Movatterモバイル変換


[0]ホーム

URL:


CN106100847B - Method and device for verifying identity information of asymmetric encryption block chain - Google Patents

Method and device for verifying identity information of asymmetric encryption block chain
Download PDF

Info

Publication number
CN106100847B
CN106100847BCN201610413635.3ACN201610413635ACN106100847BCN 106100847 BCN106100847 BCN 106100847BCN 201610413635 ACN201610413635 ACN 201610413635ACN 106100847 BCN106100847 BCN 106100847B
Authority
CN
China
Prior art keywords
block
identity information
block chain
information
asymmetric encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610413635.3A
Other languages
Chinese (zh)
Other versions
CN106100847A (en
Inventor
李立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhong Business Consultants Beijing Co ltd
Original Assignee
Huizhong Business Consultants Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhong Business Consultants Beijing Co ltdfiledCriticalHuizhong Business Consultants Beijing Co ltd
Priority to CN201610413635.3ApriorityCriticalpatent/CN106100847B/en
Publication of CN106100847ApublicationCriticalpatent/CN106100847A/en
Application grantedgrantedCritical
Publication of CN106100847BpublicationCriticalpatent/CN106100847B/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

An authentication method for the identity information of an asymmetric encryption block chain is characterized in that: the method comprises the following steps: the transaction information is broadcast to all nodes; the node collects transaction information in a block; the node starts to continuously generate a random character string and calculates a random number answer; when the answer obtained by one node is matched with the random number, the generated block is broadcasted to all other nodes; and the other nodes verify the transaction, and when the transaction contained in the block is determined to be valid, the other nodes accept the block. All other nodes start creating new blocks and add the cryptographic hash of the just accepted block. The blocks are randomly hashed and linked into a chain of blocks. The cryptographic hash formed from the previous block is used to connect the blocks together, in the order of the past transactions. The transaction is further confirmed after the block link has to be linked to the previous block.

