method of claim 1, wherein storing the authentication data into the identity attribute table of the target user comprises:
storing the authentication data into an identity attribute table of the blockchain account of the target user according to at least one table dimension; wherein the table dimension is a partitioning dimension of a sub-table, a row and/or a column of the identity attribute table, and the table dimension includes at least one of: authenticator, authentication data type, and authentication time.
3. The method of claim 1, wherein the account identification of the target user's blockchain account comprises at least: a distributed digital identity identifier, a blockchain network identifier, and a blockchain account identification of the target user.
4. The method of claim 3, wherein prior to obtaining the authenticator for the target user initiated identity authentication transaction request, the method further comprises:
acquiring an identity registration transaction request initiated by a target user;
distributing a distributed digital identity identifier for the target user based on a distributed digital identity standard according to the identity registration transaction request, acquiring a network identifier of a current block chain network to which the target user belongs, and creating a block chain account for the target user;
combining the distributed digital identity identifier, the blockchain network identifier and the blockchain account identifier as the identity of the target user;
and creating an identity attribute table of an account for the target user, and recording corresponding to the identity identification.
5. The method of claim 1, wherein obtaining authentication data that the authenticator has authenticated for the target user according to the identity authentication transaction request comprises:
acquiring authentication data signed by the private key of the authenticator according to the identity authentication transaction request;
adopting the public key of the authenticator to carry out signature verification on the authentication data;
and if the signature verification is passed, confirming the authentication data that the authenticator has authenticated the target user.
6. The method of claim 1, wherein the authentication data comprises authentication content encrypted with the authenticator private key, and further comprising the authenticator identification signed with the authenticator private key.
7. The method of claim 1, wherein obtaining the authenticator for the target user initiated identity authentication transaction request comprises:
acquiring an identity authentication transaction request automatically initiated by a block chain lightweight node belonging to an authenticator aiming at a target user;
wherein the lightweight node comprises at least one of: attendance machine, camera, user mobile terminal and user fixed terminal.
8. The method of claim 1, wherein the authentication data comprises at least one of:
user living body data, user static attribute data and user behavior data;
wherein the user static attribute data comprises at least one of: name, gender, age, home address, and contact;
the user behavior data comprises attendance behavior data, donation behavior data, public welfare behavior data, examination behavior data, prize winning behavior data or penalty behavior data.
9. The method of claim 1, wherein the method further comprises:
acquiring an identity authentication request initiated by an authentication party for a target user;
inquiring an identity attribute table of the target user in a block chain according to the identity authentication request;
and acquiring authentication data from the identity attribute table, and responding to the identity verification request based on the authentication data.
10. The method of claim 9, wherein after obtaining authentication data from the identity attribute table, further comprising:
and verifying the authenticator signature of the authentication data by adopting the authenticator public key corresponding to the authentication data, and executing response operation if the authentication is passed.
11. An apparatus for identity authentication based on a blockchain, configured at a blockchain node, the apparatus comprising:
the request acquisition module is used for acquiring an identity authentication transaction request initiated by an authenticator for a target user;
the data acquisition module is used for acquiring the authentication data which is authenticated by the authenticator aiming at the target user according to the identity authentication transaction request;
and the data storage module is used for storing the authentication data into an identity attribute table of the target user and performing uplink storage on the identity attribute table.
12. The apparatus of claim 11, wherein the data storage module comprises:
the table dimension storage unit is used for storing the authentication data into an identity attribute table of the block chain account of the target user according to at least one table dimension; wherein the table dimension is a partitioning dimension of a sub-table, a row and/or a column of the identity attribute table, and the table dimension includes at least one of: authenticator, authentication data type, and authentication time.
13. The apparatus of claim 11, wherein the account identification of the target user's blockchain account comprises at least: a distributed digital identity identifier, a blockchain network identifier, and a blockchain account identification of the target user.
14. The apparatus of claim 13, wherein the apparatus further comprises:
a registration request acquisition module, configured to acquire an identity registration transaction request initiated by a target user before an identity authentication transaction request initiated by an authenticator for the target user is acquired;
an account creating module, configured to allocate a distributed digital identity identifier to the target user based on a distributed digital identity standard according to the identity registration transaction request, obtain a network identifier of a currently-owned block chain network, and create a block chain account for the target user;
an identity combining module, configured to combine the distributed digital identity identifier, the blockchain network identifier, and the blockchain account identifier as an identity of the target user;
and the attribute table creating module is used for creating an identity attribute table of an account for the target user and recording corresponding to the identity identifier.
15. The apparatus of claim 11, wherein the data obtaining module comprises:
the authentication data acquisition unit is used for acquiring authentication data signed by the private key of the authenticator according to the identity authentication transaction request;
the data verification unit is used for adopting the public key of the authenticator to carry out signature verification on the authentication data;
and the data confirmation unit is used for confirming the authentication data which is authenticated by the authenticator for the target user if the signature verification passes.
16. The apparatus of claim 11, wherein the authentication data comprises authentication content encrypted with the authenticator private key, and further comprises the authenticator identification signed with the authenticator private key.
17. The apparatus according to claim 11, wherein the request acquisition module is specifically configured to:
acquiring an identity authentication transaction request automatically initiated by a block chain lightweight node belonging to an authenticator aiming at a target user;
wherein the lightweight node comprises at least one of: attendance machine, camera, user mobile terminal and user fixed terminal.
18. The apparatus of claim 11, wherein the authentication data comprises at least one of:
user living body data, user static attribute data and user behavior data;
wherein the user static attribute data comprises at least one of: name, gender, age, home address, and contact;
the user behavior data comprises attendance behavior data, donation behavior data, public welfare behavior data, examination behavior data, prize winning behavior data or penalty behavior data.
19. The apparatus of claim 11, wherein the apparatus further comprises:
the verification request acquisition module is used for acquiring an identity verification request initiated by a verifier aiming at a target user;
the attribute table query module is used for querying the identity attribute table of the target user in the block chain according to the identity authentication request;
and the verification request response module is used for acquiring authentication data from the identity attribute table and responding the identity verification request based on the authentication data.
20. The apparatus of claim 19, wherein the apparatus further comprises:
and the signature verification module is used for verifying the signature of the authenticator of the authentication data by adopting the authenticator public key corresponding to the authentication data after acquiring the authentication data from the identity attribute table, and executing response operation if the verification is passed.
21. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-10.
22. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-10.
CN202010688995.0A 2020-07-17 2020-07-17 Identity authentication method, device, equipment and medium based on blockchain Active CN111738893B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010688995.0A CN111738893B (en) 2020-07-17 2020-07-17 Identity authentication method, device, equipment and medium based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010688995.0A CN111738893B (en) 2020-07-17 2020-07-17 Identity authentication method, device, equipment and medium based on blockchain

