[go: up one dir, main page]

CN111885128A - Identity management method based on block chain - Google Patents

Identity management method based on block chain Download PDF

Info

Publication number
CN111885128A
CN111885128A CN202010653514.2A CN202010653514A CN111885128A CN 111885128 A CN111885128 A CN 111885128A CN 202010653514 A CN202010653514 A CN 202010653514A CN 111885128 A CN111885128 A CN 111885128A
Authority
CN
China
Prior art keywords
user
user request
information
block chain
service system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010653514.2A
Other languages
Chinese (zh)
Inventor
麦雪楹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Haixie Technology Co ltd
Original Assignee
Foshan Haixie Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Haixie Technology Co ltd filed Critical Foshan Haixie Technology Co ltd
Priority to CN202010653514.2A priority Critical patent/CN111885128A/en
Publication of CN111885128A publication Critical patent/CN111885128A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the application discloses an identity management method based on a block chain, which comprises the following steps: building a block chain network; acquiring an intelligent contract corresponding to a user model of the service system, establishing a connection channel between each service system in the block chain network, and deploying the intelligent contract on the connection channel; receiving a user request through a service system, and performing identity verification on the user according to the user request, wherein the identity verification comprises the steps of user interaction living body detection and signature information verification; and under the condition that the user identity authentication is passed, calling an intelligent contract of a corresponding service system according to the user request, synchronizing user request information to all network nodes through the connecting channel, and storing the user request information in the block of the block chain network. The method can ensure the synchronization of user information among various network nodes and the information security.