Description

Method and device for verifying identity information of asymmetric encryption block chain
Technical Field
The application relates to the technical field of block chains, in particular to an identity information verification method and device for an asymmetric encryption block chain.
Background
The TCP/IP protocol of the Internet enables us to enter the era of free information transfer, and the innovation of the block chain brings us into the era of free notarization of information! The block chain accounts through the whole network, and P2P collaboratively establishes 'credit', which is the fourth milestone after the evolution history of human credit, including blood affinity credit, noble metal credit and compulsory bank note credit, is hopeful to relieve the social pain point of the current scarce public credit of China, and has wide and deep application scenes in various fields of global market collection, intellectual property protection, property micro notarization, Internet of things finance, intelligent protocols and the like.
Existing blockchain links allow the information content to be viewed by encrypting the information content and sending it to a particular holder, who then decrypts the encryption with the key held.
The content of the information is often encrypted and information of the last transaction, time stamp, random number and address information.
The verification information and the verification mode are single, and the protection of transaction information and the development of a block chain technology are not facilitated.
With the development of technology, the difficulty of deciphering the password is smaller and smaller, and the simple random encryption of the information cannot meet the requirement of information security, so that more secure authentication information needs to be set.
Disclosure of Invention
The application aims to provide an asymmetric encryption block chain identity information verification method and device, and the method and device are used for authenticating by taking behavior characteristics as transaction information, and if abnormity is found, biological characteristics are used as supplementary authentication.
In order to solve the technical problem, the technical scheme is adopted in the application:
an authentication method for the identity information of an asymmetric encryption block chain is characterized in that:
the method comprises the following steps:
the transaction information is broadcast to all nodes;
the node collects transaction information in a block;
the node starts to continuously generate a random character string and calculates a random number answer;
when one node gets an answer that matches the random number, it broadcasts the generated tile to all other nodes.
And the other nodes verify the transaction, and when the transaction contained in the block is determined to be valid, the other nodes accept the block.
All other nodes start creating new blocks and add the cryptographic hash of the just accepted block.
The blocks are randomly hashed and linked into a chain of blocks.
The cryptographic hash formed from the previous block is used to connect the blocks together, in the order of the past transactions.
The transaction is further confirmed after the block link has to be linked to the previous block.
The authentication includes a key pair.
The key pair comprises a public key and a private key;
the public key has public property and is used for encrypting a piece of information and proving the authenticity of the information;
the private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key;
the information encrypted by the public key can be decrypted only by a person with a corresponding private key.
The public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key;
the private key signs information, and the public key verifies the signature;
the information verified by the public key signature is confirmed to be sent out by the holder of the private key;
the public key is issued for the last block and the private key is owned by the holder of the next block.
The key pair encryption method includes a hash encryption method, a DES encryption method, an RSA encryption method, an Elgamal encryption method, a matrix encryption method, an elliptic curve encryption method, and a combination thereof.
The block includes the following three parts: information, a cryptographic hash formed of the previous block, a random number.
The information further comprises behavioral characteristics and biometric characteristics;
the behavior characteristics are as follows: including paths, regions, WiFi, daily locations, consumption behaviors, consumption preferences, consumption units, consumption habits, and timestamps;
the biometric features include hand shape, palm print, fingerprint, face, iris, retina, pulse, vein, pinna, odor, and DNA.
The transaction also comprises a private key of both transaction parties, the transaction amount and a digital signature of the electronic currency.
Preferably, the verification adopts the behavior feature verification, and when the behavior feature verification is abnormal, the biometric feature secondary verification is adopted.
An asymmetric encryption block chain identity information verifying device is characterized in that: the system comprises a terminal, transmission equipment and a network server.
The terminal collects the behavior characteristics and the biological characteristics and sends the behavior characteristics and the biological characteristics to the network server through the transmission equipment;
and the network server verifies the behavior characteristics and the biological characteristics acquired by the terminal through the block chain.
The terminal comprises a consumption terminal, a mobile terminal and a geographical position information device;
the network server comprises a block linking unit, a block creating unit and a block storing unit;
the block linking unit verifies that blocks are linked with each other, the block creating unit creates a new block through verification transaction, and the block storing unit stores the newly created block.
The block linking unit comprises a random number generation unit, a random number verification unit, a time stamp unit, a password generation unit and a password decryption unit.
The behavior characteristics comprise paths, regions, WiFi, daily positions, consumption behaviors, consumption preferences, consumption amount, consumption habits and timestamps.
The biometric features include hand shape, palm print, fingerprint, face, iris, retina, pulse, vein, pinna, odor, and DNA.
When a transaction is to take place at the terminal,
the transaction information is broadcast to all network servers.
The network server collects transaction information in a block.
And the network server starts to continuously generate random character strings and calculates the answers of the random numbers.
When one web server gets an answer that matches the random number, it broadcasts the generated tile to all other web servers.
And the other network servers verify the transaction, and when the transaction contained in the block is determined to be valid, the other network servers accept the block.
All other network servers start creating new tiles and add cryptographic hashes of the just accepted tiles.
The blocks are randomly hashed and linked into a chain of blocks.
The cryptographic hash formed by the previous block is used to connect the blocks together to achieve the sequential arrangement of past transactions.
The transaction is further confirmed after the block link has to be linked to the previous block.
The authentication comprises a key pair;
the key pair comprises a public key and a private key;
the public key is public and is used for encrypting a piece of information and proving the authenticity of the information.
The private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key;
the information encrypted by the public key can be decrypted only by a person with a corresponding private key;
the public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key;
the private key signs information, and the public key verifies the signature.
The information verified by the public key signature is confirmed to be sent out by the holder of the private key;
the public key is issued for the last block, and the private key is owned by the next block.
The key pair encryption method includes a hash encryption method, a DES encryption method, an RSA encryption method, an Elgamal encryption method, a matrix encryption method, an elliptic curve encryption method, and a combination thereof.
The block includes the following three parts: information, a cryptographic hash formed of the previous block, a random number.
The information also includes behavioral characteristics and biometric characteristics.
Preferably, the verification adopts the behavior feature verification, and when the behavior feature verification is abnormal, the biometric feature secondary verification is adopted.
Compared with the prior art: 1. and the double information verification of the behavior characteristic and the biological characteristic is adopted, so that the verification safety is enhanced. Stability; 2. the behavior characteristic verification is preferentially adopted, so that the convenience and the continuity of the operation are enhanced; 3. the information is encrypted by adopting an asymmetric encryption method, a timestamp, an address and a random number are supplemented, and multi-dimensional encryption is adopted, so that the verification safety is comprehensively improved, and the attack can be defended.
Drawings
Fig. 1 is a schematic diagram of an embodiment of an authentication method for an asymmetric encryption block chain according to the present application.
FIG. 2 is a schematic diagram of an embodiment of block chaining according to the present application.
Fig. 3 is a schematic diagram of an embodiment of a block key of the present application.
Fig. 4 is a schematic diagram of another embodiment of a block key of the present application.
Fig. 5 is a schematic diagram of an embodiment of block information of the present application.
Fig. 6 is a schematic diagram of an embodiment of an apparatus for verifying identity information of an asymmetric encryption block chain according to the present application.
Fig. 7 is a schematic diagram of another embodiment of an apparatus for verifying identity information of an asymmetric encryption block chain according to the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, embodiments accompanying the present application are described in detail below with reference to the accompanying drawings.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is capable of embodiments in many different forms than those described herein and of being similarly generalized by those skilled in the art without departing from the spirit and scope of the application, and is therefore not limited to the specific embodiments disclosed below and the specific drawings.
Example one
As shown in fig. 1, transaction information is broadcast to all nodes;
the node collects transaction information in a block;
the node starts to continuously generate a random character string and calculates a random number answer;
