Movatterモバイル変換


[0]ホーム

URL:


CN109255619A - A kind of identity identifying method and equipment based on block chain - Google Patents

A kind of identity identifying method and equipment based on block chain
Download PDF

Info

Publication number
CN109255619A
CN109255619ACN201811123678.3ACN201811123678ACN109255619ACN 109255619 ACN109255619 ACN 109255619ACN 201811123678 ACN201811123678 ACN 201811123678ACN 109255619 ACN109255619 ACN 109255619A
Authority
CN
China
Prior art keywords
user
block chain
chain node
identity
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811123678.3A
Other languages
Chinese (zh)
Inventor
陈万康
王志勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Asian Union Innovation Technology Co ltd
Original Assignee
Beijing Asian Union Star Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Asian Union Star Information Technology Co LtdfiledCriticalBeijing Asian Union Star Information Technology Co Ltd
Priority to CN201811123678.3ApriorityCriticalpatent/CN109255619A/en
Publication of CN109255619ApublicationCriticalpatent/CN109255619A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

This application discloses a kind of identity identifying method and equipment based on block chain, it include: identity information of the first block chain node according to the first user, determine that there are at least one second users of incidence relation with first user, and the second block chain node logged in second user described at least one sends certification request, includes the identity information of first user in the certification request;The authentication information that at least one described first block chain node is sent is received, and according to the authentication contract of the authentication information and setting, the identity of first user is authenticated.By the characteristic that can not be distorted of block chain network, deal maker by having certification permission authenticates the identity for the deal maker for not yet passing certification, and it is realized according to the authentication information of generation and the authentication contract of setting to deal maker's authentication, effectively ensure the authenticity of deal maker's identity information, guarantee the confidence level of transaction member's identity information in the market OTC, reduces the risk traded in the market OTC.