Description

Identity management method based on block chain
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to an identity management method based on a blockchain.
Background
In the process of online transaction of a user, each transaction system corresponds to an Application (APP), and identity authentication is required for each transaction. However, because the application software/transaction systems are independent from each other, when the same user uses different application systems, the storage modes are different due to the difference of user models, the complexity of user information synchronization between the application systems and the system maintenance cost are increased, the application systems are independent from each other, data are inconsistent, the information sharing degree is not high, and therefore, not only is the user inconvenient to use, but also the identity management of the user is troublesome.
Disclosure of Invention
The embodiment of the application provides an identity management method based on a block chain, which can ensure that user information is safely and effectively synchronized among network nodes through a block chain network and ensure the reliability of written information.
The application provides an identity management method based on a block chain, each network node of the block chain network corresponds to at least one service system, and the method comprises the following steps:
building a block chain network, wherein the block chain network comprises a plurality of network nodes, a plurality of service systems and a plurality of blocks, and each network node automatically synchronizes block chain data based on a consensus mechanism;
acquiring an intelligent contract corresponding to a user model of the service system, establishing a connection channel between each service system in the block chain network, and deploying the intelligent contract on the connection channel;
receiving a user request through a service system, carrying out identity verification on the user according to the user request, wherein the user request carries user identity information, a user face image and signature information generated by an authentication device identifier,
the identity authentication comprises the steps of user interaction living body detection and signature information authentication;
the user-interactive liveness detection comprises:
generating random prompt information for reminding a user of opening the mouth and/or blinking;
under the condition that the action responded by the user is accurate, deep learning living body detection judgment is executed;
the step of deep learning living body detection comprises the following steps: selecting at least two frames of images from the responsive action;
judging whether at least two frames of images are living bodies through a neural network, and judging that the living body detection is successful only when each frame of image is a living body;
the step of verifying the signature information comprises:
based on the authentication equipment identification of the user, acquiring a public key of the authentication equipment identification from the network node;
verifying the signature information based on the public key;
determining that the user identity authentication passes under the condition that the user interaction living body detection and the signature information verification are successful;
and under the condition that the user identity authentication is passed, calling an intelligent contract of a corresponding service system according to the user request, synchronizing user request information to all network nodes through the connecting channel, and storing the user request information in the block of the block chain network.
In some embodiments, said verifying the signature information based on the public key comprises:
decrypting the signature information by adopting the public key;
and if the signature information is decrypted successfully, determining that the signature information is verified successfully.
In some embodiments, the smart contract includes one or more of a user registration module, a user authentication module, a login credential acquisition module, a voiceprint entry module, a fingerprint entry module, and a face recognition image entry module.
In some embodiments, the step of invoking the intelligent contract of the corresponding service system according to the user request includes:
responding to the user request;
invoking an intelligent contract of the business system corresponding to the user request through the encapsulated java-sdk.
In some embodiments, after the step of receiving the user request through the service system, the method further includes: and verifying the user request, matching the user request with the user authority, if the matching is successful, passing the verification, responding to the user request, if the matching is failed, failing to pass the verification, and rejecting the user request.
In some embodiments, after determining that the user identity authentication passes, the method further includes:
and sending prompt information that the identity authentication is passed to the user.
In some embodiments, further comprising: and sharing the user transaction information of each service system through the network node.
In some embodiments, further comprising: and generating a user operation report.
In some embodiments, the present application further provides an identity management apparatus based on a blockchain, where each network node of the blockchain network corresponds to at least one service system, including: the system comprises a block chain construction module, a contract acquisition module, an identity authentication module and a storage module;
the block chain building module is used for building a block chain network, the block chain network comprises a plurality of network nodes, a plurality of service systems and a plurality of blocks, and each network node automatically synchronizes block chain data based on a consensus mechanism;
the contract acquisition module is used for acquiring an intelligent contract corresponding to a user model of the service system, establishing a connection channel between each service system in the block chain network, and deploying the intelligent contract on the connection channel;
the identity authentication module is used for receiving a user request through a service system and carrying out identity authentication on the user according to the user request, wherein the user request carries user identity information, a user face image and signature information generated by an authentication device identifier,
the identity authentication comprises the steps of user interaction living body detection and signature information authentication;
the user-interactive liveness detection comprises:
generating random prompt information for reminding a user of opening the mouth and/or blinking;
under the condition that the action responded by the user is accurate, deep learning living body detection judgment is executed;
the step of deep learning living body detection comprises the following steps: selecting at least two frames of images from the responsive action;
judging whether at least two frames of images are living bodies through a neural network, and judging that the living body detection is successful only when each frame of image is a living body;
the step of verifying the signature information comprises:
based on the authentication equipment identification of the user, acquiring a public key of the authentication equipment identification from the network node;
verifying the signature information based on the public key;
determining that the user identity authentication passes under the condition that the user interaction living body detection and the signature information verification are successful;
and the storage module is used for calling an intelligent contract of a corresponding service system according to the user request under the condition that the user identity authentication is passed, synchronizing user request information to all network nodes through the connecting channel and storing the user request information in a block of the block chain network.
In some embodiments, there is also provided an electronic device comprising a memory having stored thereon computer-executable instructions and a processor that implements the above-described method when executing the computer-executable instructions on the memory.
In some embodiments, a computer-readable storage medium is also provided, on which a computer program is stored, which, when executed by a processor, implements the above-described method.
The identity management method, the identity management device, the electronic device, and the computer-readable storage medium according to the embodiments integrate a plurality of service systems based on a blockchain network, data in the blockchain network can be shared among the plurality of service systems on the chain, and each service system can write user request information into the blockchain only by calling a corresponding local intelligent contract, so that the user information can be safely and effectively synchronized among network nodes through the blockchain network, and the reliability of the written information can be ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments will be briefly introduced below.
Fig. 1 is a flow diagram of a block chain based identity management method in some embodiments;
fig. 2 is a block chain-based identity management apparatus in some embodiments;
fig. 3 is a schematic structural diagram of an identity management apparatus based on a blockchain in other embodiments.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Since different business systems (or application systems) include different user models, for example, the business systems may be an insurance system, a municipal system, a banking system, a fund security system, and the like. The different user models comprise different user information, for example, the user model of the insurance system comprises the identity information, policy information and the like of the user, and the user model of the bank system comprises the identity information, bank card information, credit card limit information, bank card balance information and the like of the user. The fund security system comprises account information, identity information, bank card information, user transaction information and the like of a user.
The user transaction information comprises a transaction type identifier, a business system identifier, a user authentication device identifier, a user identity identifier and the like, wherein the transaction type identifier is used for identifying a transaction type (car insurance transaction, savings transaction and the like) initiated by a user, the business identifier is used for identifying an application system (car insurance application system, bank application system and the like) used by a user transaction, the user authentication device identifier is used for identifying a device (client APP, computer terminal and the like) used by the user to initiate a transaction, and the user identity identifier is used for identifying the identity (common user, VIP user and the like) of the user in the business system.
When user information is stored through user models of different service systems, synchronization among the user information is more complicated due to different user models. Fig. 1 is a schematic flow chart of the identity management method based on a block chain according to the present invention, and as shown in fig. 1, the identity management method based on a block chain includes:
step 101, a block chain network is constructed, the block chain network comprises a plurality of network nodes, a plurality of service systems and a plurality of blocks, and each network node automatically synchronizes block chain data based on a consensus mechanism.
The block chain network comprises a plurality of network nodes, a plurality of service systems and a plurality of blocks, each service system corresponds to at least one network node, each network node automatically synchronizes block chain data through a consensus mechanism, and the blocks comprise public accounts and private accounts.
102, acquiring an intelligent contract corresponding to the user model of the service system, establishing a connection channel between each service system in the block chain network, and deploying the intelligent contract on the connection channel.
In this embodiment, the intelligent contracts are respectively compiled according to the user models of the application systems, the service functions are compiled on the intelligent contracts, different functions are realized, and the intelligent contracts are deployed among network nodes of the block chain, so that not only is information sharing synchronization realized, but also the intelligent contracts cannot be tampered, and the reliability of information writing through the intelligent contracts is guaranteed.
Preferably, the intelligent contract comprises one or more of a user registration module, a user verification module, a login credential acquisition module, a voiceprint entry module, a fingerprint entry module and a face recognition image entry module. The intelligent contracts compiled by different service systems are different, and the service systems call the corresponding intelligent contracts according to the user requests and select the corresponding modules from the corresponding intelligent contracts to realize the corresponding functions. For example, when a new user is registered on the application system, the application system receives a registration request of the user, invokes a user registration module in a local intelligent contract corresponding to the application system according to the registration request of the user, writes registration information of the user, and shares the registration information of the user to other application systems through a connection channel of the blockchain network, so that the user can directly log in the other application systems without re-registering.
Step 103, receiving a user request through a service system, and performing identity verification on the user according to the user request, wherein the user request carries user identity information, a user face image and signature information generated by an authentication device identifier.
In this embodiment, the user request includes user registration, user information authentication, user login, user transaction, and user addition, modification, completion, query, etc. to the user information in the service system. The user request carries user identity information, a user face image and signature information generated by an authentication device identifier. The authentication device identifier may be a terminal, such as a smart phone, a computer, etc., having a service system built therein for transmitting the user request. Or a business system such as a bank-specific security verification device, a U shield, etc., which is not limited herein.
When a network node receives a user request through a service system, the user is authenticated according to the user request, wherein the authentication comprises step 105 of user interactive liveness detection and step 106 of signature information authentication. The identity authentication process authenticates the identity of the user and authenticates the operation terminal of the user, so that the accuracy of the identity authentication of the user is further improved by the double authentication mode.
Step 105, the user interactive liveness detection comprises:
step 1051, generating random prompt information for reminding a user to open the mouth and/or blink;
step 1052, intelligently judging the action responded by the user and judging whether the responded action is accurate; if not, go to step 1503; if yes, the step 1504 of performing the in vivo detection based on the deep learning is executed.
Selecting at least two frames of images from the responsive action;
and judging whether at least two frames of images are living bodies through a neural network, if and only if each frame of image is a living body, judging that the living body detection is successful, otherwise, executing the step 1503, and judging that the living body detection is failed.
Preferably, prompt information for prompting whether the user enters the next living body detection or not can be generated after the living body detection fails.
In the embodiment, the living body judgment is rapidly carried out at the front end through the interactive action, and the living body detection is carried out on at least two frames of images in the interactive action through the deep learning living body detection after the interactive action detection is passed, so that the interactive detection technology and the deep learning detection technology are organically combined, the accuracy of the living body detection and the performance of resisting attack are effectively enhanced, the hardware overhead is reduced, the reliability of the living body detection is effectively improved, and the method has wide popularization and application values.
Step 106 the step of verifying the signature information includes:
step 1601, acquiring a public key of the authentication device identifier from a service system based on the authentication device identifier of the user;
and receiving the user identity authentication request, and acquiring a public key corresponding to the authentication equipment identifier from the network node based on the authentication equipment identifier to serve as the public key of the authentication equipment.
At step 1602, the signature information is verified based on the public key.
The signature information is verified based on the public key. Optionally, the public key may be used to decrypt the signature information, and if decryption succeeds, it is determined that signature information verification succeeds, and if decryption fails, it is determined that signature information verification fails.
And 104, under the condition that the user identity authentication is passed, calling an intelligent contract of a corresponding service system according to the user request, synchronizing user request information to all network nodes through the connecting channel, and storing the user request information in a block of the block chain network.
In this embodiment, in the case that the user interaction liveness detection and signature information verification are successful, it is determined that the user identity authentication is passed.
And calling an intelligent contract of a corresponding service system according to the user request, synchronizing user request information to all network nodes through the connecting channel, and storing the user request information in a block of the block chain network. For example, may be stored in the public ledger of the blocks. In addition, the block also comprises a plurality of private accounts, and the private accounts are in one-to-one correspondence with the business system. The private account book is used for recording the specific information of the business system and is not shared by other business systems in the block chain network, so that the isolation of the specific data of each business system on the same chain in the block chain is ensured, and even if other business systems in the same chain do not read and modify the specific unauthorized information in the private account book.
The identity management method of the embodiment integrates the plurality of service systems based on the blockchain network, data in the blockchain network can be shared among the plurality of service systems on the chain, each service system can write the user request information into the blockchain only by calling the corresponding local intelligent contract, and the user information can be ensured to be safely and effectively synchronized among the network nodes through the blockchain network, and the reliability of the written information is ensured.
In some embodiments, the identity management method further comprises: and sharing the user transaction information of each service system through the network node, and generating a user operation report.
In this embodiment, the method includes: and sharing the user transaction information of each service system through the network nodes so as to cluster the users according to the user transaction information. For example, users of the banking system may be classified into different categories according to the user transaction information, including a deposit card service category, a credit card service category, and the like, and different service system messages may be pushed to the users according to the categories.
Further, in some embodiments, in response to a user request, recording an operation record of a current user; generating a data block from the operation record; writing the data block into the blockchain network; and processing the stored data in the data block to generate an operation report of the current user. The operation report comprises the operation time, the operation type, the operation content and the like of the user, and the statistical analysis of the user behavior is convenient to be carried out according to the operation report.
In some embodiments, the step of invoking the corresponding smart contract according to the user request includes: responding to the user request; invoking an intelligent contract corresponding to the user request through the packaged java-sdk.
In some embodiments, after the step of receiving the user request through the service system, the method further includes: and verifying the user request, matching the user request with the user authority, if the matching is successful, passing the verification, responding to the user request, if the matching is failed, failing to pass the verification, and rejecting the user request.
In some embodiments, after the identity authentication is passed, the network node sends the prompt message that the user identity authentication is passed to the authentication device of the user, so that the convenience of use and the user experience of the user are improved.
In some embodiments, the blockchain-based identity management apparatus may be further divided into one or more modules, and the one or more modules are stored in the memory and executed by the processor to complete the blockchain-based identity management method. Modules, as referred to in this application, are a series of computer program instruction segments that can perform particular functions. Fig. 2 is a schematic block diagram of an identity management apparatus based on a blockchain according to the present invention, and as shown in fig. 2, the identity management apparatus based on a blockchain may be divided into: a blockchain construction module 201, a contract acquisition module 202, an identity authentication module 203, and a storage module 204. In particular, the method comprises the following steps of,
a blockchain constructing module 201, configured to construct a blockchain network, where the blockchain network includes a plurality of network nodes, a plurality of service systems, and a plurality of blocks, and each network node automatically synchronizes blockchain data based on a consensus mechanism;
a contract obtaining module 202, configured to obtain an intelligent contract corresponding to a user model of the service system, establish a connection channel between each service system in the block chain network, and deploy the intelligent contract on the connection channel;
the identity authentication module 203 is used for receiving a user request through a service system, performing identity authentication on the user according to the user request, wherein the user request carries user identity information, a user face image and signature information generated by an authentication device identifier,
the identity authentication comprises the steps of user interaction living body detection and signature information authentication;
the user-interactive liveness detection comprises:
generating random prompt information for reminding a user of opening the mouth and/or blinking;
under the condition that the action responded by the user is accurate, deep learning living body detection judgment is executed;
the step of deep learning living body detection comprises the following steps: selecting at least two frames of images from the responsive action;
judging whether at least two frames of images are living bodies through a neural network, and judging that the living body detection is successful only when each frame of image is a living body;
the step of verifying the signature information comprises:
based on the authentication equipment identification of the user, acquiring a public key of the authentication equipment identification from the network node;
verifying the signature information based on the public key;
determining that the user identity authentication passes under the condition that the user interaction living body detection and the signature information verification are successful;
the storage module 204 is configured to invoke an intelligent contract of a corresponding service system according to the user request and synchronize user request information to all network nodes through the connection channel, where the intelligent contract is stored in a block of the block chain network when the user identity authentication passes.
The functions or operation steps implemented by the modules are similar to those of the above method, and are specifically referred to corresponding parts, which are not described in detail herein.
Fig. 3 is a schematic structural diagram of an identity management apparatus based on a block chain according to another embodiment of the present application. The blockchain-based identity management device 4000 includes a processor 41 and may further include an input device 42, an output device 43, and a memory 44. The input device 42, the output device 43, the memory 44, and the processor 41 are connected to each other via a bus.
The memory includes, but is not limited to, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM), or a portable read-only memory (CD-ROM), which is used for storing instructions and data.
The input means are for inputting data and/or signals and the output means are for outputting data and/or signals. The output means and the input means may be separate devices or may be an integral device.
The processor may include one or more processors, for example, one or more Central Processing Units (CPUs), and in the case of one CPU, the CPU may be a single-core CPU or a multi-core CPU. The processor may also include one or more special purpose processors, which may include GPUs, FPGAs, etc., for accelerated processing.
The memory is used to store program codes and data of the network device.
The processor is used for calling the program codes and data in the memory and executing the steps in the method embodiment. Specifically, reference may be made to the description of the method embodiment, which is not repeated herein.
It will be appreciated that fig. 3 only shows a simplified design of the motion recognition means. In practical applications, the motion recognition devices may also respectively include other necessary components, including but not limited to any number of input/output devices, processors, controllers, memories, etc., and all motion recognition devices that can implement the embodiments of the present application are within the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the division of the unit is only one logical function division, and other division may be implemented in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. The shown or discussed mutual coupling, direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some interfaces, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are wholly or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on or transmitted over a computer-readable storage medium. The computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)), or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The usable medium may be a read-only memory (ROM), or a Random Access Memory (RAM), or a magnetic medium, such as a floppy disk, a hard disk, a magnetic tape, a magnetic disk, or an optical medium, such as a Digital Versatile Disk (DVD), or a semiconductor medium, such as a Solid State Disk (SSD).
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (7)

1. An identity management method based on a block chain, wherein each network node of a block chain network corresponds to at least one service system, the method comprising the following steps:
building a block chain network, wherein the block chain network comprises a plurality of network nodes, a plurality of service systems and a plurality of blocks, and each network node automatically synchronizes block chain data based on a consensus mechanism;
acquiring an intelligent contract corresponding to a user model of the service system, establishing a connection channel between each service system in the block chain network, and deploying the intelligent contract on the connection channel;
receiving a user request through a service system, carrying out identity verification on the user according to the user request, wherein the user request carries user identity information, a user face image and signature information generated by an authentication device identifier,
the identity authentication comprises the steps of user interaction living body detection and signature information authentication;
the user-interactive liveness detection comprises:
generating random prompt information for reminding a user of opening the mouth and/or blinking;
under the condition that the action responded by the user is accurate, deep learning living body detection judgment is executed;
the step of deep learning living body detection comprises the following steps: selecting at least two frames of images from the responsive action;
judging whether at least two frames of images are living bodies through a neural network, and judging that the living body detection is successful only when each frame of image is a living body;
the step of verifying the signature information comprises:
based on the authentication equipment identification of the user, acquiring a public key of the authentication equipment identification from the network node;
verifying the signature information based on the public key;
determining that the user identity authentication passes under the condition that the user interaction living body detection and the signature information verification are successful;
and under the condition that the user identity authentication is passed, calling an intelligent contract of a corresponding service system according to the user request, synchronizing user request information to all network nodes through the connecting channel, and storing the user request information in the block of the block chain network.
2. The identity management method of claim 1, wherein the verifying the signature information based on the public key comprises:
decrypting the signature information by adopting the public key;
and if the signature information is decrypted successfully, determining that the signature information is verified successfully.
3. The identity management method of claim 1, wherein the smart contract comprises one or more of a user registration module, a user authentication module, a login credential acquisition module, a voiceprint entry module, a fingerprint entry module, and a face recognition image entry module.
4. The identity management method of claim 1, wherein the step of invoking an intelligent contract for a corresponding business system according to the user request comprises:
responding to the user request;
invoking an intelligent contract of the business system corresponding to the user request through the encapsulated java-sdk.
5. The identity management method of claim 1, further comprising, after the step of receiving a user request through the service system: and verifying the user request, matching the user request with the user authority, if the matching is successful, passing the verification, responding to the user request, if the matching is failed, failing to pass the verification, and rejecting the user request.
6. The method of claim 1, further comprising: and sharing the user transaction information of each service system through the network node.
7. The method of claim 1, further comprising: and generating a user operation report.
CN202010653514.2A 2020-07-08 2020-07-08 Identity management method based on block chain Pending CN111885128A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010653514.2A CN111885128A (en) 2020-07-08 2020-07-08 Identity management method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010653514.2A CN111885128A (en) 2020-07-08 2020-07-08 Identity management method based on block chain

Publications (1)

Publication Number Publication Date
CN111885128A true CN111885128A (en) 2020-11-03

Family

ID=73150412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010653514.2A Pending CN111885128A (en) 2020-07-08 2020-07-08 Identity management method based on block chain

Country Status (1)

Country Link
CN (1) CN111885128A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111027099A (en) * 2019-12-09 2020-04-17 北京海益同展信息科技有限公司 Identity verification method, device, system and computer readable storage medium
CN112100594A (en) * 2020-11-13 2020-12-18 支付宝(杭州)信息技术有限公司 Service processing method, device and equipment based on block chain
CN112818403A (en) * 2021-02-26 2021-05-18 上海德衡数据科技有限公司 Container data center operation and maintenance system
CN112954190A (en) * 2021-01-26 2021-06-11 上海启迪睿视智能科技有限公司 Online adjustment method, device and equipment for industrial detection equipment parameters and storage medium
CN113079146A (en) * 2021-03-25 2021-07-06 中国联合网络通信集团有限公司 Verification method and device
CN113129024A (en) * 2021-05-19 2021-07-16 中国银行股份有限公司 Intelligent financing method and system based on 5G message of block chain
CN113242246A (en) * 2021-05-16 2021-08-10 西北工业大学 Identity authentication method based on block chain
CN116881873A (en) * 2023-09-06 2023-10-13 国网数字科技控股有限公司 Identity authentication method and device for business body, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108182409A (en) * 2017-12-29 2018-06-19 北京智慧眼科技股份有限公司 Biopsy method, device, equipment and storage medium
CN109889503A (en) * 2019-01-22 2019-06-14 平安科技(深圳)有限公司 Identity management method, electronic device and storage medium based on block chain
US20190333030A1 (en) * 2018-04-30 2019-10-31 Bank Of America Corporation Blockchain-based digital token utilization
CN110519062A (en) * 2019-09-19 2019-11-29 腾讯科技(深圳)有限公司 Identity identifying method, Verification System and storage medium based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108182409A (en) * 2017-12-29 2018-06-19 北京智慧眼科技股份有限公司 Biopsy method, device, equipment and storage medium
US20190333030A1 (en) * 2018-04-30 2019-10-31 Bank Of America Corporation Blockchain-based digital token utilization
CN109889503A (en) * 2019-01-22 2019-06-14 平安科技(深圳)有限公司 Identity management method, electronic device and storage medium based on block chain
CN110519062A (en) * 2019-09-19 2019-11-29 腾讯科技(深圳)有限公司 Identity identifying method, Verification System and storage medium based on block chain

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111027099A (en) * 2019-12-09 2020-04-17 北京海益同展信息科技有限公司 Identity verification method, device, system and computer readable storage medium
CN111027099B (en) * 2019-12-09 2022-04-26 京东科技信息技术有限公司 Identity verification method, device, system and computer readable storage medium
CN112100594A (en) * 2020-11-13 2020-12-18 支付宝(杭州)信息技术有限公司 Service processing method, device and equipment based on block chain
CN112100594B (en) * 2020-11-13 2021-03-02 支付宝(杭州)信息技术有限公司 Service processing method, device and equipment based on block chain
CN112954190A (en) * 2021-01-26 2021-06-11 上海启迪睿视智能科技有限公司 Online adjustment method, device and equipment for industrial detection equipment parameters and storage medium
CN112818403A (en) * 2021-02-26 2021-05-18 上海德衡数据科技有限公司 Container data center operation and maintenance system
CN113079146A (en) * 2021-03-25 2021-07-06 中国联合网络通信集团有限公司 Verification method and device
CN113079146B (en) * 2021-03-25 2023-04-18 中国联合网络通信集团有限公司 Verification method and device
CN113242246A (en) * 2021-05-16 2021-08-10 西北工业大学 Identity authentication method based on block chain
CN113129024A (en) * 2021-05-19 2021-07-16 中国银行股份有限公司 Intelligent financing method and system based on 5G message of block chain
CN116881873A (en) * 2023-09-06 2023-10-13 国网数字科技控股有限公司 Identity authentication method and device for business body, electronic equipment and storage medium
CN116881873B (en) * 2023-09-06 2023-12-08 国网数字科技控股有限公司 Identity authentication methods, devices, electronic equipment and storage media of business entities

Similar Documents

Publication Publication Date Title
CN111885128A (en) Identity management method based on block chain
US20210081551A1 (en) Method, apparatus, and electronic device for blockchain-based recordkeeping
US10068076B1 (en) Behavioral authentication system using a behavior server for authentication of multiple users based on their behavior
AU2019204723B2 (en) Cryptographic key management based on identity information
US20150358317A1 (en) Behavioral Authentication System using a biometric fingerprint sensor and User Behavior for Authentication
KR20210041404A (en) Electronic device and method for blockchain address management thereof
US20220164423A1 (en) Method and apparatus for user recognition
CN110458559B (en) Transaction data processing method, device, server and storage medium
US12076649B2 (en) Apparatus and methods for simulating authentication within the metaverse
US11763548B2 (en) Monitoring devices at enterprise locations using machine-learning models to protect enterprise-managed information and resources
US20220141219A1 (en) Authentication server, and non-transitory storage medium
US20210174331A1 (en) Transferring a customer from an atm transaction to a device-based transaction during an error state, and applications thereof
CN111339141B (en) Data transmission method, block chain node equipment and medium
AU2019204711B2 (en) Securely performing cryptographic operations
CN106161481B (en) A kind of device of mobile terminal physical button isolation safe module prevention security risk
CN107332825A (en) A kind of client identity authentication method and system
KR20210117731A (en) The blockchain-based transaction history confirmation system
CN117172786A (en) Identity authentication method, device, equipment, medium and program product
CN107784225B (en) Financial account security management method and device
CN110690973A (en) Identity verification method, identity verification device, identity verification medium and electronic equipment
JP7344071B2 (en) Authentication system and authentication method
CN115379447A (en) Identity authentication method and mobile terminal
KR20210014827A (en) Biometric Identification System and its operating method
CN116702108A (en) Authentication method, device and system
CN113742229A (en) Test data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201103