when the answer obtained by one node is matched with the random number, the generated block is broadcasted to all other nodes;
and the other nodes verify the transaction, and when the transaction contained in the block is determined to be valid, the other nodes accept the block.
All other nodes start creating new blocks and add the cryptographic hash of the just accepted block.
Example two
As shown in fig. 2, the blocks are randomly hashed and linked into a chain of blocks.
The cryptographic hash formed by the previous block is used to connect the blocks together to achieve the sequential arrangement of past transactions.
The transaction is further confirmed after the block link has to be linked to the previous block.
EXAMPLE III
As shown in fig. 3, the authentication includes a key pair;
the key pair comprises a public key and a private key;
the public key has public property and is used for encrypting a piece of information and proving the authenticity of the information;
the private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key;
the information encrypted by the public key can be decrypted only by a person with a corresponding private key;
the public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key;
the private key signs information, and the public key verifies the signature;
the information verified by the public key signature is confirmed to be sent out by the holder of the private key;
the public key is issued for the last block and the private key is owned by the holder of the next block.
Example four
As shown in fig. 1, 2, 3, 4, 5, 6, and 7, an asymmetric encryption block chain identity information verification apparatus is characterized in that: the system comprises a terminal, transmission equipment and a network server;
the terminal collects the behavior characteristics and the biological characteristics and sends the behavior characteristics and the biological characteristics to the network server through the transmission equipment;
the terminal comprises a consumption terminal, a mobile terminal and a geographical position information device;
the network server comprises a block linking unit, a block creating unit and a block storing unit;
the block linking unit verifies the mutual linking of the blocks, the block creating unit creates a new block through verification transaction, and the block storing unit stores the newly created block.
The block linking unit comprises a random number generation unit, a random number verification unit, a time stamp unit, a password generation unit and a password decryption unit;
the behavior characteristics comprise paths, regions, WiFi, daily positions, consumption behaviors, consumption preferences, consumption amount, consumption habits and timestamps.
The biometric features include hand shape, palm print, fingerprint, face, iris, retina, pulse, vein, pinna, odor, and DNA.
When a transaction is to take place at the terminal,
the transaction information is broadcast to all network servers;
the network server collects transaction information in a block;
the network server starts to continuously generate random character strings and calculates answers of random numbers;
when one web server gets an answer that matches the random number, it broadcasts the generated tile to all other web servers.
And the other network servers verify the transaction, and when the transaction contained in the block is determined to be valid, the other network servers accept the block.
All other network servers start creating new tiles and add cryptographic hashes of the just accepted tiles.
The blocks are randomly hashed and linked into a chain of blocks.
The cryptographic hash formed by the previous block is used to connect the blocks together to achieve the sequential arrangement of past transactions.
The transaction is further confirmed after the block link has to be linked to the previous block.
The authentication comprises a key pair;
the key pair comprises a public key and a private key;
the public key has public property and is used for encrypting a piece of information and proving the authenticity of the information;
the private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key.
The information encrypted by the public key can be decrypted only by a person with a corresponding private key;
the public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key;
the private key signs information, and the public key verifies the signature;
the information verified by the public key signature is confirmed to be sent out by the holder of the private key;
the public key is issued for the last block and the private key is owned by the holder of the next block.
The key pair encryption method includes a hash encryption method, a DES encryption method, an RSA encryption method, an Elgamal encryption method, a matrix encryption method, an elliptic curve encryption method, and a combination thereof.
The block includes the following three parts: information, a cryptographic hash formed of the previous block, a random number.
The information also includes behavioral characteristics and biometric characteristics.
Preferably, the verification adopts the behavior feature verification, and when the behavior feature verification is abnormal, the biometric feature secondary verification is adopted.
Although the preferred embodiments of the present invention have been disclosed in the foregoing description, it should be understood that they are not intended to limit the scope of the claims so far, and that possible variations and modifications may be made by those skilled in the art without departing from the spirit and scope of the present invention.

