[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113904774A - Block chain address authentication method and device and computer equipment - Google Patents

Block chain address authentication method and device and computer equipment Download PDF

Info

Publication number
CN113904774A
CN113904774A CN202110997495.XA CN202110997495A CN113904774A CN 113904774 A CN113904774 A CN 113904774A CN 202110997495 A CN202110997495 A CN 202110997495A CN 113904774 A CN113904774 A CN 113904774A
Authority
CN
China
Prior art keywords
address
block chain
virtual resource
blockchain
target virtual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110997495.XA
Other languages
Chinese (zh)
Other versions
CN113904774B (en
Inventor
肖飖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Simplecredit Micro-Lending Co ltd
Original Assignee
Simplecredit Micro-Lending Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Simplecredit Micro-Lending Co ltd filed Critical Simplecredit Micro-Lending Co ltd
Priority to CN202110997495.XA priority Critical patent/CN113904774B/en
Publication of CN113904774A publication Critical patent/CN113904774A/en
Application granted granted Critical
Publication of CN113904774B publication Critical patent/CN113904774B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Data Mining & Analysis (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the application discloses a block chain address authentication method, a block chain address authentication device and computer equipment, wherein the block chain address authentication method comprises the following steps: sending first verification information to a client in response to a block chain address authentication request, wherein the block chain address authentication request comprises a first block chain address; querying a target virtual resource according to the first blockchain address, wherein the target virtual resource is generated according to the first verification information and the first blockchain address; authenticating the first blockchain address using the target virtual resource. By adopting the scheme, the safety of authenticating the block chain address can be effectively improved.

Description

Block chain address authentication method and device and computer equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a block chain address authentication method and apparatus, and a computer device.
Background
However, because of the anonymity of the blockchain, the blockchain account address has no much data such as credit records, and the like, which affects the activities of the individual applying for in the blockchain project, such as transactions between the individual blockchain account and other blockchain accounts, there is a need for binding personal information and the blockchain account address. Before this, the blockchain account address needs to be authenticated.
Currently, the blockchain account address can be authenticated by judging whether a transaction from the successfully registered blockchain account address to the blockchain account address of the service party exists or not, and the transaction contains appointed related information, but the method is completed through the transaction, and each transaction in the blockchain network is public, so that the security of the verification method is low and the verification method is complicated. Therefore, how to perform secure and convenient authentication on the blockchain account address becomes a problem to be solved urgently.
Disclosure of Invention
The embodiment of the application provides a method and a device for authenticating a block chain address and computer equipment, which can effectively improve the security of authenticating the block chain address.
An aspect of the present application provides a block chain address authentication method, including:
sending first verification information to a client in response to a block chain address authentication request, wherein the block chain address authentication request comprises a first block chain address;
querying a target virtual resource according to the first blockchain address, wherein the target virtual resource is generated according to the first verification information and the first blockchain address;
the first blockchain address is authenticated using the target virtual resource.
An aspect of the present application provides a block chain address authentication method, including:
submitting a block chain address authentication request to a server, wherein the block chain address authentication request comprises a first block chain address;
receiving first verification information sent by a server in response to the block chain address authentication request;
and generating a target virtual resource according to the first verification information, wherein the target virtual resource is used for the server to authenticate the first block chain address.
An aspect of the present application provides a block chain address authentication apparatus, including:
the sending module is used for responding to the block chain address authentication request and sending first verification information to the client, wherein the block chain address authentication request comprises a first block chain address;
the query module is used for querying a target virtual resource according to the first block chain address, and the target virtual resource is generated according to the first verification information and the first block chain address;
and the authentication module is used for authenticating the first block chain address by using the target virtual resource.
An aspect of the present application provides a block chain address authentication apparatus, including:
the system comprises a submitting module, a receiving module and a sending module, wherein the submitting module is used for submitting a block chain address authentication request to a server, and the block chain address authentication request comprises a first block chain address;
the receiving module is used for receiving first verification information sent by the server in response to the block chain address authentication request;
and the generating module is used for generating a target virtual resource according to the first verification information, wherein the target virtual resource is used for the server to authenticate the first block chain address.
An aspect of an embodiment of the present application provides a server, including: a processor, a memory, and a network interface; the processor is connected with the memory and the network interface, wherein the network interface is used for providing a network communication function, the memory is used for storing program codes, and the processor is used for calling the program codes to execute the block chain address authentication method in the embodiment of the application.
An aspect of an embodiment of the present application provides a terminal device, including: a processor, a memory, a network interface, an input device, and an output device; the processor is connected with the memory, the network interface, the input device and the output device, wherein the network interface is used for providing a network communication function, the memory is used for storing program codes, the input device is used for receiving instructions input by a user to generate signal input related to user setting and function control of the terminal device, the output device is used for outputting data information, and the processor is used for calling the program codes to execute the block chain address authentication method in the embodiment of the application.
An aspect of the embodiments of the present application provides a computer-readable storage medium, where a computer program is stored, where the computer program includes program instructions, and when the program instructions are executed by a processor, the method for authenticating a blockchain address in the embodiments of the present application is performed.
Accordingly, embodiments of the present application provide a computer program product or a computer program comprising computer instructions stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and executes the computer instructions, so that the computer device executes the block chain address authentication method provided in an aspect of the embodiment of the present application.
In the embodiment of the application, the server sends the verification information to the client by responding to the submitted block chain address authentication request, the client constructs the target virtual resource according to the verification information and the obtained block chain address, and due to the uniqueness of the block chain address and the timeliness of the verification information, the information cannot be completely duplicated, so that the target virtual resource constructed according to the block chain address and the verification information has irreplaceability, and the submitted block chain address can be authenticated more effectively and safely by using the target virtual resource.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is an architecture diagram of a block chain address authentication system according to an embodiment of the present application;
fig. 2 is a flowchart illustrating a block chain address authentication method according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a target virtual resource according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another block chain address authentication method according to an embodiment of the present application;
figure 5 is a schematic diagram of a non-homogeneous token provided by an embodiment of the present application;
fig. 6 is a schematic flowchart of another block chain address authentication method according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an apparatus for authenticating a block chain address according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of another block chain address authentication apparatus according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a server provided in an embodiment of the present application;
fig. 10 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the following, for convenience of understanding, terms to which embodiments of the present application may relate will be explained first.
Block chains: the method comprises a series of blocks (blocks) which are mutually connected according to the generated chronological order, new blocks cannot be removed once being added into a Block chain, and recorded data submitted by nodes in the Block chain system are recorded in the blocks.
A blockchain wallet: the tool for managing the keys and addresses of blockchain nodes is a software program that stores encrypted virtual assets. The wallet provides functions for performing transactions of virtual resources, including initiating transactions (i.e., sending transaction records of current transactions to other nodes in the blockchain system, and storing the record data of the transactions in temporary blocks of the blockchain as a response for confirming that the transactions are valid after the other nodes are successfully verified), and of course, the wallet also supports querying of virtual resources remaining in the address.
Block chain address: i.e., the blockchain account address, typically referred to as the blockchain wallet address.
Intelligent contract: a computerized transaction agreement may enforce the terms of a contract. The method is realized by codes which are deployed on a shared account and are used for executing when certain conditions are met, and the codes are used for completing automated transaction according to actual business requirements, such as inquiring the logistics state of goods purchased by a buyer and transferring virtual resources of the buyer to the address of a merchant after the buyer signs the goods; of course, smart contracts are not limited to executing contracts for trading, but may also execute contracts that process received information.
Referring to fig. 1, fig. 1 is an architecture diagram of a block chain address authentication system according to an embodiment of the present disclosure, as shown in fig. 1, the architecture diagram includes a terminal device 100, a verification server 101, and a virtual resource creation server 102, where the terminal device 100 and the verification server 101 and the virtual resource creation server 102 may be connected through wired or wireless communication.
The terminal device 100 may be not only the personal computer shown in fig. 1, but also other mobile devices, such as a smart phone, a tablet computer, a smart wearable device, and the like, and the number of terminal devices 100 connected to the server is not limited herein. Various functional applications can be installed and run in the terminal device, and a server and a service program in a network provide corresponding services, and the functional Application may be an online Application or a third party Application (APP for short). Alternatively, the functional application may include a website, APP, or the like, which needs to authenticate the blockchain address, and the user may log in to the website, APP, server, or the like through the terminal device 100 (for example, authentication of transaction qualification, authentication of participation in a marketing campaign, or the like), submit an authentication requirement, and authenticate the blockchain address needing authentication through the verification server 101. Meanwhile, the terminal device 100 may also run a tool for managing virtual assets, such as a blockchain wallet, and the address of the blockchain wallet (that is, the address of the blockchain account) may be associated with a website, APP, a server, or the like that needs to authenticate the address of the blockchain, so that the authentication server 101 of the service party can perform authentication according to the address of the blockchain. A third party website may also be run by the terminal device 100 that is used to create (or generate) the target virtual resource, optionally also via tools within the blockchain wallet of the terminal device 100.
The authentication server 101 may be owned by the server or may be owned by a third party. The service party here refers to an organization such as an enterprise providing authentication and other offer services, for example, the service party may offer a user to participate in an activity, issue an activity reward, and the like for a certain blockchain project by using an authenticated blockchain address. The verification server 101 may start itself after receiving the blockchain address authentication request (own server) sent by the terminal device 100 or the blockchain address authentication request (third-party server) forwarded by another server of the service party, and may send verification information, such as a digital verification code or a verification code field, to the user through a communication manner such as a website, a short message, a WeChat, and in-station information, where the expression form and the sending manner of the verification information are not limited. The verification server 101 of the service party may also query the target virtual resource according to a preset rule, for example, initiate verification or perform directed query on the target virtual resource in the blockchain wallet in an appointed time according to the submitted blockchain address, and perform authentication by using the target virtual resource.
