Identity verification method based on block chain

文档序号:1831442 发布日期:2021-11-12 浏览:17次 中文

阅读说明:本技术 一种基于区块链的身份验证方法 (Identity verification method based on block chain ) 是由 王保春 张蛟鹏 余洋 莫恒 于 2021-08-14 设计创作,主要内容包括:本发明公开了一种基于区块链的身份验证方法,包括如下步骤:S1、确定验证方式,并对于身份验证信息的正确率进行确定;S2、确定后,判断电子信息的正确率,通过数据库对于身份信息进行验证;S3、验证合格后对于身份确定,并同时通知相关的后台与操作人员,并生成操作记录;S4、确定后,通知系统正常使用,本发明结构科学合理,使用安全方便,通过多种验证方式进行更好的对于身份信息进行验证,选择对于其方便的验证模数,其次通过数据库对于身份信息进行验证,让每个参与节点都能获得一份完整数据库的拷贝,其中验证方式可以通过第三方进行协调,大大提高了安全与多项性。(The invention discloses an identity verification method based on a block chain, which comprises the following steps: s1, determining a verification mode and determining the accuracy of the identity verification information; s2, after the determination, judging the accuracy of the electronic information, and verifying the identity information through the database; s3, after the verification is qualified, the identity is determined, related backstage and operators are informed, and an operation record is generated; s4, after the confirmation, the system is informed of normal use, the invention has scientific and reasonable structure and safe and convenient use, identity information is better verified through a plurality of verification modes, a convenient verification modulus is selected, then the identity information is verified through the database, each participating node can obtain a copy of a complete database, wherein the verification modes can be coordinated through a third party, and the safety and the diversity are greatly improved.)

1. An identity authentication method based on a block chain is characterized in that: the method comprises the following steps:

s1, determining a verification mode and determining the accuracy of the identity verification information;

s2, after the determination, judging the accuracy of the electronic information, and verifying the identity information through the database;

s3, after the verification is qualified, the identity is determined, related backstage and operators are informed, and an operation record is generated;

and S4, after the determination, informing the system of normal use.

2. The identity verification method based on the blockchain according to claim 1, wherein the verification means in S1 includes an electronic signature, a digital certificate, and an electronic certificate;

the electronic signature is data which is contained in an electronic form in a data message, attached to the data message and used for identifying the identity of a signer and indicating that the signer approves the content of the data message;

the digital signature is that a pair of uniquely matched asymmetric keys, namely a public key and a private key, is established through a mathematical operation, and signature and verification are realized by encrypting and decrypting a data message by using an asymmetric cipher encryption system;

the digital certificate is a data message or other electronic files containing public key data and identity information of the electronic signer, and the relation between the electronic signer and the private key is established through a corresponding relation between the public key and the private key;

the electronic authentication is an activity for providing proof for authenticity and reliability of the electronic signature, and comprises three parts of authenticity authentication of the identity of a signer, reliability authentication of a signature process and integrity authentication of a data message.

3. The identity verification method based on the blockchain as claimed in claim 2, wherein the electronic certification is a entrusted service performed by a third party organization, the third party electronic certification service organization is determined by a monitoring organization, then a certificate and a verification service are signed and issued by the third party electronic certification service organization, the network principal of the certificate side sends information to the network principal of the verification side through a signature, and the network principal of the verification side performs interpretation through the signature information.

4. The blockchain-based identity authentication method of claim 1, wherein in the step S2, each participating node can obtain a copy of the complete database through the form of a distributed database, and unless more than 51% of nodes in the whole system are controlled simultaneously, the modification to the database at a single node is invalid and cannot affect the data content at other nodes.

5. The identity verification method based on the block chain as claimed in claim 4, wherein the data blocks of the database are commonly maintained by all nodes with maintenance function in the whole server, and the nodes with maintenance function can participate by anyone.

6. The blockchain-based identity authentication method according to claim 1, wherein a blockchain, biometric features, and network behavior analysis identity authentication technique are introduced and fused in S3 to form a PKI technology-based network trust service;

the accounting nodes achieve consensus in what way, and the block chain provides four different consensus mechanisms, so that the method is suitable for different application scenarios.

7. The blockchain-based identity authentication method of claim 1, wherein the record in S3 is saved by the server, and meanwhile, the data in the server is saved only by reading, and then, the information of the system is modified once.

Technical Field

The invention relates to the technical field of block chains, in particular to an identity authentication method based on a block chain.

Background

The block chain is a term in the technical field of information, and essentially, the block chain is a shared database, data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'open transparency', 'collective maintenance' and the like, and based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has a wide application prospect;

however, the identity authentication method of the block chain in the current market is single, and the correct authentication mode of the block chain cannot be determined, so that the problems of authentication errors and low authentication efficiency are caused.

Disclosure of Invention

The invention provides an identity authentication method based on a block chain, which can effectively solve the problems that the identity authentication method of the block chain in the current market is single, the correct authentication mode of the block chain cannot be determined, and the authentication error and the authentication efficiency are low in the background technology.

In order to achieve the purpose, the invention provides the following technical scheme: an identity authentication method based on a block chain comprises the following steps:

s1, determining a verification mode and determining the accuracy of the identity verification information;

s2, after the determination, judging the accuracy of the electronic information, and verifying the identity information through the database;

s3, after the verification is qualified, the identity is determined, related backstage and operators are informed, and an operation record is generated;

and S4, after the determination, informing the system of normal use.

According to the above technical solution, the verification means in S1 includes an electronic signature, a digital certificate, and an electronic certificate;

the electronic signature is data which is contained in an electronic form in a data message, attached to the data message and used for identifying the identity of a signer and indicating that the signer approves the content of the data message;

the digital signature is that a pair of uniquely matched asymmetric keys, namely a public key and a private key, is established through a mathematical operation, and signature and verification are realized by encrypting and decrypting a data message by using an asymmetric cipher encryption system;

the digital certificate is a data message or other electronic files containing public key data and identity information of the electronic signer, and the relation between the electronic signer and the private key is established through a corresponding relation between the public key and the private key;

the electronic authentication is an activity for providing proof for authenticity and reliability of the electronic signature, and comprises three parts of authenticity authentication of the identity of a signer, reliability authentication of a signature process and integrity authentication of a data message.

According to the technical scheme, the electronic authentication is that a third-party organization carries out entrusted service, a certificate and verification service are signed and issued through the third-party electronic authentication service organization determined by a monitoring organization, a network main body of a certificate end sends information to a network main body of a verification end through a signature, and the network main body of the verification end carries out interpretation through signature information.

According to the above technical solution, in S2, each participating node can obtain a copy of the complete database in the form of a distributed database, and unless more than 51% of nodes in the entire system are controlled simultaneously, modification of the database on a single node is invalid and cannot affect data contents on other nodes.

According to the technical scheme, the data blocks of the database are commonly maintained by all nodes with the maintenance function in the whole server, and the nodes with the maintenance function can participate by anyone.

According to the technical scheme, a block chain, biological characteristics and network behavior analysis identity authentication technology are introduced and fused in the S3, and a network trust service based on a PKI technology is formed;

the accounting nodes achieve consensus in what way, and the block chain provides four different consensus mechanisms, so that the method is suitable for different application scenarios.

According to the technical scheme, the record in the S3 is saved through the server, meanwhile, the data in the server is saved only, and then, the information of the system is modified once.

Compared with the prior art, the invention has the beneficial effects that: the invention has scientific and reasonable structure, safe and convenient use, better verifies the identity information through various verification modes, selects a convenient verification modulus, verifies the identity information through the database, and ensures that each participating node can obtain a copy of a complete database, wherein the verification modes can be coordinated through a third party, thereby greatly improving the safety and the multinomial property, and then the data blocks of the database are commonly maintained by all nodes with maintenance functions in the whole server, and the nodes with the maintenance functions can be participated in by anyone, thereby facilitating the whole data movement, being convenient and fast, finally introducing and fusing a block chain, biological characteristics and network behavior analysis identity authentication technology, forming a network trust service based on a PKI technology, and being suitable for better popularization and use.

Drawings

The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.

In the drawings:

fig. 1 is a schematic structural view of the present invention.

Detailed Description

The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.

Example (b): as shown in fig. 1, the present invention provides a technical solution, and an identity authentication method based on a block chain, including the following steps:

s1, determining a verification mode and determining the accuracy of the identity verification information;

s2, after the determination, judging the accuracy of the electronic information, and verifying the identity information through the database;

s3, after the verification is qualified, the identity is determined, related backstage and operators are informed, and an operation record is generated;

and S4, after the determination, informing the system of normal use.

According to the technical scheme, the verification mode in the S1 comprises an electronic signature, a digital certificate and electronic authentication;

the electronic signature is data which is contained in an electronic form in a data message, attached to the data message and used for identifying the identity of a signer and indicating that the signer approves the content of the data message;

the digital signature is that a pair of uniquely matched asymmetric keys, namely a public key and a private key, are established through a mathematical operation, and signature and verification are realized by encrypting and decrypting a data message by using an asymmetric cipher encryption system;

the digital certificate is a data message or other electronic files containing public key data and identity information of the electronic signer, and the relation between the electronic signer and the private key is established through a corresponding relation between the public key and the private key;

the electronic authentication is an activity for providing proof for the authenticity and the reliability of the electronic signature, and comprises three parts of authenticity authentication of the identity of a signer, reliability authentication of a signature process and integrity authentication of a data message.

According to the technical scheme, the electronic authentication is that a third-party organization carries out entrusted service, a certificate and verification service is signed and issued through the third-party electronic authentication service organization determined by a monitoring organization, a network main body of a certificate end sends information to a network main body of a verification end through a signature, and the network main body of the verification end carries out interpretation through signature information.

According to the technical scheme, each participating node can obtain a copy of the complete database in the form of a distributed database in S2, and unless more than 51% of nodes in the whole system are controlled simultaneously, modification of the database on a single node is ineffective, and data content on other nodes cannot be influenced.

According to the technical scheme, the data blocks of the database are commonly maintained by all nodes with the maintenance function in the whole server, and the nodes with the maintenance function can participate by anyone.

According to the technical scheme, a block chain, biological characteristics and network behavior analysis identity authentication technology are introduced and fused in S3, and a network trust service based on a PKI technology is formed;

the accounting nodes achieve consensus in what way, and the block chain provides four different consensus mechanisms, so that the method is suitable for different application scenarios.

According to the technical scheme, the record in the S3 is saved through the server, meanwhile, the data in the server is saved only, and then, the information of the system is modified once.

Compared with the prior art, the invention has the beneficial effects that: the invention has scientific and reasonable structure, safe and convenient use, better verifies the identity information through various verification modes, selects a convenient verification modulus, verifies the identity information through the database, and ensures that each participating node can obtain a copy of a complete database, wherein the verification modes can be coordinated through a third party, thereby greatly improving the safety and the multinomial property, and then the data blocks of the database are commonly maintained by all nodes with maintenance functions in the whole server, and the nodes with the maintenance functions can be participated in by anyone, thereby facilitating the whole data movement, being convenient and fast, finally introducing and fusing a block chain, biological characteristics and network behavior analysis identity authentication technology, forming a network trust service based on a PKI technology, and being suitable for better popularization and use.

Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

6页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种基于间隔式训练的云计算信息安全的改善方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类