+

CN116032939A - Information processing method and information verification method and device based on block chain - Google Patents

Information processing method and information verification method and device based on block chain Download PDF

Info

Publication number
CN116032939A
CN116032939A CN202111243141.2A CN202111243141A CN116032939A CN 116032939 A CN116032939 A CN 116032939A CN 202111243141 A CN202111243141 A CN 202111243141A CN 116032939 A CN116032939 A CN 116032939A
Authority
CN
China
Prior art keywords
verification
address
chain
verified
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111243141.2A
Other languages
Chinese (zh)
Inventor
张磊
孙英男
宋婉琳
王炜煜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Bilibili Technology Co Ltd
Original Assignee
Shanghai Bilibili Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Bilibili Technology Co Ltd filed Critical Shanghai Bilibili Technology Co Ltd
Priority to CN202111243141.2A priority Critical patent/CN116032939A/en
Publication of CN116032939A publication Critical patent/CN116032939A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application provides a blockchain-based information processing method and an information verification method and device, wherein the blockchain-based information processing method is applied to a blockchain supervision node and comprises the following steps: receiving information to be verified sent by a client of a block chain, and verifying the information to be verified to obtain a verification result; acquiring an on-chain address of a login client and client information; if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result into the blockchain. The scheme can reduce the implementation difficulty of the block chain information processing and verification.