The virtual resource creating server 102 corresponds to a service that is a function of producing a virtual resource in the terminal device 100 through a third-party application or a website, and optionally, a third-party website tool may be used in the terminal device 100, and a virtual resource frame generated in advance in the website is used to generate a target virtual resource. In this process, the virtual resource creating server 102 may automatically acquire and fill part of attribute information required for the virtual resource framework, including one or more of the block chain address and the timestamp, and the verification information included in the attribute information is output by the user through the input device of the terminal device 100, and the virtual resource creating server 102 may automatically generate the target virtual resource according to the information. It should be noted that the target virtual resource created at the third-party website or application needs to be transferred to the user's own blockchain wallet with the user's authorization.
As can be seen from the above, the blockchain address authentication system performs authentication on blockchain addresses through the integrated operation of the terminal device 100 and the function server (including one or more of the verification server 101 and the virtual resource creation server 102). The server's authentication server 101 transmits authentication information after receiving the blockchain address authentication request, the user creates a target virtual resource in the terminal device 100 using a third-party website or within the blockchain wallet based on the received authentication information and the automatically acquired blockchain address, and the server's authentication server 101 can perform effective and secure authentication by comparing the authentication information and the blockchain address included in the target virtual resource.
It should be noted that the verification server 101 and the virtual resource creation server 102 may be independent physical servers, may also be a server cluster or a distributed system formed by a plurality of physical servers, and may also be cloud servers that provide basic cloud computing services such as cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, and big data and artificial intelligence platforms.
The block chain address authentication scheme provided by the embodiment of the present application may be executed by a user terminal (e.g., the terminal device 100 in fig. 1) or a server (e.g., the verification server 101 in fig. 1).
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating a block chain address authentication method according to an embodiment of the present disclosure. The block chain address authentication method is described as an example executed by the server. The block chain address authentication method includes, but is not limited to, the following steps:
s101, first verification information is sent to the client side in response to the block chain address authentication request, and the block chain address authentication request comprises a first block chain address.
In one embodiment, the first blockchain address is a blockchain address that requires authentication. After receiving the block chain address authentication request, the server may start a verification server, and the verification server responds to the first verification information sent by the block chain address authentication request to the client. It should be noted that the target client that the server sends the first verification information may be different from or the same as the client that sends the block chain address authentication request to the server, that is, the client may refer to a terminal device that sends the block chain address authentication request to the server, or may refer to another terminal device. For example, a personal computer submits a blockchain address authentication request, but the receiving first verification message is a smartphone. The verification server may be a server of a third party, or may be a server owned by a service provider providing the service, and the service provider may invite the user to participate in the activity, issue an activity reward, or the like, using the authenticated blockchain address.
The first verification information may be a short message verification code, or a special verification code field B is sent to the user in multiple ways such as google's authorized APP, and optionally, the first verification information is valid for a predetermined time (e.g., 60 seconds), and is invalid after the predetermined time. The mode of the server sending the first verification information to the client can be various communication modes such as a website, a short message, a WeChat, in-station information and the like. For the user, the operation is only required to be performed according to the prompt content, and the terminal device can identify the mode (including but not limited to in-station communication, short message, third-party software authorization) for acquiring the first verification information submitted by the user operation, and then enable the user to acquire the first verification information according to the corresponding mode, that is, send the first verification information to the terminal device. The specific form and transmission manner of the first authentication information are not limited herein.
S102, the target virtual resource is inquired according to the first block chain address.
In an embodiment, the server may query the target virtual resource located in the first blockchain address according to the first blockchain address included in the submitted blockchain address authentication request, optionally, the server may perform the query according to a preset rule, for example, the server queries when starting verification at a certain appointed time, or may direct the server to the first blockchain address and query the target virtual resource in the first blockchain address every predetermined time period (e.g., 2 minutes). Optionally, the target virtual resource may be generated according to the first verification information and the first blockchain address, which may be specifically described with reference to fig. 4 and will not be described in detail herein.
S103, the target virtual resource is used to authenticate the first blockchain address.
In one embodiment, the implementation of this step may be: acquiring attribute information included in the target virtual resource, wherein the attribute information includes one or more of second verification information, a second block chain address and a timestamp; and authenticating the first block chain address according to the attribute information. The second verification information may be verification information input to the terminal device according to the first verification information, and may be a verification code or a verification field, and the second verification information may be different from or the same as the first verification information. The second blockchain address is a blockchain address automatically acquired by the terminal device or the server creating the target virtual resource, and may be the same as or different from the submitted first blockchain address, and the timestamp may refer to the generation time of the target virtual resource. Illustratively, the target virtual resource may be a block on the blockchain, and the corresponding structure thereof in conjunction with the above description may refer to what is shown in fig. 3, including the standard block and the attribute information, which includes the second authentication information, the second blockchain address, and the timestamp. The submitted first blockchain address may be authenticated using the second verification information and the second blockchain address included in the attribute information, and the authentication may be understood as identity authentication, i.e. authentication that the user receiving the verification information is the owner of the blockchain wallet, which may specifically participate in the following.
Optionally, the method for authenticating the first blockchain address according to the attribute information may be: comparing the second block chain address and the second verification information with the first block chain address and the first verification information; and if the second block chain address is the same as the first block chain address and the second verification information is the same as the first verification information, determining that the authentication result of the first block chain address is authenticated. That is, when the attribute information in the target virtual resource, i.e., the submitted first blockchain address and the received first verification information, indicates that the authentication of the first blockchain address is successful, and thus can prove that the blockchain address is associated with the user. Optionally, the attribute information of the target virtual resource may further include a timestamp, which may be used to assist in authenticating the first blockchain address. Illustratively, when a plurality of block chain addresses send verification requests to the server and the verification information is the same, the verification requests are used for indicating the server to compare the attribute information in the target virtual resource, the target virtual resource of a certain block chain address can be selected according to the minimum timestamp, whether the block chain address in the target virtual resource is the block chain address submitted to the client or not and whether the verification information is the verification information sent correspondingly or not are compared, and therefore the block chain address authentication can be avoided by illegally stealing the verification information. In addition, if a plurality of target virtual resources are generated in the same block chain address, and the verification information included in the target virtual resources is different, the target virtual resource where the latest timestamp is located can be selected to compare the latest verification information, so that the target resource needing comparison can be directly and quickly selected through the timestamp instead of determining the compared target virtual resource by traversing all the verification information, and the determination speed of the block chain address authentication result can be improved.
The process of comparing the attribute information is an authentication process, which may be authentication of the service provider itself or authentication of a third party, and the final objective is to determine the one-to-one correspondence relationship between the user and the account address a of a certain block chain of the block chain. The process is similar to the traditional verification mode, the user submits the own mobile phone number to obtain a mobile phone verification code, and the mobile phone number can be verified through returning the verification code.
In one embodiment, the blockchain address authentication request further includes identity information of the target user. The identity information of the target user may refer to information indicating the identity of the target user when logging in a website or application of a service provider, for example, an identity card number, a mobile phone number, or other forms of account information. Optionally, if the first blockchain address passes the authentication, a binding relationship between the first blockchain address and the identity information of the target user is established. The first blockchain address passes the authentication, which indicates that the blockchain wallet indicated by the first blockchain address is the target user of the login service party, and the target user is regarded as a trusted user, so that the binding relationship between the first blockchain address and the identity information of the target user can be established, namely the one-to-one mapping relationship between the blockchain wallet and the user is established. Optionally, in the expression form of the specific binding relationship, the server establishes a corresponding data table of the user and the specific blockchain address in the background after the authentication of the service party is passed, and the blockchain wallet is bound with the user identity information in such a way, so as to acquire the personal credit data of the user. Of course, if the authentication fails, the user is required to log in the website or application of the authenticated blockchain address again, and the first blockchain address is resubmitted, i.e., re-executed from step S101.
Based on the above, in practical applications, for example, when a service provider provides a service for borrowing virtual resources to a user, the behavior of borrowing virtual resources can be guaranteed by the personal credit data of the user. In addition, if the behavior of illegally stealing the virtual resources of other people exists, the behavior that the users of the blockchain wallets tracking the flowing of the virtual resources in the exchange are specifically determined can be directly determined according to the relationship between the clear blockchain wallets and the identity information of the users in the corresponding data table without specially dealing with the users.
In summary, the present application has at least the following advantages:
the server sends verification information to the client by responding to the block chain address authentication request, wherein the block chain address authentication request comprises a block chain address to be authenticated (namely a block chain account address), and in the subsequent authentication process by utilizing the target virtual resource, the block chain address to be authenticated and the verification information sent by the server are used as known data of the server and can be matched with the block chain address and the verification information included by the attribute information of the target virtual resource, and the authentication is completed by correspondingly checking the consistency of the data. Due to the fact that the block chain addresses are different and the verification information is time-efficient, the safety degree of authentication of the block chain account addresses can be higher, unnecessary transactions among the block chain accounts can be reduced by means of target virtual resource verification, the efficiency of block chain address authentication is improved, and operation complexity is reduced; in addition, after the authentication is passed, the address of the blockchain account and the identity information of the user are bound, so that the convenience of inquiring the user of the blockchain account can be further improved.
Referring to fig. 4, fig. 4 is a schematic flowchart illustrating another block chain address authentication method according to an embodiment of the present disclosure. For ease of understanding, the present embodiment is described as an example in which the method is executed by the terminal device described above.
The block chain address authentication method includes, but is not limited to, the following steps:
s201, submitting a block chain address authentication request to a server, wherein the block chain address authentication request comprises a first block chain address.
In one embodiment, the first blockchain address refers to a blockchain address to be authenticated, typically a blockchain wallet address. The client (here, the terminal device) may submit a blockchain address authentication request to the server through a corresponding operation, for example, a user logs in to a website, APP, server, etc. where a blockchain address needs to be authenticated through the terminal device (e.g., transaction qualification authentication, marketing activity participation authentication, etc.), after the login is successful, the server prompts to connect with a blockchain wallet address a in the terminal device, and when the user authorizes the connection and the connection is successful, that is, the client indicates that the terminal device submits the blockchain address authentication request including the connected blockchain wallet address a to the server. And subsequently, the server responds to the submitted block chain address authentication request to start authentication, and first, first verification information is sent to the terminal equipment.
S202, first verification information sent by the server in response to the block chain address authentication request is received.
In an embodiment, the first verification information received by the terminal device may be a short message verification code, or may also be a verification code field sent to the user in multiple ways such as google's authorized APP, where the form of the first verification information is not limited. Optionally, the manner in which the terminal device receives the first verification information may include various communication manners such as through a website, a short message, a WeChat, and in-station information, which is not limited herein. It should be noted that, here, the terminal device that submits the block chain address authentication request and the terminal device that receives the first verification information may also be different terminal devices.
And S203, generating a target virtual resource according to the first verification information, wherein the target virtual resource is used for the server to authenticate the first block chain address.
In one embodiment, the implementation of generating the target virtual resource may be: acquiring a virtual resource generation object, wherein the virtual resource generation object comprises an attribute field, and the attribute field comprises one or more of a verification information field, a block chain address field and a timestamp field; and acquiring a first block chain address, and generating a target virtual resource according to the attribute field, the first verification information and the first block chain address. Optionally, the virtual resource generation object is a casting program of a virtual resource, which may be referred to as a virtual resource framework for short, and the framework has a customized standard format and includes a standard portion and an extended portion, the standard portion is an original format of the virtual resource, the extended portion is an added attribute field portion, the attribute field may include one or more corresponding field values (i.e., attribute information) to be determined, where field values of the block chain field and the timestamp field may be automatically obtained and determined by the terminal device, and a field value of the verification information field needs to be determined according to verification information input by the user.
When the attribute field includes an authentication information field and a block chain field, the attribute information included in the target virtual resource includes second authentication information and a second block chain address, which are field values of the authentication information field and the block chain field, respectively. After receiving the first verification information, the terminal device may manually input verification information as a field value of a verification information field according to the first verification information, which is referred to as second verification information herein. The terminal device may automatically acquire a first blockchain address, that is, a blockchain wallet address in the terminal device, and may determine, according to the first blockchain address, a blockchain address of a blockchain field, that is, a second blockchain address, where the second blockchain address and the first blockchain address may be the same or different. In summary, the finally generated target virtual resource includes the second verification information and the second blockchain address. Further, when the attribute field further includes a timestamp field, the target virtual resource includes the second authentication information, the second block chain address, and a timestamp, and the timestamp may be a generation time of the target virtual resource automatically acquired by the terminal device and is used as a field value of the timestamp field, where field values corresponding to three attribute fields included in the target virtual resource are also referred to as attribute information. The foregoing approach may refer to generating or casting a target virtual resource in a blockchain wallet of a terminal device via a tool, which may optionally be generated by invoking a smart contract that supports a standard protocol for the virtual resource.
In an embodiment, an implementation manner of generating the target virtual resource may also be: sending a virtual resource generation request to a third-party platform, wherein the virtual resource generation request comprises first verification information and is used for indicating the third-party platform to generate a target virtual resource according to the first verification information and the first block link address after the first block link address is acquired; receiving a notification message that the target virtual resource is successfully generated and sent by a third-party platform; when the notification message is received, transferring the target virtual resource generated by the third-party platform to the first blockchain address. This approach corresponds to the target virtual resource being generated and transferred to the first blockchain address at the third party platform.
Optionally, the third-party platform may refer to a background server of a third-party application or a website, and the third-party application and the third-party website run in the terminal device and may communicate with the corresponding server through the terminal device. After the terminal device receives the first verification message, the casting program of the virtual resource needs to be started at the third-party platform, that is, a virtual resource generation request is sent to the third-party platform, wherein the virtual resource generation request includes the first verification information. In a similar manner as described above, the attribute information of the target virtual resource may include one or more of second authentication information and a second blockchain address, timestamp. The second validation information may be entered based on the first validation information, which may be the same or different from the first validation information, and may be automatically obtained and populated into the casting program for the blockchain address and generation timestamp third party platform. Optionally, the third-party platform may be associated with the first blockchain address of the terminal device before that, so that the subsequent third-party platform automatically acquires the blockchain address according to the first blockchain address, and ideally, the acquired blockchain address is the first blockchain address, and due to some influence factors, the blockchain address included in the finally generated target virtual resource may also be a second blockchain address different from the first blockchain address. Subsequently, the server needs to verify the attribute information included in the target virtual resource, and then determines whether the authentication can pass. When the terminal device receives the notification message, the target virtual resource can be transferred to a first blockchain address, namely a wallet address of the terminal device, namely the target virtual resource is transferred from the third-party blockchain to the blockchain wallet of the target user. User authorization is typically required during the transfer, i.e., the first blockchain address is authenticated more than once, e.g., a wallet address may be entered by the user, a transfer button may be clicked, the wallet address entered by the user and a wallet address previously associated with the third party platform may be authenticated by the third party platform, and if they are consistent, the transfer may be made to the wallet address. Of course, the transfer may also be accomplished by a third party platform automatically obtaining the blockchain wallet address and then determining by the user whether the address is the target blockchain address for the transfer. In summary, the target virtual resource may be generated in a blockchain wallet of the terminal device, or may be generated in a third party platform through the terminal device. After the terminal device acquires the target virtual resource, the server may authenticate the first blockchain address using the target virtual resource.
Optionally, the attribute information corresponding to the attribute field may be encrypted once because the attribute information is visible in the block chain, the second authentication information may be encrypted before the generation of the target virtual resource, and the encryption may use a general SHA256 Algorithm, which is an Algorithm subdivided under SHA-2(Secure Hash Algorithm-2). The method of symmetric encryption or asymmetric encryption can be adopted, the key can also use the sent first verification information, and the type of algorithm, the encryption mode and the like are not limited here. It should be noted that although the authentication information, the blockchain address, and the like are all public, the uniqueness of the blockchain address and the timeliness of the authentication information, the information agreed between the target virtual resource and the server in the terminal device is irreplaceable, and even if the information is not encrypted, the security of the authentication using the target virtual resource can be ensured.
Optionally, the target virtual resource comprises a non-homogeneous digital asset, the non-homogeneous digital asset being a virtual asset that is unique and not interchangeable with other digital assets. Such as Non-homogeneous Tokens NFT (Non-exchangeable Tokens), which have unique and indivisible properties. The following describes an exemplary process of generating the target virtual resource by taking the NFT as the target virtual resource and the authentication code as the first authentication information.
After the terminal device receives the verification code sent by the server, the user may start an NFT casting program, i.e., a program for generating the target virtual resource, in the terminal device. Alternatively, the casting may be done using a third party tool, such as third party freeware or a third party website, or may be done with the tool in its own wallet, which is a wallet that supports casting functionality. By casting, it is meant that an NFT is produced by itself by invoking an intelligent contract (e.g., ERC721) that supports the standard protocol of the NFT. For convenience of understanding, taking the third-party website tool casting NFT as an example, the service party may provide a pre-generated NFT frame (or referred to as "validation code NFT" frame) for the user at the third-party website tool, that is, the virtual resource generation object, for most users, only this "validation code NFT" frame needs to be selected, the obtained validation code can be filled in, and others may be automatically completed by the background server. The framework includes a well-defined standard format, whose name may be a standard name, such as "validate NFT", which includes an attribute section divided into three attribute fields: 256 bits of block chain address to be verified; receiving a verification code; and thirdly, time stamp of casting. Figure 5 shows a schematic of a non-homogeneous token. The standard block and extended attribute part, which includes the block chain address, the verification code and the time stamp, are both intelligent contracts ERC721 using the standard protocol supporting NFT. For the user, the first verified blockchain address can be automatically acquired and filled in the background directly by a third-party tool, the verification code part needs to be input, and the time stamp is also automatic.
It should be noted that, after the user completes casting the NFT, the NFT needs to be located in the user's own blockchain address, if the NFT is generated through the casting function built in the wallet function, the NFT is located in the user's own wallet address, but if the NFT is located on the third-party blockchain, that is, on the third-party website address after being cast through the third-party platform, the user needs to make a transfer, applies for transferring the NFT on the website address to the own wallet, and transfers the NFT from the third-party website to the own wallet address through the user authorization.
For the subsequent authentication of the blockchain address by using the target virtual resource, still taking NFT as an example for illustration, an NFT is generally cast in about one minute or less, so that the service party may start the NFT in the verification wallet address at a certain appointed time (for example, after the valid time after the verification code is sent is over), or directionally inquire whether there is an NFT at every preset time (for example, 2 minutes) according to the address submitted by the user, if so, start verification, wherein the verification mainly includes verifying the attribute of the obtained NFT, and verifying whether the filled verification code is the verification code sent to the user by comparing whether the blockchain address is the same as the submitted blockchain address, and whether the timestamp reasonably matches the appointed time. Optionally, if the data is encrypted data, it needs to be decrypted by an automatic program of the background server and compared, and the process is independent of the user. If the comparison passes, this blockchain address binding is successful. The server establishes a corresponding data table of the user and the specific blockchain address in the background. If the comparison fails, the verification code needs to be acquired again, and the target virtual resource needs to be recast for verification.
In summary, the embodiments of the present application have at least the following advantages:
the client side obtains verification information by submitting the block chain address needing to be authenticated, and generates the target virtual resource according to the verification information, wherein the target virtual resource is generated in a block chain wallet supporting creation of the target virtual resource or by using a third-party platform, and the target virtual resource is generated by using a predefined virtual resource casting program, so that the convenience and the efficiency of generation of the target virtual resource can be improved, the operation complexity of block chain address authentication is reduced, and the authentication process is simpler and more efficient; in addition, the block chain account address is authenticated by using the attribute information included in the target virtual resource and the information agreed between the client and the server, so that the safety of the block chain account address authentication can be improved.
Based on the contents described in the above embodiments, the following description is made on the contents interacted between the server and the client, please refer to fig. 6, which is a schematic flow chart of another block chain address authentication method provided in the embodiment of the present application, including but not limited to the following steps:
s301, submitting a block chain address authentication request. Specifically, the client submits a block chain address authentication request to the server where the server is located, where the block chain address authentication request includes a first block chain address, and optionally, the block chain address authentication request may be submitted after the user logs in the server where the server is located through the client.
S302, first verification information is sent in response to the block chain address authentication request. And sending the first verification information to the client by the server in response to the block link address authentication request. After the client receives first verification information sent by the server responding to the block chain address authentication request, two ways for subsequently generating the target virtual resource include: one may be generated within the client's blockchain wallet, the other is generated by a third party platform, which requires interaction between the client and a backend server of the third party platform. These two ways correspond to the following step S303 and steps S304-S309, respectively, and one of them may be arbitrarily selected in practical applications, and the step numbers expressed by the two ways do not constitute the selection priority order of the ways.
S303, generating the target virtual resource according to the first block chain address and the first verification information. This corresponds to the way the target virtual resource is generated within the wallet, which may include the second authentication information and the second blockchain address, which may be the blockchain address automatically obtained by the client, typically the blockchain address is the first blockchain address, but may also be different from the first blockchain address, the second authentication information may be the second authentication information that the terminal device obtains from the user and is entered according to the first authentication information, or that the terminal device automatically identifies, and the second authentication information may be the same as or different from the first authentication information. Optionally, the target virtual resource may be generated according to a virtual resource casting program started by the user at the client and the obtained data.
If the method of generating the target virtual resource on the third-party platform is adopted, the method may include the following steps:
s304, sending a virtual resource generation request. The virtual resource request includes second authentication information filled by the user according to the first authentication information. After responding to the virtual resource generation request, the server of the third party platform may execute step S305 of generating a target virtual resource according to the first blockchain address and the first verification information. Since the step is similar to the content of creating the target virtual resource at the client, no further description is given here, it should be noted that the first block chain address is obtained by a server of the third party platform, and a specific obtaining manner may be to log in the third party platform through the terminal device, associate the block chain wallet with the third party platform, and thus the wallet address may be automatically obtained under the condition of user authorization, but the block chain address obtained by the server may also be an incorrect wallet address, so that the second block chain address included in the finally generated target virtual resource is different from the first block chain address. Of course, whether it is correct or not, as long as there is the above data, the target virtual resource may be generated, and step S306 may be further executed to send a notification message that the target virtual resource is successfully generated. Specifically, the third-party server sends the notification message to the client, after the client receives the notification message, the target virtual resource needs to be transferred into the blockchain wallet, before that, authentication of the wallet address needs to be performed in step S307, and the user authorizes the wallet through the terminal device, where the method representing the user authorization may be to click to transfer after inputting the transferred wallet address, or the server prompts the user whether to transfer into the previously associated wallet address after the target virtual resource is successfully generated. Optionally, after the user is authorized, the server performs comparison authentication on the acquired blockchain address and the associated wallet address, and when the comparison is consistent, S308 may be performed to determine that the authentication of the transferred wallet address is successful, and then the transfer target virtual resource of S309 may be performed, and the target virtual resource is transferred from the third-party platform to the wallet address of the client.
No matter what way the target virtual resource is generated, the final target virtual resource is in the wallet of the client, so that the server of the server may interact with the client, determine whether there is a target virtual resource in the wallet when performing S310 appointed time start verification or directed query verification, and then perform step S311 to obtain attribute information (e.g., a second block chain address, second verification information, etc.) of the target virtual resource. It should be noted that step S310 may also be executed after the server acquires the first blockchain address, that is, the step is executed before or after the target virtual resource is generated without order limitation, and step S310 may be executed until the target virtual resource is detected in the wallet before the target virtual resource is not acquired.
S312, performing a block chain address authentication on the first block chain address by using the attribute information of the target virtual resource. The attribute information may include a second blockchain address and second verification information, and by comparing whether the first blockchain address and the second blockchain address are consistent with each other and the first verification information and the second verification information are consistent with each other, it may be further verified whether the generation timestamp is within the valid time of the verification information, so as to determine the result of the blockchain address authentication. When the result of the authentication of the blockchain address is authentication pass, step S313 is executed to bind the identity information of the target user and the first blockchain address when the blockchain address authentication pass. Note that, when the block chain address authentication does not pass, the process restarts from step S301.
In summary, the embodiments of the present application have at least the following advantages:
after the client submits the to-be-authenticated blockchain address included in the blockchain address authentication request through the server of the access service party, the server of the service party can send verification information to the client, wherein the to-be-authenticated blockchain address and the verification information can be used as appointed information between a user and the service party, a target virtual resource can be generated in the server of a local terminal device or a third-party platform according to the appointed information, and authentication of the blockchain address is achieved by comparing attribute information in the target virtual resource and the consistency of the appointed information. Since these provisioning information can uniquely identify the user identity, it can be more secure to authenticate the blockchain account address using the target virtual resource.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a block chain address authentication apparatus according to an embodiment of the present disclosure. The blockchain address authentication device may be a computer program (including program code) running in a computer device, for example, the blockchain address authentication device is an application software; the apparatus may be used to perform the corresponding steps in the methods provided by the embodiments of the present application. As shown in fig. 7, the block chain address authentication device 70 may include: a sending module 701, an inquiring module 702 and an authenticating module 703.
A sending module 701, configured to send first verification information to a client in response to a block chain address authentication request, where the block chain address authentication request includes a first block chain address;
a query module 702, configured to query a target virtual resource according to the first blockchain address, where the target virtual resource is generated according to the first verification information and the first blockchain address;
the authentication module 703 is configured to authenticate the first blockchain address by using the target virtual resource.
In an embodiment, the authentication module 703 is specifically configured to: acquiring attribute information included by the target virtual resource, wherein the attribute information includes one or more of second verification information, a second block chain address and a timestamp; and authenticating the first block chain address according to the attribute information.
In an embodiment, the authentication module 703 is specifically configured to: comparing the second block chain address and the second verification information with the first block chain address and the first verification information; and if the second block chain address is the same as the first block chain address and the second verification information is the same as the first verification information, determining that the authentication result of the first block chain address is authenticated.
In an embodiment, the blockchain address authentication request further includes identity information of the target user, and the blockchain address authentication device 70 further includes a binding module 704 for: and if the first block chain address passes the authentication, establishing a binding relationship between the first block chain address and the identity information of the target user.
It can be understood that the functions of the functional modules of the block chain address authentication apparatus described in this embodiment of the present application may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the description related to the foregoing method embodiment, which is not described herein again. In addition, the beneficial effects of the same method are not described in detail.
Referring to fig. 8, fig. 8 is a schematic structural diagram of another block chain address authentication apparatus according to an embodiment of the present disclosure. The blockchain address authentication device may be a computer program (including program code) running in a computer device, for example, the blockchain address authentication device is an application software; the apparatus may be used to perform the corresponding steps in the methods provided by the embodiments of the present application. As shown in fig. 8, the block chain address authentication apparatus 80 may include: a submission module 801, a reception module 802, and a generation module 803.
A submitting module 801, configured to submit a block chain address authentication request to a server, where the block chain address authentication request includes a first block chain address;
a receiving module 802, configured to receive first verification information sent by a server in response to a block chain address authentication request;
a generating module 803, configured to generate a target virtual resource according to the first verification information, where the target virtual resource is used for the server to authenticate the first blockchain address.
In an embodiment, the generating module 803 is specifically configured to: acquiring a virtual resource generation object, wherein the virtual resource generation object comprises an attribute field, and the attribute field comprises one or more of a verification information field, a block chain address field and a timestamp field; and acquiring a first block chain address, and generating a target virtual resource according to the attribute field, the first verification information and the first block chain address.
In an embodiment, the generating module 803 is further specifically configured to: sending a virtual resource generation request to a third-party platform, wherein the virtual resource generation request comprises second verification information and is used for indicating the third-party platform to generate a target virtual resource according to the first verification information and the first block link address after the first block link address is acquired; receiving a notification message that the target virtual resource is successfully generated and sent by a third-party platform; when the notification message is received, transferring the target virtual resource generated by the third-party platform to the first blockchain address. Optionally, the target virtual resource includes attribute information, and the attribute information is used for the server to authenticate the first blockchain address, where the attribute information includes one or more of second verification information, a second blockchain address, and a timestamp.
It can be understood that the functions of the functional modules of the block chain address authentication apparatus described in this embodiment of the present application may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the description related to the foregoing method embodiment, which is not described herein again. In addition, the beneficial effects of the same method are not described in detail.
Referring to fig. 9, which is a schematic structural diagram of a server according to an embodiment of the present disclosure, the server 900 may include a processor 901, a memory 902, a network interface 903, and at least one communication bus 904. The processor 901 is used for scheduling computer programs, and may include a central processing unit, a controller, and a microprocessor; the memory 902 is used for storing computer programs and may include a high-speed random access memory RAM, a non-volatile memory such as a magnetic disk storage device, a flash memory device; the network interface 903 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface) to provide data communication functionality, and a communication bus 904 to connect the various communication elements. The server 900 may correspond to the authentication server 101 described above.
Among other things, the processor 901 may be configured to call a computer program in memory to perform the following operations:
sending first verification information to a client in response to a block chain address authentication request, wherein the block chain address authentication request comprises a first block chain address;
querying a target virtual resource according to the first blockchain address, wherein the target virtual resource is generated according to the first verification information and the first blockchain address;
the first blockchain address is authenticated using the target virtual resource.
In an embodiment, the processor 901 is specifically configured to: acquiring attribute information included by the target virtual resource, wherein the attribute information includes one or more of second verification information, a second block chain address and a timestamp; and authenticating the first block chain address according to the attribute information.
In an embodiment, the processor 901 is specifically configured to: comparing the second block chain address and the second verification information with the first block chain address and the first verification information; and if the second block chain address is the same as the first block chain address and the second verification information is the same as the first verification information, determining that the authentication result of the first block chain address is authenticated.
In an embodiment, the block chain address authentication request further includes identity information of a target user, and the processor 901 is further configured to: and if the first block chain address passes the authentication, establishing a binding relationship between the first block chain address and the identity information of the target user.
It should be understood that the server 900 described in this embodiment of the present application may perform the description of the blockchain address authentication method in the embodiment corresponding to the foregoing, and may also perform the description of the blockchain address authentication device 70 in the embodiment corresponding to fig. 7, which is not described herein again. In addition, the beneficial effects of the same method are not described in detail.
Please refer to fig. 10, which is a schematic structural diagram of a terminal device according to an embodiment of the present application. As shown in fig. 10, the terminal device 1000 can include an input device 1001, an output device 1002, a processor 1003, a memory 1004, a network interface 1005, and at least one communication bus 1006. The terminal device 1000 may correspond to the terminal device 100 of the preamble, wherein:
the processor 1003 may be a Central Processing Unit (CPU). The processor may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or the like. The PLD may be a field-programmable gate array (FPGA), a General Array Logic (GAL), or the like.
Memory 1004 may include volatile memory (volatile memory), such as random-access memory (RAM); the memory 1004 may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a solid-state drive (SSD), etc.; the memory 1004 may be a high-speed RAM memory or a non-volatile memory (e.g., at least one disk memory). The memory 1004 may optionally be at least one storage device located remotely from the processor 1003. The memory 1004 may also comprise a combination of memories of the kind described above. As shown in fig. 10, the memory 1004, which is a kind of computer-readable storage medium, may include therein an operating system, a network communication module, a user interface module, and a device control application program.
The network interface 1005 may include a standard wired interface, a wireless interface (e.g., WI-FI interface) for providing data communication functionality; the communication bus 1006 is responsible for connecting the various communication elements; the input device 1001 receives an instruction input by a user to generate a signal input related to user setting and function control of the terminal device.
In one embodiment, input device 1001 includes, but is not limited to, one or more of a touch panel, a physical or virtual Keyboard (Keyboard), function keys, a mouse, and the like; the output device 1002 is configured to output data information, in this embodiment of the present application, the client interface with a corresponding Display function, for example, a blockchain wallet, a third-party platform casting a target virtual resource, a website of a service provider, and the like, where the output device 1002 may include a Display screen (Display) or other Display devices; the processor 1003 is a control center of the terminal device, connects various parts of the entire terminal device by various interfaces and lines, and executes various functions by scheduling and running the computer programs stored in the memory 1004.
Among other things, the processor 1003 may be configured to call a computer program in the memory to perform the following operations:
submitting a block chain address authentication request to a server, wherein the block chain address authentication request comprises a first block chain address;
receiving first verification information sent by a server in response to the block chain address authentication request;
and generating a target virtual resource according to the first verification information, wherein the target virtual resource is used for the server to authenticate the first block chain address.
In an embodiment, the processor 1003 is specifically configured to: acquiring a virtual resource generation object, wherein the virtual resource generation object comprises an attribute field, and the attribute field comprises one or more of a verification information field, a block chain address field and a timestamp field; and acquiring a first block chain address, and generating a target virtual resource according to the attribute field, the first verification information and the first block chain address.
In an embodiment, the processor 1003 is specifically configured to: sending a virtual resource generation request to a third-party platform, wherein the virtual resource generation request comprises first verification information and is used for indicating the third-party platform to generate a target virtual resource according to the first verification information and the first block link address after the first block link address is acquired; receiving a notification message that the target virtual resource is successfully generated and sent by a third-party platform; when the notification message is received, transferring the target virtual resource generated by the third-party platform to the first blockchain address. Optionally, the target virtual resource includes attribute information, and the attribute information is used for the server to authenticate the first blockchain address, where the attribute information includes one or more of second verification information, a second blockchain address, and a timestamp.
It should be understood that the terminal device 1000 described in this embodiment of the present application can perform the description of the method for authenticating the blockchain address in the corresponding embodiment described above, and can also perform the description of the device 80 for authenticating the blockchain address in the corresponding embodiment shown in fig. 8 described above, which is not described herein again. In addition, the beneficial effects of the same method are not described in detail.
In addition, it should be further noted that, in this embodiment of the present application, a storage medium is further provided, where the storage medium stores a computer program of the foregoing block chain address authentication method, where the computer program includes program instructions, and when one or more processors load and execute the program instructions, a description of the block chain address authentication method according to the embodiment may be implemented, which is not described herein again, and beneficial effects of the same method are also described herein without being described herein again. It will be understood that the program instructions may be deployed to be executed on one computer device or on multiple computer devices that are capable of communicating with each other.
Embodiments of the present application also provide a computer program product or computer program comprising computer instructions stored in a computer-readable storage medium. The computer instructions are read by a processor of a computer device from a computer-readable storage medium, and the computer instructions are executed by the processor to cause the computer device to perform the steps performed in the embodiments of the methods described above.
Finally, it should be further noted that the terms in the description and claims of the present application and the above-described drawings, such as first and second, etc., are merely used to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present application and is not to be construed as limiting the scope of the present application, so that the present application is not limited thereto but rather by the claims appended hereto.

Claims (10)

1. A method of block chain address authentication, the method comprising:
sending first verification information to a client in response to a block chain address authentication request, wherein the block chain address authentication request comprises a first block chain address;
querying a target virtual resource according to the first blockchain address, wherein the target virtual resource is generated according to the first verification information and the first blockchain address;
authenticating the first blockchain address using the target virtual resource.
2. The method of claim 1, wherein the authenticating the first blockchain address using the target virtual resource comprises:
acquiring attribute information included in the target virtual resource, wherein the attribute information includes one or more of second verification information, a second block chain address and a timestamp;
and authenticating the first block chain address according to the attribute information.
3. The method of claim 2, wherein the authenticating the first blockchain address according to the attribute information comprises:
comparing the second blockchain address and the second verification information with the first blockchain address and the first verification information;
and if the second blockchain address is the same as the first blockchain address and the second verification information is the same as the first verification information, determining that the authentication result of the first blockchain address is authentication pass.
4. A method according to any one of claims 1 to 3, wherein the blockchain address authentication request further comprises identity information of a target user, the method further comprising:
and if the first block chain address passes the authentication, establishing a binding relationship between the first block chain address and the identity information of the target user.
5. A method of block chain address authentication, the method comprising:
submitting a block chain address authentication request to a server, wherein the block chain address authentication request comprises a first block chain address;
receiving first verification information sent by the server in response to the block link address authentication request;
and generating a target virtual resource according to the first verification information, wherein the target virtual resource is used for the server to authenticate the first block chain address.
6. The method of claim 5, wherein the generating the target virtual resource from the first validation information comprises:
acquiring a virtual resource generation object, wherein the virtual resource generation object comprises an attribute field, and the attribute field comprises one or more of a verification information field, a block chain address field and a timestamp field;
and acquiring the first block chain address, and generating a target virtual resource according to the attribute field, the first verification information and the first block chain address.
7. The method of claim 5, wherein the generating the target virtual resource from the first validation information comprises:
sending a virtual resource generation request to a third-party platform, wherein the virtual resource generation request comprises the first verification information, and the virtual resource generation request is used for indicating the third-party platform to generate a target virtual resource according to the first verification information and the first block link address after the third-party platform acquires the first block link address;
receiving a notification message that the target virtual resource is successfully generated and sent by the third-party platform;
when the notification message is received, transferring the target virtual resource generated by the third party platform to the first blockchain address.
8. The method of any of claims 5-7, wherein the target virtual resource comprises attribute information for the server to authenticate the first blockchain address, wherein the attribute information comprises one or more of second verification information, a second blockchain address, and a timestamp.
9. A block chain address authentication apparatus, comprising:
a sending module, configured to send first verification information to a client in response to a block chain address authentication request, where the block chain address authentication request includes a first block chain address;
a query module, configured to query a target virtual resource according to the first blockchain address, where the target virtual resource is generated according to the first verification information and the first blockchain address;
and the authentication module is used for authenticating the first block chain address by utilizing the target virtual resource.
10. A computer device, comprising: a processor, a memory, and a network interface;
the processor is connected with the memory and the network interface, wherein the network interface is used for providing a network communication function, the memory is used for storing program codes, and the processor is used for calling the program codes to execute the block chain address authentication method of any one of claims 1 to 8.
CN202110997495.XA 2021-08-27 2021-08-27 Block chain address authentication method and device and computer equipment Active CN113904774B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110997495.XA CN113904774B (en) 2021-08-27 2021-08-27 Block chain address authentication method and device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110997495.XA CN113904774B (en) 2021-08-27 2021-08-27 Block chain address authentication method and device and computer equipment