Claims (41)

CN201610413635.3A2016-06-142016-06-14Method and device for verifying identity information of asymmetric encryption block chainExpired - Fee RelatedCN106100847B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201610413635.3ACN106100847B (en)2016-06-142016-06-14Method and device for verifying identity information of asymmetric encryption block chain

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201610413635.3ACN106100847B (en)2016-06-142016-06-14Method and device for verifying identity information of asymmetric encryption block chain

Publications (2)

Publication NumberPublication Date
CN106100847A CN106100847A (en)2016-11-09
CN106100847Btrue CN106100847B (en)2021-10-26

Family

ID=57846333

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201610413635.3AExpired - Fee RelatedCN106100847B (en)2016-06-142016-06-14Method and device for verifying identity information of asymmetric encryption block chain

Country Status (1)

CountryLink
CN (1)CN106100847B (en)

Families Citing this family (72)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN116957790A (en)*2016-02-232023-10-27区块链控股有限公司Method and system for realizing universal certification of exchange on blockchain
CN108075895B (en)*2016-11-152020-03-24深圳银链科技有限公司Node permission method and system based on block chain
CN106548397A (en)*2016-11-222017-03-29天津米游科技有限公司A kind of block chain common recognition mechanism
CN106991334B (en)2016-11-242021-03-02创新先进技术有限公司Data access method, system and device
CN106407481B (en)*2016-11-302019-12-03福州微启迪物联科技有限公司Ecological environment supervising system and its implementation based on block chain framework
CN106534160B (en)*2016-12-022020-02-21江苏通付盾科技有限公司Identity authentication method and system based on block chain
CN107016542A (en)*2016-12-062017-08-04阿里巴巴集团控股有限公司A kind of business data processing method, verification method, apparatus and system
US10715331B2 (en)*2016-12-282020-07-14MasterCard International IncorportedMethod and system for providing validated, auditable, and immutable inputs to a smart contract
CN107077674B (en)*2016-12-292021-06-11达闼机器人有限公司Transaction verification processing method and device and node equipment
WO2018126340A1 (en)*2017-01-032018-07-12华为技术有限公司Blockchain-based data processing method, device and system
CN106982203B (en)*2017-01-062020-05-22中国银联股份有限公司Robust ATM network system based on block chain technology and information processing method thereof
CN106686555A (en)*2017-01-122017-05-17算丰科技(北京)有限公司Data block broadcasting method and device and electronic equipment
CN106790253A (en)*2017-01-252017-05-31中钞信用卡产业发展有限公司北京智能卡技术研究院Authentication method and device based on block chain
GB201701360D0 (en)*2017-01-272017-03-15Nchain Holdings LtdComputer implemented method and system
CN107086909B (en)*2017-03-072021-01-12创新先进技术有限公司Identity information generation method and device and identity verification method and device
CN106991569B (en)*2017-03-292018-07-31宁夏灵智科技有限公司The method of commerce and system that big data calculates in e-commerce platform
CN107016543A (en)*2017-03-292017-08-04宁夏煜隆科技有限公司The method of commerce and system of model adaptation in e-commerce platform
CN106980980A (en)*2017-03-292017-07-25宁夏宁信信息科技有限公司Method of commerce and system based on block chain technology in e-commerce platform
CN106971342A (en)*2017-03-292017-07-21宁夏凯速德科技有限公司Method of commerce and system based on block chain technology in the e-commerce platform of decentralization
GB201705749D0 (en)*2017-04-102017-05-24Nchain Holdings LtdComputer-implemented system and method
CN107172016B (en)*2017-04-252021-05-18中国联合网络通信集团有限公司 Security trust processing method and device
CN107301546B (en)*2017-05-032020-10-16北京众享比特科技有限公司 Random number generation and application method and device
CN107147652B (en)*2017-05-182019-08-09电子科技大学 A secure fusion authentication method for user multi-modal identity based on blockchain
EP3631727B1 (en)*2017-05-222025-07-09nChain Licensing AGConstraining injection of unlocking transaction bytecode
CN107104977B (en)*2017-05-232020-07-31北京天德科技有限公司Block chain data secure transmission method based on SCTP
CN108064440B (en)*2017-05-252021-04-09达闼机器人有限公司 Blockchain-based FIDO authentication method, device and system
CN107423978A (en)*2017-06-162017-12-01郑州大学A kind of distributed energy business confirmation method based on alliance's block chain
EP3419210B1 (en)*2017-06-222025-09-03ALMA GmbHMethod for generating a transaction of a blockchain and method for validating a block of a blockchain
CN107241196A (en)*2017-06-302017-10-10杰创智能科技股份有限公司Digital signature method and system based on block chain technology
CN107506661B (en)*2017-08-152020-04-24河南真二互联网科技有限公司Method for generating house historical record based on block chain
EP3444997A1 (en)*2017-08-182019-02-20Siemens AktiengesellschaftDevices to provide a quantity of cryptographically protected and filtered as well as sorted transaction datasets of a link of a block chain
CN107480559B (en)*2017-08-252019-08-20北京中星仝创科技有限公司A kind of safe storage system and method for the block chain from chain data
CN107656812A (en)*2017-09-272018-02-02咪咕文化科技有限公司block chain processing method, system, node device, terminal and storage medium
CN107528688B (en)*2017-09-302020-04-21矩阵元技术(深圳)有限公司 A blockchain key storage and recovery method and device based on encryption entrustment technology
CN107749848B (en)*2017-10-232020-04-07中国联合网络通信集团有限公司Internet of things data processing method and device and Internet of things system
CN107994991B (en)*2017-10-312021-06-11深圳市轱辘车联数据技术有限公司Data processing method, data processing server and storage medium
CN107682364B (en)*2017-11-032019-12-03杭州秘猿科技有限公司A kind of license chain privacy method of commerce
CN107993359B (en)*2017-11-232021-01-19浙江大学Block chain-based end-to-end bicycle sharing system and method
CN107888384B (en)*2017-11-302020-11-27中链科技有限公司Identity data management method, system and computer readable storage medium
US11842335B2 (en)*2017-12-012023-12-12Quant Network Ltd.Blockchain communications and ordering
CN108270571B (en)*2017-12-082019-10-11西安电子科技大学 Blockchain-based Internet of Things identity authentication system and its method
GB201721021D0 (en)*2017-12-152018-01-31Nchain Holdings LtdComputer-implemented methods and systems
US9990504B1 (en)*2017-12-182018-06-05Northern Trust CorporationSystems and methods for generating and maintaining immutable digital meeting records within distributed network nodes
CN108334553B (en)*2017-12-292020-07-10北京欧链科技有限公司Data screening method and device based on block chain
CN108320228A (en)*2018-03-072018-07-24物数(上海)信息科技有限公司Transregional piece of chain transaction in assets method, platform, equipment and storage medium
CN108596608A (en)*2018-04-282018-09-28比飞力(深圳)科技有限公司A kind of method and device of digital wallet transaction
CN108737108A (en)*2018-05-092018-11-02合肥达朴汇联科技有限公司A kind of computer-readable medium including block chain node
SG11202010346TA (en)*2018-05-142020-11-27Nchain Holdings LtdComputer-implemented systems and methods for using a blockchain to perform an atomic swap
CN108712429B (en)*2018-05-242020-07-10西安电子科技大学 Privacy protection method based on blockchain cloud outsourcing computing data
CN108737430B (en)*2018-05-252020-07-17全链通有限公司Encryption communication method and system for block chain node
CN108876332B (en)*2018-06-042020-09-22清华大学Block chain safe transaction method and device based on biometric feature mark authentication
CN108737114A (en)*2018-06-192018-11-02天津中兴云链技术有限公司A kind of endorsement method and device of the block catenary system based on quantum key distribution
CN108846108B (en)*2018-06-222020-07-07苏州得尔达国际物流有限公司Unmanned aerial vehicle route distribution system based on block chain technology
CN108847046A (en)*2018-07-032018-11-20中钞信用卡产业发展有限公司杭州区块链技术研究院Parking management method, equipment and medium based on block chain technology
CN109039645A (en)*2018-07-122018-12-18佛山伊苏巨森科技有限公司A kind of system and method signed using digital signature to block chain affairs
CN108833438B (en)*2018-07-182020-04-14电子科技大学 A method for secure storage of industrial Internet of Things information based on blockchain
CN109166021A (en)*2018-07-262019-01-08阿里巴巴集团控股有限公司Bookkeeping methods, device and business finance integral system
CN109118655A (en)*2018-07-312019-01-01温州市图盛科技有限公司A kind of electrical energy measurement and transaction terminal of block chain technology
CN109067741A (en)*2018-08-012018-12-21佛山市苔藓云链科技有限公司A kind of server of reception and storage terminal block chain data
CN109150542A (en)*2018-08-152019-01-04杭州链汇通区块链科技有限公司Hardware signature method, hardware stamped signature verification method, sealing system and storage medium
CN109213914A (en)*2018-08-282019-01-15蔡捷The network search engines based on block chain technology are logged in using living body biological identity
CN109067529A (en)*2018-09-092018-12-21成都量安区块链科技有限公司A kind of production method of block chain private key for user
CN109257179A (en)*2018-10-092019-01-22北京网录科技有限公司A kind of signature generating method and the block chain account management method using this method
CN109040139B (en)*2018-10-122021-05-18重庆邮电大学Identity authentication system and method based on block chain and intelligent contract
CN109347868B (en)*2018-11-272021-06-08咪咕文化科技有限公司 Information verification method, device and storage medium
CN109862006A (en)*2019-01-292019-06-07济南浪潮高新科技投资发展有限公司A kind of block catenary system cut-in method, apparatus and system
CN110086780B (en)*2019-03-262021-11-02北京百度网讯科技有限公司 Method, device and storage medium for processing tampered transactions based on Ethereum
GB2582978B (en)*2019-04-122022-05-04Nchain Holdings LtdMethods and devices for propagating blocks in a blockchain network
CN112532394B (en)*2020-11-262022-05-06中国电子科技集团公司第五十四研究所 A certificate-free blind signature generation method with anti-signature traceability in blockchain
CN113610526A (en)*2021-08-242021-11-05上海点融信息科技有限责任公司Data trust method and device, electronic equipment and storage medium
CN113886778B (en)*2021-09-242025-04-22杭州电子科技大学 A Regulatable Approach to Dynamic Self-Sovereign Identity Generation
CN116471030A (en)*2022-09-192023-07-21湖南湘科智慧科技有限公司 A smart cabinet linkage control system for property involved in the case

