[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112328686A - Block chain link point sharing method based on digital certificate and related products thereof - Google Patents

Block chain link point sharing method based on digital certificate and related products thereof Download PDF

Info

Publication number
CN112328686A
CN112328686A CN202011228528.6A CN202011228528A CN112328686A CN 112328686 A CN112328686 A CN 112328686A CN 202011228528 A CN202011228528 A CN 202011228528A CN 112328686 A CN112328686 A CN 112328686A
Authority
CN
China
Prior art keywords
user
digital certificate
ciphertext
identity information
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011228528.6A
Other languages
Chinese (zh)
Inventor
王梦寒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN202011228528.6A priority Critical patent/CN112328686A/en
Publication of CN112328686A publication Critical patent/CN112328686A/en
Priority to PCT/CN2021/124690 priority patent/WO2022095694A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the application relates to the technical field of block chains, in particular to a block chain link point sharing method based on a digital certificate and a related product thereof, wherein the block chain link point sharing method based on the digital certificate comprises the following steps: acquiring identity information of a first user; determining a digital certificate of the first user according to the identity information of the first user; and encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and chaining the first ciphertext. According to the embodiment of the application, the digital certificate is combined with the block chain, so that the problem of user identity authentication security of the block chain link point is solved.

Description

Block chain link point sharing method based on digital certificate and related products thereof
Technical Field
The application relates to the technical field of block chains, in particular to a block chain link point sharing method based on a digital certificate and a related product thereof.
Background
The block chain is a shared database, is used for storing data or information in the database, and has the characteristics of unforgeability, whole-course trace, traceability, public transparency, collective maintenance and the like. Based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect. Blockchains are involved in more and more commercial scenarios.
In the blockchain network, when some enterprises and individuals access the blockchain, a blockchain node is required to be used as an access terminal to access the blockchain network. At present, the nodes of a block chain are basically clusters formed by a plurality of computers together, and the cost is high; the scheme of using the mobile terminal block chain node as the access node, but when the mobile terminal equipment realizes that multiple users share the same block chain node, the security of user data is weaker, so how to ensure the data security of each user when multiple users share the same block chain node.
Disclosure of Invention
The embodiments of the present application mainly aim to provide a block chain node sharing method based on a digital certificate and a related product thereof, which can effectively solve the data security problem of each user when multiple users share the same block chain node.
In a first aspect, an embodiment of the present application provides a block link point sharing method based on a digital certificate, which is applied to an electronic device, and the method includes:
acquiring identity information of a first user;
determining a digital certificate of the first user according to the identity information of the first user, wherein the digital certificate is used for representing the online legal identity of the first user;
and encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and chaining the first ciphertext.
Optionally, encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and chaining the first ciphertext, where the encrypting the first ciphertext includes: and encrypting the first data according to a private key of a digital certificate to obtain the first ciphertext, and chaining the first ciphertext.
Optionally, after encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext and chaining the first ciphertext, the method further includes: and encrypting the digital certificate to obtain a second ciphertext, and chaining the second ciphertext.
Optionally, the determining the digital certificate of the first user according to the identity information of the first user includes: and performing identity authentication on the identity information of the first user through a third-party platform, and determining the digital certificate of the first user, wherein the third-party platform is a digital certificate issuing authority platform.
Optionally, the performing, by the third party platform, identity authentication on the identity information of the first user to determine the digital certificate of the first user includes: under the condition that the first user is a person, performing primary identity information authentication according to the name, the gender and the identity card number in the identity information of the first user and the user information in the third-party platform; if the primary identity information of the first user passes the authentication, performing face recognition authentication on the acquired first face image and a second face image in the identity information of the first user; if the preliminary identity information authentication and the face recognition authentication pass, sending the personal name, sex, identity card number and face image information in the identity information of the first user to a third-party platform; and determining that the digital certificate of the first user is a digital certificate corresponding to the first user from the third-party platform.
Optionally, the performing, by the third party platform, identity authentication on the identity information of the first user to determine the digital certificate of the first user includes: when the first user is an enterprise, performing authentication of the primary identity information of the first user according to the enterprise name, the enterprise number and the enterprise qualification information of the first user; if the primary identity information of the first user passes the authentication, performing face recognition authentication on the acquired first face image and a second face image of the first user; after the second face image of the first user passes face identification authentication, sending the enterprise name, the enterprise number, the enterprise qualification information and the face image information of the enterprise legal person of the identity information of the enterprise to the third-party platform; and determining that the digital certificate of the first user is a digital certificate corresponding to the first user from the third-party platform.
Optionally, the method further includes: acquiring the first data; determining a signer corresponding to the first data according to the digital certificate signature information of the first data; acquiring a public key of the signer; and verifying the second ciphertext according to the public key, determining whether the first data is signed and linked by a third-party platform, and determining whether the signer is the first user.
In a second aspect, an embodiment of the present application provides a digital certificate-based block link point sharing apparatus, including:
the acquiring unit is used for acquiring the identity information of the first user;
the determining unit is used for determining the digital certificate of the first user according to the identity information of the first user, wherein the digital certificates of the first user and the first user are in one-to-one correspondence, and the digital certificate is used for representing the online legal identity of the first user;
and the uplink unit is used for encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext and uplink the first ciphertext.
Optionally, in the step of encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and in the step of chaining the first ciphertext, the chaining unit is specifically configured to: and encrypting the first data according to a private key of a digital certificate to obtain the first ciphertext, and chaining the first ciphertext.