Description

Information processing method and information verification method and device based on block chain
Technical Field
The application relates to the technical field of blockchains, in particular to an information processing method based on a blockchain. The present application also relates to a blockchain-based information processing apparatus, a blockchain-based information verification method, a blockchain-based information verification apparatus, a computing device, and a computer-readable storage medium.
Background
A blockchain is a network of distributed databases and multiple nodes. The data stored in the blockchain can only be added in blocks by the consensus algorithm, and cannot be modified and deleted. Therefore, blockchains are widely used in scenarios where there is a need for data reliability.
In the related art, in order to reduce the offending task in the blockchain, information verification may be performed on information of a gateway node of the blockchain in advance, for example, real-name verification is performed, and a result of the information verification is stored. In this way, in the case that the user initiates a task request to the blockchain through the gateway node, the information of the gateway node can be verified by using the result of the information verification. If the verification is not passed, the gateway node is likely to be illegally set. Accordingly, the task request initiated by the gateway node is likely to be for an offending task, and the blockchain may refuse to respond to the task request. Thus, verification of information to the gateway node may reduce the handling of violations by the blockchain.
However, in the above information authentication, the gateway node is a node providing a network access service. Therefore, in order to secure security, it is necessary to set and maintain network access services specifically for blockchain or periodically perform maintenance on information verification for a node providing network access services to a third party. Thus, the information verification of the blockchain has the problem of high implementation difficulty.
Disclosure of Invention
In view of this, the embodiments of the present application provide a blockchain-based information processing method. The application also relates to an information processing device based on the blockchain, an information verification method based on the blockchain, an information verification device based on the blockchain, a computing device and a computer readable storage medium, so as to solve the problem that the difficulty in realizing the blockchain information verification in the prior art is high.
According to a first aspect of an embodiment of the present application, there is provided a blockchain-based information processing method applied to a blockchain supervision node, including:
receiving information to be verified sent by a client, and verifying the information to be verified to obtain a verification result;
obtaining an address on a chain of the client and client information;
and if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result into the blockchain.
According to a second aspect of embodiments of the present application, there is provided a blockchain-based information verification method applied to a blockchain verification node, including:
receiving a verification request sent by a client, and analyzing the verification request to obtain an address on a chain to be verified;
searching a binding result binding the address on the chain to be verified from binding results stored in the blockchain according to the address on the chain to be verified, wherein the binding result is generated after the address on the chain and the client information are bound based on the verification result of the client;
if the binding result of the address on the chain to be verified is found, the verification is determined to be successful.
According to a third aspect of embodiments of the present application, there is provided an information processing apparatus based on a blockchain, applied to a supervision node of the blockchain, including:
the verification module is configured to receive information to be verified sent by the client, verify the information to be verified and obtain a verification result;
the acquisition module is configured to acquire an on-chain address and client information of the login client;
and the binding module is configured to bind the address on the chain and the client information if the verification is determined to be successful according to the verification result, and store the binding result to the blockchain.
According to a fourth aspect of embodiments of the present application, there is provided a blockchain-based information verification device, applied to a blockchain verification node, including:
the analysis module is configured to receive a verification request sent by a client, analyze the verification request and obtain an address on a chain to be verified;
the searching module is configured to search a binding result binding the address on the chain to be verified from binding results stored in the blockchain according to the address on the chain to be verified, wherein the binding result is generated after the address on the chain and the client information are bound based on the verification result of the client;
And the verification module is configured to determine whether verification is successful if a binding result of the address on the chain to be verified is found.
According to a fifth aspect of embodiments of the present application, there is provided a blockchain system including: the system comprises a client, a supervision node and a verification node;
the client is configured to send information to be verified to the supervision node;
the supervision node is configured to receive the information to be verified, verify the information to be verified and obtain a verification result; obtaining an address on a chain of the client and client information; if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result to the blockchain;
the client is further configured to send a verification request to the verification node;
the verification node is configured to receive the verification request, analyze the verification request and obtain an address on a chain to be verified; and searching the binding result binding the address on the chain to be verified from the binding results stored in the blockchain according to the address on the chain to be verified, and if the binding result binding the address on the chain to be verified is found, determining whether verification is successful.
According to a sixth aspect of embodiments of the present application, there is provided a computing device comprising a memory, a processor and computer instructions stored on the memory and executable on the processor, the processor implementing the steps of the blockchain-based information processing method or blockchain-based information verification method when executing the instructions.
According to a seventh aspect of embodiments of the present application, there is provided a computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the blockchain-based information processing method or blockchain-based information verification method.
According to the scheme provided by the embodiment of the application, the information to be verified is verified by receiving the information to be verified sent by the client of the blockchain, so that a verification result is obtained; acquiring an on-chain address of a login client and client information; if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result into the blockchain. Thus, in the case where the client initiates a validation request to the blockchain, the blockchain may utilize the binding result to validate the on-chain address contained in the validation request. Therefore, the information verification of the blockchain can be directly realized from the verification dimension of the address on the chain without special setting and maintenance of network access service, so that the realization difficulty of the information processing and verification of the blockchain is reduced.
Drawings
FIG. 1 is a flow chart of a blockchain-based information processing method provided in an embodiment of the present application;
FIG. 2 is a flow chart of a blockchain-based information processing method provided in another embodiment of the present application;
FIG. 3 is a flow chart of a blockchain-based information verification method provided in an embodiment of the present application;
FIG. 4 is a flow chart of an information processing and verification method for a blockchain in accordance with an embodiment of the present application;
FIG. 5 is a flow chart of a blockchain-based information verification method provided in another embodiment of the present application;
FIG. 6 is a schematic diagram of a block chain based information processing apparatus according to an embodiment of the present application;
FIG. 7 is a schematic block chain-based information verification device according to an embodiment of the present application;
FIG. 8 is a block chain system architecture diagram according to one embodiment of the present application;
fig. 9 is a block diagram of a computing device according to an embodiment of the present application.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is, however, susceptible of embodiment in many other ways than those herein described and similar generalizations can be made by those skilled in the art without departing from the spirit of the application and the application is therefore not limited to the specific embodiments disclosed below.
The terminology used in one or more embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of one or more embodiments of the application. As used in this application in one or more embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present application refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that, although the terms first, second, etc. may be used in one or more embodiments of the present application to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, a first may also be referred to as a second, and similarly, a second may also be referred to as a first, without departing from the scope of one or more embodiments of the present application. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
In the present application, a blockchain-based information processing method is provided, and the present application relates to a blockchain-based information processing apparatus, a computing device, and a computer-readable storage medium, which are described in detail in the following embodiments one by one.
Fig. 1 is a flowchart of a blockchain-based information processing method, which is applied to a blockchain supervision node according to an embodiment of the present application, and specifically may include the following steps:
s102, receiving information to be verified sent by the client, and verifying the information to be verified to obtain a verification result.
