Method and device for verifying identity information of asymmetric encryption block chainTechnical Field
The application relates to the technical field of block chains, in particular to an identity information verification method and device for an asymmetric encryption block chain.
Background
The TCP/IP protocol of the Internet enables us to enter the era of free information transfer, and the innovation of the block chain brings us into the era of free notarization of information! The block chain accounts through the whole network, and P2P collaboratively establishes 'credit', which is the fourth milestone after the evolution history of human credit, including blood affinity credit, noble metal credit and compulsory bank note credit, is hopeful to relieve the social pain point of the current scarce public credit of China, and has wide and deep application scenes in various fields of global market collection, intellectual property protection, property micro notarization, Internet of things finance, intelligent protocols and the like.
Existing blockchain links allow the information content to be viewed by encrypting the information content and sending it to a particular holder, who then decrypts the encryption with the key held.
The content of the information is often encrypted and information of the last transaction, time stamp, random number and address information.
The verification information and the verification mode are single, and the protection of transaction information and the development of a block chain technology are not facilitated.
With the development of technology, the difficulty of deciphering the password is smaller and smaller, and the simple random encryption of the information cannot meet the requirement of information security, so that more secure authentication information needs to be set.
Disclosure of Invention
The application aims to provide an asymmetric encryption block chain identity information verification method and device, and the method and device are used for authenticating by taking behavior characteristics as transaction information, and if abnormity is found, biological characteristics are used as supplementary authentication.
In order to solve the technical problem, the technical scheme is adopted in the application:
an authentication method for the identity information of an asymmetric encryption block chain is characterized in that:
the method comprises the following steps:
the transaction information is broadcast to all nodes;
the node collects transaction information in a block;
the node starts to continuously generate a random character string and calculates a random number answer;
when one node gets an answer that matches the random number, it broadcasts the generated tile to all other nodes.
And the other nodes verify the transaction, and when the transaction contained in the block is determined to be valid, the other nodes accept the block.
All other nodes start creating new blocks and add the cryptographic hash of the just accepted block.
The blocks are randomly hashed and linked into a chain of blocks.
The cryptographic hash formed from the previous block is used to connect the blocks together, in the order of the past transactions.
The transaction is further confirmed after the block link has to be linked to the previous block.
The authentication includes a key pair.
The key pair comprises a public key and a private key;
the public key has public property and is used for encrypting a piece of information and proving the authenticity of the information;
the private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key;
the information encrypted by the public key can be decrypted only by a person with a corresponding private key.
The public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key;
the private key signs information, and the public key verifies the signature;
the information verified by the public key signature is confirmed to be sent out by the holder of the private key;
the public key is issued for the last block and the private key is owned by the holder of the next block.
The key pair encryption method includes a hash encryption method, a DES encryption method, an RSA encryption method, an Elgamal encryption method, a matrix encryption method, an elliptic curve encryption method, and a combination thereof.
The block includes the following three parts: information, a cryptographic hash formed of the previous block, a random number.
The information further comprises behavioral characteristics and biometric characteristics;
the behavior characteristics are as follows: including paths, regions, WiFi, daily locations, consumption behaviors, consumption preferences, consumption units, consumption habits, and timestamps;
the biometric features include hand shape, palm print, fingerprint, face, iris, retina, pulse, vein, pinna, odor, and DNA.
The transaction also comprises a private key of both transaction parties, the transaction amount and a digital signature of the electronic currency.
Preferably, the verification adopts the behavior feature verification, and when the behavior feature verification is abnormal, the biometric feature secondary verification is adopted.
An asymmetric encryption block chain identity information verifying device is characterized in that: the system comprises a terminal, transmission equipment and a network server.
The terminal collects the behavior characteristics and the biological characteristics and sends the behavior characteristics and the biological characteristics to the network server through the transmission equipment;
and the network server verifies the behavior characteristics and the biological characteristics acquired by the terminal through the block chain.
The terminal comprises a consumption terminal, a mobile terminal and a geographical position information device;
the network server comprises a block linking unit, a block creating unit and a block storing unit;
the block linking unit verifies that blocks are linked with each other, the block creating unit creates a new block through verification transaction, and the block storing unit stores the newly created block.
The block linking unit comprises a random number generation unit, a random number verification unit, a time stamp unit, a password generation unit and a password decryption unit.
The behavior characteristics comprise paths, regions, WiFi, daily positions, consumption behaviors, consumption preferences, consumption amount, consumption habits and timestamps.
The biometric features include hand shape, palm print, fingerprint, face, iris, retina, pulse, vein, pinna, odor, and DNA.
When a transaction is to take place at the terminal,
the transaction information is broadcast to all network servers.
The network server collects transaction information in a block.
And the network server starts to continuously generate random character strings and calculates the answers of the random numbers.
When one web server gets an answer that matches the random number, it broadcasts the generated tile to all other web servers.
And the other network servers verify the transaction, and when the transaction contained in the block is determined to be valid, the other network servers accept the block.
All other network servers start creating new tiles and add cryptographic hashes of the just accepted tiles.
The blocks are randomly hashed and linked into a chain of blocks.
The cryptographic hash formed by the previous block is used to connect the blocks together to achieve the sequential arrangement of past transactions.
The transaction is further confirmed after the block link has to be linked to the previous block.
The authentication comprises a key pair;
the key pair comprises a public key and a private key;
the public key is public and is used for encrypting a piece of information and proving the authenticity of the information.
The private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key;
the information encrypted by the public key can be decrypted only by a person with a corresponding private key;
the public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key;
the private key signs information, and the public key verifies the signature.
The information verified by the public key signature is confirmed to be sent out by the holder of the private key;
the public key is issued for the last block, and the private key is owned by the next block.
The key pair encryption method includes a hash encryption method, a DES encryption method, an RSA encryption method, an Elgamal encryption method, a matrix encryption method, an elliptic curve encryption method, and a combination thereof.
The block includes the following three parts: information, a cryptographic hash formed of the previous block, a random number.
The information also includes behavioral characteristics and biometric characteristics.
Preferably, the verification adopts the behavior feature verification, and when the behavior feature verification is abnormal, the biometric feature secondary verification is adopted.
Compared with the prior art: 1. and the double information verification of the behavior characteristic and the biological characteristic is adopted, so that the verification safety is enhanced. Stability; 2. the behavior characteristic verification is preferentially adopted, so that the convenience and the continuity of the operation are enhanced; 3. the information is encrypted by adopting an asymmetric encryption method, a timestamp, an address and a random number are supplemented, and multi-dimensional encryption is adopted, so that the verification safety is comprehensively improved, and the attack can be defended.
Drawings
Fig. 1 is a schematic diagram of an embodiment of an authentication method for an asymmetric encryption block chain according to the present application.
FIG. 2 is a schematic diagram of an embodiment of block chaining according to the present application.
Fig. 3 is a schematic diagram of an embodiment of a block key of the present application.
Fig. 4 is a schematic diagram of another embodiment of a block key of the present application.
Fig. 5 is a schematic diagram of an embodiment of block information of the present application.
Fig. 6 is a schematic diagram of an embodiment of an apparatus for verifying identity information of an asymmetric encryption block chain according to the present application.
Fig. 7 is a schematic diagram of another embodiment of an apparatus for verifying identity information of an asymmetric encryption block chain according to the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, embodiments accompanying the present application are described in detail below with reference to the accompanying drawings.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is capable of embodiments in many different forms than those described herein and of being similarly generalized by those skilled in the art without departing from the spirit and scope of the application, and is therefore not limited to the specific embodiments disclosed below and the specific drawings.
Example one
As shown in fig. 1, transaction information is broadcast to all nodes;
the node collects transaction information in a block;
the node starts to continuously generate a random character string and calculates a random number answer;
when the answer obtained by one node is matched with the random number, the generated block is broadcasted to all other nodes;
and the other nodes verify the transaction, and when the transaction contained in the block is determined to be valid, the other nodes accept the block.
All other nodes start creating new blocks and add the cryptographic hash of the just accepted block.
Example two
As shown in fig. 2, the blocks are randomly hashed and linked into a chain of blocks.
The cryptographic hash formed by the previous block is used to connect the blocks together to achieve the sequential arrangement of past transactions.
The transaction is further confirmed after the block link has to be linked to the previous block.
EXAMPLE III
As shown in fig. 3, the authentication includes a key pair;
the key pair comprises a public key and a private key;
the public key has public property and is used for encrypting a piece of information and proving the authenticity of the information;
the private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key;
the information encrypted by the public key can be decrypted only by a person with a corresponding private key;
the public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key;
the private key signs information, and the public key verifies the signature;
the information verified by the public key signature is confirmed to be sent out by the holder of the private key;
the public key is issued for the last block and the private key is owned by the holder of the next block.
Example four
As shown in fig. 1, 2, 3, 4, 5, 6, and 7, an asymmetric encryption block chain identity information verification apparatus is characterized in that: the system comprises a terminal, transmission equipment and a network server;
the terminal collects the behavior characteristics and the biological characteristics and sends the behavior characteristics and the biological characteristics to the network server through the transmission equipment;
the terminal comprises a consumption terminal, a mobile terminal and a geographical position information device;
the network server comprises a block linking unit, a block creating unit and a block storing unit;
the block linking unit verifies the mutual linking of the blocks, the block creating unit creates a new block through verification transaction, and the block storing unit stores the newly created block.
The block linking unit comprises a random number generation unit, a random number verification unit, a time stamp unit, a password generation unit and a password decryption unit;
the behavior characteristics comprise paths, regions, WiFi, daily positions, consumption behaviors, consumption preferences, consumption amount, consumption habits and timestamps.
The biometric features include hand shape, palm print, fingerprint, face, iris, retina, pulse, vein, pinna, odor, and DNA.
When a transaction is to take place at the terminal,
the transaction information is broadcast to all network servers;
the network server collects transaction information in a block;
the network server starts to continuously generate random character strings and calculates answers of random numbers;
when one web server gets an answer that matches the random number, it broadcasts the generated tile to all other web servers.
And the other network servers verify the transaction, and when the transaction contained in the block is determined to be valid, the other network servers accept the block.
All other network servers start creating new tiles and add cryptographic hashes of the just accepted tiles.
The blocks are randomly hashed and linked into a chain of blocks.
The cryptographic hash formed by the previous block is used to connect the blocks together to achieve the sequential arrangement of past transactions.
The transaction is further confirmed after the block link has to be linked to the previous block.
The authentication comprises a key pair;
the key pair comprises a public key and a private key;
the public key has public property and is used for encrypting a piece of information and proving the authenticity of the information;
the private key has privacy, and is only mastered by an information owner and used for decrypting the information encrypted by the public key.
The information encrypted by the public key can be decrypted only by a person with a corresponding private key;
the public key and the private key code have asymmetry, namely the private key cannot be obtained according to the public key;
the private key signs information, and the public key verifies the signature;
the information verified by the public key signature is confirmed to be sent out by the holder of the private key;
the public key is issued for the last block and the private key is owned by the holder of the next block.
The key pair encryption method includes a hash encryption method, a DES encryption method, an RSA encryption method, an Elgamal encryption method, a matrix encryption method, an elliptic curve encryption method, and a combination thereof.
The block includes the following three parts: information, a cryptographic hash formed of the previous block, a random number.
The information also includes behavioral characteristics and biometric characteristics.
Preferably, the verification adopts the behavior feature verification, and when the behavior feature verification is abnormal, the biometric feature secondary verification is adopted.
Although the preferred embodiments of the present invention have been disclosed in the foregoing description, it should be understood that they are not intended to limit the scope of the claims so far, and that possible variations and modifications may be made by those skilled in the art without departing from the spirit and scope of the present invention.