Publications (2)

Publication Number Publication Date
CN111738893A true CN111738893A (en) 2020-10-02
CN111738893B CN111738893B (en) 2024-03-22

Family

ID=72654864

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010688995.0A Active CN111738893B (en) 2020-07-17 2020-07-17 Identity authentication method, device, equipment and medium based on blockchain

Country Status (1)

Country Link
CN (1) CN111738893B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112395356A (en) * 2020-11-13 2021-02-23 浙江数秦科技有限公司 Distributed identity authentication and verification method, equipment and storage medium
CN112417037A (en) * 2020-11-05 2021-02-26 杭州云象网络技术有限公司 Block chain construction method for distributed identity authentication in industrial field
CN113487468A (en) * 2021-07-20 2021-10-08 支付宝(杭州)信息技术有限公司 Block chain-based endowment authentication data analysis method, device, equipment and medium
CN113627959A (en) * 2021-09-29 2021-11-09 支付宝(杭州)信息技术有限公司 Method and device for generating digital identity of geographic marking product
CN115022016A (en) * 2022-05-31 2022-09-06 中国银行股份有限公司 Block chain-based user identity authentication method and device
CN115757648A (en) * 2023-01-10 2023-03-07 武汉工商学院 Method and system for multi-modal achievement on-chain based on alliance chain DID

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN109409831A (en) * 2018-10-18 2019-03-01 深圳前海乐寻坊区块链科技有限公司 Resume authentication method, device, computer equipment and storage medium
CN110519062A (en) * 2019-09-19 2019-11-29 腾讯科技(深圳)有限公司 Identity identifying method, Verification System and storage medium based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN109409831A (en) * 2018-10-18 2019-03-01 深圳前海乐寻坊区块链科技有限公司 Resume authentication method, device, computer equipment and storage medium
CN110519062A (en) * 2019-09-19 2019-11-29 腾讯科技(深圳)有限公司 Identity identifying method, Verification System and storage medium based on block chain

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112417037A (en) * 2020-11-05 2021-02-26 杭州云象网络技术有限公司 Block chain construction method for distributed identity authentication in industrial field
CN112417037B (en) * 2020-11-05 2022-12-23 杭州云象网络技术有限公司 Block chain construction method for distributed identity authentication in industrial field
CN112395356A (en) * 2020-11-13 2021-02-23 浙江数秦科技有限公司 Distributed identity authentication and verification method, equipment and storage medium
CN113487468A (en) * 2021-07-20 2021-10-08 支付宝(杭州)信息技术有限公司 Block chain-based endowment authentication data analysis method, device, equipment and medium
CN113627959A (en) * 2021-09-29 2021-11-09 支付宝(杭州)信息技术有限公司 Method and device for generating digital identity of geographic marking product
CN115022016A (en) * 2022-05-31 2022-09-06 中国银行股份有限公司 Block chain-based user identity authentication method and device
CN115757648A (en) * 2023-01-10 2023-03-07 武汉工商学院 Method and system for multi-modal achievement on-chain based on alliance chain DID
CN115757648B (en) * 2023-01-10 2023-03-31 武汉工商学院 Multi-mode score uplink method and system based on alliance chain DID

Also Published As

Publication number Publication date
CN111738893B (en) 2024-03-22

Similar Documents

Publication Publication Date Title
CN111738893B (en) Identity authentication method, device, equipment and medium based on blockchain
US12174935B2 (en) Method and system for interoperable identity and interoperable credentials
US11329981B2 (en) Issuing, storing and verifying a rich credential
US10454856B2 (en) Instant message processing method, apparatus, and system
TWI717728B (en) Identity verification and login method, device and computer equipment
CN109509288B (en) Electronic voting system and control method
TW202034186A (en) Methods and devices for acquiring and recording tracking information on blockchain
CN110490776B (en) Block chain-based learning authentication method and device and electronic equipment
CN111492634A (en) Secure and confidential custody transaction systems, methods, and apparatus using zero-knowledge protocols
WO2019010392A1 (en) Systems, methods, and devices for reducing and/or eliminating data leakage in electronic ledger technologies for trustless order matching
US20150074785A1 (en) Using service request ticket for multi-factor authentication
Hsu et al. Design of an e-diploma system based on consortium blockchain and facial recognition
CN109327312B (en) Authentication method and device and electronic equipment
US11823501B2 (en) Associating voting sessions with tabulation machines in electronic voting
TWI455562B (en) Dual-channel electronic signature system using image codes and related method and computer program product
US10068082B1 (en) Systems and methods for maintaining split knowledge of web-based accounts
CN110048848A (en) Method, system and the storage medium of session token are sent by passive client
WO2016082718A1 (en) Information access processing method and device
KR20200114188A (en) Electronic voting method using smart contract based block chain And system
US20150172254A1 (en) System and Method For Operating a Social Networking Site on the Internet
Wells Civic identity and the question of organization in contemporary civic engagement
US20200396087A1 (en) Systems and methods to timestamp and authenticate digital documents using a secure ledger
CN117397205A (en) Booting trust for a decentralised identifier
US20210158298A1 (en) Contact discovery load balancing by matter invite
CN112950154B (en) Flow information matching method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant