+

CN106100847A - Asymmetric encryption block chain identity information verification method and device - Google Patents

Asymmetric encryption block chain identity information verification method and device Download PDF

Info

Publication number
CN106100847A
CN106100847A CN201610413635.3A CN201610413635A CN106100847A CN 106100847 A CN106100847 A CN 106100847A CN 201610413635 A CN201610413635 A CN 201610413635A CN 106100847 A CN106100847 A CN 106100847A
Authority
CN
China
Prior art keywords
block chain
block
asymmetric encryption
identity information
chain identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610413635.3A
Other languages
Chinese (zh)
Other versions
CN106100847B (en
Inventor
李立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhong Business Consultants (beijing) Co Ltd
Original Assignee
Huizhong Business Consultants (beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhong Business Consultants (beijing) Co Ltd filed Critical Huizhong Business Consultants (beijing) Co Ltd
Priority to CN201610413635.3A priority Critical patent/CN106100847B/en
Publication of CN106100847A publication Critical patent/CN106100847A/en
Application granted granted Critical
Publication of CN106100847B publication Critical patent/CN106100847B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of asymmetric encryption block chain identity information verification method, it is characterised in that: comprise the following steps: Transaction Information is broadcast to all nodes;Transaction Information is collected in a block by described node;Described node starts to be continuously generated random string, calculates random number answer;When the answer that a node draws and nonces match, the block of generation is broadcast to other all nodes by it;Transaction is verified by other all nodes described, determines when the transaction that this block is comprised is effective, and other all nodes described accept this block.Other all nodes described start to create new block, and are added by the keyed hash of the block just accepted.Described block random hash is also linked into block chain.The keyed hash that described previous block is formed is used for coupling together block, arranges by the order of passing transaction.After described block chain must be linked to previous block, transaction is the most further confirmed.