Description

A kind of identity identifying method and equipment based on block chain
Technical field
This application involves computer disposal and financial technology technical field more particularly to a kind of identity based on block chainAuthentication method and equipment.
Background technique
OTC(Over-The-Counter;Over-the-counter trading) refer to credits, stock that market except stock exchange carries outThe transaction such as power.The mainly one-to-one transaction that is carried out by private consultation of both parties.
The market OTC and exchange market are entirely different: not having fixed-site, be not specified by membership qualification, without strictly may be usedThe regulatory of control is not specified by products transactions limitation.That is, both parties need respectively to undertake letter in the market OTCUse risk.Therefore, in the market OTC, only both sides can trade after establishing credit.
In practical business scene, in order to guarantee the security and reliability of OTC marketing, how to guarantee in the market OTCThe confidence level of transaction member's identity information becomes the technical issues of urgent need to resolve.
Summary of the invention
In view of this, the embodiment of the present application provides a kind of identity identifying method and equipment based on block chain, for solvingCertainly how to confirm the confidence level of transaction member's identity information in the market OTC.
The embodiment of the present application provides a kind of identity identifying method based on block chain, comprising:
First block chain node determines that there are incidence relations with first user according to the identity information of the first userAt least one second user;
The second block chain node transmission that the first block chain node is logged in second user described at least one is recognizedCard is requested, and includes the identity information of first user in the certification request;
The first block chain node receives the authentication information that at least one described second block chain node is sent, and according toThe authentication contract of the authentication information and setting authenticates the identity of first user.
The embodiment of the present application provides a kind of identity identifying method based on block chain, comprising:
Second block chain node receives the certification request that the first block chain node is sent, and includes first in the certification requestThe identity information of user;
The second block chain node according to the identity information of first user, determine the second user that logs in it is describedIncidence relation between first user;
The second block chain node authenticates the identity of first user according to the incidence relation.
The embodiment of the present application provides a kind of ID authentication device based on block chain, including at least one processor and depositsReservoir, the memory are stored with program, and are configured to execute following steps by least one described processor:
According to the identity information of the first user, determining there are at least one second use of incidence relation with first userFamily;
The the second block chain node logged in second user described at least one sends certification request, the certification requestIn include first user identity information;
The authentication information that at least one described second block chain node is sent is received, and according to the authentication information and settingAuthentication contract, the identity of first user is authenticated.
The embodiment of the present application provides a kind of ID authentication device based on block chain, including at least one processor and depositsReservoir, the memory are stored with program, and are configured to execute following steps by least one described processor:
The certification request of the first block chain node transmission is received, the identity comprising the first user is believed in the certification requestBreath;
According to the identity information of first user, being associated between the second user logged in and first user is determinedRelationship;
According to the incidence relation, the identity of first user is authenticated.
What at least one embodiment provided by the present application can reach has the beneficial effect that:
The embodiment of the present application the first block chain node is determined and is deposited with first user according to the identity information of the first userIn at least one second user of incidence relation, and the second block chain node hair logged in second user described at least oneCertification request is sent, includes the identity information of first user in the certification request;Receive at least one described second blockThe authentication information that chain node is sent, and according to the authentication contract of the authentication information and setting, to first user'sIdentity is authenticated.By the characteristic that can not be distorted of block chain network, by having the deal maker of certification permission to not yet passingThe identity of the deal maker of certification authenticates, and is realized according to the authentication information of generation and the authentication contract of setting to transactionMember's authentication effectively ensures the authenticity of deal maker's identity information, and transaction member's identity information can in the guarantee market OTCReliability reduces the risk traded in the market OTC.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodimentAttached drawing is briefly introduced, it should be apparent that, the drawings in the following description are only some examples of the present application, for thisFor the those of ordinary skill in field, without any creative labor, it can also be obtained according to these attached drawingsHis attached drawing.
Fig. 1 provides a kind of flow diagram of identity identifying method based on block chain for the embodiment of the present application;
Fig. 2 provides a kind of flow diagram of identity identifying method based on block chain for the embodiment of the present application;
Fig. 3 provides a kind of structural schematic diagram of ID authentication device based on block chain for the embodiment of the present application;
Fig. 4 provides a kind of structural schematic diagram of ID authentication device based on block chain for the embodiment of the present application.
Specific embodiment
In order to realize the purpose of the application, the embodiment of the present application provide a kind of identity identifying method based on block chain andEquipment, the first block chain node is according to the identity information of the first user, and there are incidence relations by determining and first user extremelyA few second user, and the second block chain node logged in second user described at least one sends certification request, instituteState the identity information in certification request comprising first user;Receive recognizing at least one the second block chain node transmissionInformation is demonstrate,proved, and according to the authentication contract of the authentication information and setting, the identity of first user is authenticated.It borrowsThe characteristic that can not be distorted for helping block chain network, by having body of the deal maker of certification permission to the deal maker for not yet passing certificationPart is authenticated, and is realized to deal maker's authentication, effectively according to the authentication information of generation and the authentication contract of settingIt ensures the authenticity of deal maker's identity information, guarantees the confidence level of transaction member's identity information in the market OTC, reduce the city OTCThe risk traded in.
It should be noted that " the first user " that is recorded in the embodiment of the present application, " first " in " second user " and "Two " do not have particular meaning, are only used to indicate different users;" the first block chain node " recorded in the embodiment of the present application, "" first " and " second " in two block chain nodes " does not have particular meaning, is only used to indicate arbitrary block in block chain networkChain node.
The each embodiment of the application is described in further detail with reference to the accompanying drawings of the specification.Obviously, describedEmbodiment is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this fieldThose of ordinary skill's all other embodiment obtained without making creative work belongs to the application protectionRange.
Fig. 1 is a kind of flow diagram of the identity identifying method based on block chain provided by the embodiments of the present application.It is describedMethod can be as follows.
Step 101: according to the identity information of the first user, determining and first user exists closes the first block chain nodeAt least one second user of connection relationship.
In the embodiment of the present application, the first block chain node can be used as the arbitrary node in block chain network, show shapeFormula can be a system client, and user is provided after logining successfully using system by system client login systemFunction.
Specifically, the first user completes registration by the first block chain node in system, and utilizes generation user informationLogin system.
Firstly, the first user sends registration request, at this time the first block chain to system by the first block chain nodeNode receives the registration request of first user, includes the identity information of first user in the registration request.
Here identity information is including but not limited to user name, login password, name, occupation, education background, work experienceEtc..
Such as: user initiates registration request by a certain system client, and carries in the registration request and filled inIdentity information.
Secondly, the first block chain node stores the registration request of first user.
Specifically, the first block chain node is in the case where receiving registration request, can should by way of broadcastThe identity information for including in registration request is sent to other nodes in block chain network.According to the conjunction of block chain information cochainAbout, in the case where determining that the registration request is verified, store the identity information for including in the registration request, i.e., it is so-calledIdentity information cochain.Here storage is not limited only to the storage of the first block chain node, further includes but is not limited to block chain networkIn all block chain nodes store the identity information for including in the registration request that the first user sends.
It should be noted that implementing here according to the contract of block chain information cochain to the verifying of registration request and the applicationThe authentication recorded in example is different.Here verifying is the data storage technology based on block chain, and being used to determine whether shouldIdentity information is stored into block chain network.There are many kinds of verification modes, such as: proof of work, equity prove etc., at thisVerification mode is not specifically limited in application embodiment.
For cochain user (registering the deal maker of completion), if having certification permission, or whether can be by itHis users to trust, it is also necessary to further the identity of the user be authenticated.So the first block chain node is used according to firstThe identity information at family, there are at least one second users of incidence relation with first user for lookup from block chain.
The incidence relation recorded in the embodiment of the present application includes but is not limited to that Peer Relationships (can be passed through according to the work of submissionGo through information judgement), transaction relationship (historical trading data that can be dispatched according to internet financial platform judges), acquaintance etc.Deng.
Step 102: the second block chain link that the first block chain node is logged in second user described at least onePoint sends certification request, includes the identity information of first user in the certification request.
In the embodiment of the present application, the second block chain link that the first block chain node can be logged in determining second userPoint sends certification request, and the certification request is for requesting second user to authenticate the identity of the first user.
Specifically, the first block chain node is according to the certification permission of the different user of storage, from it is determining with it is describedFirst user has the second user of certification permission there are filtering out at least one second user of incidence relation, and to screeningThe second block chain node that the second user that out at least one has certification permission is logged in sends certification request.
More preferably, there are at least one second use of incidence relation in determining and first user for the first block chain nodeIn the case where family, certification request can be sent by the way of broadcast, so that receiving other block chains of the certification requestNode realizes the authentication to the first user in the case where having certification permission.
Since there may be some second users not to authenticate permission in determining second user, in order to guarantee authentication informationCredibility, in the embodiment of the present application, firstly, whether the first block chain node determines at least one described second userHas certification permission.
Specifically, the first block chain node executes following operation for each determining second user respectively:
Search whether second user has certification permission.
Secondly, the first block chain node logged in at least one the described second user for having certification permission theTwo block chain nodes send certification request.
Step 103: the first block chain node receives the certification letter that at least one described second block chain node is sentBreath.
In the embodiment of the present application, the first block chain node receives what the second different block chain nodes was sent respectivelyAuthentication information.What needs to be explained here is that the mode that the second block chain node sends authentication information can use point-to-point transmissionMode, can also using broadcast transmission by the way of, sending method is not specifically limited here.
More preferably, the first block chain node stores the authentication information.
Wherein, in the authentication information comprising authenticated time, authenticating tag, first user user information, describedThe user information of second user, the authenticating tag characterize in the incidence relation between first user and the second userIt is at least one or a variety of.It also include the whether true information of subscriber identity information to be verified in the authentication information.
Specifically, the first block chain node is the case where receiving the authentication information of each second block chain node transmissionUnder, regardless of the authentication information indicates that subscriber identity information is true or untrue, the first block chain node stores the authentication information,Include authenticated time (can be the time for receiving authentication information), authenticating tag (i.e. the first user and the in the authentication informationIncidence relation between two users, such as: the corresponding colleague's label of Peer Relationships;Business relations correspond to service label), the first userUser information, one or more of the user information of second user.
Whether subscriber identity information to be verified here thinks that genuine information is a second user to the first userIdentity carries out what certification obtained, i.e., some second user authenticates the identity of the first user, generates subscriber identity informationBe true or subscriber identity information is false information, that is to say, that whether in authentication information comprising subscriber identity information be it is true, useFamily identity information is false one of information.
Step 104: the first block chain node is according to the authentication contract of the authentication information and setting, to describedThe identity of first user authenticates.
In the embodiment of the present application, the first block chain node is receiving the transmission of each second block chain nodeIn the case where authentication information, " whether subscriber identity information is genuine information " in authentication information read.
For the first block chain node in determining the authentication information received, authentication information is that subscriber identity information is trueAnd in the case that authentication information indicates that subscriber identity information is the authentication contract that genuine quantity meets setting, by describedThe authentication of first user.
Here the contract rule being arranged in the authentication contract set, which can be, indicates subscriber identity information really to recognizeThe quantity for demonstrate,proving information is greater than setting numerical value, that is to say, that once the first block chain node is determining the authentication information receivedIn, authentication information indicates that subscriber identity information is genuine information and indicates that the quantity that subscriber identity information is genuine authentication information is bigIn setting numerical value, illustrate the authentication contract for meeting setting.Once the first block chain node is recognized what determination receivedIt demonstrate,proves in information, authentication information indicates that the quantity that subscriber identity information is genuine information is not more than setting numerical value, illustrates to be unsatisfactory for settingFixed authentication contract.
Such as: the first block chain node receives the authentication information that different second block chain nodes are sent, and confirms and receivesInclude in authentication information is that subscriber identity information is genuine information or subscriber identity information is false information, if authentication informationIt is genuine information for subscriber identity information, then counter adds 1, otherwise, counter values are remained unchanged.When the numerical value of counterIn the case where greater than setting numerical value, pass through the authentication to first user.
More preferably, in the embodiment of the present application, the method also includes:
The first block chain node determines described first through authentication to first userThe certification permission of user, the certification permission, which characterizes first user, to authenticate the identity of other users;
Specifically, the first block chain node is through authentication to first user, for instituteIt states the first user and distributes (or open-minded) certification permission, is i.e. the first user can authenticate the identity of other users.
More preferably, the first block chain node broadcasts the certification permission of first user in block chain network, withThe certification permission of the first user is stored convenient for other block chain nodes in block chain network.
In the embodiment of the present application, the executing subject of the embodiment of the present application can be any one area in block chain networkBlock chain node is also possible to all block chain nodes, can also be block chain node (i.e. the first block chain that the first user logs inNode), above-described embodiment is described using the first block chain node as executing subject, but the executing subject of this programme not officeIt is limited to the first block chain node.
By technical solution provided by the embodiments of the present application, the first block chain node according to the identity information of the first user,It determines that there are at least one second users of incidence relation with first user, and is stepped on to second user described at least oneSecond block chain node of record sends certification request, includes the identity information of first user in the certification request;It receivesThe authentication information that at least one described second block chain node is sent, and closed according to the authentication of the authentication information and settingAbout, the identity of first user is authenticated.By the characteristic that can not be distorted of block chain network, by having certification permissionDeal maker the identity for the deal maker for not yet passing certification is authenticated, and according to the identity of the authentication information of generation and settingIt authenticates contract to realize to deal maker's authentication, effectively ensures the authenticity of deal maker's identity information, guarantee to hand in the market OTCThe confidence level of easy member identities' information, reduces the risk traded in the market OTC.
Fig. 2 is a kind of flow diagram of the identity identifying method based on block chain provided by the embodiments of the present application.It is describedMethod can be as follows.
Step 201: the second block chain node receives the certification request that the first block chain node is sent, in the certification requestIdentity information comprising the first user.
In the embodiment of the present application, since the first block chain node can be sent and be recognized using broadcast or point-to-point modeCard request, then the second block chain node receives the certification request that the first block chain node is sent.
Step 202: the second block chain node determines that log in second uses according to the identity information of first userIncidence relation between family and first user.
In the embodiment of the present application, the second block chain node is in the case where receiving certification request, according to certification requestIn include the first user identity information and login second user user information, determine log in second user with it is describedIt whether there is incidence relation between first user.
Such as: whether in second user friend information have first user, search the transaction pair in historical transactional information if searchingWhether there is second user etc. in hand.
Step 203: the second block chain node recognizes the identity of first user according to the incidence relationCard.
In the embodiment of the present application, the second block chain node once it is determined that log in second user and the first user itBetween there are incidence relations, prompt information can be sent, prompt log in second user the identity of the first user is authenticated, andAccording to the information that second user inputs, authentication information is generated, the first block chain node is sent to.
Fig. 3 is a kind of structural schematic diagram of the ID authentication device based on block chain provided by the embodiments of the present application.It is describedID authentication device comprises determining that unit 301, transmission unit 302 and authentication unit 303, in which:
Determination unit 301 determines that there are incidence relations with first user for the identity information according to the first userAt least one second user;
Transmission unit 302, the second block chain node for being logged in second user described at least one send certificationIt requests, includes the identity information of first user in the certification request;
Authentication unit 303, the authentication information sent for receiving at least one described second block chain node, and according to instituteThe authentication contract for stating authentication information and setting authenticates the identity of first user.
In another embodiment of the application, the authentication unit 303 is according to the identity of the authentication information and settingContract is authenticated, the identity of first user is authenticated, comprising:
Determining that the authentication information received is to indicate that subscriber identity information is genuine information and indicates user identityInformation is in the case that the quantity of genuine information meets the authentication contract set, to be recognized by the identity to first userCard.
In another embodiment of the application, the ID authentication device further include: certification priority assignation unit 304,Wherein:
The certification priority assignation unit 304, for being through authentication to first userFirst user distributes certification permission, and the certification permission, which characterizes first user, to carry out the identity of other usersCertification.
In another embodiment of the application, the ID authentication device further include: radio unit 305, wherein describedRadio unit 305, for broadcasting the certification permission of first user in block chain network.
In another embodiment of the application, the ID authentication device further include: storage unit 306, wherein;
The storage unit 306, for receiving at least one described second block chain node in the authentication unit 303In the case where the authentication information of transmission, store the authentication information, in the authentication information comprising authenticated time, authenticating tag,At least one or multiple of the user information of first user, user information of the second user, the certification letterIt further include whether subscriber identity information is genuine information in breath, the authenticating tag characterizes first user and described second and usesIncidence relation between family.
In another embodiment of the application, the ID authentication device further include: receiving unit 307, in which:
The receiving unit 307 includes described in the registration request for receiving the registration request of first userThe identity information of first user;Store the registration request of first user.
In another embodiment of the application, the transmission unit 302 is logged in second user described at least oneThe second block chain node send certification request, comprising:
Broadcast authentication is requested in block chain network;
Alternatively, having described the second of certification permission according to the certification permission of the different user of storage at least one and usingThe second block chain node that family is logged in sends certification request.
It should be noted that the ID authentication device recorded in the embodiment of the present application can be realized by software mode,It can be realized by hardware mode, be not specifically limited here.ID authentication device is determined according to the identity information of the first userThere are at least one second users of incidence relation with first user, and logged in second user described at least oneSecond block chain node sends certification request, includes the identity information of first user in the certification request;It receives at leastThe authentication information that one the second block chain node is sent, and according to the authentication contract of the authentication information and setting,The identity of first user is authenticated.By the characteristic that can not be distorted of block chain network, by having certification permissionDeal maker authenticates the identity for the deal maker for not yet passing certification, and is recognized according to the authentication information of generation and the identity of settingIt demonstrate,proves contract to realize to deal maker's authentication, effectively ensures the authenticity of deal maker's identity information, guarantee to trade in the market OTCThe confidence level of member identities' information reduces the risk traded in the market OTC.
Based on the same inventive concept, the embodiment of the present application also provides a kind of ID authentication device based on block chain,Including at least one processor and memory, the memory is stored with program, and be configured to by it is described at least oneIt manages device and executes following steps:
According to the identity information of the first user, determining there are at least one second use of incidence relation with first userFamily;
The the second block chain node logged in second user described at least one sends certification request, the certification requestIn include first user identity information;
The authentication information that at least one described second block chain node is sent is received, and according to the authentication information and settingAuthentication contract, the identity of first user is authenticated.
The processor recorded in the embodiment of the present application can be central processing unit, can also be other controllers, here notIt is specifically limited.
Fig. 4 is a kind of structural schematic diagram of the ID authentication device based on block chain provided by the embodiments of the present application.It is describedID authentication device includes: receiving unit 401, determination unit 402 and authentication unit 403, in which:
Receiving unit 401, for receiving the certification request of the first block chain node transmission, comprising the in the certification requestThe identity information of one user;
Determination unit 402 determines the second user logged in and described for the identity information according to first userIncidence relation between one user;
Authentication unit 403, for being authenticated to the identity of first user according to the incidence relation.
It should be noted that ID authentication device provided by the embodiments of the present application can be realized by software mode, it can alsoTo be realized by hardware mode, it is not specifically limited here.
Based on the same inventive concept, the embodiment of the present application also provides a kind of ID authentication device based on block chain,Including at least one processor and memory, the memory is stored with program, and be configured to by it is described at least oneIt manages device and executes following steps:
The certification request of the first block chain node transmission is received, the identity comprising the first user is believed in the certification requestBreath;
According to the identity information of first user, being associated between the second user logged in and first user is determinedRelationship;
According to the incidence relation, the identity of first user is authenticated.
It will be understood by those skilled in the art that embodiments herein can provide as method, apparatus (equipment) or computerProgram product.Therefore, in terms of the application can be used complete hardware embodiment, complete software embodiment or combine software and hardwareEmbodiment form.Moreover, it wherein includes the meter of computer usable program code that the application, which can be used in one or more,The computer journey implemented in calculation machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)The form of sequence product.
The application is flow chart of the reference according to method, apparatus (equipment) and computer program product of the embodiment of the present applicationAnd/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructionsAnd/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer toEnable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generateOne machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizingThe device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spyDetermine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram orThe function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that countingSeries of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer orThe instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram oneThe step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basicProperty concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted asIt selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the applicationMind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologiesWithin, then the application is also intended to include these modifications and variations.

Claims (10)

CN201811123678.3A2018-09-262018-09-26A kind of identity identifying method and equipment based on block chainPendingCN109255619A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201811123678.3ACN109255619A (en)2018-09-262018-09-26A kind of identity identifying method and equipment based on block chain

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201811123678.3ACN109255619A (en)2018-09-262018-09-26A kind of identity identifying method and equipment based on block chain

Publications (1)

Publication NumberPublication Date
CN109255619Atrue CN109255619A (en)2019-01-22

Family

ID=65047380

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201811123678.3APendingCN109255619A (en)2018-09-262018-09-26A kind of identity identifying method and equipment based on block chain

Country Status (1)

CountryLink
CN (1)CN109255619A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110060060A (en)*2019-03-012019-07-26阿里巴巴集团控股有限公司Method of controlling security, device, electronic equipment and computer readable storage medium
CN110443624A (en)*2019-07-312019-11-12中国工商银行股份有限公司Shou Dan trade company checking method and node apparatus based on block chain
CN110473102A (en)*2019-08-152019-11-19广州蚁比特区块链科技有限公司Transaction processing method, device and block chain node
CN110599190A (en)*2019-09-272019-12-20支付宝(杭州)信息技术有限公司Identity authentication method and device based on block chain
CN111444271A (en)*2020-03-052020-07-24链农(深圳)信息科技有限公司Information collection and judgment method and system based on block chain
US10791122B2 (en)2019-07-042020-09-29Alibaba Group Holding LimitedBlockchain user account data
CN112115523A (en)*2020-09-302020-12-22海南大学Data self-destruction encryption storage device
CN112134883A (en)*2020-09-222020-12-25北京八分量信息科技有限公司Method and device for quickly authenticating trust relationship between nodes based on trusted computing and related products
WO2021000578A1 (en)*2019-07-042021-01-07创新先进技术有限公司Method, device and apparatus for creating user in chained-block account book
CN113190813A (en)*2021-05-252021-07-30数字广东网络建设有限公司Dual-authentication processing method, device, equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106375317A (en)*2016-08-312017-02-01北京明朝万达科技股份有限公司Block chain-based big data security authentication method and system
CN107426157A (en)*2017-04-212017-12-01杭州趣链科技有限公司A kind of alliance's chain authority control method based on digital certificate and ca authentication system
WO2018046009A1 (en)*2016-09-122018-03-15上海鼎利信息科技有限公司Block chain identity system
CN108551437A (en)*2018-03-132018-09-18百度在线网络技术(北京)有限公司Method and apparatus for authentication information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106375317A (en)*2016-08-312017-02-01北京明朝万达科技股份有限公司Block chain-based big data security authentication method and system
WO2018046009A1 (en)*2016-09-122018-03-15上海鼎利信息科技有限公司Block chain identity system
CN107426157A (en)*2017-04-212017-12-01杭州趣链科技有限公司A kind of alliance's chain authority control method based on digital certificate and ca authentication system
CN108551437A (en)*2018-03-132018-09-18百度在线网络技术(北京)有限公司Method and apparatus for authentication information

Cited By (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110060060B (en)*2019-03-012023-03-31创新先进技术有限公司Security control method and device, electronic equipment and computer readable storage medium
CN110060060A (en)*2019-03-012019-07-26阿里巴巴集团控股有限公司Method of controlling security, device, electronic equipment and computer readable storage medium
US10791122B2 (en)2019-07-042020-09-29Alibaba Group Holding LimitedBlockchain user account data
WO2021000578A1 (en)*2019-07-042021-01-07创新先进技术有限公司Method, device and apparatus for creating user in chained-block account book
CN110443624A (en)*2019-07-312019-11-12中国工商银行股份有限公司Shou Dan trade company checking method and node apparatus based on block chain
CN110473102A (en)*2019-08-152019-11-19广州蚁比特区块链科技有限公司Transaction processing method, device and block chain node
CN110599190A (en)*2019-09-272019-12-20支付宝(杭州)信息技术有限公司Identity authentication method and device based on block chain
CN110599190B (en)*2019-09-272022-10-21支付宝(杭州)信息技术有限公司Identity authentication method and device based on block chain
CN111444271A (en)*2020-03-052020-07-24链农(深圳)信息科技有限公司Information collection and judgment method and system based on block chain
CN112134883A (en)*2020-09-222020-12-25北京八分量信息科技有限公司Method and device for quickly authenticating trust relationship between nodes based on trusted computing and related products
CN112134883B (en)*2020-09-222023-05-30北京八分量信息科技有限公司 Method, device and related products for fast authentication of trust relationship between nodes based on trusted computing
CN112115523A (en)*2020-09-302020-12-22海南大学Data self-destruction encryption storage device
CN113190813A (en)*2021-05-252021-07-30数字广东网络建设有限公司Dual-authentication processing method, device, equipment and medium
CN113190813B (en)*2021-05-252024-08-02数字广东网络建设有限公司Dual authentication processing method, device, equipment and medium

Similar Documents

PublicationPublication DateTitle
CN109255619A (en)A kind of identity identifying method and equipment based on block chain
Pasdar et al.Connect API with blockchain: A survey on blockchain oracle implementation
KR102009160B1 (en)Information trust engine system based on block-chain
KR102131292B1 (en)Method for managing trust information based on block-chain
US9978094B2 (en)Tokenization revocation list
US8719911B2 (en)Methods, systems, and computer program products for authenticating an identity of a user by generating a confidence indicator of the identity of the user based on a combination of multiple authentication techniques
US12248600B2 (en)Portable reputation brokering using linked blockchains and shared events
CN111034114A (en)Block chain structure with recording safety
CN105719172A (en)Information issuing method and device
CN105871786B (en)A kind of verification method of user information, device and system
CN108352021A (en)Method and system for authentication data collection and reporting associated with online transactions
HK1244098A1 (en)Systems and methods for personal identification and verification
WO2015158874A1 (en)Method and system for user authentication
CN102067145A (en)Obtaining digital identities or tokens through independent endpoint resolution
CN108418808A (en)Identity information changes method, apparatus, terminal device and storage medium
US20240187416A1 (en)Systems and methods for enhanced authorization messages
US11997103B2 (en)Graduated accounts using assertions
CN112000744A (en)Signature method and related equipment
CN112700250A (en)Identity authentication method, device and system in financial scene
Ye et al.An anonymous and fair auction system based on blockchain
CN108352010A (en)Method and system for administrative authentication services client data
CN112862589A (en)Identity verification method, device and system in financial scene
Packin et al.Decentralized credit scoring: Black box 3.0
US11682016B2 (en)System to perform identity verification
CN105631665A (en)Security payment method based on PKI

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
TA01Transfer of patent application right
TA01Transfer of patent application right

Effective date of registration:20200113

Address after:Room 0112-168, 01 Floor, 26 Shangdi Information Road, Haidian District, Beijing 100084

Applicant after:Asian Union Innovation Technology Co.,Ltd.

Address before:100088 Floor 1206, Block B, Building 8, Guanchengyuan, Haidian District, Beijing

Applicant before:BEIJING AFCA STAR INFORMATION TECHNOLOGY Co.,Ltd.

RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20190122


[8]ページ先頭

©2009-2025 Movatter.jp