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104735164A (en)*2015-04-102015-06-24网易(杭州)网络有限公司Method and device for saving file information
CN105488665A (en)*2015-11-252016-04-13布比(北京)网络技术有限公司Decentralized transaction method
CN105573828A (en)*2015-12-172016-05-11布比(北京)网络技术有限公司Operation processing method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9876775B2 (en)*2012-11-092018-01-23Ent Technologies, Inc.Generalized entity network translation (GENT)

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104735164A (en)*2015-04-102015-06-24网易(杭州)网络有限公司Method and device for saving file information
CN105488665A (en)*2015-11-252016-04-13布比(北京)网络技术有限公司Decentralized transaction method
CN105573828A (en)*2015-12-172016-05-11布比(北京)网络技术有限公司Operation processing method and device

Also Published As

Publication numberPublication date
CN106100847A (en)2016-11-09

Similar Documents

PublicationPublication DateTitle
CN106100847B (en)Method and device for verifying identity information of asymmetric encryption block chain
CN109756485B (en)Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
CN109768988B (en)Decentralized Internet of things security authentication system, equipment registration and identity authentication method
US11228582B2 (en)Digital certificate with software enabling indication
CN107851253B (en)Contract consensus method, consensus verification method, contract consensus system, consensus verification device, contract consensus device, computer-readable recording medium
CN109687965B (en) A real-name authentication method for protecting user identity information in the network
EP3360279B1 (en)Public key infrastructure&method of distribution
CN109003083A (en)A kind of ca authentication method, apparatus and electronic equipment based on block chain
CN106797311A (en) Method for secure password generation
US8806206B2 (en)Cooperation method and system of hardware secure units, and application device
UA128523C2 (en) METHOD OF GENERATION OF A BLOCKCHAIN TRANSACTION AND METHOD OF CHECKING THE VALIDITY OF A BLOCK OF BLOCKCHAIN
JP2007049708A (en) System and method for updating keys used for public key cryptography
CN112231769A (en) Blockchain-based numerical verification method, device, computer equipment and medium
CN114692218A (en)Electronic signature method, equipment and system for individual user
CN114257376B (en)Digital certificate updating method, device, computer equipment and storage medium
WO2008031301A1 (en)A method for the point to point online identity authenticaiton
CN108777673B (en)Bidirectional identity authentication method in block chain
CN109687977A (en)Anti- quantum calculation digital signature method and anti-quantum calculation digital signature system based on multiple pool of keys
CN115345618A (en)Block chain transaction verification method and system based on mixed quantum digital signature
JP2010231404A (en) Secret information management system, secret information management method, and secret information management program
León-Coca et al.Authentication systems using ID Cards over NFC links: the Spanish experience using DNIe
CN112272088A (en)Auditable signature method based on multiple secure parties and related components
Kwon et al.Certificate transparency with enhanced privacy
CN115147975B (en)Encryption network voting method based on block chain
CN106027254A (en)Secret key use method for identity card reading terminal in identity card authentication system

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
CF01Termination of patent right due to non-payment of annual fee

Granted publication date:20211026

CF01Termination of patent right due to non-payment of annual fee

[8]ページ先頭

©2009-2025 Movatter.jp