Optionally, the encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and the uplink unit after uplink of the first ciphertext is further specifically configured to: and encrypting the digital certificate to obtain a second ciphertext, and chaining the second ciphertext.
Optionally, in the aspect of determining the digital certificate of the first user according to the identity information of the first user, the determining unit is specifically configured to: and performing identity authentication on the identity information of the first user through a third-party platform, and determining the digital certificate of the first user, wherein the third-party platform is a digital certificate issuing authority platform.
Optionally, in the aspect of performing identity authentication on the identity information of the first user through the third-party platform and determining the digital certificate of the first user, the determining unit is specifically configured to: under the condition that the first user is a person, performing primary identity information authentication according to the name, the gender and the identity card number in the identity information of the first user and the user information in the third-party platform; if the primary identity information of the first user passes the authentication, performing face recognition authentication on the acquired first face image and a second face image in the identity information of the first user; if the preliminary identity information authentication and the face recognition authentication pass, sending the personal name, sex, identity card number and face image information in the identity information of the first user to a third-party platform; and determining that the digital certificate of the first user is a digital certificate corresponding to the first user from the third-party platform.
Optionally, in the aspect of performing identity authentication on the identity information of the first user through the third-party platform and determining the digital certificate of the first user, the determining unit is specifically configured to: when the first user is an enterprise, performing authentication of the primary identity information of the first user according to the enterprise name, the enterprise number and the enterprise qualification information of the first user; if the primary identity information of the first user passes the authentication, performing face recognition authentication on the acquired first face image and a second face image of the first user; after the second face image of the first user passes face identification authentication, sending the enterprise name, the enterprise number, the enterprise qualification information and the face image information of the enterprise legal person of the identity information of the enterprise to the third-party platform; and determining that the digital certificate of the first user is a digital certificate corresponding to the first user from the third-party platform.
Optionally, the block link point sharing device based on the digital certificate is further configured to: acquiring the first data; determining a signer corresponding to the first data according to the digital certificate signature information of the first data; acquiring a public key of the signer; and verifying the second ciphertext according to the public key, determining whether the first data is signed and linked by a third-party platform, and determining whether the signer is the first user.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing steps in any method of the first aspect of the embodiment of the present application.
In a fourth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program makes a computer perform part or all of the steps described in any one of the methods of the first aspect of the present application.
In a fifth aspect, the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform some or all of the steps as described in any one of the methods of the first aspect of the embodiments of the present application. The computer program product may be a software installation package.
It can be seen that, in the embodiment of the application, the identity information of the first user is obtained; determining a digital certificate of the first user according to the identity information of the first user; and encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and chaining the first ciphertext. According to the embodiment of the application, the digital certificate is combined with the block chain, so that the problem of user identity authentication security of the block chain link point is solved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario of block link point sharing based on a digital certificate according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a block link point sharing method based on a digital certificate according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a block link point sharing method based on a digital certificate according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 5 is a block diagram illustrating functional units of a block link point sharing device based on a digital certificate according to an embodiment of the present disclosure.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Fig. 1 is a schematic view of an application scenario of digital certificate-based blockchain node sharing, for example, in fig. 1, a first user 101 accesses a blockchain network 103 through a first blockchain node 102 to upload first data of the first user.
The following describes embodiments of the present application in detail.
In order to solve the problem of weak security of user identity authentication of a blockchain node, the present application provides a method for sharing a blockchain node based on a digital certificate, which is applied to an electronic device, specifically as shown in fig. 2, the method may include, but is not limited to, the following steps:
s201, the electronic equipment acquires identity information of a first user;
the identity information of the first user may be identity information of an individual, and may be identity information of an enterprise. The identity information of the individual includes: personal identification card information, professional information. The identity card information includes: name, gender, identification card number and face image information. Professional information includes the industry involved, the company engaged. Identity information for an enterprise includes: enterprise name, enterprise number, enterprise qualification information and enterprise legal person face image information. The enterprise qualification information comprises: enterprise registered fund information and enterprise scale information. In a specific implementation, if the first user is an individual, the electronic device obtains identity information of the first user, including: the electronic equipment acquires the professional information of the individual in the personal identity information and the name, the sex, the identity card number and the face image information in the identity card information. For example, the first user is an individual, the individual is Zhang III, the electronic device obtains face image information, wherein professional information in the identity information of Zhang III is a product manager of the employment internet industry, a name in the identity card information is Zhang III, a gender is a woman, an identity card number is 440121189012213456, and face image information is Zhang III.
It should be further explained that the acquisition of the face image information may be realized by the following specific steps: acquiring the first time length and the number of the face images, and acquiring the face images according to the first time length and the number of the face images. For example, the electronic device acquires a first time length of 1 second and the number of face images of 3, acquires a first face image, acquires a second face image after the first time length of 1 second, and acquires a third face image after the first time length of 1 second.