Description

Asymmetric encryption block chain identity information verification method and device
Technical field
The application relates to block chain technical field, particularly relates to a kind of asymmetric encryption block chain identity information verification method And device.
Background technology
The Internet ICP/IP protocol let us enters the epoch of freedom of information transmission, and the innovation of block chain will carry us Enter the free evaluation of evidence through inner conviction epoch of information!Block chain is kept accounts by the whole network, and P2P is collaborative to be set up " credit ", it is on mankind's credit evolutionary history Continue blood relation's credit, noble metal credit, the 4th milestone after Central Bank's paper credit, gets a good chance of alleviating the current public credibility of China Rare social pain spot, all at world market Correspondent, intellectual property protection, the micro-notarization of property, Internet of Things finance, intelligent protocol etc. Multi-field have extensive application scenarios.
The link of existing block chain, by information content being encrypted, is sent to specific holding, and specific holder is by holding Key password is untied, seen information content.
And for information content often through encryption and the information of last transaction, timestamp, random number, address Information.
Information and the mode of its checking are the most single, are unfavorable for protection and the development of block chain technology of Transaction Information.
Along with the development of technology, the difficulty broken a code is more and more less, adapts to information is carried out accidental enciphering merely The not requirement of information security, it is therefore necessary to set a kind of safer authentication information.
Summary of the invention
The purpose of the application is to provide a kind of asymmetric encryption block chain identity information verification method and device, by going It is characterized and is authenticated as Transaction Information, as noted abnormalities, use biological characteristic as supplementary certification.
In order to solve above-mentioned technical problem, the application uses technical scheme:
A kind of asymmetric encryption block chain identity information verification method, it is characterised in that:
Comprise the following steps:
Transaction Information is broadcast to all nodes;
Transaction Information is collected in a block by described node;
Described node starts to be continuously generated random string, calculates random number answer;
When the answer that a node draws and nonces match, the block of generation is broadcast to other all nodes by it.
Transaction is verified by other all nodes described, determines when the transaction that this block is comprised is effective, described other All nodes accept this block.
Other all nodes described start to create new block, and are added by the keyed hash of the block just accepted.
Described block random hash is also linked into block chain.
The keyed hash that described previous block is formed is used for coupling together block, arranges by the order of passing transaction.
After described block chain must be linked to previous block, transaction is the most further confirmed.
Described checking includes double secret key.
Described double secret key includes PKI and private key;
Described PKI has publicity, in order to encrypt a segment information and the verity of the information of proof;
Described private key has privacy, and described private key only has information owner to grasp, in order to decipher the information that public key encryption is crossed;
The information that described public key encryption is crossed only has the people of respective private keys and could decipher.
Described PKI and private key codes have asymmetry, i.e. cannot draw private key according to PKI;
Described private key is to Information Signature, and described public key verifications is signed;
Described is that described private key holder sends by the validation of information of public key signature verifications;
Described PKI is that a upper block sends, and described private key has for next block holder.
Described secret key pair enciphered method includes Hash enciphered method, des encryption method, rsa encryption method, Elgamal enciphered method, matrix Enciphered method, elliptic curve cryptography and combinations thereof.
Described block comprises following three parts: keyed hash that information, previous block are formed, random number.
Described information also includes behavior characteristics and biological characteristic;
Described behavior characteristics: include path, region, WiFi, daily position, consuming behavior, consumption preferences, spending limit, consumption Custom and timestamp;
Described biological characteristic includes hand, palmmprint, fingerprint, face, iris, retina, pulse, vein, auricle, abnormal smells from the patient and DNA.
Described transaction also includes the private key of both parties, the quantity of transaction, the digital signature of electronic money.
Preferably, described checking uses the checking of described behavior characteristics, when the checking of described behavior characteristics is abnormal, uses described Biological characteristic secondary is verified.
A kind of asymmetric encryption block chain identity information checking device, it is characterised in that: include terminal, transmission equipment, net Network server.
Described terminal gathers behavior characteristics and biological characteristic, and is sent to the webserver by transmission equipment;
Described terminal collection behavior characteristics and biological characteristic are verified by the described webserver by block chain.
Described terminal includes consumption terminal, mobile terminal, geographical location information equipment;
The described webserver includes block link unit, block creating unit, block storage unit;
Link mutual to the block checking of described block link unit, described block creating unit is to new by checking transaction creation Block, newly created block is preserved by described block storage unit.
Described block link unit includes that random number generation unit, random number verification unit, timestamp unit, password generate Unit, password decryption unit.
Described behavior characteristics includes path, region, WiFi, daily position, consuming behavior, consumption preferences, the amount of consumption Degree, consumption habit and timestamp.
Described biological characteristic include hand, palmmprint, fingerprint, face, iris, retina, pulse, vein, auricle, abnormal smells from the patient and DNA。
When there is transaction in terminal,
Transaction Information is broadcast to all-network server.
Transaction Information is collected in a block by the described webserver.
The described webserver starts to be continuously generated random string, calculates random number answer.
When the answer that a webserver draws and nonces match, the block of generation is broadcast to other by it to be owned The webserver.
Transaction is verified by other all-network servers described, determines when the transaction that this block is comprised is effective, institute State other all-network servers and accept this block.
Other all-network servers described start to create new block, and are added by the keyed hash of the block just accepted Enter.
Described block random hash is also linked into block chain.
The keyed hash that described previous block is formed is used for coupling together block, it is achieved the order row of passing transaction Row.
After described block chain must be linked to previous block, transaction is the most further confirmed.
Described checking includes double secret key;
Described double secret key includes PKI and private key;
Described PKI has publicity, in order to encrypt a segment information and the verity of the information of proof.
Described private key has privacy, and described private key only has information owner to grasp, in order to decipher the letter that public key encryption is crossed Breath;
The information that described public key encryption is crossed only has the people of respective private keys and could decipher;
Described PKI and private key codes have asymmetry, i.e. cannot draw private key according to PKI;
Described private key is to Information Signature, and described public key verifications is signed.
Described is that described private key holder sends by the validation of information of public key signature verifications;
Described PKI is that a upper block sends, and described private key has for next block.
Described key pair encryption method includes Hash enciphered method, des encryption method, rsa encryption method, Elgamal enciphered method, matrix Enciphered method, elliptic curve cryptography and combinations thereof.
Described block comprises following three parts: keyed hash that information, previous block are formed, random number.
Described information also includes behavior characteristics and biological characteristic.
Preferably, described checking uses the checking of described behavior characteristics, when the checking of described behavior characteristics is abnormal, uses described Biological characteristic secondary is verified.
The application is compared with prior art: 1, uses behavior characteristics and the checking of biological characteristic double-point information, strengthens checking peace Quan Xing.Stability;2, preferential employing behavior characteristics checking, strengthens the convenience of operation, continuous;3, asymmetric encryption side is used Information is encrypted by method, is aided with timestamp, address, random number, and various dimensions are encrypted, and improves checking safety comprehensively, and tenability is attacked.
Accompanying drawing explanation
Fig. 1 is the application asymmetric encryption block chain identity information verification method one embodiment schematic diagram.
Fig. 2 is that the application block links an embodiment schematic diagram.
Fig. 3 is the application block key one embodiment schematic diagram.
Fig. 4 is another embodiment schematic diagram of the application block key.
Fig. 5 is the application block information one embodiment schematic diagram.
Fig. 6 is that the application asymmetric encryption block chain identity information verifies device one embodiment schematic diagram.
Fig. 7 is that the application asymmetric encryption block chain identity information verifies another embodiment schematic diagram of device.
Detailed description of the invention
Understandable, below in conjunction with the accompanying drawings to the application for enabling the above-mentioned purpose of the application, feature and advantage to become apparent from Detailed description of the invention be described in detail.
Elaborate a lot of detail in the following description so that fully understanding the application.But the application can be with Much being different from alternate manner described here to implement, those skilled in the art can be in the situation without prejudice to the application intension Under do similar popularization, therefore the application is not embodied as and concrete accompanying drawing is limited by following public.
Embodiment one
As it is shown in figure 1, Transaction Information is broadcast to all nodes;
Transaction Information is collected in a block by described node;
Described node starts to be continuously generated random string, calculates random number answer;
When the answer that a node draws and nonces match, the block of generation is broadcast to other all nodes by it;
Transaction is verified by other all nodes described, determines when the transaction that this block is comprised is effective, and described other own Node accepts this block.
Other all nodes described start to create new block, and are added by the keyed hash of the block just accepted.
Embodiment two
As in figure 2 it is shown, described block random hash be linked into block chain.
The keyed hash that described previous block is formed is used for coupling together block, it is achieved the order row of passing transaction Row.
After described block chain must be linked to previous block, transaction is the most further confirmed.
Embodiment three
As it is shown on figure 3, described checking includes double secret key;
Described double secret key includes PKI and private key;
Described PKI has publicity, in order to encrypt a segment information and the verity of the information of proof;
Described private key has privacy, and described private key only has information owner to grasp, in order to decipher the information that public key encryption is crossed;
The information that described public key encryption is crossed only has the people of respective private keys and could decipher;
Described PKI and private key codes have asymmetry, i.e. cannot draw private key according to PKI;
Described private key is to Information Signature, and described public key verifications is signed;
It is that described private key holder sends by the validation of information of described public key signature verifications;
Described PKI is that a upper block sends, and described private key has for next block holder.
Embodiment four
As shown in Fig. 1,2,3,4,5,6,7, a kind of asymmetric encryption block chain identity information checking device, it is characterised in that: bag Include terminal, transmission equipment, the webserver;
Described terminal gathers behavior characteristics and biological characteristic, and is sent to the webserver by transmission equipment;
Described terminal includes consumption terminal, mobile terminal, geographical location information equipment;
The described webserver includes block link unit, block creating unit, block storage unit;
Link mutual to the block checking of described block link unit, block creating unit is to the district new by checking transaction creation Block, newly created block is preserved by block storage unit.
Described block link unit includes that random number generation unit, random number verification unit, timestamp unit, password generate Unit, password decryption unit;
Described behavior characteristics includes path, region, WiFi, daily position, consuming behavior, consumption preferences, spending limit, disappears Take custom and timestamp.
Described biological characteristic include hand, palmmprint, fingerprint, face, iris, retina, pulse, vein, auricle, abnormal smells from the patient and DNA。
When there is transaction in terminal,
Transaction Information is broadcast to all-network server;
Transaction Information is collected in a block by the described webserver;
The described webserver starts to be continuously generated random string, calculates random number answer;
When the answer that a webserver draws and nonces match, the block of generation is broadcast to other all-networks by it Server.
Transaction is verified by other all-network servers described, determines when the transaction that this block is comprised is effective, institute State other all-network servers and accept this block.
Other all-network servers described start to create new block, and are added by the keyed hash of the block just accepted Enter.
Described block random hash is also linked into block chain.
The keyed hash that described previous block is formed is used for coupling together block, it is achieved the order row of passing transaction Row.
After described block chain must be linked to previous block, transaction is the most further confirmed.
Described checking includes double secret key;
Described double secret key includes PKI and private key;
Described PKI has publicity, in order to encrypt a segment information and the verity of the information of proof;
Described private key has privacy, and described private key only has information owner to grasp, in order to decipher the information that public key encryption is crossed.
The information that described public key encryption is crossed only has the people of respective private keys and could decipher;
Described PKI and private key codes have asymmetry, i.e. cannot draw private key according to PKI;
Described private key is to Information Signature, and described public key verifications is signed;
Described is that described private key holder sends by the validation of information of public key signature verifications;
Described PKI is that a upper block sends, and described private key has for next block holder.
Described key pair encryption method includes Hash enciphered method, des encryption method, rsa encryption method, Elgamal enciphered method, matrix Enciphered method, elliptic curve cryptography and combinations thereof.
Described block comprises following three parts: keyed hash that information, previous block are formed, random number.
Described information also includes behavior characteristics and biological characteristic.
Preferably, described checking uses the checking of described behavior characteristics, when the checking of described behavior characteristics is abnormal, uses described Biological characteristic secondary is verified.
Although the application is open as above with preferred embodiment, but it is not for limiting claim, any this area Technical staff without departing from spirit and scope, can make possible variation and amendment, therefore the application Protection domain should be defined in the range of standard with the application claim.

Claims (42)

1. an asymmetric encryption block chain identity information verification method, it is characterised in that: comprise the following steps:
Transaction Information is broadcast to all nodes;
Transaction Information is collected in a block by described node;
Described node starts to be continuously generated random string, calculates random number answer;
When the answer that a node draws and nonces match, the block of generation is broadcast to other all nodes by it;
Transaction is verified by other all nodes described, determines when the transaction that this block is comprised is effective, and described other own Node accepts this block;
Other all nodes described start to create new block, and are added by the keyed hash of the block just accepted;
Described information includes behavior characteristics and biological characteristic.
2. asymmetric encryption block chain identity information verification method as claimed in claim 1, it is characterised in that:
Described block random hash is also linked into block chain.
3. asymmetric encryption block chain identity information verification method as claimed in claim 2, it is characterised in that:
The keyed hash that described previous block is formed is used for coupling together block, arranges by the order of passing transaction.
4. asymmetric encryption block chain identity information verification method as described in claim 1-3 any one, it is characterised in that:
After described block chain must be linked to previous block, transaction is the most further confirmed.
5. asymmetric encryption block chain identity information verification method as claimed in claim 1, it is characterised in that:
Described checking includes double secret key.
6. asymmetric encryption block chain identity information verification method as claimed in claim 5, it is characterised in that:
Described double secret key includes PKI and private key.
7. asymmetric encryption block chain identity information verification method as claimed in claim 6, it is characterised in that:
Described PKI has publicity, in order to encrypt a segment information and the verity of the information of proof.
8. asymmetric encryption block chain identity information verification method as claimed in claim 6, it is characterised in that:
Described private key has privacy, and described private key only has information owner to grasp, in order to decipher the information that public key encryption is crossed.
9. asymmetric encryption block chain identity information verification method as described in claim 6,7, it is characterised in that:
The information that described public key encryption is crossed only has the people of respective private keys and could decipher.
10. asymmetric encryption block chain identity information verification method as claimed in claim 6, it is characterised in that:
Described PKI and private key codes have asymmetry, i.e. cannot draw private key according to PKI.
11. as described in claim 6,10 asymmetric encryption block chain identity information verification method, it is characterised in that:
Described private key is to Information Signature, and described public key verifications is signed.
12. asymmetric encryption block chain identity information verification methods as claimed in claim 11, it is characterised in that:
Described is that described private key holder sends by the validation of information of public key signature verifications.
13. asymmetric encryption block chain identity information verification methods as claimed in claim 11, it is characterised in that:
Described PKI is that a upper block sends, and described private key has for next block holder.
14. asymmetric encryption block chain identity information verification methods as claimed in claim 5, it is characterised in that:
Described secret key pair enciphered method includes that Hash enciphered method, des encryption method, rsa encryption method, Elgamal enciphered method, matrix are encrypted Method, elliptic curve cryptography and combinations thereof.
15. asymmetric encryption block chain identity information verification methods as claimed in claim 4, it is characterised in that:
Described block comprises following three parts: keyed hash that information, previous block are formed, random number.
16. asymmetric encryption block chain identity information verification methods as claimed in claim 1, it is characterised in that:
Described behavior characteristics: include path, region, WiFi, daily position, consuming behavior, consumption preferences, spending limit, consumption Custom and timestamp.
17. asymmetric encryption block chain identity information verification methods as claimed in claim 1, it is characterised in that:
Described biological characteristic includes hand, palmmprint, fingerprint, face, iris, retina, pulse, vein, auricle, abnormal smells from the patient and DNA.
18. asymmetric encryption block chain identity information verification methods as claimed in claim 1, it is characterised in that:
Described transaction also includes the private key of both parties, the quantity of transaction, the digital signature of electronic money.
19. asymmetric encryption block chain identity information verification methods as claimed in claim 1, it is characterised in that:
Described checking uses the checking of described behavior characteristics.
20. asymmetric encryption block chain identity information verification methods as claimed in claim 19, it is characterised in that:
When the checking of described behavior characteristics is abnormal, described biological characteristic secondary is used to verify.
21. 1 kinds of asymmetric encryption block chain identity information verification methods, it is characterised in that: it is applied to server, including:
Transaction Information is broadcast to all-network server;
Transaction Information is collected in a block by the described webserver;
The described webserver starts to be continuously generated random string, calculates random number answer;
When the answer that a webserver draws and nonces match, the block of generation is broadcast to other all-networks by it Server;
Transaction is verified by other all-network servers described, determines when the transaction that this block is comprised is effective, described its He accepts this block by all-network server;
Other all-network servers described start to create new block, and are added to by the keyed hash of the block just accepted Go;
Described information includes behavior characteristics and biological characteristic.
22. 1 kinds of asymmetric encryption block chain identity information checking devices, it is characterised in that:
Including terminal, transmission equipment, the webserver;
Described terminal gathers behavior characteristics and biological characteristic, and is sent to the webserver by transmission equipment;
Described terminal collection behavior characteristics and biological characteristic are verified by the described webserver by block chain.
23. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
Described terminal includes consumption terminal, mobile terminal, geographical location information equipment.
24. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
The described webserver includes block link unit, block creating unit, block storage unit.
25. asymmetric encryption block chain identity information as claimed in claim 24 checking devices, it is characterised in that:
Link mutual to the block checking of described block link unit, described block creating unit is to new by checking transaction creation Block, newly created block is preserved by described block storage unit.
26. asymmetric encryption block chain identity information as claimed in claim 25 checking devices, it is characterised in that:
It is single that described block link unit includes that random number generation unit, random number verification unit, timestamp unit, password generate Unit, password decryption unit.
27. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
Described behavior characteristics includes path, region, WiFi, daily position, consuming behavior, consumption preferences, spending limit, disappears Take custom and timestamp.
28. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
Described biological characteristic includes hand, palmmprint, fingerprint, face, iris, retina, pulse, vein, auricle, abnormal smells from the patient and DNA.
29. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
Described checking includes double secret key.
30. asymmetric encryption block chain identity information as claimed in claim 29 checking devices, it is characterised in that:
Described double secret key includes PKI and private key.
31. asymmetric encryption block chain identity information as claimed in claim 30 checking devices, it is characterised in that:
Described PKI has publicity, in order to encrypt a segment information and the verity of the information of proof.
32. asymmetric encryption block chain identity information as claimed in claim 30 checking devices, it is characterised in that:
Described private key has privacy, and described private key only has information owner to grasp, in order to decipher the information that public key encryption is crossed.
33. asymmetric encryption block chain identity informations as described in claim 30,31 verify device, it is characterised in that:
The information that described public key encryption is crossed only has the people of respective private keys and could decipher.
34. asymmetric encryption block chain identity information as claimed in claim 30 checking devices, it is characterised in that:
Described PKI and private key codes have asymmetry, i.e. cannot draw private key according to PKI.
35. asymmetric encryption block chain identity informations as described in claim 30,34 verify device, it is characterised in that:
Described private key is to Information Signature, and described public key verifications is signed.
36. asymmetric encryption block chain identity information as claimed in claim 35 checking devices, it is characterised in that:
Described is that described private key holder sends by the validation of information of public key signature verifications.
37. asymmetric encryption block chain identity information as claimed in claim 35 checking devices, it is characterised in that:
Described PKI is that a upper block sends, and described private key has for next block holder.
38. asymmetric encryption block chain identity information as claimed in claim 29 checking devices, it is characterised in that:
Described secret key pair enciphered method includes that Hash enciphered method, des encryption method, rsa encryption method, Elgamal enciphered method, matrix are encrypted Method, elliptic curve cryptography and combinations thereof.
39. asymmetric encryption block chain identity information as claimed in claim 37 checking devices, it is characterised in that:
Described block comprises following three parts: keyed hash that information, previous block are formed, random number.
40. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
Described transaction also includes the private key of both parties, the quantity of transaction, the digital signature of electronic money.
41. asymmetric encryption block chain identity information as claimed in claim 22 checking devices, it is characterised in that:
Described checking uses the checking of described behavior characteristics.
42. asymmetric encryption block chain identity informations as described in claim 41 verify device, it is characterised in that:
When the checking of described behavior characteristics is abnormal, described biological characteristic secondary is used to verify.
CN201610413635.3A 2016-06-14 2016-06-14 Method and device for verifying identity information of asymmetric encryption block chain Expired - Fee Related CN106100847B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610413635.3A CN106100847B (en) 2016-06-14 2016-06-14 Method and device for verifying identity information of asymmetric encryption block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610413635.3A CN106100847B (en) 2016-06-14 2016-06-14 Method and device for verifying identity information of asymmetric encryption block chain

Publications (2)

Publication Number Publication Date
CN106100847A true CN106100847A (en) 2016-11-09
CN106100847B CN106100847B (en) 2021-10-26

Family

ID=57846333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610413635.3A Expired - Fee Related CN106100847B (en) 2016-06-14 2016-06-14 Method and device for verifying identity information of asymmetric encryption block chain

Country Status (1)

Country Link
CN (1) CN106100847B (en)

Cited By (72)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407481A (en) * 2016-11-30 2017-02-15 福州微启迪物联科技有限公司 Block chain architecture-based ecological environment monitoring system and implementation method thereof
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain
CN106548397A (en) * 2016-11-22 2017-03-29 天津米游科技有限公司 A kind of block chain common recognition mechanism
CN106686555A (en) * 2017-01-12 2017-05-17 算丰科技(北京)有限公司 Data block broadcasting method and device and electronic equipment
CN106790253A (en) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Authentication method and device based on block chain
CN106971342A (en) * 2017-03-29 2017-07-21 宁夏凯速德科技有限公司 Method of commerce and system based on block chain technology in the e-commerce platform of decentralization
CN106982203A (en) * 2017-01-06 2017-07-25 中国银联股份有限公司 The ATM network system and its information processing method of robust based on block chain technology
CN106980980A (en) * 2017-03-29 2017-07-25 宁夏宁信信息科技有限公司 Method of commerce and system based on block chain technology in e-commerce platform
CN106991334A (en) * 2016-11-24 2017-07-28 阿里巴巴集团控股有限公司 A kind of method, system and device of data access
CN106991569A (en) * 2017-03-29 2017-07-28 宁夏灵智科技有限公司 Big data is calculated in e-commerce platform method of commerce and system
CN107016543A (en) * 2017-03-29 2017-08-04 宁夏煜隆科技有限公司 The method of commerce and system of model adaptation in e-commerce platform
CN107016542A (en) * 2016-12-06 2017-08-04 阿里巴巴集团控股有限公司 A kind of business data processing method, verification method, apparatus and system
CN107077674A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 Transaction verification processing method and device and node equipment
CN107086909A (en) * 2017-03-07 2017-08-22 阿里巴巴集团控股有限公司 Generation method and device, the method and apparatus of identity examination & verification of identity information
CN107104977A (en) * 2017-05-23 2017-08-29 北京天德科技有限公司 A kind of block chain data safe transmission method based on Stream Control Transmission Protocol
CN107147652A (en) * 2017-05-18 2017-09-08 电子科技大学 A secure fusion authentication method for user multi-modal identity based on blockchain
CN107172016A (en) * 2017-04-25 2017-09-15 中国联合网络通信集团有限公司 Safe trust processing method and device
CN107241196A (en) * 2017-06-30 2017-10-10 杰创智能科技股份有限公司 Digital signature method and system based on block chain technology
CN107301546A (en) * 2017-05-03 2017-10-27 北京众享比特科技有限公司 Generating random number and methods for using them and device
CN107423978A (en) * 2017-06-16 2017-12-01 郑州大学 A kind of distributed energy business confirmation method based on alliance's block chain
CN107480559A (en) * 2017-08-25 2017-12-15 北京中星仝创科技有限公司 Safe storage system and method for a kind of block chain from chain data
CN107506661A (en) * 2017-08-15 2017-12-22 河南真二互联网科技有限公司 A kind of method of the generation house historical record based on block chain
CN107528688A (en) * 2017-09-30 2017-12-29 矩阵元技术(深圳)有限公司 A kind of keeping of block chain key and restoration methods, device based on encryption commission technology
CN107656812A (en) * 2017-09-27 2018-02-02 咪咕文化科技有限公司 block chain processing method, system, node device, terminal and storage medium
CN107682364A (en) * 2017-11-03 2018-02-09 杭州秘猿科技有限公司 One kind license chain privacy method of commerce
CN107749848A (en) * 2017-10-23 2018-03-02 中国联合网络通信集团有限公司 Processing method, device and the Internet of things system of Internet of Things data
CN107888384A (en) * 2017-11-30 2018-04-06 中链科技有限公司 A kind of identity data management method, system and computer-readable recording medium
CN107994991A (en) * 2017-10-31 2018-05-04 深圳市轱辘车联数据技术有限公司 A kind of data processing method, data processing server and storage medium
CN107993359A (en) * 2017-11-23 2018-05-04 浙江大学 A kind of end-to-end bicycle shared system and method based on block chain
CN108064440A (en) * 2017-05-25 2018-05-22 深圳前海达闼云端智能科技有限公司 FIDO authentication method, device and system based on block chain
CN108075895A (en) * 2016-11-15 2018-05-25 深圳银链科技有限公司 Node permission method and system based on block chain
CN108270571A (en) * 2017-12-08 2018-07-10 西安电子科技大学 Internet of Things identity authorization system and its method based on block chain
WO2018126340A1 (en) * 2017-01-03 2018-07-12 华为技术有限公司 Blockchain-based data processing method, device and system
CN108320228A (en) * 2018-03-07 2018-07-24 物数(上海)信息科技有限公司 Transregional piece of chain transaction in assets method, platform, equipment and storage medium
CN108334553A (en) * 2017-12-29 2018-07-27 北京欧链科技有限公司 Data screening method and apparatus based on block chain
CN108596608A (en) * 2018-04-28 2018-09-28 比飞力(深圳)科技有限公司 A kind of method and device of digital wallet transaction
CN108712429A (en) * 2018-05-24 2018-10-26 西安电子科技大学 The method for secret protection of data is calculated based on block chain cloud outsourcing
CN108737108A (en) * 2018-05-09 2018-11-02 合肥达朴汇联科技有限公司 A kind of computer-readable medium including block chain node
CN108737114A (en) * 2018-06-19 2018-11-02 天津中兴云链技术有限公司 A kind of endorsement method and device of the block catenary system based on quantum key distribution
CN108737430A (en) * 2018-05-25 2018-11-02 全链通有限公司 The encryption communication method and system of block chain node
CN108833438A (en) * 2018-07-18 2018-11-16 电子科技大学 A blockchain-based method for secure storage of industrial Internet of Things information
CN108846108A (en) * 2018-06-22 2018-11-20 苏州得尔达国际物流有限公司 Shipping unmanned aerial vehicle group paths planning method based on block chain
CN108847046A (en) * 2018-07-03 2018-11-20 中钞信用卡产业发展有限公司杭州区块链技术研究院 Parking management method, equipment and medium based on block chain technology
CN108876332A (en) * 2018-06-04 2018-11-23 清华大学 A kind of block chain method for secure transactions and device based on biological characteristic label certification
CN108885741A (en) * 2016-02-23 2018-11-23 区块链控股有限公司 Method and system for realizing communication certification on block chain
CN109039645A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A kind of system and method signed using digital signature to block chain affairs
CN109040139A (en) * 2018-10-12 2018-12-18 重庆邮电大学 A kind of identity authorization system and method based on block chain and intelligent contract
CN109067741A (en) * 2018-08-01 2018-12-21 佛山市苔藓云链科技有限公司 A kind of server of reception and storage terminal block chain data
CN109067529A (en) * 2018-09-09 2018-12-21 成都量安区块链科技有限公司 A kind of production method of block chain private key for user
CN109118655A (en) * 2018-07-31 2019-01-01 温州市图盛科技有限公司 A kind of electrical energy measurement and transaction terminal of block chain technology
CN109150542A (en) * 2018-08-15 2019-01-04 杭州链汇通区块链科技有限公司 Hardware signature method, hardware stamped signature verification method, sealing system and storage medium
CN109166021A (en) * 2018-07-26 2019-01-08 阿里巴巴集团控股有限公司 Bookkeeping methods, device and business finance integral system
CN109213914A (en) * 2018-08-28 2019-01-15 蔡捷 The network search engines based on block chain technology are logged in using living body biological identity
CN109257179A (en) * 2018-10-09 2019-01-22 北京网录科技有限公司 A kind of signature generating method and the block chain account management method using this method
CN109347868A (en) * 2018-11-27 2019-02-15 咪咕文化科技有限公司 Information verification method, device and storage medium
CN109862006A (en) * 2019-01-29 2019-06-07 济南浪潮高新科技投资发展有限公司 A kind of block catenary system cut-in method, apparatus and system
CN110086780A (en) * 2019-03-26 2019-08-02 北京百度网讯科技有限公司 The processing method for being tampered transaction, device and storage medium based on ether mill
CN110121727A (en) * 2016-12-28 2019-08-13 万事达卡国际公司 Method and system for providing certified, auditable and immutable inputs for intelligent contracts
CN110192216A (en) * 2017-01-27 2019-08-30 区块链控股有限公司 Computer-implemented method and system
CN110546604A (en) * 2017-04-10 2019-12-06 区块链控股有限公司 Secure blockchain transactions based on undetermined data
CN110709871A (en) * 2017-05-22 2020-01-17 区块链控股有限公司 Parameterizable intelligent contracts
CN110892674A (en) * 2017-06-22 2020-03-17 Plc集团公司 The transaction generation method of the blockchain and the block verification method of the blockchain
CN111201754A (en) * 2017-08-18 2020-05-26 西门子股份公司 Apparatus for providing a collection of cryptographically protected and filtered and sorted transaction data sets of links of a blockchain
CN111433803A (en) * 2017-12-01 2020-07-17 快特网络有限公司 Block chain communication and ordering
CN111566992A (en) * 2017-12-15 2020-08-21 区块链控股有限公司 Initiation of security-enhanced blockchain transactions
CN111771194A (en) * 2017-12-18 2020-10-13 北方信托公司 System and method for generating and maintaining immutable digital conference records within distributed network nodes
CN112119611A (en) * 2018-05-14 2020-12-22 区块链控股有限公司 Computer-implemented system and method for performing atomic swaps using blockchain
CN112532394A (en) * 2020-11-26 2021-03-19 中国电子科技集团公司第五十四研究所 Block chain anti-signature traceable certificateless blind signature generation method
CN113610526A (en) * 2021-08-24 2021-11-05 上海点融信息科技有限责任公司 Data trust method and device, electronic equipment and storage medium
CN113841359A (en) * 2019-04-12 2021-12-24 区块链控股有限公司 Method and apparatus for disseminating blocks in a blockchain network
CN113886778A (en) * 2021-09-24 2022-01-04 杭州电子科技大学 Dynamic self-ownership identity generation method capable of monitoring
CN116471030A (en) * 2022-09-19 2023-07-21 湖南湘科智慧科技有限公司 A smart cabinet linkage control system for property involved in the case

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104735164A (en) * 2015-04-10 2015-06-24 网易(杭州)网络有限公司 Method and device for saving file information
US20150244690A1 (en) * 2012-11-09 2015-08-27 Ent Technologies, Inc. Generalized entity network translation (gent)
CN105488665A (en) * 2015-11-25 2016-04-13 布比(北京)网络技术有限公司 Decentralized transaction method
CN105573828A (en) * 2015-12-17 2016-05-11 布比(北京)网络技术有限公司 Operation processing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150244690A1 (en) * 2012-11-09 2015-08-27 Ent Technologies, Inc. Generalized entity network translation (gent)
CN104735164A (en) * 2015-04-10 2015-06-24 网易(杭州)网络有限公司 Method and device for saving file information
CN105488665A (en) * 2015-11-25 2016-04-13 布比(北京)网络技术有限公司 Decentralized transaction method
CN105573828A (en) * 2015-12-17 2016-05-11 布比(北京)网络技术有限公司 Operation processing method and device

Cited By (106)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108885741A (en) * 2016-02-23 2018-11-23 区块链控股有限公司 Method and system for realizing communication certification on block chain
CN108885741B (en) * 2016-02-23 2023-05-16 区块链控股有限公司 Tokenization method and system for realizing exchange on block chain
CN108075895B (en) * 2016-11-15 2020-03-24 深圳银链科技有限公司 Node permission method and system based on block chain
CN108075895A (en) * 2016-11-15 2018-05-25 深圳银链科技有限公司 Node permission method and system based on block chain
CN106548397A (en) * 2016-11-22 2017-03-29 天津米游科技有限公司 A kind of block chain common recognition mechanism
US10938550B2 (en) 2016-11-24 2021-03-02 Advanced New Technologies Co., Ltd. Method, system and apparatus for data storage and data access
CN106991334A (en) * 2016-11-24 2017-07-28 阿里巴巴集团控股有限公司 A kind of method, system and device of data access
US10536265B2 (en) 2016-11-24 2020-01-14 Alibaba Group Holding Limited Method, system and apparatus for data storage and data access
CN106407481B (en) * 2016-11-30 2019-12-03 福州微启迪物联科技有限公司 Ecological environment supervising system and its implementation based on block chain framework
CN106407481A (en) * 2016-11-30 2017-02-15 福州微启迪物联科技有限公司 Block chain architecture-based ecological environment monitoring system and implementation method thereof
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain
US10789356B2 (en) 2016-12-06 2020-09-29 Alibaba Group Holding Limited Method, apparatus, and system for service data processing and verification
CN107016542A (en) * 2016-12-06 2017-08-04 阿里巴巴集团控股有限公司 A kind of business data processing method, verification method, apparatus and system
CN110121727B (en) * 2016-12-28 2023-08-04 万事达卡国际公司 Method and system for providing authenticated, auditable and immutable input for intelligent contracts
CN110121727A (en) * 2016-12-28 2019-08-13 万事达卡国际公司 Method and system for providing certified, auditable and immutable inputs for intelligent contracts
CN107077674A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 Transaction verification processing method and device and node equipment
CN107077674B (en) * 2016-12-29 2021-06-11 达闼机器人有限公司 Transaction verification processing method and device and node equipment
CN110121860B (en) * 2017-01-03 2021-08-13 华为技术有限公司 Blockchain-based data processing method, equipment and system
CN110121860A (en) * 2017-01-03 2019-08-13 华为技术有限公司 Data processing method, equipment and system based on block chain
WO2018126340A1 (en) * 2017-01-03 2018-07-12 华为技术有限公司 Blockchain-based data processing method, device and system
CN106982203A (en) * 2017-01-06 2017-07-25 中国银联股份有限公司 The ATM network system and its information processing method of robust based on block chain technology
CN106982203B (en) * 2017-01-06 2020-05-22 中国银联股份有限公司 Robust ATM network system based on block chain technology and information processing method thereof
CN106686555A (en) * 2017-01-12 2017-05-17 算丰科技(北京)有限公司 Data block broadcasting method and device and electronic equipment
CN106790253A (en) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Authentication method and device based on block chain
CN110192216B (en) * 2017-01-27 2023-05-09 区块链控股有限公司 Computer-implemented method and system
CN110192216A (en) * 2017-01-27 2019-08-30 区块链控股有限公司 Computer-implemented method and system
CN107086909A (en) * 2017-03-07 2017-08-22 阿里巴巴集团控股有限公司 Generation method and device, the method and apparatus of identity examination & verification of identity information
CN106971342A (en) * 2017-03-29 2017-07-21 宁夏凯速德科技有限公司 Method of commerce and system based on block chain technology in the e-commerce platform of decentralization
CN106980980A (en) * 2017-03-29 2017-07-25 宁夏宁信信息科技有限公司 Method of commerce and system based on block chain technology in e-commerce platform
CN106991569A (en) * 2017-03-29 2017-07-28 宁夏灵智科技有限公司 Big data is calculated in e-commerce platform method of commerce and system
CN106991569B (en) * 2017-03-29 2018-07-31 宁夏灵智科技有限公司 The method of commerce and system that big data calculates in e-commerce platform
CN107016543A (en) * 2017-03-29 2017-08-04 宁夏煜隆科技有限公司 The method of commerce and system of model adaptation in e-commerce platform
CN110546604A (en) * 2017-04-10 2019-12-06 区块链控股有限公司 Secure blockchain transactions based on undetermined data
CN107172016A (en) * 2017-04-25 2017-09-15 中国联合网络通信集团有限公司 Safe trust processing method and device
CN107172016B (en) * 2017-04-25 2021-05-18 中国联合网络通信集团有限公司 Security trust processing method and device
CN107301546B (en) * 2017-05-03 2020-10-16 北京众享比特科技有限公司 Random number generation and application method and device
CN107301546A (en) * 2017-05-03 2017-10-27 北京众享比特科技有限公司 Generating random number and methods for using them and device
CN107147652B (en) * 2017-05-18 2019-08-09 电子科技大学 A secure fusion authentication method for user multi-modal identity based on blockchain
CN107147652A (en) * 2017-05-18 2017-09-08 电子科技大学 A secure fusion authentication method for user multi-modal identity based on blockchain
CN110709871A (en) * 2017-05-22 2020-01-17 区块链控股有限公司 Parameterizable intelligent contracts
CN107104977A (en) * 2017-05-23 2017-08-29 北京天德科技有限公司 A kind of block chain data safe transmission method based on Stream Control Transmission Protocol
CN107104977B (en) * 2017-05-23 2020-07-31 北京天德科技有限公司 Block chain data secure transmission method based on SCTP
CN108064440A (en) * 2017-05-25 2018-05-22 深圳前海达闼云端智能科技有限公司 FIDO authentication method, device and system based on block chain
CN107423978A (en) * 2017-06-16 2017-12-01 郑州大学 A kind of distributed energy business confirmation method based on alliance's block chain
CN110892674A (en) * 2017-06-22 2020-03-17 Plc集团公司 The transaction generation method of the blockchain and the block verification method of the blockchain
CN107241196A (en) * 2017-06-30 2017-10-10 杰创智能科技股份有限公司 Digital signature method and system based on block chain technology
CN107506661B (en) * 2017-08-15 2020-04-24 河南真二互联网科技有限公司 Method for generating house historical record based on block chain
CN107506661A (en) * 2017-08-15 2017-12-22 河南真二互联网科技有限公司 A kind of method of the generation house historical record based on block chain
CN111201754B (en) * 2017-08-18 2023-08-29 西门子股份公司 Device for providing cryptographically protected and filtered and ordered collection of transaction data sets for links of a blockchain
CN111201754A (en) * 2017-08-18 2020-05-26 西门子股份公司 Apparatus for providing a collection of cryptographically protected and filtered and sorted transaction data sets of links of a blockchain
CN107480559A (en) * 2017-08-25 2017-12-15 北京中星仝创科技有限公司 Safe storage system and method for a kind of block chain from chain data
CN107480559B (en) * 2017-08-25 2019-08-20 北京中星仝创科技有限公司 A kind of safe storage system and method for the block chain from chain data
CN107656812A (en) * 2017-09-27 2018-02-02 咪咕文化科技有限公司 block chain processing method, system, node device, terminal and storage medium
CN107528688A (en) * 2017-09-30 2017-12-29 矩阵元技术(深圳)有限公司 A kind of keeping of block chain key and restoration methods, device based on encryption commission technology
CN107749848A (en) * 2017-10-23 2018-03-02 中国联合网络通信集团有限公司 Processing method, device and the Internet of things system of Internet of Things data
CN107749848B (en) * 2017-10-23 2020-04-07 中国联合网络通信集团有限公司 Internet of things data processing method and device and Internet of things system
CN107994991A (en) * 2017-10-31 2018-05-04 深圳市轱辘车联数据技术有限公司 A kind of data processing method, data processing server and storage medium
CN107682364B (en) * 2017-11-03 2019-12-03 杭州秘猿科技有限公司 A kind of license chain privacy method of commerce
CN107682364A (en) * 2017-11-03 2018-02-09 杭州秘猿科技有限公司 One kind license chain privacy method of commerce
CN107993359A (en) * 2017-11-23 2018-05-04 浙江大学 A kind of end-to-end bicycle shared system and method based on block chain
CN107888384A (en) * 2017-11-30 2018-04-06 中链科技有限公司 A kind of identity data management method, system and computer-readable recording medium
CN111433803A (en) * 2017-12-01 2020-07-17 快特网络有限公司 Block chain communication and ordering
CN108270571A (en) * 2017-12-08 2018-07-10 西安电子科技大学 Internet of Things identity authorization system and its method based on block chain
CN108270571B (en) * 2017-12-08 2019-10-11 西安电子科技大学 Blockchain-based Internet of Things identity authentication system and its method
CN111566992A (en) * 2017-12-15 2020-08-21 区块链控股有限公司 Initiation of security-enhanced blockchain transactions
CN111566992B (en) * 2017-12-15 2024-04-16 区块链控股有限公司 Initiation of a security enhanced blockchain transaction
CN111771194B (en) * 2017-12-18 2023-07-28 北方信托公司 System and method for generating and maintaining a non-variable digital conference record within a distributed network node
CN111771194A (en) * 2017-12-18 2020-10-13 北方信托公司 System and method for generating and maintaining immutable digital conference records within distributed network nodes
CN108334553B (en) * 2017-12-29 2020-07-10 北京欧链科技有限公司 Data screening method and device based on block chain
CN108334553A (en) * 2017-12-29 2018-07-27 北京欧链科技有限公司 Data screening method and apparatus based on block chain
CN108320228A (en) * 2018-03-07 2018-07-24 物数(上海)信息科技有限公司 Transregional piece of chain transaction in assets method, platform, equipment and storage medium
CN108596608A (en) * 2018-04-28 2018-09-28 比飞力(深圳)科技有限公司 A kind of method and device of digital wallet transaction
CN108737108A (en) * 2018-05-09 2018-11-02 合肥达朴汇联科技有限公司 A kind of computer-readable medium including block chain node
CN112119611A (en) * 2018-05-14 2020-12-22 区块链控股有限公司 Computer-implemented system and method for performing atomic swaps using blockchain
CN108712429A (en) * 2018-05-24 2018-10-26 西安电子科技大学 The method for secret protection of data is calculated based on block chain cloud outsourcing
CN108737430B (en) * 2018-05-25 2020-07-17 全链通有限公司 Encryption communication method and system for block chain node
CN108737430A (en) * 2018-05-25 2018-11-02 全链通有限公司 The encryption communication method and system of block chain node
CN108876332B (en) * 2018-06-04 2020-09-22 清华大学 Block chain safe transaction method and device based on biometric feature mark authentication
WO2019232880A1 (en) * 2018-06-04 2019-12-12 清华大学 Biomarker authentication-based block chain secure transaction method and apparatus
CN108876332A (en) * 2018-06-04 2018-11-23 清华大学 A kind of block chain method for secure transactions and device based on biological characteristic label certification
CN108737114A (en) * 2018-06-19 2018-11-02 天津中兴云链技术有限公司 A kind of endorsement method and device of the block catenary system based on quantum key distribution
CN108846108A (en) * 2018-06-22 2018-11-20 苏州得尔达国际物流有限公司 Shipping unmanned aerial vehicle group paths planning method based on block chain
CN108847046A (en) * 2018-07-03 2018-11-20 中钞信用卡产业发展有限公司杭州区块链技术研究院 Parking management method, equipment and medium based on block chain technology
CN109039645A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A kind of system and method signed using digital signature to block chain affairs
CN108833438B (en) * 2018-07-18 2020-04-14 电子科技大学 A method for secure storage of industrial Internet of Things information based on blockchain
CN108833438A (en) * 2018-07-18 2018-11-16 电子科技大学 A blockchain-based method for secure storage of industrial Internet of Things information
CN109166021A (en) * 2018-07-26 2019-01-08 阿里巴巴集团控股有限公司 Bookkeeping methods, device and business finance integral system
CN109118655A (en) * 2018-07-31 2019-01-01 温州市图盛科技有限公司 A kind of electrical energy measurement and transaction terminal of block chain technology
CN109067741A (en) * 2018-08-01 2018-12-21 佛山市苔藓云链科技有限公司 A kind of server of reception and storage terminal block chain data
CN109150542A (en) * 2018-08-15 2019-01-04 杭州链汇通区块链科技有限公司 Hardware signature method, hardware stamped signature verification method, sealing system and storage medium
CN109213914A (en) * 2018-08-28 2019-01-15 蔡捷 The network search engines based on block chain technology are logged in using living body biological identity
CN109067529A (en) * 2018-09-09 2018-12-21 成都量安区块链科技有限公司 A kind of production method of block chain private key for user
CN109257179A (en) * 2018-10-09 2019-01-22 北京网录科技有限公司 A kind of signature generating method and the block chain account management method using this method
CN109040139A (en) * 2018-10-12 2018-12-18 重庆邮电大学 A kind of identity authorization system and method based on block chain and intelligent contract
CN109040139B (en) * 2018-10-12 2021-05-18 重庆邮电大学 Identity authentication system and method based on block chain and intelligent contract
CN109347868B (en) * 2018-11-27 2021-06-08 咪咕文化科技有限公司 Information verification method, device and storage medium
CN109347868A (en) * 2018-11-27 2019-02-15 咪咕文化科技有限公司 Information verification method, device and storage medium
CN109862006A (en) * 2019-01-29 2019-06-07 济南浪潮高新科技投资发展有限公司 A kind of block catenary system cut-in method, apparatus and system
CN110086780A (en) * 2019-03-26 2019-08-02 北京百度网讯科技有限公司 The processing method for being tampered transaction, device and storage medium based on ether mill
CN110086780B (en) * 2019-03-26 2021-11-02 北京百度网讯科技有限公司 Method, device and storage medium for processing tampered transactions based on Ethereum
CN113841359A (en) * 2019-04-12 2021-12-24 区块链控股有限公司 Method and apparatus for disseminating blocks in a blockchain network
CN112532394A (en) * 2020-11-26 2021-03-19 中国电子科技集团公司第五十四研究所 Block chain anti-signature traceable certificateless blind signature generation method
CN112532394B (en) * 2020-11-26 2022-05-06 中国电子科技集团公司第五十四研究所 A certificate-free blind signature generation method with anti-signature traceability in blockchain
CN113610526A (en) * 2021-08-24 2021-11-05 上海点融信息科技有限责任公司 Data trust method and device, electronic equipment and storage medium
CN113886778A (en) * 2021-09-24 2022-01-04 杭州电子科技大学 Dynamic self-ownership identity generation method capable of monitoring
CN116471030A (en) * 2022-09-19 2023-07-21 湖南湘科智慧科技有限公司 A smart cabinet linkage control system for property involved in the case

Also Published As

Publication number Publication date
CN106100847B (en) 2021-10-26

Similar Documents

Publication Publication Date Title
CN106100847A (en) Asymmetric encryption block chain identity information verification method and device
CN102099810B (en) Mobile device assisted secure computer network communications
TWI396428B (en) Network reputation system and its controlling method
ES2553222T3 (en) Enhanced 2CHK authentication security with query transactions
CN101969446B (en) Mobile commerce identity authentication method
CN109327313A (en) A two-way identity authentication method and server with privacy protection feature
CN105975846B (en) The authentication method and system of terminal
WO2015135063A1 (en) System and method for secure deposit and recovery of secret data
CN104243494B (en) A kind of data processing method
CN105141425A (en) Bidirectional authentication method capable of protecting identity based on chaotic mapping
Xie et al. A secure and privacy‐preserving three‐factor anonymous authentication scheme for wireless sensor networks in internet of things
CN108768613A (en) A kind of ciphertext password method of calibration based on multiple encryption algorithms
CN110378152A (en) A contract signing management system and method based on PKICA authentication and blockchain technology
CN108400962A (en) A kind of Authentication and Key Agreement method under multiserver framework
Kumar An Enhanced Remote User Authentication Scheme with Smart Card.
Li et al. A lightweight and secure three-factor access authentication scheme in metaverse
Xie et al. A multi server authentication protocol with integrated monitoring for iomt based healthcare system
CN110289961A (en) Telemedicine Certification Methods
Sharma et al. Defense and Isolation in the Internet of Things
CN102014136B (en) Peer to peer (P2P) network secure communication method based on random handshake
CN116112234A (en) Method, system, medium and equipment for security verification of electronic receipt
CN104702559A (en) Improved ECC-based double-factor identity authentication protocol
CN105760768A (en) Data security storage method
Lu Secure web applications against off-line password guessing attack: a two way password protocol with challenge response using arbitrary images
CN106027255B (en) A kind of identity card card reading response method of controlling security and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20211026

CF01 Termination of patent right due to non-payment of annual fee
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载