In a specific application, the authentication may be a real-name authentication, such as KYC (Know your Customer, knowledge of your user, a mechanism that requires full real-name for the user being served). And, the client may actively transmit the information to be verified under the condition of receiving the information to be verified submitted by the user, or the client may transmit the information to be verified under the condition of receiving the verification notification or the verification failure notification transmitted by the supervision node. The timing of sending the verification notification may be various. For example, verification notifications may be actively sent by a supervising node of the blockchain to clients of the blockchain. Alternatively, illustratively, the supervising node of the blockchain may send verification notifications to each client of the blockchain upon receiving address generation requests sent by the clients. On the basis, the client side displays the received verification notification, and the user submits the information to be verified in the client side according to the displayed verification notification, so that the client side sends the information to be verified submitted by the user to the supervision node of the blockchain.
The information to be verified is information for indicating the authenticity of the user identity, and specifically may include at least one of information such as a user identity card number, a user video, a user image and the like. The specific mode of verifying the information to be verified by the supervision node of the blockchain can be various exemplary, and the supervision node of the blockchain can input the information to be verified into a recognition model obtained by pre-training to obtain a verification result. The identification model is a neural network model trained by using identity information in an identity information base and verification result labels. Alternatively, the supervision node may send the information to be verified to the specified verification platform and receive the verification result returned by the specified verification platform. The appointed verification platform can be a platform which can be used for user real-name verification by a security management department, a financial supervision department and the like.
S104, obtaining the on-chain address of the login client and the client information.
In particular applications, the manner in which the on-chain address of the login client is obtained may be varied. For example, if the on-chain address of the login client is sent together with the information to be verified, the on-chain address is received. Alternatively, for example, if login information of the client is received, the on-chain address of the login client may be read from the login information, to obtain the on-chain address of the login client. Alternatively, if the client requests generation of an on-chain address, the generated on-chain address may be used as the on-chain address of the login client. And, the client information may include information such as a client identifier, client device information, and a summary of the information to be verified.
And S106, if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result into the blockchain.
In particular applications, storing binding results to the blockchain may be various. For example, the binding result may be stored directly to the blockchain, or a validity period may be added to the binding result, and the binding result added with the validity period may be stored to the blockchain. The validity period is the validity period of the binding result. The second case will be described in detail in the form of alternative embodiments for ease of understanding and rational layout. In addition, in order to improve security, any data stored in the blockchain may be first encrypted and then stored.
And, the blockchain may be any of a public chain, a federated chain, and a private chain. Wherein, the public chain has no admission rule in general, any user can process tasks by using the public chain, and the execution of illegal tasks by the public chain, such as tasks for propagating illegal information, is easy to cause. In this regard, the scheme provided by the embodiment of the application can verify the user using the public chain through the binding result, so that the security of the public chain is improved, and the execution of the public chain on the illegal task is reduced. The authority verification of the alliance chain and the private chain is to verify the gateway node of the blockchain, and the problem of high difficulty in information verification realization exists. In this regard, the scheme provided by the embodiment of the application can directly realize the information verification of the blockchain from the verification dimension of the address on the chain without specially setting and maintaining the network access service, thereby reducing the difficulty in realizing the information processing and verification of the blockchain. Therefore, the embodiment of the application has wide application scenes.
According to the scheme provided by the embodiment of the application, the information to be verified is verified by receiving the information to be verified sent by the client of the blockchain, so that a verification result is obtained; acquiring an on-chain address of a login client and client information; if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result into the blockchain. Thus, in the case where the client initiates a validation request to the blockchain, the blockchain may utilize the binding result to validate the on-chain address contained in the validation request. Therefore, the information verification of the blockchain can be directly realized from the verification dimension of the address on the chain without special setting and maintenance of network access service, so that the realization difficulty of the information processing and verification of the blockchain is reduced.
In an optional implementation manner, the blockchain-based information processing method provided in the embodiment of the present application may further include the following steps:
if the verification failure is determined according to the verification result, sending a notification of the verification failure to the client.
In a specific application, the notification of the authentication failure may include information indicating the authentication failure, a cause of the authentication failure, and the like. After receiving the notification of the verification failure, the client can display the notification of the verification failure, and the user can submit the information to be verified again according to the notification of the verification failure. The embodiment can facilitate the user to know whether the verification is successful or not in time, thereby improving the user experience.
In an alternative embodiment, the binding the address and the client information on the chain and storing the binding result in the blockchain may specifically include the following steps:
binding the address on the chain and the client information to obtain a binding result, and determining a binding timestamp;
determining the validity period of a binding result based on the binding timestamp and a preset validity period;
and adding the validity period into the binding result, and storing the binding result added with the validity period into the blockchain.
Binding on-chain addresses and client information may be particularly diverse in particular applications. For example, a correspondence between the addresses on the chain and the client information may be established, where the correspondence is a binding result. The correspondence may specifically be in the form of a correspondence table or pointer. Alternatively, for example, client information may be added to the on-chain address to obtain a binding result. Any manner of binding the on-chain address and client information may be used in the present application, and the present embodiment is not limited in this regard. In addition, storing the binding result added with the validity period to the blockchain specifically may include: and processing the binding result added with the validity period into a block, transmitting the block to a verification node of the block chain, and broadcasting the block in the block chain if the verification node of the block chain determines that the block accords with a preset block format. On this basis, if each node in the blockchain receives the block and the node does not store the block, the node stores the block and records the event about storing the block into the blockchain ledger.
And, the binding timestamp refers to a point of time when the binding result is obtained. The specific manner of determining the validity period of the binding result based on the binding timestamp and the preset validity period may be various. For example, the binding timestamp and the preset validity period may be directly used as the validity period of the binding result. Alternatively, as an example, a point in time at which a time span after and between the binding timestamp and the binding timestamp is a preset validity period may be determined as the validity period of the binding result. For example, if the binding timestamp is 2021, 9, 14, 12:00 and the preset validity period is 30 days, the validity period of the binding result is 2021, 10, 14, 12:00.
The embodiment can ensure that the binding result has timeliness, so that in the process of verifying the information based on the blockchain, the addresses on the chain exceeding the validity period can be automatically classified as invalid addresses, and the verification result corresponding to the verification request of the invalid addresses is verification failure; and if the task request is initiated by the invalid address, the task corresponding to the task request is forbidden to be executed, so that the safety is further improved.
In an optional implementation manner, the blockchain-based information processing method provided in the embodiment of the present application may further include the following steps:
Receiving an address generation request sent by a client;
sending a verification notification to the client, wherein the verification notification is used for notifying the client to send information to be verified according to the verification notification;
determining whether the information to be verified is verified;
if yes, the response address generation request is forbidden.
In a specific application, in order to reduce the situations that the task request sent by the user is prohibited from being executed and reduce the situations that verification notifications are sent to a large number of clients that have already been verified, the verification notifications may be sent to the clients when an address generation request sent by the client, that is, when the user applies for an address on the chain, is received. On the basis, in order to reduce the situation that the illegal user falsely uses the verification information to further improve the safety, a principle that the verified user only has one on-chain address can be adopted, namely the information to be verified corresponds to the on-chain address one by one, and further the information processing is carried out according to the principle that the on-chain address corresponds to the binding result one by one. Specifically, it may be determined whether the information to be verified has been verified; if yes, the response address generation request is forbidden.
In addition, the principle of one-to-one correspondence between the information to be verified and the addresses on the chain can be applied to the embodiment of fig. 1 of the present application, that is, before the information to be verified is verified in the embodiment of fig. 1, it can be determined whether the information to be verified has been verified; if yes, sending a notice of verification failure to the client, and if not, executing a step of verifying the information to be verified.
In an optional implementation manner, the blockchain-based information processing method provided in the embodiment of the present application may further include the following steps:
generating a private key corresponding to the address generation request by using a specified random algorithm;
correspondingly, the obtaining the address on the link of the login client may specifically include the following steps:
generating a public key corresponding to the address generation request by using a first encryption algorithm based on the private key;
based on the public key, an on-chain address of the login client is generated using a second encryption algorithm.
In a specific application, the specified random algorithm, the first encryption algorithm and the second encryption algorithm are all irreversible algorithms, namely asymmetric encryption algorithms, namely inputs of the algorithms cannot be deduced through outputs of the algorithms, and safety of a private key, a public key and addresses on a chain can be guaranteed. In addition, if the information to be verified is determined not to be verified, the information to be verified is not verified, and the principle that the information to be verified corresponds to the addresses on the chain one by one is met. Thus, the steps of this embodiment may be performed to generate a corresponding on-chain address for the generation request, which is sent to the client, and the user logs in to the client using the on-chain address. Thus, the generated is the on-chain address of the login client.
The method and the device generate the on-chain address of the login client for the user conforming to the principle that the information to be verified corresponds to the on-chain address one by one, so that the condition that the illegal user imports the verification information can be reduced, and the safety is further improved.
For easy understanding, the embodiment of fig. 1 and some optional embodiments are described in detail below with reference to a flow of a blockchain-based information processing method according to another embodiment of the present application shown in fig. 2.
As shown in fig. 2, an information processing method based on a blockchain, which is applied to a supervision node of the blockchain, may include the following steps:
starting; initiating real-name verification of addresses on a chain, and receiving information to be verified submitted by a user;
verifying whether the information to be verified meets real-name verification requirements or not; if yes, binding the address, the client information and the validity period of verification on the chain; if not, the verification fails.
The steps in this embodiment are similar to the steps in the embodiment of fig. 1 and the optional embodiments of part of fig. 1, and the same parts are not described herein again, and detailed descriptions of the embodiment of fig. 1 and the optional embodiments of part are described above. The difference is that the expression is different for the sake of brevity, in particular: starting, which is equivalent to client start-up operation or blockchain start-up operation; initiating real-name verification of the address on the chain, which is equivalent to sending verification notification to the client; receiving information to be verified submitted by a user, which is equivalent to receiving the information to be verified sent by a client; verifying whether the information to be verified meets the real-name verification requirement is equivalent to verifying the information to be verified to obtain a verification result; binding the address on the chain, the client information and the verified validity period, which is equivalent to binding the address on the chain and the client information to obtain a binding result, determining a binding timestamp, determining the validity period of the binding result based on the binding timestamp and a preset validity period, adding the validity period into the binding result, and storing the binding result added with the validity period into the blockchain; the verification failure is equivalent to sending a notification of the verification failure to the client.
Fig. 3 is a flowchart of a block chain based information verification method, applied to a block chain verification node, according to an embodiment of the present application, where the method may include the following steps:
s302, receiving a verification request sent by a client, and analyzing the verification request to obtain the address on the chain to be verified.
In a particular application, the validation request may be a request to validate an address on a chain, a task request, and so on. Accordingly, the manner in which the authentication request is parsed to obtain the on-chain address to be authenticated may be varied. For example, if the verification request is a request for verifying an address on a chain, a preset regularization algorithm may be used to extract a keyword in the verification request, where the extracted keyword is the address on the chain to be verified; or matching the verification request with a preset dictionary, wherein the character which is successfully matched is the address on the chain to be verified; or extracting the character at the appointed position of the verification request to obtain the on-chain address to be verified. Alternatively, if the validation request is a task request, and the task request is typically signed by the user's private key, for example. Therefore, the private key in the task request can be read, the private key is processed by the first encryption algorithm, the public key can be obtained, and then the public key is processed by the second encryption algorithm, so that the on-chain address to be processed is obtained.
In addition, the on-chain address to be verified may include the on-chain address of the login client, and the on-chain address of another user interacting with the user using the client.
S304, searching a binding result binding the address on the chain to be verified from binding results stored in the blockchain according to the address on the chain to be verified.
The binding result is generated after binding the address on the chain and the client information based on the verification result of the client.
In a specific application, the step of binding the address on the chain with the client information to generate the address on the chain may specifically include any one of the steps of the blockchain-based information processing method provided in the embodiment of fig. 1 and the optional embodiment of fig. 1. Searching the binding result bound with the address on the chain from the binding results stored in the blockchain according to the address on the chain specifically comprises the following steps: comparing the binding result of the block chain account book record stored by the verification node with the address on the chain to be verified, and if the address on the chain corresponding to the binding result is the same as the address on the chain to be verified, determining to find the binding result of the address on the chain to be verified; if the on-chain address corresponding to the binding result is different from the on-chain address to be verified, determining that the binding result of the on-chain address to be verified is not found.
In addition, the binding result contains client information, so that the client information of the client sending the verification request can be obtained, the candidate binding result bound with the client information is searched from the binding results stored in the blockchain, and further the binding result bound with the address on the chain is searched in the candidate binding result. Therefore, the binding is screened once by using the client information, and the searching efficiency can be improved.
S306, if the binding result of the address on the chain to be verified is found, the verification is determined to be successful.
If the binding result of the to-be-verified on-chain address is found, it indicates that the to-be-verified on-chain address is the on-chain address that is verified and verified successfully in the embodiment of fig. 1 and the alternative embodiment of fig. 1, so that the on-chain address to be verified corresponding to the verification request can be determined to be verified successfully. If the search result is not found, determining that verification fails. In addition, after determining that the authentication is successful, the authentication node may send a notification of the authentication success to the client; in the case that the authentication request is a task request, after determining that the authentication is successful, the authentication node may execute a task corresponding to the task request.
According to the scheme provided by the embodiment of the application, the information to be verified is verified by receiving the information to be verified sent by the client of the blockchain, so that a verification result is obtained; acquiring an on-chain address of a login client and client information; if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result into the blockchain. Thus, in the case where the client initiates a validation request to the blockchain, the blockchain may utilize the binding result to validate the on-chain address contained in the validation request. Therefore, the information verification of the blockchain can be directly realized from the verification dimension of the address on the chain without special setting and maintenance of network access service, so that the realization difficulty of the information processing and verification of the blockchain is reduced.
For easy understanding, the method provided in the embodiment of the present application will be further described below by taking a flowchart of the method for processing and verifying information applied to a blockchain as an example, which is provided in an embodiment of the present application as shown in fig. 4.
As shown in fig. 4, an embodiment of the present application provides a flow of an information processing and verification method applied to a blockchain, where the blockchain includes a client, a supervision node, and a verification node, and the method may include:
S402, the client sends information to be verified to the supervision node.
S404, the supervision node verifies the received information to be verified to obtain a verification result.
S406, the supervision node obtains the in-chain address of the login client and the client information.
S408, the supervision node binds the address on the chain and the client information under the condition that the verification is successful according to the verification result, and stores the binding result into the blockchain.
S410, the client sends a verification request to the verification node.
S412, the verification node analyzes the received verification request to obtain the on-chain address to be verified.
S414, the verification node searches the binding result of the address on the chain to be verified from the binding results stored in the blockchain according to the address on the chain to be verified.
S416, if the verification node finds out the binding result of the address on the chain to be verified, the verification node determines that the verification is successful.
The steps S402 to S416 in this embodiment are the same as those described in the foregoing embodiment of fig. 1, the optional embodiment of fig. 1, the embodiment of fig. 2, and the optional embodiment of fig. 2, and are not described herein again, and detailed descriptions of the same steps in the foregoing embodiment of fig. 1, the optional embodiment of fig. 2, and the optional embodiment of fig. 2 are described in detail.
In an alternative embodiment, the binding result includes a validity period;
correspondingly, if the binding result of the address on the chain to be verified is found, the verification is determined to be successful, which specifically includes the following steps:
if the binding result of the address on the chain to be verified is found, reading the validity period from the found binding result;
determining whether the address on the chain to be verified is in the validity period or not based on the validity period and the current time point;
if so, the verification is determined to be successful.
The embodiment can automatically classify the addresses on the chain exceeding the validity period as invalid addresses, and the verification result corresponding to the verification request of the invalid addresses is verification failure; and if the task request is initiated by the invalid address, the task corresponding to the task request is forbidden to be executed, so that the safety is further improved.
Also, the specific manner of determining whether the on-chain address to be verified is within the validity period based on the validity period and the current point in time may be various, and is specifically described below in the form of alternative embodiments.
In an alternative embodiment, the validity period includes: a point in time of failure;
correspondingly, the determining whether the address on the chain to be verified is in the validity period based on the validity period and the current time point specifically comprises the following steps:
Comparing the current time point with the failure time point, if the current time point exceeds the failure time point, determining that the address on the face to be verified is not in the valid period, otherwise, determining that the address on the face to be verified is in the valid period.
The expiration time point may specifically include a date and a time point. Illustratively, the failure time point is 2022, 3, 15, 22:00, and the current time point is 2022, 3, 15, 22:01, and the current time point exceeds the failure time point. In addition, the above time point may be accurate to seconds, and the accuracy of the time point is not limited in this embodiment.
In an alternative embodiment, the validity period may include: obtaining a time stamp and a preset effective duration of a binding result;
correspondingly, the determining whether the address on the chain to be verified is in the validity period based on the validity period and the current time point specifically comprises the following steps:
calculating a time span between the time stamp and the current time point;
and determining whether the address on the chain to be verified is in the validity period according to the size relation between the time span and the preset validity period.
If the time span is larger than the effective duration, determining that the address on the chain to be verified is not in the effective duration, otherwise, determining that the address on the chain to be verified is in the effective duration. Illustratively, the binding timestamp is 2021, 9, 14, 12:00, the preset effective duration is 30 days, and the current time point is 2021, 10, 16, 12:00. Thus, the time span between the time stamp and the current time point is 32 days, which is greater than the preset validity period by 30 days, and thus, it is determined that the on-chain address to be verified is not within the validity period. The embodiment can determine whether the on-chain address to be verified is in the validity period through the time span between the time stamp and the current time point.
In an optional implementation manner, the blockchain-based information verification method provided in the embodiment of the present application may further include the following steps:
if the binding result of the address on the chain to be verified is not found, sending a notification of verification failure to the client.
In a specific application, the notification of the authentication failure may include information indicating the authentication failure, a cause of the authentication failure, and the like. After receiving the notification of the verification failure, the client can display the notification of the verification failure, and the user can submit the information to be verified again according to the notification of the verification failure. The embodiment can facilitate the user to know whether the verification is successful or not in time, thereby improving the user experience.
For easy understanding, the block chain-based information verification method provided in the embodiment of the present application is further described by taking a flowchart of another block chain-based information verification method provided in another embodiment of the present application as an example, and integrating the above-mentioned embodiment of fig. 3 and some optional embodiments of fig. 3.
As shown in fig. 5, another embodiment of the present application provides a flow of a blockchain-based information verification method, applied to a blockchain verification node, the method may include the following steps:
A task starts; analyzing to obtain the addresses on the chains corresponding to the tasks;
whether the address on the chain corresponding to the block chain end verification task passes real name verification or not; if the real name authentication is passed, determining whether the timeliness of the real name authentication is qualified; if the task is qualified, the verification is successful, and the task is executed;
if the real name verification is not passed, returning information of verification failure; and if the timeliness is unqualified, returning information of verification failure.
The steps in this embodiment are similar to the steps in the embodiment of fig. 3 and the optional embodiment of fig. 3, and the same parts are not described herein again, and detailed descriptions of the embodiment of fig. 3 and the optional embodiment of fig. 3 are described above. The difference is that the expression is different for the sake of brevity, in particular: a task starts, which is equivalent to receiving a task request sent by a client; whether the chain address corresponding to the block chain end verification task passes real name verification or not is equivalent to searching a binding result binding the chain address to be verified from binding results stored in the block chain by a verification node according to the chain address to be verified; determining whether the timeliness of real-name authentication is qualified or not, which is equivalent to determining whether the address on the chain to be verified is in the validity period or not based on the validity period and the current time point; failing to pass the real name verification is equivalent to failing to find; returning information of verification failure, which is equivalent to sending notification of verification failure to the client; the timeliness is unqualified and is equivalent to not being in the effective period.
Corresponding to the above method embodiments, the present application further provides an embodiment of a blockchain-based information processing device, and fig. 6 shows a schematic structural diagram of a blockchain-based information processing device according to an embodiment of the present application. As shown in fig. 6, the apparatus is applied to a supervision node of a blockchain, and includes:
the verification module 602 is configured to receive information to be verified sent by the client, verify the information to be verified, and obtain a verification result;
an acquisition module 604 configured to acquire an on-chain address and client information for logging into the client;
and a binding module 606 configured to bind the address on the chain and the client information and store a binding result to the blockchain if the verification is determined to be successful according to the verification result.
According to the scheme provided by the embodiment of the application, the information to be verified is verified by receiving the information to be verified sent by the client of the blockchain, so that a verification result is obtained; acquiring an on-chain address of a login client and client information; if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result into the blockchain. Thus, in the case where the client initiates a validation request to the blockchain, the blockchain may utilize the binding result to validate the on-chain address contained in the validation request. Therefore, the information verification of the blockchain can be directly realized from the verification dimension of the address on the chain without special setting and maintenance of network access service, so that the realization difficulty of the information processing and verification of the blockchain is reduced.
In an alternative embodiment, binding module 606 is further configured to:
binding the address on the chain and the client information to obtain a binding result, and determining a binding timestamp;
determining the validity period of the binding result based on the binding timestamp and a preset validity period;
and adding the validity period to the binding result, and storing the binding result added with the validity period to the blockchain.
In an alternative embodiment, the verification module 602 is further configured to:
receiving an address generation request sent by the client; sending a verification notification to the client, wherein the verification notification is used for notifying the client to send information to be verified according to the verification notification;
determining whether the information to be verified is verified; if yes, the response to the address generation request is forbidden.
In an alternative embodiment, the verification module 602 is further configured to:
generating a private key corresponding to the address generation request by using a specified random algorithm;
accordingly, the obtaining module 604 is further configured to:
generating a public key corresponding to the address generation request by using a first encryption algorithm based on the private key;
And generating an on-chain address for logging in the client by using a second encryption algorithm based on the public key.
In an alternative embodiment, the verification module 602 is further configured to:
and if the verification failure is determined according to the verification result, sending a notification of the verification failure to the client.
The above is an exemplary scheme of a blockchain-based information verification device of the present embodiment. It should be noted that, the technical solution of the information verification device based on the blockchain and the technical solution of the information verification method based on the blockchain belong to the same conception, and details of the technical solution of the information verification device based on the blockchain, which are not described in detail, can be referred to the description of the technical solution of the information verification method based on the blockchain.
Corresponding to the above method embodiment, the present application further provides an embodiment of a blockchain-based information verification device, and fig. 7 shows a schematic structural diagram of the blockchain-based information verification device according to an embodiment of the present application. As shown in fig. 7, the apparatus is applied to a verification node of a blockchain, and includes:
the parsing module 702 is configured to receive a verification request sent by a client, parse the verification request, and obtain an address on a chain to be verified;
The searching module 704 is configured to search a binding result binding the address on the chain to be verified from binding results stored in the blockchain according to the address on the chain to be verified, wherein the binding result is generated after the address on the chain and the client information are bound based on the verification result of the client;
and the verification module 706 is configured to determine that the verification is successful if the binding result of the address on the chain to be verified is found.
According to the scheme provided by the embodiment of the application, the information to be verified is verified by receiving the information to be verified sent by the client of the blockchain, so that a verification result is obtained; acquiring an on-chain address of a login client and client information; if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result into the blockchain. Thus, in the case where the client initiates a validation request to the blockchain, the blockchain may utilize the binding result to validate the on-chain address contained in the validation request. Therefore, the information verification of the blockchain can be directly realized from the verification dimension of the address on the chain without special setting and maintenance of network access service, so that the realization difficulty of the information processing and verification of the blockchain is reduced.
In an alternative embodiment, the binding result includes an expiration date;
accordingly, the verification module 706 is further configured to:
if the binding result of the address on the chain to be verified is found, reading the validity period from the found binding result;
determining whether the on-chain address to be verified is within the validity period based on the validity period and the current time point;
if so, the verification is determined to be successful.
In an alternative embodiment, the validity period includes: obtaining a time stamp and preset effective duration of the binding result;
the verification module 706 is further configured to:
calculating a time span between the time stamp and the current point in time;
and determining whether the address on the chain to be verified is in the validity period according to the size relation between the time span and the preset validity period.
In an alternative embodiment, the lookup module 704 is further configured to:
and if the binding result of the address on the chain to be verified is not found, sending a notification of verification failure to the client.
The above is an exemplary scheme of a blockchain-based information verification device of the present embodiment. It should be noted that, the technical solution of the information verification device based on the blockchain and the technical solution of the information verification method based on the blockchain belong to the same conception, and details of the technical solution of the information verification device based on the blockchain, which are not described in detail, can be referred to the description of the technical solution of the information verification method based on the blockchain.
FIG. 8 illustrates a block diagram of a blockchain system provided in accordance with an embodiment of the present application. The blockchain system includes: a client 802, a supervisory node 804 and a verification node 806;
the client 802 is configured to send information to be verified to the supervisory node 804;
the supervision node 804 is configured to receive the information to be verified, verify the information to be verified, and obtain a verification result; obtaining an address on a chain of the client and client information; if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result to the blockchain;
the client 802 is further configured to send a verification request to the verification node 806;
the verification node 806 is configured to receive the verification request, parse the verification request, and obtain an address on the chain to be verified; and searching the binding result binding the address on the chain to be verified from the binding results stored in the blockchain according to the address on the chain to be verified, and if the binding result binding the address on the chain to be verified is found, determining that verification is successful.
According to the scheme provided by the embodiment of the application, the information to be verified is verified by receiving the information to be verified sent by the client of the blockchain, so that a verification result is obtained; acquiring an on-chain address of a login client and client information; if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result into the blockchain. Thus, in the case where the client initiates a validation request to the blockchain, the blockchain may utilize the binding result to validate the on-chain address contained in the validation request. Therefore, the information verification of the blockchain can be directly realized from the verification dimension of the address on the chain without special setting and maintenance of network access service, so that the realization difficulty of the information processing and verification of the blockchain is reduced.
Fig. 9 illustrates a block diagram of a computing device 900 provided in accordance with an embodiment of the present application. The components of computing device 900 include, but are not limited to, memory 920 and processor 940. Processor 940 is coupled to memory 920 via bus 960 and database 9010 is used to store data.
The computing device 900 also includes an access device 980, the access device 980 enabling the computing device 900 to communicate via one or more networks 9012. Examples of such networks include public switched telephone networks (PSTN, public Switched Telephone Network), local area networks (LAN, local Area Network), wide area networks (WAN, wide Area Network), personal area networks (PAN, personal Area Network), or combinations of communication networks such as the internet. The access device 980 may include one or more of any type of network interface, wired or wireless (e.g., network interface card (NIC, network Interface Controller)), such as an IEEE802.11 wireless local area network (WLAN, wireless Local Area Networks) wireless interface, a worldwide interoperability for microwave access (Wi-MAX, worldwide Interoperability for Microwave Access) interface, an ethernet interface, a universal serial bus (USB, universal Serial Bus) interface, a cellular network interface, a bluetooth interface, a near field communication (NFC, near Field Communication) interface, and so forth.
In one embodiment of the present application, the above-described components of computing device 900 and other components not shown in FIG. 9 may also be connected to each other, for example, by a bus. It should be understood that the block diagram of the computing device illustrated in FIG. 9 is for exemplary purposes only and is not intended to limit the scope of the present application. Those skilled in the art may add or replace other components as desired.
Computing device 900 may be any type of stationary or mobile computing device including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smart phone), wearable computing device (e.g., smart watch, smart glasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 900 may also be a mobile or stationary server.
Wherein the processor 940 implements the steps of the blockchain-based information processing method or the blockchain-based information verification method when executing the instructions.
The foregoing is a schematic illustration of a computing device of this embodiment. It should be noted that, the technical solution of the computing device and the technical solution of the above-mentioned blockchain-based information processing method or the blockchain-based information verification method belong to the same concept, and details of the technical solution of the computing device, which are not described in detail, can be referred to the description of the technical solution of the above-mentioned blockchain-based information processing method or the blockchain-based information verification method.
An embodiment of the present application also provides a computer-readable storage medium storing computer instructions that when executed by a processor implement the steps of a blockchain-based information processing method or a blockchain-based information verification method as described above.
The above is an exemplary version of a computer-readable storage medium of the present embodiment. It should be noted that, the technical solution of the storage medium and the technical solution of the above-mentioned blockchain-based information processing method or the blockchain-based information verification method belong to the same concept, and details of the technical solution of the storage medium which are not described in detail can be referred to the description of the technical solution of the above-mentioned blockchain-based information processing method or the blockchain-based information verification method.
The foregoing describes specific embodiments of the present application. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The computer instructions include computer program code that may be in source code form, object code form, executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
It should be noted that, for the sake of simplicity of description, the foregoing method embodiments are all expressed as a series of combinations of actions, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily all necessary for the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
The above-disclosed preferred embodiments of the present application are provided only as an aid to the elucidation of the present application. Alternative embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the teaching of this application. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. This application is to be limited only by the claims and the full scope and equivalents thereof.

Claims (14)

1. A blockchain-based information processing method, applied to a blockchain supervision node, the method comprising:
receiving information to be verified sent by a client, and verifying the information to be verified to obtain a verification result;
obtaining an address on a chain of the client and client information;
and if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result into the blockchain.
2. The method of claim 1, wherein binding the on-chain address and the client information and storing binding results to the blockchain comprises:
binding the address on the chain and the client information to obtain a binding result, and determining a binding timestamp;
determining the validity period of the binding result based on the binding timestamp and a preset validity period;
and adding the validity period to the binding result, and storing the binding result added with the validity period to the blockchain.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
receiving an address generation request sent by the client;
sending a verification notification to the client, wherein the verification notification is used for notifying the client to send information to be verified according to the verification notification;
determining whether the information to be verified is verified;
if yes, the response to the address generation request is forbidden.
4. A method according to claim 3, characterized in that the method further comprises:
generating a private key corresponding to the address generation request by using a specified random algorithm;
The obtaining the address on the chain logging in the client side comprises the following steps:
generating a public key corresponding to the address generation request by using a first encryption algorithm based on the private key;
and generating an on-chain address for logging in the client by using a second encryption algorithm based on the public key.
5. The method according to any one of claims 1, 2 and 4, further comprising:
and if the verification failure is determined according to the verification result, sending a notification of the verification failure to the client.
6. A blockchain-based information verification method, applied to a blockchain verification node, the method comprising:
receiving a verification request sent by a client, and analyzing the verification request to obtain an address on a chain to be verified;
searching a binding result binding the address on the chain to be verified from binding results stored in the blockchain according to the address on the chain to be verified, wherein the binding result is generated after the address on the chain and the client information are bound based on the verification result of the client;
if the binding result of the address on the chain to be verified is found, the verification is determined to be successful.
7. The method of claim 6, wherein the binding result includes a validity period;
if the binding result of the address on the chain to be verified is found, determining that the verification is successful includes:
if the binding result of the address on the chain to be verified is found, reading the validity period from the found binding result;
determining whether the on-chain address to be verified is within the validity period based on the validity period and the current time point;
if so, the verification is determined to be successful.
8. The method of claim 7, wherein the expiration period comprises: obtaining a time stamp and preset effective duration of the binding result;
the determining whether the address on the chain to be verified is in the validity period based on the validity period and the current time point comprises the following steps:
calculating a time span between the time stamp and the current point in time;
and determining whether the address on the chain to be verified is in the validity period according to the size relation between the time span and the preset validity period.
9. The method according to any one of claims 6 to 8, further comprising:
And if the binding result of the address on the chain to be verified is not found, sending a notification of verification failure to the client.
10. A blockchain-based information processing device, characterized by a supervisory node for application to a blockchain, the device comprising:
the verification module is configured to receive information to be verified sent by the client, verify the information to be verified and obtain a verification result;
the acquisition module is configured to acquire an on-chain address and client information of the login client;
and the binding module is configured to bind the address on the chain and the client information if the verification is determined to be successful according to the verification result, and store the binding result to the blockchain.
11. A blockchain-based information verification device, characterized by a verification node applied to a blockchain, the device comprising:
the analysis module is configured to receive a verification request sent by a client, analyze the verification request and obtain an address on a chain to be verified;
the searching module is configured to search a binding result binding the address on the chain to be verified from binding results stored in the blockchain according to the address on the chain to be verified, wherein the binding result is generated after the address on the chain and the client information are bound based on the verification result of the client;
And the verification module is configured to determine that the verification is successful if the binding result of the address on the chain to be verified is found.
12. A blockchain system, the blockchain system comprising: the system comprises a client, a supervision node and a verification node;
the client is configured to send information to be verified to the supervision node;
the supervision node is configured to receive the information to be verified, verify the information to be verified and obtain a verification result; obtaining an address on a chain of the client and client information; if the verification is successful according to the verification result, binding the address on the chain and the client information, and storing the binding result to the blockchain;
the client is further configured to send a verification request to the verification node;
the verification node is configured to receive the verification request, analyze the verification request and obtain an address on a chain to be verified; and searching the binding result binding the address on the chain to be verified from the binding results stored in the blockchain according to the address on the chain to be verified, and if the binding result binding the address on the chain to be verified is found, determining that verification is successful.
13. A computing device comprising a memory, a processor, and computer instructions stored on the memory and executable on the processor, wherein the processor, when executing the instructions, implements the steps of the method of any of claims 1-5 or 6-9.
14. A computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the method of any one of claims 1-5 or 6-9.
CN202111243141.2A 2021-10-25 2021-10-25 Information processing method and information verification method and device based on block chain Pending CN116032939A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111243141.2A CN116032939A (en) 2021-10-25 2021-10-25 Information processing method and information verification method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111243141.2A CN116032939A (en) 2021-10-25 2021-10-25 Information processing method and information verification method and device based on block chain

Publications (1)

Publication Number Publication Date
CN116032939A true CN116032939A (en) 2023-04-28

Family

ID=86080016

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111243141.2A Pending CN116032939A (en) 2021-10-25 2021-10-25 Information processing method and information verification method and device based on block chain

Country Status (1)

Country Link
CN (1) CN116032939A (en)

Similar Documents

Publication Publication Date Title
US10560261B1 (en) Systems and techniques for capture of trusted media data
CN109558748B (en) Data processing method and device, electronic equipment and storage medium
CN112115511B (en) Authorization verification method, device and system, business authority configuration method and device
US9882790B2 (en) Method and apparatus for a recommendation system based on token exchange
CN110879903A (en) Evidence storage method, evidence verification method, evidence storage device, evidence verification device, evidence storage equipment and evidence verification medium
CN108718341B (en) Method for sharing and searching data
CN110099047B (en) Registration information processing method and device, computer equipment and storage medium
CN113268336B (en) Service acquisition method, device, equipment and readable medium
CN109885790B (en) Method and device for acquiring satisfaction evaluation data
CN103890734A (en) Telemetry file hash and conflict detection
CN116055067B (en) Weak password detection method, device, electronic equipment and medium
CN112348535A (en) Traceability application method and system based on block chain technology
CN115563600A (en) Data auditing method and device, electronic equipment and storage medium
CN115664743B (en) Behavior detection method and device
CN114239072B (en) Block chain node management method and block chain network
CN111010395B (en) Credit-based information identifier generation method and device
CN116756782B (en) Data verification method and system
CN116032939A (en) Information processing method and information verification method and device based on block chain
CN113395281B (en) Verification method and device capable of verifying statement and electronic equipment
CN116561777A (en) Data processing method and device
CN110808978B (en) Real name authentication method and device
CN117743456A (en) Digital asset processing method, device, equipment and medium based on blockchain
CN115001776A (en) Data processing system and method
CN116468439A (en) Data management method, apparatus, device, storage medium, and computer program product
CN114648334B (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载