In a specific implementation, if the first user is an enterprise, the obtaining, by the electronic device, identity information of the first user includes: the electronic equipment acquires the enterprise name, the enterprise number, the enterprise registered fund information, the enterprise scale information and the enterprise legal person face image information in the enterprise qualification information in the identity information of the enterprise. For example, if the first user is an enterprise, the enterprise is a certain limited company, the electronic device obtains the enterprise name "the certain limited company" of the certain limited company, the enterprise number "000000000" of the enterprise registered fund information is 1000 thousands of registered fund, the enterprise scale information is 300 plus 500 employees, and the turnover number is 8000 thousands per year, and the enterprise legal person face image information is the facial image information of a legal person of the certain limited company.
It should be further explained that the acquisition of the face image information of the corporate identity may be realized by the following specific steps: and acquiring the first time length and the number of the face images of the enterprise legal person, and acquiring the face images of the enterprise legal person according to the first time length and the number of the face images of the enterprise legal person. For example, the first duration is 1 second and the number of the enterprise legal person face images is 3, when the first enterprise legal person face image is obtained, the second enterprise legal person face image is obtained after the first duration is 1 second, and the third enterprise legal person face image is obtained after the first duration is 1 second.
The electronic device according to the embodiments of the present application may be a communication-capable electronic device, and the electronic device may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices, or other processing devices connected to a wireless modem, which have wireless communication functions.
S202, the electronic equipment determines a digital certificate of the first user according to the identity information of the first user;
wherein the digital certificate is used for representing the legal identity of the first user on the line. When the first user is a person Zhang III, the digital certificate is used for representing the legal identity of Zhang III on line; when the first user is a certain limited company of the enterprise, the digital certificate is used for representing the legal identity of the certain limited company on line.
In a specific implementation, determining a digital certificate of a first user according to identity information of the first user includes: and performing identity authentication on the identity information of the first user through a third-party platform, and determining the digital certificate of the first user.
Wherein the third party platform may be a national approved digital certificate issuing authority platform. Where digital certificates are used to represent the online legitimate identity of a business or individual.
It should be further noted that, when the first user is an individual, the electronic device performs the authentication of the preliminary identity information of the first user according to the name, the gender and the identification number of the individual; after the primary identity information of the first user passes the authentication, performing face recognition authentication on the acquired first face image and a second face image of the first user; after the primary identity information authentication and the face recognition authentication of the first user are passed, sending personal name, sex, identity card number and face image information in the personal identity information to a third-party platform; a digital certificate corresponding to the first user from a third party platform is obtained.
It should be explained that, after the primary identity information authentication of the first user passes, the face recognition authentication is performed on the acquired first face image and the second face image of the first user, including: carrying out image preprocessing on the first face image to obtain a preprocessed face image; carrying out local face recognition on the preprocessed face image through a local face recognition model to obtain a local face recognition value; if the local face recognition value is judged to meet the preset numerical value condition, carrying out face recognition at the server end, receiving a server end face recognition result sent by the server end, and determining whether the first user in the face image is a user corresponding to the second face image; and if the local face recognition value is judged not to meet the preset numerical value condition, judging whether the first user in the face image is the user corresponding to the second face image or not according to the local face recognition value and a local set threshold value.
The local face recognition model may be, for example, a Convolutional Neural Network (CNN); further, the local face recognition model may be an N-layer residual network structure, and usually a face image with a small network and a small input resolution is selected as the local training sample, for example, a face image with a size of 64 × 64 after image preprocessing may be selected as the local training sample, so that the local training sample is the same as the face image in the actually input preprocessed face image, and the local face recognition value obtained by the local face recognition model performing local face recognition on the preprocessed face image is more accurate, thereby improving the local face recognition accuracy, where N is an integer not less than 2.
The local face recognition model can be a residual error network structure of N layers, and a multi-classification loss function is used for training a local training sample to obtain the local face recognition model.
The preset value condition may be a value of 95%, 99%, 89%, 92%, 100%, etc., without any limitation, and the locally set threshold may be a value of 70%, 80%, 75%, 78%, 85%, etc., without any limitation.
The first face image can be an image obtained through a camera, and the second face image is a face image corresponding to the first user on the third-party platform.
It should be further explained that, when the first user is an enterprise, the primary identity information of the first user is authenticated according to the enterprise name, the enterprise number and the enterprise qualification information; after the primary identity information authentication of the first user is passed, carrying out face recognition authentication on the obtained face image and a second face image of the first user, after the face recognition authentication of the second face image of the first user is passed, sending the enterprise name, the enterprise number, the enterprise qualification information and the enterprise legal person face image information of the identity information of the enterprise to a third-party platform, and obtaining a digital certificate corresponding to the first user from the third-party platform.
The first face image can be an image obtained through a camera, and the second face image is an enterprise legal person face image corresponding to the first user on the third-party platform.
After the primary identity information of the first user passes the authentication, performing face recognition authentication on the acquired face image and a second face image of the first user, including: carrying out image preprocessing on the first face image to obtain a preprocessed face image; carrying out local face recognition on the preprocessed face image through a local face recognition model to obtain a local face recognition value; if the local face recognition value is judged to meet the preset numerical value condition, carrying out face recognition at the server end, receiving a server end face recognition result sent by the server end, and determining whether the first user in the face image is a user corresponding to the second face image; and if the local face recognition value is judged not to meet the preset numerical value condition, judging whether the first user in the face image is the user corresponding to the second face image or not according to the local face recognition value and a local set threshold value.
The local face recognition model may be, for example, a Convolutional Neural Network (CNN); further, the local face recognition model may be an N-layer residual network structure, and usually a face image with a small network and a small input resolution is selected as the local training sample, for example, a face image with a size of 64 × 64 after image preprocessing may be selected as the local training sample, so that the local training sample is the same as the face image in the actually input preprocessed face image, and the local face recognition value obtained by the local face recognition model performing local face recognition on the preprocessed face image is more accurate, thereby improving the local face recognition accuracy, where N is an integer not less than 2.
The local face recognition model can be a residual error network structure of N layers, and a multi-classification loss function is used for training a local training sample to obtain the local face recognition model.
The preset value condition may be a value of 95%, 99%, 89%, 92%, 100%, etc., without any limitation, and the locally set threshold may be a value of 70%, 80%, 75%, 78%, 85%, etc., without any limitation.
S203, the electronic equipment encrypts first data of the first user according to the digital certificate to obtain a first ciphertext, and chaining the first ciphertext.
The first data is data to be uploaded.
In a specific implementation, after the electronic device encrypts first data of the first user according to the digital certificate to obtain a first ciphertext and chains the first ciphertext, the method further includes: and storing the public key and the private key of the data certificate.
Further, storing the public key and the private key of the data certificate includes: and storing the public key and the private key of the data certificate locally.
In a specific implementation, after the electronic device encrypts first data of the first user according to the digital certificate to obtain a first ciphertext and chains the first ciphertext, the method further includes: the public key and the private key of the first user are stored locally.
In a specific implementation, before the electronic device performs data uplink on the identity information data of the first user according to the digital certificate, the method further includes: the electronic device obtains first data and an instruction to access a blockchain network.
The instruction of accessing the blockchain network is used for instructing the electronic equipment to access the blockchain network.
In a specific implementation, encrypting, by an electronic device, first data of the first user according to the digital certificate to obtain a first ciphertext, and chaining the first ciphertext, includes: and encrypting the first data of the first user according to the private key of the digital certificate to obtain a first ciphertext, and chaining the first ciphertext.
It should be further explained that encrypting the first data of the first user according to the private key of the digital certificate to obtain a first ciphertext includes: and encrypting the first data of the first user and the private key of the digital certificate through a Hash hash algorithm to obtain a first ciphertext.
In a specific implementation, the electronic device encrypts, according to the digital certificate, first data of the first user to obtain a first ciphertext, and after chaining the first ciphertext, the method further includes: and encrypting the digital certificate to obtain a second ciphertext, and chaining the second ciphertext.
It should be further explained that encrypting the digital certificate to obtain a second ciphertext, chaining the second ciphertext, includes: and encrypting the digital certificate of the first user by the private key of the first user through a Hash hash algorithm to obtain a second ciphertext.
In a specific implementation, the electronic device encrypts, according to the digital certificate, first data of the first user to obtain a first ciphertext, and after chaining the first ciphertext, the method further includes: encrypting the first data according to a private key of the first user to obtain a third ciphertext, and chaining the third ciphertext; chaining the public key of the first user, the public key of the digital certificate of the first user, and the digital certificate of the first user.
It should be further explained that encrypting the first data according to the private key of the first user to obtain a third ciphertext includes: and encrypting the first data of the first user and the private key of the first user by a Hash algorithm to obtain a third ciphertext.
In a specific implementation, the method further comprises: the electronic equipment acquires the first data; determining a signer corresponding to the first data according to the digital certificate signature information of the first data; acquiring a public key of a signer; and verifying the second ciphertext according to the public key of the signer, determining whether the first data is signed and linked by the third-party platform, and determining whether the user corresponding to the first data is the first user.
It should be further explained that, the verifying the second ciphertext according to the public key of the user corresponding to the first data includes: and decrypting the second ciphertext according to the public key of the user corresponding to the first data to obtain the digital certificate corresponding to the second ciphertext. It can be seen that, in the embodiment of the application, the identity information of the first user is obtained; determining a digital certificate of the first user according to the identity information of the first user; and encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and chaining the first ciphertext. According to the embodiment of the application, the digital certificate is combined with the block chain, so that the problem of user identity authentication security of the block chain link point is solved.
The embodiments of the present application will be described in detail below with reference to a specific example.
Referring to fig. 3, fig. 3 is a schematic flowchart of a block link point sharing method based on a digital certificate according to an embodiment of the present application, applied to an electronic device, where the block link point sharing method based on a digital certificate includes:
s301, the electronic equipment acquires identity information of a first user;
s302, the electronic equipment performs identity authentication on identity information of the first user through a third-party platform, and determines a digital certificate of the first user;
and the third-party platform is a digital certificate issuing authority platform. Wherein the digital certificate is used for representing the legal identity of the first user on the line;
s303, the electronic equipment encrypts the first data according to a private key of the digital certificate to obtain a first ciphertext, and chaining the first ciphertext;
s304, the electronic equipment acquires the first data;
s305, the electronic equipment determines a signer corresponding to the first data according to the digital certificate signature information of the first data;
s306, the electronic equipment acquires the public key of the signer;
s307, the electronic equipment verifies the second ciphertext according to the public key, determines whether the first data is signed and linked by a third-party platform, and determines whether the signer is the first user.
It can be seen that, in the embodiment of the application, the identity information of the first user is obtained; performing identity authentication on the identity information of the first user through a third-party platform, and determining a digital certificate of the first user; encrypting the first data according to a private key of a digital certificate to obtain a first ciphertext, and chaining the first ciphertext; acquiring the first data; determining a signer corresponding to the first data according to the digital certificate signature information of the first data; acquiring a public key of the signer; and verifying the second ciphertext according to the public key, determining whether the first data is signed and linked by a third-party platform, and determining whether the signer is the first user. According to the embodiment of the application, the digital certificate is combined with the block chain, so that the problem that the user identity authentication security of the block chain link point is weak is solved.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an electronic device 400 according to an embodiment of the present application, and as shown in the drawing, the electronic device 400 includes an application processor 410, a memory 420, a communication interface 430, and one or more programs 421, where the one or more programs 421 are stored in the memory 420 and configured to be executed by the application processor 410, and the one or more programs 421 include instructions for performing the following steps:
acquiring identity information of a first user;
determining a digital certificate of the first user according to the identity information of the first user, wherein the digital certificate is used for representing the online legal identity of the first user;
and encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and chaining the first ciphertext.
In one possible example, in the encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and chaining the first ciphertext, the one or more programs 421 include instructions for performing the following steps: and encrypting the first data according to a private key of a digital certificate to obtain the first ciphertext, and chaining the first ciphertext.
In a possible example, the encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and after chaining the first ciphertext, the method further includes: and encrypting the digital certificate to obtain a second ciphertext, and chaining the second ciphertext.
In one possible example, the determining the digital certificate of the first user according to the identity information of the first user includes: and performing identity authentication on the identity information of the first user through a third-party platform, and determining the digital certificate of the first user, wherein the third-party platform is a digital certificate issuing authority platform.
In one possible example, the determining, by the third party platform, the identity information of the first user and the digital certificate of the first user includes: under the condition that the first user is a person, performing primary identity information authentication according to the name, the gender and the identity card number in the identity information of the first user and the user information in the third-party platform; if the primary identity information of the first user passes the authentication, performing face recognition authentication on the acquired first face image and a second face image in the identity information of the first user; if the preliminary identity information authentication and the face recognition authentication pass, sending the personal name, sex, identity card number and face image information in the identity information of the first user to a third-party platform; and determining that the digital certificate of the first user is a digital certificate corresponding to the first user from the third-party platform.
In one possible example, the determining, by the third party platform, the identity information of the first user and the digital certificate of the first user includes: when the first user is an enterprise, performing authentication of the primary identity information of the first user according to the enterprise name, the enterprise number and the enterprise qualification information of the first user; if the primary identity information of the first user passes the authentication, performing face recognition authentication on the acquired first face image and a second face image of the first user; after the second face image of the first user passes face identification authentication, sending the enterprise name, the enterprise number, the enterprise qualification information and the face image information of the enterprise legal person of the identity information of the enterprise to the third-party platform; and determining that the digital certificate of the first user is a digital certificate corresponding to the first user from the third-party platform.
In one possible example, the method further comprises: acquiring the first data; determining a signer corresponding to the first data according to the digital certificate signature information of the first data; acquiring a public key of the signer; and verifying the second ciphertext according to the public key, determining whether the first data is signed and linked by a third-party platform, and determining whether the signer is the first user.
It can be seen that one or more programs of the electronic device in the embodiments of the present application are configured to perform the following steps: acquiring identity information of a first user; determining a digital certificate of the first user according to the identity information of the first user; and encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and chaining the first ciphertext. The embodiment of the application solves the problem of user identity authentication of the block chain link point by combining the digital certificate and the block chain.
The above description has introduced the solution of the embodiment of the present application mainly from the perspective of the method-side implementation process. It is understood that the electronic device comprises corresponding hardware structures and/or software modules for performing the respective functions in order to realize the above-mentioned functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the various illustrative elements and algorithm steps described in connection with the embodiments provided herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the electronic device may be divided into the functional units according to the method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 5 is a block diagram of functional units of a block link point sharing device 500 based on a digital certificate according to an embodiment of the present application. The block link point sharing device 500 based on the digital certificate comprises:
an obtaining unit 501, configured to obtain identity information of a first user;
a determining unit 502, configured to determine a digital certificate of the first user according to identity information of the first user, where the digital certificates of the first user and the first user are in one-to-one correspondence, and the digital certificate is used to represent an online legal identity of the first user;
an uplink unit 503, configured to encrypt the first data of the first user according to the digital certificate to obtain a first ciphertext, and uplink the first ciphertext.
The digital certificate-based block link point sharing apparatus 500 may further include a storage unit 504 for storing program codes and data of electronic devices. The storage unit 504 may be a memory.
In a possible example, in the step of encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and linking the first ciphertext, the linking unit 503 is specifically configured to: and encrypting the first data according to a private key of a digital certificate to obtain the first ciphertext, and chaining the first ciphertext.
In a possible example, after encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext and chaining the first ciphertext, the chaining unit 503 is further specifically configured to: and encrypting the digital certificate to obtain a second ciphertext, and chaining the second ciphertext.
In a possible example, in the aspect of determining the digital certificate of the first user according to the identity information of the first user, the determining unit 502 is specifically configured to: and performing identity authentication on the identity information of the first user through a third-party platform, and determining the digital certificate of the first user, wherein the third-party platform is a digital certificate issuing authority platform.
In a possible example, in the aspect of determining the digital certificate of the first user by performing identity authentication on the identity information of the first user through the third-party platform, the determining unit 502 is specifically configured to: : under the condition that the first user is a person, performing primary identity information authentication according to the name, the gender and the identity card number in the identity information of the first user and the user information in the third-party platform; if the primary identity information of the first user passes the authentication, performing face recognition authentication on the acquired first face image and a second face image in the identity information of the first user; if the preliminary identity information authentication and the face recognition authentication pass, sending the personal name, sex, identity card number and face image information in the identity information of the first user to a third-party platform; and determining that the digital certificate of the first user is a digital certificate corresponding to the first user from the third-party platform.
In a possible example, in the aspect of determining the digital certificate of the first user by performing identity authentication on the identity information of the first user through the third-party platform, the determining unit 502 is specifically configured to: when the first user is an enterprise, performing authentication of the primary identity information of the first user according to the enterprise name, the enterprise number and the enterprise qualification information of the first user; if the primary identity information of the first user passes the authentication, performing face recognition authentication on the acquired first face image and a second face image of the first user; after the second face image of the first user passes face identification authentication, sending the enterprise name, the enterprise number, the enterprise qualification information and the face image information of the enterprise legal person of the identity information of the enterprise to the third-party platform; and determining that the digital certificate of the first user is a digital certificate corresponding to the first user from the third-party platform.
In one possible example, the digital certificate-based block link point sharing apparatus 500 is further configured to: acquiring the first data; determining a signer corresponding to the first data according to the digital certificate signature information of the first data; acquiring a public key of the signer; and verifying the second ciphertext according to the public key, determining whether the first data is signed and linked by a third-party platform, and determining whether the signer is the first user.
It can be seen that, in the embodiment of the present application, the block link point sharing device based on the digital certificate obtains the identity information of the first user; determining a digital certificate of the first user according to the identity information of the first user; and encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and chaining the first ciphertext. The embodiment of the application solves the problem of user identity authentication of the block chain link point by combining the digital certificate and the block chain.
Embodiments of the present application also provide a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, the computer program enabling a computer to execute part or all of the steps of any one of the methods described in the above method embodiments, and the computer includes an electronic device.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package, the computer comprising an electronic device.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A block chain node point sharing method based on a digital certificate is applied to electronic equipment, and comprises the following steps:
acquiring identity information of a first user;
determining a digital certificate of the first user according to the identity information of the first user, wherein the digital certificate is used for representing the online legal identity of the first user;
and encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and chaining the first ciphertext.
2. The method of claim 1, wherein encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and wherein chaining the first ciphertext comprises:
and encrypting the first data according to a private key of the digital certificate to obtain the first ciphertext, and chaining the first ciphertext.
3. The method of claim 1, wherein encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext, and wherein chaining the first ciphertext further comprises:
and encrypting the digital certificate to obtain a second ciphertext, and chaining the second ciphertext.
4. The method of claim 1, wherein determining the digital certificate of the first user according to the identity information of the first user comprises:
and performing identity authentication on the identity information of the first user through a third-party platform, and determining the digital certificate of the first user, wherein the third-party platform is a digital certificate issuing authority platform.
5. The method of claim 4, wherein the identity authentication of the identity information of the first user by the third-party platform and the determination of the digital certificate of the first user comprises:
under the condition that the first user is a person, performing primary identity information authentication according to the name, the gender and the identity card number in the identity information of the first user and the user information in the third-party platform;
if the primary identity information of the first user passes the authentication, performing face recognition authentication on the acquired first face image and a second face image in the identity information of the first user;
if the preliminary identity information authentication and the face recognition authentication pass, sending the personal name, sex, identity card number and face image information in the identity information of the first user to a third-party platform;
determining that the digital certificate of the first user is a digital certificate corresponding to the first user from the third-party platform.
6. The method of claim 4,
the identity authentication of the identity information of the first user through the third-party platform and the determination of the digital certificate of the first user comprise:
when the first user is an enterprise, performing authentication of the primary identity information of the first user according to the enterprise name, the enterprise number and the enterprise qualification information of the first user;
if the primary identity information of the first user passes the authentication, performing face recognition authentication on the acquired first face image and a second face image of the first user;
after the second face image of the first user passes face identification authentication, sending the enterprise name, the enterprise number, the enterprise qualification information and the face image information of the enterprise legal person of the identity information of the enterprise to the third-party platform;
determining that the digital certificate of the first user is a digital certificate corresponding to the first user from the third-party platform.
7. The method according to any one of claims 1-6, further comprising:
acquiring the first data;
determining a signer corresponding to the first data according to the digital certificate signature information of the first data;
acquiring a public key of the signer;
and verifying the second ciphertext according to the public key, determining whether the first data is signed and linked by a third-party platform, and determining whether the signer is the first user.
8. A block link point sharing device based on digital certificate, comprising:
the acquiring unit is used for acquiring the identity information of the first user;
the determining unit is used for determining the digital certificate of the first user according to the identity information of the first user, wherein the digital certificates of the first user and the first user are in one-to-one correspondence, and the digital certificate is used for representing the online legal identity of the first user;
and the uplink unit is used for encrypting the first data of the first user according to the digital certificate to obtain a first ciphertext and uplink the first ciphertext.
9. An electronic device comprising a processor, a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps in the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that it stores a computer program for electronic data exchange, wherein the computer program causes a computer to perform the method according to any one of claims 1-7.
CN202011228528.6A 2020-11-05 2020-11-05 Block chain link point sharing method based on digital certificate and related products thereof Pending CN112328686A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011228528.6A CN112328686A (en) 2020-11-05 2020-11-05 Block chain link point sharing method based on digital certificate and related products thereof
PCT/CN2021/124690 WO2022095694A1 (en) 2020-11-05 2021-10-19 Blockchain node sharing method based on digital certificate, and product related thereto

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011228528.6A CN112328686A (en) 2020-11-05 2020-11-05 Block chain link point sharing method based on digital certificate and related products thereof

Publications (1)

Publication Number Publication Date
CN112328686A true CN112328686A (en) 2021-02-05

Family

ID=74316340

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011228528.6A Pending CN112328686A (en) 2020-11-05 2020-11-05 Block chain link point sharing method based on digital certificate and related products thereof

Country Status (2)

Country Link
CN (1) CN112328686A (en)
WO (1) WO2022095694A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022095694A1 (en) * 2020-11-05 2022-05-12 深圳壹账通智能科技有限公司 Blockchain node sharing method based on digital certificate, and product related thereto

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115311732A (en) * 2022-10-12 2022-11-08 中国信息通信研究院 Book management method and device based on block chain

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881290A (en) * 2018-07-17 2018-11-23 深圳前海微众银行股份有限公司 Digital certificate application method, system and storage medium based on block chain
CN109544331A (en) * 2018-10-12 2019-03-29 深圳壹账通智能科技有限公司 Supply chain financial application method, apparatus and terminal device based on block chain
CN109598615A (en) * 2018-11-30 2019-04-09 深圳市链联科技有限公司 A method of the transaction of block chain is participated in entity identities
CN109635585A (en) * 2018-12-07 2019-04-16 深圳市智税链科技有限公司 Method, agent node and the medium of Transaction Information are inquired in block chain network
CN110010213A (en) * 2019-02-18 2019-07-12 深圳壹账通智能科技有限公司 Electronic health record storage method, system, device, equipment and readable storage medium storing program for executing
KR20190128309A (en) * 2018-05-08 2019-11-18 라온시큐어(주) Blcok chain-based digita id and its issuance and identification method and system
CN110490776A (en) * 2019-08-21 2019-11-22 腾讯云计算(北京)有限责任公司 A kind of study authentication method, device and electronic equipment based on block chain
CN110569658A (en) * 2019-09-12 2019-12-13 腾讯科技(深圳)有限公司 User information processing method and device based on block chain network, electronic equipment and storage medium
CN110611569A (en) * 2019-09-24 2019-12-24 腾讯科技(深圳)有限公司 Authentication method and related equipment
WO2020189926A1 (en) * 2019-03-15 2020-09-24 주식회사 코인플러그 Method and server for managing user identity by using blockchain network, and method and terminal for user authentication using blockchain network-based user identity

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110061846B (en) * 2019-03-14 2022-08-23 深圳壹账通智能科技有限公司 Method, device and computer readable storage medium for identity authentication and confirmation of user node in block chain
CN110135992A (en) * 2019-05-14 2019-08-16 北京智签科技有限公司 The acquisition methods and acquisition device of block chain network Fabric-CA digital certificate
CN111859348B (en) * 2020-07-31 2022-07-19 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology
CN112328686A (en) * 2020-11-05 2021-02-05 深圳壹账通智能科技有限公司 Block chain link point sharing method based on digital certificate and related products thereof

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190128309A (en) * 2018-05-08 2019-11-18 라온시큐어(주) Blcok chain-based digita id and its issuance and identification method and system
CN108881290A (en) * 2018-07-17 2018-11-23 深圳前海微众银行股份有限公司 Digital certificate application method, system and storage medium based on block chain
CN109544331A (en) * 2018-10-12 2019-03-29 深圳壹账通智能科技有限公司 Supply chain financial application method, apparatus and terminal device based on block chain
CN109598615A (en) * 2018-11-30 2019-04-09 深圳市链联科技有限公司 A method of the transaction of block chain is participated in entity identities
CN109635585A (en) * 2018-12-07 2019-04-16 深圳市智税链科技有限公司 Method, agent node and the medium of Transaction Information are inquired in block chain network
CN110010213A (en) * 2019-02-18 2019-07-12 深圳壹账通智能科技有限公司 Electronic health record storage method, system, device, equipment and readable storage medium storing program for executing
WO2020189926A1 (en) * 2019-03-15 2020-09-24 주식회사 코인플러그 Method and server for managing user identity by using blockchain network, and method and terminal for user authentication using blockchain network-based user identity
CN110490776A (en) * 2019-08-21 2019-11-22 腾讯云计算(北京)有限责任公司 A kind of study authentication method, device and electronic equipment based on block chain
CN110569658A (en) * 2019-09-12 2019-12-13 腾讯科技(深圳)有限公司 User information processing method and device based on block chain network, electronic equipment and storage medium
CN110611569A (en) * 2019-09-24 2019-12-24 腾讯科技(深圳)有限公司 Authentication method and related equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022095694A1 (en) * 2020-11-05 2022-05-12 深圳壹账通智能科技有限公司 Blockchain node sharing method based on digital certificate, and product related thereto

Also Published As

Publication number Publication date
WO2022095694A1 (en) 2022-05-12

Similar Documents

Publication Publication Date Title
CN109657450B (en) Method, device, medium, and electronic device for evaluation based on block chain
CN107079034B (en) Identity authentication method, terminal equipment, authentication server and electronic equipment
CN109274652B (en) Identity information verification system, method and device and computer storage medium
CN110569658B (en) User information processing method and device based on blockchain network, electronic equipment and storage medium
CN108537046A (en) A kind of online contract signature system and method based on block chain technology
CN106330850A (en) Biological characteristic-based security verification method, client and server
CN108234442B (en) Method, system and readable storage medium for acquiring contract
CN109361508A (en) Data transmission method, electronic equipment and computer readable storage medium
CN109922027A (en) A kind of trusted identity authentication method, terminal and storage medium
CN114238874A (en) Digital signature verification method and device, computer equipment and storage medium
CN112328686A (en) Block chain link point sharing method based on digital certificate and related products thereof
CN112308236B (en) Method, device, electronic equipment and storage medium for processing user request
KR20120087095A (en) Apparatus and method for generating a realtime password and storage medium
CN107453871A (en) Password generated method, password authentication method, method of payment and device
CN110266653B (en) Authentication method, system and terminal equipment
CN111581661A (en) Terminal management method and device based on biological feature recognition and computer equipment
CN110992155A (en) Bidding and enclosing processing method and related product
CN108566371B (en) Social authentication method, system and terminal equipment
GB2555476A (en) Apparatuses and methods for signing a legal document
CN111681141B (en) File authentication method, file authentication device and terminal equipment
CN113783690A (en) Tender inviting method and device based on authentication
CN117077092A (en) Model property right protection method, device, storage medium and program product
CN115482132A (en) Data processing method and device for electronic contract based on block chain and server
CN116095671A (en) Resource sharing method based on meta universe and related equipment thereof
CN114077749A (en) Data processing method based on block chain and related equipment thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination