CN106100847A - Asymmetric encryption block chain identity information verification method and device - Google Patents
Asymmetric encryption block chain identity information verification method and device Download PDFInfo
- Publication number
- CN106100847A CN106100847A CN201610413635.3A CN201610413635A CN106100847A CN 106100847 A CN106100847 A CN 106100847A CN 201610413635 A CN201610413635 A CN 201610413635A CN 106100847 A CN106100847 A CN 106100847A
- Authority
- CN
- China
- Prior art keywords
- block chain
- block
- asymmetric encryption
- identity information
- chain identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000012795 verification Methods 0.000 title claims abstract description 43
- 230000008878 coupling Effects 0.000 claims abstract description 6
- 238000010168 coupling process Methods 0.000 claims abstract description 6
- 238000005859 coupling reaction Methods 0.000 claims abstract description 6
- 230000002159 abnormal effect Effects 0.000 claims description 10
- 230000005540 biological transmission Effects 0.000 claims description 7
- 238000010200 validation analysis Methods 0.000 claims description 6
- 239000011159 matrix material Substances 0.000 claims description 5
- 210000001525 retina Anatomy 0.000 claims description 5
- 230000035943 smell Effects 0.000 claims description 5
- 210000003462 vein Anatomy 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 3
- 230000005856 abnormality Effects 0.000 description 1
- 239000008280 blood Substances 0.000 description 1
- 210000004369 blood Anatomy 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 229910000510 noble metal Inorganic materials 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
A kind of asymmetric encryption block chain identity information verification method, it is characterised in that: comprise the following steps: Transaction Information is broadcast to all nodes;Transaction Information is collected in a block by described node;Described node starts to be continuously generated random string, calculates random number answer;When the answer that a node draws and nonces match, the block of generation is broadcast to other all nodes by it;Transaction is verified by other all nodes described, determines when the transaction that this block is comprised is effective, and other all nodes described accept this block.Other all nodes described start to create new block, and are added by the keyed hash of the block just accepted.Described block random hash is also linked into block chain.The keyed hash that described previous block is formed is used for coupling together block, arranges by the order of passing transaction.After described block chain must be linked to previous block, transaction is the most further confirmed.
Description
Technical field
The application relates to block chain technical field, particularly relates to a kind of asymmetric encryption block chain identity information verification method
And device.
Background technology
The Internet ICP/IP protocol let us enters the epoch of freedom of information transmission, and the innovation of block chain will carry us
Enter the free evaluation of evidence through inner conviction epoch of information!Block chain is kept accounts by the whole network, and P2P is collaborative to be set up " credit ", it is on mankind's credit evolutionary history
Continue blood relation's credit, noble metal credit, the 4th milestone after Central Bank's paper credit, gets a good chance of alleviating the current public credibility of China
Rare social pain spot, all at world market Correspondent, intellectual property protection, the micro-notarization of property, Internet of Things finance, intelligent protocol etc.
Multi-field have extensive application scenarios.
The link of existing block chain, by information content being encrypted, is sent to specific holding, and specific holder is by holding
Key password is untied, seen information content.
And for information content often through encryption and the information of last transaction, timestamp, random number, address
Information.
Information and the mode of its checking are the most single, are unfavorable for protection and the development of block chain technology of Transaction Information.
Along with the development of technology, the difficulty broken a code is more and more less, adapts to information is carried out accidental enciphering merely
The not requirement of information security, it is therefore necessary to set a kind of safer authentication information.
Summary of the invention
The purpose of the application is to provide a kind of asymmetric encryption block chain identity information verification method and device, by going
It is characterized and is authenticated as Transaction Information, as noted abnormalities, use biological characteristic as supplementary certification.
In order to solve above-mentioned technical problem, the application uses technical scheme:
A kind of asymmetric encryption block chain identity information verification method, it is characterised in that:
Comprise the following steps:
Transaction Information is broadcast to all nodes;
Transaction Information is collected in a block by described node;
Described node starts to be continuously generated random string, calculates random number answer;
When the answer that a node draws and nonces match, the block of generation is broadcast to other all nodes by it.
Transaction is verified by other all nodes described, determines when the transaction that this block is comprised is effective, described other
All nodes accept this block.
Other all nodes described start to create new block, and are added by the keyed hash of the block just accepted.
Described block random hash is also linked into block chain.
The keyed hash that described previous block is formed is used for coupling together block, arranges by the order of passing transaction.
After described block chain must be linked to previous block, transaction is the most further confirmed.
Described checking includes double secret key.
Described double secret key includes PKI and private key;
Described PKI has publicity, in order to encrypt a segment information and the verity of the information of proof;
Described private key has privacy, and described private key only has information owner to grasp, in order to decipher the information that public key encryption is crossed;
The information that described public key encryption is crossed only has the people of respective private keys and could decipher.
Described PKI and private key codes have asymmetry, i.e. cannot draw private key according to PKI;
Described private key is to Information Signature, and described public key verifications is signed;
Described is that described private key holder sends by the validation of information of public key signature verifications;
Described PKI is that a upper block sends, and described private key has for next block holder.
Described secret key pair enciphered method includes Hash enciphered method, des encryption method, rsa encryption method, Elgamal enciphered method, matrix
Enciphered method, elliptic curve cryptography and combinations thereof.
Described block comprises following three parts: keyed hash that information, previous block are formed, random number.
Described information also includes behavior characteristics and biological characteristic;
Described behavior characteristics: include path, region, WiFi, daily position, consuming behavior, consumption preferences, spending limit, consumption
Custom and timestamp;
Described biological characteristic includes hand, palmmprint, fingerprint, face, iris, retina, pulse, vein, auricle, abnormal smells from the patient and DNA.
Described transaction also includes the private key of both parties, the quantity of transaction, the digital signature of electronic money.
Preferably, described checking uses the checking of described behavior characteristics, when the checking of described behavior characteristics is abnormal, uses described
Biological characteristic secondary is verified.
A kind of asymmetric encryption block chain identity information checking device, it is characterised in that: include terminal, transmission equipment, net
Network server.
Described terminal gathers behavior characteristics and biological characteristic, and is sent to the webserver by transmission equipment;
Described terminal collection behavior characteristics and biological characteristic are verified by the described webserver by block chain.
Described terminal includes consumption terminal, mobile terminal, geographical location information equipment;
The described webserver includes block link unit, block creating unit, block storage unit;
Link mutual to the block checking of described block link unit, described block creating unit is to new by checking transaction creation
Block, newly created block is preserved by described block storage unit.
Described block link unit includes that random number generation unit, random number verification unit, timestamp unit, password generate
Unit, password decryption unit.
Described behavior characteristics includes path, region, WiFi, daily position, consuming behavior, consumption preferences, the amount of consumption
Degree, consumption habit and timestamp.
Described biological characteristic include hand, palmmprint, fingerprint, face, iris, retina, pulse, vein, auricle, abnormal smells from the patient and
DNA。
When there is transaction in terminal,
Transaction Information is broadcast to all-network server.
Transaction Information is collected in a block by the described webserver.
The described webserver starts to be continuously generated random string, calculates random number answer.
When the answer that a webserver draws and nonces match, the block of generation is broadcast to other by it to be owned
The webserver.
Transaction is verified by other all-network servers described, determines when the transaction that this block is comprised is effective, institute
State other all-network servers and accept this block.
Other all-network servers described start to create new block, and are added by the keyed hash of the block just accepted
Enter.
Described block random hash is also linked into block chain.
The keyed hash that described previous block is formed is used for coupling together block, it is achieved the order row of passing transaction
Row.
After described block chain must be linked to previous block, transaction is the most further confirmed.
Described checking includes double secret key;
Described double secret key includes PKI and private key;
Described PKI has publicity, in order to encrypt a segment information and the verity of the information of proof.
Described private key has privacy, and described private key only has information owner to grasp, in order to decipher the letter that public key encryption is crossed
Breath;
The information that described public key encryption is crossed only has the people of respective private keys and could decipher;
Described PKI and private key codes have asymmetry, i.e. cannot draw private key according to PKI;
Described private key is to Information Signature, and described public key verifications is signed.
Described is that described private key holder sends by the validation of information of public key signature verifications;
Described PKI is that a upper block sends, and described private key has for next block.
Described key pair encryption method includes Hash enciphered method, des encryption method, rsa encryption method, Elgamal enciphered method, matrix
Enciphered method, elliptic curve cryptography and combinations thereof.
Described block comprises following three parts: keyed hash that information, previous block are formed, random number.
Described information also includes behavior characteristics and biological characteristic.
Preferably, described checking uses the checking of described behavior characteristics, when the checking of described behavior characteristics is abnormal, uses described
Biological characteristic secondary is verified.
The application is compared with prior art: 1, uses behavior characteristics and the checking of biological characteristic double-point information, strengthens checking peace
Quan Xing.Stability;2, preferential employing behavior characteristics checking, strengthens the convenience of operation, continuous;3, asymmetric encryption side is used
Information is encrypted by method, is aided with timestamp, address, random number, and various dimensions are encrypted, and improves checking safety comprehensively, and tenability is attacked.
Accompanying drawing explanation
Fig. 1 is the application asymmetric encryption block chain identity information verification method one embodiment schematic diagram.
Fig. 2 is that the application block links an embodiment schematic diagram.
Fig. 3 is the application block key one embodiment schematic diagram.
Fig. 4 is another embodiment schematic diagram of the application block key.
Fig. 5 is the application block information one embodiment schematic diagram.
Fig. 6 is that the application asymmetric encryption block chain identity information verifies device one embodiment schematic diagram.
Fig. 7 is that the application asymmetric encryption block chain identity information verifies another embodiment schematic diagram of device.
Detailed description of the invention
Understandable, below in conjunction with the accompanying drawings to the application for enabling the above-mentioned purpose of the application, feature and advantage to become apparent from
Detailed description of the invention be described in detail.
Elaborate a lot of detail in the following description so that fully understanding the application.But the application can be with
Much being different from alternate manner described here to implement, those skilled in the art can be in the situation without prejudice to the application intension
Under do similar popularization, therefore the application is not embodied as and concrete accompanying drawing is limited by following public.
Embodiment one
As it is shown in figure 1, Transaction Information is broadcast to all nodes;
Transaction Information is collected in a block by described node;
Described node starts to be continuously generated random string, calculates random number answer;
When the answer that a node draws and nonces match, the block of generation is broadcast to other all nodes by it;
Transaction is verified by other all nodes described, determines when the transaction that this block is comprised is effective, and described other own
Node accepts this block.
Other all nodes described start to create new block, and are added by the keyed hash of the block just accepted.
Embodiment two
As in figure 2 it is shown, described block random hash be linked into block chain.
The keyed hash that described previous block is formed is used for coupling together block, it is achieved the order row of passing transaction
Row.
After described block chain must be linked to previous block, transaction is the most further confirmed.
Embodiment three
As it is shown on figure 3, described checking includes double secret key;
Described double secret key includes PKI and private key;
Described PKI has publicity, in order to encrypt a segment information and the verity of the information of proof;
Described private key has privacy, and described private key only has information owner to grasp, in order to decipher the information that public key encryption is crossed;
The information that described public key encryption is crossed only has the people of respective private keys and could decipher;
Described PKI and private key codes have asymmetry, i.e. cannot draw private key according to PKI;
Described private key is to Information Signature, and described public key verifications is signed;
It is that described private key holder sends by the validation of information of described public key signature verifications;
Described PKI is that a upper block sends, and described private key has for next block holder.
Embodiment four
As shown in Fig. 1,2,3,4,5,6,7, a kind of asymmetric encryption block chain identity information checking device, it is characterised in that: bag
Include terminal, transmission equipment, the webserver;
Described terminal gathers behavior characteristics and biological characteristic, and is sent to the webserver by transmission equipment;
Described terminal includes consumption terminal, mobile terminal, geographical location information equipment;
The described webserver includes block link unit, block creating unit, block storage unit;
Link mutual to the block checking of described block link unit, block creating unit is to the district new by checking transaction creation
Block, newly created block is preserved by block storage unit.
Described block link unit includes that random number generation unit, random number verification unit, timestamp unit, password generate
Unit, password decryption unit;
Described behavior characteristics includes path, region, WiFi, daily position, consuming behavior, consumption preferences, spending limit, disappears
Take custom and timestamp.
Described biological characteristic include hand, palmmprint, fingerprint, face, iris, retina, pulse, vein, auricle, abnormal smells from the patient and
DNA。
When there is transaction in terminal,
Transaction Information is broadcast to all-network server;
Transaction Information is collected in a block by the described webserver;
The described webserver starts to be continuously generated random string, calculates random number answer;
When the answer that a webserver draws and nonces match, the block of generation is broadcast to other all-networks by it
Server.
Transaction is verified by other all-network servers described, determines when the transaction that this block is comprised is effective, institute
State other all-network servers and accept this block.
Other all-network servers described start to create new block, and are added by the keyed hash of the block just accepted
Enter.
Described block random hash is also linked into block chain.
The keyed hash that described previous block is formed is used for coupling together block, it is achieved the order row of passing transaction
Row.
After described block chain must be linked to previous block, transaction is the most further confirmed.
Described checking includes double secret key;
Described double secret key includes PKI and private key;
Described PKI has publicity, in order to encrypt a segment information and the verity of the information of proof;
Described private key has privacy, and described private key only has information owner to grasp, in order to decipher the information that public key encryption is crossed.
The information that described public key encryption is crossed only has the people of respective private keys and could decipher;
Described PKI and private key codes have asymmetry, i.e. cannot draw private key according to PKI;
Described private key is to Information Signature, and described public key verifications is signed;
Described is that described private key holder sends by the validation of information of public key signature verifications;
Described PKI is that a upper block sends, and described private key has for next block holder.
Described key pair encryption method includes Hash enciphered method, des encryption method, rsa encryption method, Elgamal enciphered method, matrix
Enciphered method, elliptic curve cryptography and combinations thereof.
Described block comprises following three parts: keyed hash that information, previous block are formed, random number.
Described information also includes behavior characteristics and biological characteristic.
Preferably, described checking uses the checking of described behavior characteristics, when the checking of described behavior characteristics is abnormal, uses described
Biological characteristic secondary is verified.
Although the application is open as above with preferred embodiment, but it is not for limiting claim, any this area
Technical staff without departing from spirit and scope, can make possible variation and amendment, therefore the application
Protection domain should be defined in the range of standard with the application claim.
Claims (42)
1. an asymmetric encryption block chain identity information verification method, it is characterised in that: comprise the following steps:
Transaction Information is broadcast to all nodes;
Transaction Information is collected in a block by described node;
Described node starts to be continuously generated random string, calculates random number answer;
When the answer that a node draws and nonces match, the block of generation is broadcast to other all nodes by it;
Transaction is verified by other all nodes described, determines when the transaction that this block is comprised is effective, and described other own
Node accepts this block;
Other all nodes described start to create new block, and are added by the keyed hash of the block just accepted;
Described information includes behavior characteristics and biological characteristic.
2. asymmetric encryption block chain identity information verification method as claimed in claim 1, it is characterised in that:
Described block random hash is also linked into block chain.
3. asymmetric encryption block chain identity information verification method as claimed in claim 2, it is characterised in that:
The keyed hash that described previous block is formed is used for coupling together block, arranges by the order of passing transaction.
4. asymmetric encryption block chain identity information verification method as described in claim 1-3 any one, it is characterised in that:
After described block chain must be linked to previous block, transaction is the most further confirmed.
5. asymmetric encryption block chain identity information verification method as claimed in claim 1, it is characterised in that:
Described checking includes double secret key.
6. asymmetric encryption block chain identity information verification method as claimed in claim 5, it is characterised in that:
Described double secret key includes PKI and private key.
7. asymmetric encryption block chain identity information verification method as claimed in claim 6, it is characterised in that:
Described PKI has publicity, in order to encrypt a segment information and the verity of the information of proof.
8. asymmetric encryption block chain identity information verification method as claimed in claim 6, it is characterised in that:
Described private key has privacy, and described private key only has information owner to grasp, in order to decipher the information that public key encryption is crossed.
9. asymmetric encryption block chain identity information verification method as described in claim 6,7, it is characterised in that:
The information that described public key encryption is crossed only has the people of respective private keys and could decipher.
10. asymmetric encryption block chain identity information verification method as claimed in claim 6, it is characterised in that:
Described PKI and private key codes have asymmetry, i.e. cannot draw private key according to PKI.
11. as described in claim 6,10 asymmetric encryption block chain identity information verification method, it is characterised in that:
Described private key is to Information Signature, and described public key verifications is signed.
12. asymmetric encryption block chain identity information verification methods as claimed in claim 11, it is characterised in that:
Described is that described private key holder sends by the validation of information of public key signature verifications.
13. asymmetric encryption block chain identity information verification methods as claimed in claim 11, it is characterised in that:
Described PKI is that a upper block sends, and described private key has for next block holder.
14. asymmetric encryption block chain identity information verification methods as claimed in claim 5, it is characterised in that:
Described secret key pair enciphered method includes that Hash enciphered method, des encryption method, rsa encryption method, Elgamal enciphered method, matrix are encrypted
Method, elliptic curve cryptography and combinations thereof.
15. asymmetric encryption block chain identity information verification methods as claimed in claim 4, it is characterised in that:
Described block comprises following three parts: keyed hash that information, previous block are formed, random number.
16. asymmetric encryption block chain identity information verification methods as claimed in claim 1, it is characterised in that:
Described behavior characteristics: include path, region, WiFi, daily position, consuming behavior, consumption preferences, spending limit, consumption
Custom and timestamp.
17. asymmetric encryption block chain identity information verification methods as claimed in claim 1, it is characterised in that:
Described biological characteristic includes hand, palmmprint, fingerprint, face, iris, retina, pulse, vein, auricle, abnormal smells from the patient and DNA.
18. asymmetric encryption block chain identity information verification methods as claimed in claim 1, it is characterised in that:
Described transaction also includes the private key of both parties, the quantity of transaction, the digital signature of electronic money.
19. asymmetric encryption block chain identity information verification methods as claimed in claim 1, it is characterised in that:
Described checking uses the checking of described behavior characteristics.
20. asymmetric encryption block chain identity information verification methods as claimed in claim 19, it is characterised in that:
When the checking of described behavior characteristics is abnormal, described biological characteristic secondary is used to verify.
21. 1 kinds of asymmetric encryption block chain identity information verification methods, it is characterised in that: it is applied to server, including:
Transaction Information is broadcast to all-network server;
Transaction Information is collected in a block by the described webserver;
The described webserver starts to be continuously generated random string, calculates random number answer;
When the answer that a webserver draws and nonces match, the block of generation is broadcast to other all-networks by it
Server;
Transaction is verified by other all-network servers described, determines when the transaction that this block is comprised is effective, described its
He accepts this block by all-network server;
Other all-network servers described start to create new block, and are added to by the keyed hash of the block just accepted
Go;
Described information includes behavior characteristics and biological characteristic.
22. 1 kinds of asymmetric encryption block chain identity information checking devices, it is characterised in that:
Including terminal, transmission equipment, the webserver;
Described terminal gathers behavior characteristics and biological characteristic, and is sent to the webserver by transmission equipment;
Described terminal collection behavior characteristics and biological characteristic are verified by the described webserver by block chain.
23. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
Described terminal includes consumption terminal, mobile terminal, geographical location information equipment.
24. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
The described webserver includes block link unit, block creating unit, block storage unit.
25. asymmetric encryption block chain identity information as claimed in claim 24 checking devices, it is characterised in that:
Link mutual to the block checking of described block link unit, described block creating unit is to new by checking transaction creation
Block, newly created block is preserved by described block storage unit.
26. asymmetric encryption block chain identity information as claimed in claim 25 checking devices, it is characterised in that:
It is single that described block link unit includes that random number generation unit, random number verification unit, timestamp unit, password generate
Unit, password decryption unit.
27. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
Described behavior characteristics includes path, region, WiFi, daily position, consuming behavior, consumption preferences, spending limit, disappears
Take custom and timestamp.
28. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
Described biological characteristic includes hand, palmmprint, fingerprint, face, iris, retina, pulse, vein, auricle, abnormal smells from the patient and DNA.
29. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
Described checking includes double secret key.
30. asymmetric encryption block chain identity information as claimed in claim 29 checking devices, it is characterised in that:
Described double secret key includes PKI and private key.
31. asymmetric encryption block chain identity information as claimed in claim 30 checking devices, it is characterised in that:
Described PKI has publicity, in order to encrypt a segment information and the verity of the information of proof.
32. asymmetric encryption block chain identity information as claimed in claim 30 checking devices, it is characterised in that:
Described private key has privacy, and described private key only has information owner to grasp, in order to decipher the information that public key encryption is crossed.
33. asymmetric encryption block chain identity informations as described in claim 30,31 verify device, it is characterised in that:
The information that described public key encryption is crossed only has the people of respective private keys and could decipher.
34. asymmetric encryption block chain identity information as claimed in claim 30 checking devices, it is characterised in that:
Described PKI and private key codes have asymmetry, i.e. cannot draw private key according to PKI.
35. asymmetric encryption block chain identity informations as described in claim 30,34 verify device, it is characterised in that:
Described private key is to Information Signature, and described public key verifications is signed.
36. asymmetric encryption block chain identity information as claimed in claim 35 checking devices, it is characterised in that:
Described is that described private key holder sends by the validation of information of public key signature verifications.
37. asymmetric encryption block chain identity information as claimed in claim 35 checking devices, it is characterised in that:
Described PKI is that a upper block sends, and described private key has for next block holder.
38. asymmetric encryption block chain identity information as claimed in claim 29 checking devices, it is characterised in that:
Described secret key pair enciphered method includes that Hash enciphered method, des encryption method, rsa encryption method, Elgamal enciphered method, matrix are encrypted
Method, elliptic curve cryptography and combinations thereof.
39. asymmetric encryption block chain identity information as claimed in claim 37 checking devices, it is characterised in that:
Described block comprises following three parts: keyed hash that information, previous block are formed, random number.
40. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
Described transaction also includes the private key of both parties, the quantity of transaction, the digital signature of electronic money.
41. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
Described checking uses the checking of described behavior characteristics.
42. asymmetric encryption block chain identity informations as described in claim 41 verify device, it is characterised in that:
When the checking of described behavior characteristics is abnormal, described biological characteristic secondary is used to verify.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610413635.3A CN106100847B (en) | 2016-06-14 | 2016-06-14 | Method and device for verifying identity information of asymmetric encryption block chain |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610413635.3A CN106100847B (en) | 2016-06-14 | 2016-06-14 | Method and device for verifying identity information of asymmetric encryption block chain |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106100847A true CN106100847A (en) | 2016-11-09 |
| CN106100847B CN106100847B (en) | 2021-10-26 |
Family
ID=57846333
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201610413635.3A Expired - Fee Related CN106100847B (en) | 2016-06-14 | 2016-06-14 | Method and device for verifying identity information of asymmetric encryption block chain |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106100847B (en) |
Cited By (72)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106407481A (en) * | 2016-11-30 | 2017-02-15 | 福州微启迪物联科技有限公司 | Block chain architecture-based ecological environment monitoring system and implementation method thereof |
| CN106534160A (en) * | 2016-12-02 | 2017-03-22 | 江苏通付盾科技有限公司 | Identity authentication method and system based on block chain |
| CN106548397A (en) * | 2016-11-22 | 2017-03-29 | 天津米游科技有限公司 | A kind of block chain common recognition mechanism |
| CN106686555A (en) * | 2017-01-12 | 2017-05-17 | 算丰科技(北京)有限公司 | Data block broadcasting method and device and electronic equipment |
| CN106790253A (en) * | 2017-01-25 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Authentication method and device based on block chain |
| CN106971342A (en) * | 2017-03-29 | 2017-07-21 | 宁夏凯速德科技有限公司 | Method of commerce and system based on block chain technology in the e-commerce platform of decentralization |
| CN106982203A (en) * | 2017-01-06 | 2017-07-25 | 中国银联股份有限公司 | The ATM network system and its information processing method of robust based on block chain technology |
| CN106980980A (en) * | 2017-03-29 | 2017-07-25 | 宁夏宁信信息科技有限公司 | Method of commerce and system based on block chain technology in e-commerce platform |
| CN106991334A (en) * | 2016-11-24 | 2017-07-28 | 阿里巴巴集团控股有限公司 | A kind of method, system and device of data access |
| CN106991569A (en) * | 2017-03-29 | 2017-07-28 | 宁夏灵智科技有限公司 | Big data is calculated in e-commerce platform method of commerce and system |
| CN107016543A (en) * | 2017-03-29 | 2017-08-04 | 宁夏煜隆科技有限公司 | The method of commerce and system of model adaptation in e-commerce platform |
| CN107016542A (en) * | 2016-12-06 | 2017-08-04 | 阿里巴巴集团控股有限公司 | A kind of business data processing method, verification method, apparatus and system |
| CN107077674A (en) * | 2016-12-29 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Transaction verification processing method and device and node equipment |
| CN107086909A (en) * | 2017-03-07 | 2017-08-22 | 阿里巴巴集团控股有限公司 | Generation method and device, the method and apparatus of identity examination & verification of identity information |
| CN107104977A (en) * | 2017-05-23 | 2017-08-29 | 北京天德科技有限公司 | A kind of block chain data safe transmission method based on Stream Control Transmission Protocol |
| CN107147652A (en) * | 2017-05-18 | 2017-09-08 | 电子科技大学 | A secure fusion authentication method for user multi-modal identity based on blockchain |
| CN107172016A (en) * | 2017-04-25 | 2017-09-15 | 中国联合网络通信集团有限公司 | Safe trust processing method and device |
| CN107241196A (en) * | 2017-06-30 | 2017-10-10 | 杰创智能科技股份有限公司 | Digital signature method and system based on block chain technology |
| CN107301546A (en) * | 2017-05-03 | 2017-10-27 | 北京众享比特科技有限公司 | Generating random number and methods for using them and device |
| CN107423978A (en) * | 2017-06-16 | 2017-12-01 | 郑州大学 | A kind of distributed energy business confirmation method based on alliance's block chain |
| CN107480559A (en) * | 2017-08-25 | 2017-12-15 | 北京中星仝创科技有限公司 | Safe storage system and method for a kind of block chain from chain data |
| CN107506661A (en) * | 2017-08-15 | 2017-12-22 | 河南真二互联网科技有限公司 | A kind of method of the generation house historical record based on block chain |
| CN107528688A (en) * | 2017-09-30 | 2017-12-29 | 矩阵元技术(深圳)有限公司 | A kind of keeping of block chain key and restoration methods, device based on encryption commission technology |
| CN107656812A (en) * | 2017-09-27 | 2018-02-02 | 咪咕文化科技有限公司 | block chain processing method, system, node device, terminal and storage medium |
| CN107682364A (en) * | 2017-11-03 | 2018-02-09 | 杭州秘猿科技有限公司 | One kind license chain privacy method of commerce |
| CN107749848A (en) * | 2017-10-23 | 2018-03-02 | 中国联合网络通信集团有限公司 | Processing method, device and the Internet of things system of Internet of Things data |
| CN107888384A (en) * | 2017-11-30 | 2018-04-06 | 中链科技有限公司 | A kind of identity data management method, system and computer-readable recording medium |
| CN107994991A (en) * | 2017-10-31 | 2018-05-04 | 深圳市轱辘车联数据技术有限公司 | A kind of data processing method, data processing server and storage medium |
| CN107993359A (en) * | 2017-11-23 | 2018-05-04 | 浙江大学 | A kind of end-to-end bicycle shared system and method based on block chain |
| CN108064440A (en) * | 2017-05-25 | 2018-05-22 | 深圳前海达闼云端智能科技有限公司 | FIDO authentication method, device and system based on block chain |
| CN108075895A (en) * | 2016-11-15 | 2018-05-25 | 深圳银链科技有限公司 | Node permission method and system based on block chain |
| CN108270571A (en) * | 2017-12-08 | 2018-07-10 | 西安电子科技大学 | Internet of Things identity authorization system and its method based on block chain |
| WO2018126340A1 (en) * | 2017-01-03 | 2018-07-12 | 华为技术有限公司 | Blockchain-based data processing method, device and system |
| CN108320228A (en) * | 2018-03-07 | 2018-07-24 | 物数(上海)信息科技有限公司 | Transregional piece of chain transaction in assets method, platform, equipment and storage medium |
| CN108334553A (en) * | 2017-12-29 | 2018-07-27 | 北京欧链科技有限公司 | Data screening method and apparatus based on block chain |
| CN108596608A (en) * | 2018-04-28 | 2018-09-28 | 比飞力(深圳)科技有限公司 | A kind of method and device of digital wallet transaction |
| CN108712429A (en) * | 2018-05-24 | 2018-10-26 | 西安电子科技大学 | The method for secret protection of data is calculated based on block chain cloud outsourcing |
| CN108737108A (en) * | 2018-05-09 | 2018-11-02 | 合肥达朴汇联科技有限公司 | A kind of computer-readable medium including block chain node |
| CN108737114A (en) * | 2018-06-19 | 2018-11-02 | 天津中兴云链技术有限公司 | A kind of endorsement method and device of the block catenary system based on quantum key distribution |
| CN108737430A (en) * | 2018-05-25 | 2018-11-02 | 全链通有限公司 | The encryption communication method and system of block chain node |
| CN108833438A (en) * | 2018-07-18 | 2018-11-16 | 电子科技大学 | A blockchain-based method for secure storage of industrial Internet of Things information |
| CN108846108A (en) * | 2018-06-22 | 2018-11-20 | 苏州得尔达国际物流有限公司 | Shipping unmanned aerial vehicle group paths planning method based on block chain |
| CN108847046A (en) * | 2018-07-03 | 2018-11-20 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Parking management method, equipment and medium based on block chain technology |
| CN108876332A (en) * | 2018-06-04 | 2018-11-23 | 清华大学 | A kind of block chain method for secure transactions and device based on biological characteristic label certification |
| CN108885741A (en) * | 2016-02-23 | 2018-11-23 | 区块链控股有限公司 | Method and system for realizing communication certification on block chain |
| CN109039645A (en) * | 2018-07-12 | 2018-12-18 | 佛山伊苏巨森科技有限公司 | A kind of system and method signed using digital signature to block chain affairs |
| CN109040139A (en) * | 2018-10-12 | 2018-12-18 | 重庆邮电大学 | A kind of identity authorization system and method based on block chain and intelligent contract |
| CN109067741A (en) * | 2018-08-01 | 2018-12-21 | 佛山市苔藓云链科技有限公司 | A kind of server of reception and storage terminal block chain data |
| CN109067529A (en) * | 2018-09-09 | 2018-12-21 | 成都量安区块链科技有限公司 | A kind of production method of block chain private key for user |
| CN109118655A (en) * | 2018-07-31 | 2019-01-01 | 温州市图盛科技有限公司 | A kind of electrical energy measurement and transaction terminal of block chain technology |
| CN109150542A (en) * | 2018-08-15 | 2019-01-04 | 杭州链汇通区块链科技有限公司 | Hardware signature method, hardware stamped signature verification method, sealing system and storage medium |
| CN109166021A (en) * | 2018-07-26 | 2019-01-08 | 阿里巴巴集团控股有限公司 | Bookkeeping methods, device and business finance integral system |
| CN109213914A (en) * | 2018-08-28 | 2019-01-15 | 蔡捷 | The network search engines based on block chain technology are logged in using living body biological identity |
| CN109257179A (en) * | 2018-10-09 | 2019-01-22 | 北京网录科技有限公司 | A kind of signature generating method and the block chain account management method using this method |
| CN109347868A (en) * | 2018-11-27 | 2019-02-15 | 咪咕文化科技有限公司 | Information verification method, device and storage medium |
| CN109862006A (en) * | 2019-01-29 | 2019-06-07 | 济南浪潮高新科技投资发展有限公司 | A kind of block catenary system cut-in method, apparatus and system |
| CN110086780A (en) * | 2019-03-26 | 2019-08-02 | 北京百度网讯科技有限公司 | The processing method for being tampered transaction, device and storage medium based on ether mill |
| CN110121727A (en) * | 2016-12-28 | 2019-08-13 | 万事达卡国际公司 | Method and system for providing certified, auditable and immutable inputs for intelligent contracts |
| CN110192216A (en) * | 2017-01-27 | 2019-08-30 | 区块链控股有限公司 | Computer-implemented method and system |
| CN110546604A (en) * | 2017-04-10 | 2019-12-06 | 区块链控股有限公司 | Secure blockchain transactions based on undetermined data |
| CN110709871A (en) * | 2017-05-22 | 2020-01-17 | 区块链控股有限公司 | Parameterizable intelligent contracts |
| CN110892674A (en) * | 2017-06-22 | 2020-03-17 | Plc集团公司 | The transaction generation method of the blockchain and the block verification method of the blockchain |
| CN111201754A (en) * | 2017-08-18 | 2020-05-26 | 西门子股份公司 | Apparatus for providing a collection of cryptographically protected and filtered and sorted transaction data sets of links of a blockchain |
| CN111433803A (en) * | 2017-12-01 | 2020-07-17 | 快特网络有限公司 | Block chain communication and ordering |
| CN111566992A (en) * | 2017-12-15 | 2020-08-21 | 区块链控股有限公司 | Initiation of security-enhanced blockchain transactions |
| CN111771194A (en) * | 2017-12-18 | 2020-10-13 | 北方信托公司 | System and method for generating and maintaining immutable digital conference records within distributed network nodes |
| CN112119611A (en) * | 2018-05-14 | 2020-12-22 | 区块链控股有限公司 | Computer-implemented system and method for performing atomic swaps using blockchain |
| CN112532394A (en) * | 2020-11-26 | 2021-03-19 | 中国电子科技集团公司第五十四研究所 | Block chain anti-signature traceable certificateless blind signature generation method |
| CN113610526A (en) * | 2021-08-24 | 2021-11-05 | 上海点融信息科技有限责任公司 | Data trust method and device, electronic equipment and storage medium |
| CN113841359A (en) * | 2019-04-12 | 2021-12-24 | 区块链控股有限公司 | Method and apparatus for disseminating blocks in a blockchain network |
| CN113886778A (en) * | 2021-09-24 | 2022-01-04 | 杭州电子科技大学 | Dynamic self-ownership identity generation method capable of monitoring |
| CN116471030A (en) * | 2022-09-19 | 2023-07-21 | 湖南湘科智慧科技有限公司 | A smart cabinet linkage control system for property involved in the case |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104735164A (en) * | 2015-04-10 | 2015-06-24 | 网易(杭州)网络有限公司 | Method and device for saving file information |
| US20150244690A1 (en) * | 2012-11-09 | 2015-08-27 | Ent Technologies, Inc. | Generalized entity network translation (gent) |
| CN105488665A (en) * | 2015-11-25 | 2016-04-13 | 布比(北京)网络技术有限公司 | Decentralized transaction method |
| CN105573828A (en) * | 2015-12-17 | 2016-05-11 | 布比(北京)网络技术有限公司 | Operation processing method and device |
-
2016
- 2016-06-14 CN CN201610413635.3A patent/CN106100847B/en not_active Expired - Fee Related
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150244690A1 (en) * | 2012-11-09 | 2015-08-27 | Ent Technologies, Inc. | Generalized entity network translation (gent) |
| CN104735164A (en) * | 2015-04-10 | 2015-06-24 | 网易(杭州)网络有限公司 | Method and device for saving file information |
| CN105488665A (en) * | 2015-11-25 | 2016-04-13 | 布比(北京)网络技术有限公司 | Decentralized transaction method |
| CN105573828A (en) * | 2015-12-17 | 2016-05-11 | 布比(北京)网络技术有限公司 | Operation processing method and device |
Cited By (106)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108885741A (en) * | 2016-02-23 | 2018-11-23 | 区块链控股有限公司 | Method and system for realizing communication certification on block chain |
| CN108885741B (en) * | 2016-02-23 | 2023-05-16 | 区块链控股有限公司 | Tokenization method and system for realizing exchange on block chain |
| CN108075895B (en) * | 2016-11-15 | 2020-03-24 | 深圳银链科技有限公司 | Node permission method and system based on block chain |
| CN108075895A (en) * | 2016-11-15 | 2018-05-25 | 深圳银链科技有限公司 | Node permission method and system based on block chain |
| CN106548397A (en) * | 2016-11-22 | 2017-03-29 | 天津米游科技有限公司 | A kind of block chain common recognition mechanism |
| US10938550B2 (en) | 2016-11-24 | 2021-03-02 | Advanced New Technologies Co., Ltd. | Method, system and apparatus for data storage and data access |
| CN106991334A (en) * | 2016-11-24 | 2017-07-28 | 阿里巴巴集团控股有限公司 | A kind of method, system and device of data access |
| US10536265B2 (en) | 2016-11-24 | 2020-01-14 | Alibaba Group Holding Limited | Method, system and apparatus for data storage and data access |
| CN106407481B (en) * | 2016-11-30 | 2019-12-03 | 福州微启迪物联科技有限公司 | Ecological environment supervising system and its implementation based on block chain framework |
| CN106407481A (en) * | 2016-11-30 | 2017-02-15 | 福州微启迪物联科技有限公司 | Block chain architecture-based ecological environment monitoring system and implementation method thereof |
| CN106534160A (en) * | 2016-12-02 | 2017-03-22 | 江苏通付盾科技有限公司 | Identity authentication method and system based on block chain |
| US10789356B2 (en) | 2016-12-06 | 2020-09-29 | Alibaba Group Holding Limited | Method, apparatus, and system for service data processing and verification |
| CN107016542A (en) * | 2016-12-06 | 2017-08-04 | 阿里巴巴集团控股有限公司 | A kind of business data processing method, verification method, apparatus and system |
| CN110121727B (en) * | 2016-12-28 | 2023-08-04 | 万事达卡国际公司 | Method and system for providing authenticated, auditable and immutable input for intelligent contracts |
| CN110121727A (en) * | 2016-12-28 | 2019-08-13 | 万事达卡国际公司 | Method and system for providing certified, auditable and immutable inputs for intelligent contracts |
| CN107077674A (en) * | 2016-12-29 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Transaction verification processing method and device and node equipment |
| CN107077674B (en) * | 2016-12-29 | 2021-06-11 | 达闼机器人有限公司 | Transaction verification processing method and device and node equipment |
| CN110121860B (en) * | 2017-01-03 | 2021-08-13 | 华为技术有限公司 | Blockchain-based data processing method, equipment and system |
| CN110121860A (en) * | 2017-01-03 | 2019-08-13 | 华为技术有限公司 | Data processing method, equipment and system based on block chain |
| WO2018126340A1 (en) * | 2017-01-03 | 2018-07-12 | 华为技术有限公司 | Blockchain-based data processing method, device and system |
| CN106982203A (en) * | 2017-01-06 | 2017-07-25 | 中国银联股份有限公司 | The ATM network system and its information processing method of robust based on block chain technology |
| CN106982203B (en) * | 2017-01-06 | 2020-05-22 | 中国银联股份有限公司 | Robust ATM network system based on block chain technology and information processing method thereof |
| CN106686555A (en) * | 2017-01-12 | 2017-05-17 | 算丰科技(北京)有限公司 | Data block broadcasting method and device and electronic equipment |
| CN106790253A (en) * | 2017-01-25 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Authentication method and device based on block chain |
| CN110192216B (en) * | 2017-01-27 | 2023-05-09 | 区块链控股有限公司 | Computer-implemented method and system |
| CN110192216A (en) * | 2017-01-27 | 2019-08-30 | 区块链控股有限公司 | Computer-implemented method and system |
| CN107086909A (en) * | 2017-03-07 | 2017-08-22 | 阿里巴巴集团控股有限公司 | Generation method and device, the method and apparatus of identity examination & verification of identity information |
| CN106971342A (en) * | 2017-03-29 | 2017-07-21 | 宁夏凯速德科技有限公司 | Method of commerce and system based on block chain technology in the e-commerce platform of decentralization |
| CN106980980A (en) * | 2017-03-29 | 2017-07-25 | 宁夏宁信信息科技有限公司 | Method of commerce and system based on block chain technology in e-commerce platform |
| CN106991569A (en) * | 2017-03-29 | 2017-07-28 | 宁夏灵智科技有限公司 | Big data is calculated in e-commerce platform method of commerce and system |
| CN106991569B (en) * | 2017-03-29 | 2018-07-31 | 宁夏灵智科技有限公司 | The method of commerce and system that big data calculates in e-commerce platform |
| CN107016543A (en) * | 2017-03-29 | 2017-08-04 | 宁夏煜隆科技有限公司 | The method of commerce and system of model adaptation in e-commerce platform |
| CN110546604A (en) * | 2017-04-10 | 2019-12-06 | 区块链控股有限公司 | Secure blockchain transactions based on undetermined data |
| CN107172016A (en) * | 2017-04-25 | 2017-09-15 | 中国联合网络通信集团有限公司 | Safe trust processing method and device |
| CN107172016B (en) * | 2017-04-25 | 2021-05-18 | 中国联合网络通信集团有限公司 | Security trust processing method and device |
| CN107301546B (en) * | 2017-05-03 | 2020-10-16 | 北京众享比特科技有限公司 | Random number generation and application method and device |
| CN107301546A (en) * | 2017-05-03 | 2017-10-27 | 北京众享比特科技有限公司 | Generating random number and methods for using them and device |
| CN107147652B (en) * | 2017-05-18 | 2019-08-09 | 电子科技大学 | A secure fusion authentication method for user multi-modal identity based on blockchain |
| CN107147652A (en) * | 2017-05-18 | 2017-09-08 | 电子科技大学 | A secure fusion authentication method for user multi-modal identity based on blockchain |
| CN110709871A (en) * | 2017-05-22 | 2020-01-17 | 区块链控股有限公司 | Parameterizable intelligent contracts |
| CN107104977A (en) * | 2017-05-23 | 2017-08-29 | 北京天德科技有限公司 | A kind of block chain data safe transmission method based on Stream Control Transmission Protocol |
| CN107104977B (en) * | 2017-05-23 | 2020-07-31 | 北京天德科技有限公司 | Block chain data secure transmission method based on SCTP |
| CN108064440A (en) * | 2017-05-25 | 2018-05-22 | 深圳前海达闼云端智能科技有限公司 | FIDO authentication method, device and system based on block chain |
| CN107423978A (en) * | 2017-06-16 | 2017-12-01 | 郑州大学 | A kind of distributed energy business confirmation method based on alliance's block chain |
| CN110892674A (en) * | 2017-06-22 | 2020-03-17 | Plc集团公司 | The transaction generation method of the blockchain and the block verification method of the blockchain |
| CN107241196A (en) * | 2017-06-30 | 2017-10-10 | 杰创智能科技股份有限公司 | Digital signature method and system based on block chain technology |
| CN107506661B (en) * | 2017-08-15 | 2020-04-24 | 河南真二互联网科技有限公司 | Method for generating house historical record based on block chain |
| CN107506661A (en) * | 2017-08-15 | 2017-12-22 | 河南真二互联网科技有限公司 | A kind of method of the generation house historical record based on block chain |
| CN111201754B (en) * | 2017-08-18 | 2023-08-29 | 西门子股份公司 | Device for providing cryptographically protected and filtered and ordered collection of transaction data sets for links of a blockchain |
| CN111201754A (en) * | 2017-08-18 | 2020-05-26 | 西门子股份公司 | Apparatus for providing a collection of cryptographically protected and filtered and sorted transaction data sets of links of a blockchain |
| CN107480559A (en) * | 2017-08-25 | 2017-12-15 | 北京中星仝创科技有限公司 | Safe storage system and method for a kind of block chain from chain data |
| CN107480559B (en) * | 2017-08-25 | 2019-08-20 | 北京中星仝创科技有限公司 | A kind of safe storage system and method for the block chain from chain data |
| CN107656812A (en) * | 2017-09-27 | 2018-02-02 | 咪咕文化科技有限公司 | block chain processing method, system, node device, terminal and storage medium |
| CN107528688A (en) * | 2017-09-30 | 2017-12-29 | 矩阵元技术(深圳)有限公司 | A kind of keeping of block chain key and restoration methods, device based on encryption commission technology |
| CN107749848A (en) * | 2017-10-23 | 2018-03-02 | 中国联合网络通信集团有限公司 | Processing method, device and the Internet of things system of Internet of Things data |
| CN107749848B (en) * | 2017-10-23 | 2020-04-07 | 中国联合网络通信集团有限公司 | Internet of things data processing method and device and Internet of things system |
| CN107994991A (en) * | 2017-10-31 | 2018-05-04 | 深圳市轱辘车联数据技术有限公司 | A kind of data processing method, data processing server and storage medium |
| CN107682364B (en) * | 2017-11-03 | 2019-12-03 | 杭州秘猿科技有限公司 | A kind of license chain privacy method of commerce |
| CN107682364A (en) * | 2017-11-03 | 2018-02-09 | 杭州秘猿科技有限公司 | One kind license chain privacy method of commerce |
| CN107993359A (en) * | 2017-11-23 | 2018-05-04 | 浙江大学 | A kind of end-to-end bicycle shared system and method based on block chain |
| CN107888384A (en) * | 2017-11-30 | 2018-04-06 | 中链科技有限公司 | A kind of identity data management method, system and computer-readable recording medium |
| CN111433803A (en) * | 2017-12-01 | 2020-07-17 | 快特网络有限公司 | Block chain communication and ordering |
| CN108270571A (en) * | 2017-12-08 | 2018-07-10 | 西安电子科技大学 | Internet of Things identity authorization system and its method based on block chain |
| CN108270571B (en) * | 2017-12-08 | 2019-10-11 | 西安电子科技大学 | Blockchain-based Internet of Things identity authentication system and its method |
| CN111566992A (en) * | 2017-12-15 | 2020-08-21 | 区块链控股有限公司 | Initiation of security-enhanced blockchain transactions |
| CN111566992B (en) * | 2017-12-15 | 2024-04-16 | 区块链控股有限公司 | Initiation of a security enhanced blockchain transaction |
| CN111771194B (en) * | 2017-12-18 | 2023-07-28 | 北方信托公司 | System and method for generating and maintaining a non-variable digital conference record within a distributed network node |
| CN111771194A (en) * | 2017-12-18 | 2020-10-13 | 北方信托公司 | System and method for generating and maintaining immutable digital conference records within distributed network nodes |
| CN108334553B (en) * | 2017-12-29 | 2020-07-10 | 北京欧链科技有限公司 | Data screening method and device based on block chain |
| CN108334553A (en) * | 2017-12-29 | 2018-07-27 | 北京欧链科技有限公司 | Data screening method and apparatus based on block chain |
| CN108320228A (en) * | 2018-03-07 | 2018-07-24 | 物数(上海)信息科技有限公司 | Transregional piece of chain transaction in assets method, platform, equipment and storage medium |
| CN108596608A (en) * | 2018-04-28 | 2018-09-28 | 比飞力(深圳)科技有限公司 | A kind of method and device of digital wallet transaction |
| CN108737108A (en) * | 2018-05-09 | 2018-11-02 | 合肥达朴汇联科技有限公司 | A kind of computer-readable medium including block chain node |
| CN112119611A (en) * | 2018-05-14 | 2020-12-22 | 区块链控股有限公司 | Computer-implemented system and method for performing atomic swaps using blockchain |
| CN108712429A (en) * | 2018-05-24 | 2018-10-26 | 西安电子科技大学 | The method for secret protection of data is calculated based on block chain cloud outsourcing |
| CN108737430B (en) * | 2018-05-25 | 2020-07-17 | 全链通有限公司 | Encryption communication method and system for block chain node |
| CN108737430A (en) * | 2018-05-25 | 2018-11-02 | 全链通有限公司 | The encryption communication method and system of block chain node |
| CN108876332B (en) * | 2018-06-04 | 2020-09-22 | 清华大学 | Block chain safe transaction method and device based on biometric feature mark authentication |
| WO2019232880A1 (en) * | 2018-06-04 | 2019-12-12 | 清华大学 | Biomarker authentication-based block chain secure transaction method and apparatus |
| CN108876332A (en) * | 2018-06-04 | 2018-11-23 | 清华大学 | A kind of block chain method for secure transactions and device based on biological characteristic label certification |
| CN108737114A (en) * | 2018-06-19 | 2018-11-02 | 天津中兴云链技术有限公司 | A kind of endorsement method and device of the block catenary system based on quantum key distribution |
| CN108846108A (en) * | 2018-06-22 | 2018-11-20 | 苏州得尔达国际物流有限公司 | Shipping unmanned aerial vehicle group paths planning method based on block chain |
| CN108847046A (en) * | 2018-07-03 | 2018-11-20 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Parking management method, equipment and medium based on block chain technology |
| CN109039645A (en) * | 2018-07-12 | 2018-12-18 | 佛山伊苏巨森科技有限公司 | A kind of system and method signed using digital signature to block chain affairs |
| CN108833438B (en) * | 2018-07-18 | 2020-04-14 | 电子科技大学 | A method for secure storage of industrial Internet of Things information based on blockchain |
| CN108833438A (en) * | 2018-07-18 | 2018-11-16 | 电子科技大学 | A blockchain-based method for secure storage of industrial Internet of Things information |
| CN109166021A (en) * | 2018-07-26 | 2019-01-08 | 阿里巴巴集团控股有限公司 | Bookkeeping methods, device and business finance integral system |
| CN109118655A (en) * | 2018-07-31 | 2019-01-01 | 温州市图盛科技有限公司 | A kind of electrical energy measurement and transaction terminal of block chain technology |
| CN109067741A (en) * | 2018-08-01 | 2018-12-21 | 佛山市苔藓云链科技有限公司 | A kind of server of reception and storage terminal block chain data |
| CN109150542A (en) * | 2018-08-15 | 2019-01-04 | 杭州链汇通区块链科技有限公司 | Hardware signature method, hardware stamped signature verification method, sealing system and storage medium |
| CN109213914A (en) * | 2018-08-28 | 2019-01-15 | 蔡捷 | The network search engines based on block chain technology are logged in using living body biological identity |
| CN109067529A (en) * | 2018-09-09 | 2018-12-21 | 成都量安区块链科技有限公司 | A kind of production method of block chain private key for user |
| CN109257179A (en) * | 2018-10-09 | 2019-01-22 | 北京网录科技有限公司 | A kind of signature generating method and the block chain account management method using this method |
| CN109040139A (en) * | 2018-10-12 | 2018-12-18 | 重庆邮电大学 | A kind of identity authorization system and method based on block chain and intelligent contract |
| CN109040139B (en) * | 2018-10-12 | 2021-05-18 | 重庆邮电大学 | Identity authentication system and method based on block chain and intelligent contract |
| CN109347868B (en) * | 2018-11-27 | 2021-06-08 | 咪咕文化科技有限公司 | Information verification method, device and storage medium |
| CN109347868A (en) * | 2018-11-27 | 2019-02-15 | 咪咕文化科技有限公司 | Information verification method, device and storage medium |
| CN109862006A (en) * | 2019-01-29 | 2019-06-07 | 济南浪潮高新科技投资发展有限公司 | A kind of block catenary system cut-in method, apparatus and system |
| CN110086780A (en) * | 2019-03-26 | 2019-08-02 | 北京百度网讯科技有限公司 | The processing method for being tampered transaction, device and storage medium based on ether mill |
| CN110086780B (en) * | 2019-03-26 | 2021-11-02 | 北京百度网讯科技有限公司 | Method, device and storage medium for processing tampered transactions based on Ethereum |
| CN113841359A (en) * | 2019-04-12 | 2021-12-24 | 区块链控股有限公司 | Method and apparatus for disseminating blocks in a blockchain network |
| CN112532394A (en) * | 2020-11-26 | 2021-03-19 | 中国电子科技集团公司第五十四研究所 | Block chain anti-signature traceable certificateless blind signature generation method |
| CN112532394B (en) * | 2020-11-26 | 2022-05-06 | 中国电子科技集团公司第五十四研究所 | A certificate-free blind signature generation method with anti-signature traceability in blockchain |
| CN113610526A (en) * | 2021-08-24 | 2021-11-05 | 上海点融信息科技有限责任公司 | Data trust method and device, electronic equipment and storage medium |
| CN113886778A (en) * | 2021-09-24 | 2022-01-04 | 杭州电子科技大学 | Dynamic self-ownership identity generation method capable of monitoring |
| CN116471030A (en) * | 2022-09-19 | 2023-07-21 | 湖南湘科智慧科技有限公司 | A smart cabinet linkage control system for property involved in the case |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106100847B (en) | 2021-10-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106100847A (en) | Asymmetric encryption block chain identity information verification method and device | |
| CN102099810B (en) | Mobile device assisted secure computer network communications | |
| TWI396428B (en) | Network reputation system and its controlling method | |
| ES2553222T3 (en) | Enhanced 2CHK authentication security with query transactions | |
| CN101969446B (en) | Mobile commerce identity authentication method | |
| CN109327313A (en) | A two-way identity authentication method and server with privacy protection feature | |
| CN105975846B (en) | The authentication method and system of terminal | |
| WO2015135063A1 (en) | System and method for secure deposit and recovery of secret data | |
| CN104243494B (en) | A kind of data processing method | |
| CN105141425A (en) | Bidirectional authentication method capable of protecting identity based on chaotic mapping | |
| Xie et al. | A secure and privacy‐preserving three‐factor anonymous authentication scheme for wireless sensor networks in internet of things | |
| CN108768613A (en) | A kind of ciphertext password method of calibration based on multiple encryption algorithms | |
| CN110378152A (en) | A contract signing management system and method based on PKICA authentication and blockchain technology | |
| CN108400962A (en) | A kind of Authentication and Key Agreement method under multiserver framework | |
| Kumar | An Enhanced Remote User Authentication Scheme with Smart Card. | |
| Li et al. | A lightweight and secure three-factor access authentication scheme in metaverse | |
| Xie et al. | A multi server authentication protocol with integrated monitoring for iomt based healthcare system | |
| CN110289961A (en) | Telemedicine Certification Methods | |
| Sharma et al. | Defense and Isolation in the Internet of Things | |
| CN102014136B (en) | Peer to peer (P2P) network secure communication method based on random handshake | |
| CN116112234A (en) | Method, system, medium and equipment for security verification of electronic receipt | |
| CN104702559A (en) | Improved ECC-based double-factor identity authentication protocol | |
| CN105760768A (en) | Data security storage method | |
| Lu | Secure web applications against off-line password guessing attack: a two way password protocol with challenge response using arbitrary images | |
| CN106027255B (en) | A kind of identity card card reading response method of controlling security and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20211026 |
|
| CF01 | Termination of patent right due to non-payment of annual fee |