Publications (2)

Publication Number Publication Date
CN113904774A true CN113904774A (en) 2022-01-07
CN113904774B CN113904774B (en) 2024-09-06

Family

ID=79187919

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110997495.XA Active CN113904774B (en) 2021-08-27 2021-08-27 Block chain address authentication method and device and computer equipment

Country Status (1)

Country Link
CN (1) CN113904774B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598531A (en) * 2022-03-10 2022-06-07 上海星图比特信息技术服务有限公司 Identity authentication method and equipment
US12124600B1 (en) 2023-11-04 2024-10-22 Jun Chen Identification method and identification system and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107844978A (en) * 2017-11-30 2018-03-27 中链科技有限公司 A kind of staple commodities transaction processing method and system based on block chain
CN108702622A (en) * 2017-11-30 2018-10-23 深圳前海达闼云端智能科技有限公司 Mobile network's access authentication method, device, storage medium and block chain node
CN109064151A (en) * 2018-10-23 2018-12-21 北京金山安全软件有限公司 Transfer method, device, electronic equipment and storage medium
CN109961292A (en) * 2019-03-22 2019-07-02 杭州复杂美科技有限公司 Block chain identifying code application method, equipment and storage medium
CN110659993A (en) * 2019-09-27 2020-01-07 腾讯科技(深圳)有限公司 Resource management method and device based on block chain network
US20200013026A1 (en) * 2018-07-03 2020-01-09 Gmo Globalsign, Inc. Systems and methods for blockchain addresses and owner verification
CN111149122A (en) * 2018-05-30 2020-05-12 重庆小雨点小额贷款有限公司 Block chain-based security management method, related device and storage medium
CN111859348A (en) * 2020-07-31 2020-10-30 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology
CN111950026A (en) * 2020-08-21 2020-11-17 安徽高山科技有限公司 Ciphertext sharing method based on block chain intelligent contract

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107844978A (en) * 2017-11-30 2018-03-27 中链科技有限公司 A kind of staple commodities transaction processing method and system based on block chain
CN108702622A (en) * 2017-11-30 2018-10-23 深圳前海达闼云端智能科技有限公司 Mobile network's access authentication method, device, storage medium and block chain node
CN111149122A (en) * 2018-05-30 2020-05-12 重庆小雨点小额贷款有限公司 Block chain-based security management method, related device and storage medium
US20200013026A1 (en) * 2018-07-03 2020-01-09 Gmo Globalsign, Inc. Systems and methods for blockchain addresses and owner verification
CN109064151A (en) * 2018-10-23 2018-12-21 北京金山安全软件有限公司 Transfer method, device, electronic equipment and storage medium
CN109961292A (en) * 2019-03-22 2019-07-02 杭州复杂美科技有限公司 Block chain identifying code application method, equipment and storage medium
CN110659993A (en) * 2019-09-27 2020-01-07 腾讯科技(深圳)有限公司 Resource management method and device based on block chain network
CN111859348A (en) * 2020-07-31 2020-10-30 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology
CN111950026A (en) * 2020-08-21 2020-11-17 安徽高山科技有限公司 Ciphertext sharing method based on block chain intelligent contract

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZIYUAN WANG ECT.: "ArtChain: Blockchain-Enabled Platform for Art Marketplace", 《2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN)》, 2 January 2020 (2020-01-02) *
梁青青;张刚要;: "融入课程质量的在线学习成果认证区块链模型及实现机理研究", 电化教育研究, no. 04, 1 April 2020 (2020-04-01) *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598531A (en) * 2022-03-10 2022-06-07 上海星图比特信息技术服务有限公司 Identity authentication method and equipment
CN114598531B (en) * 2022-03-10 2024-07-23 上海星图比特信息技术服务有限公司 Identity authentication method and equipment
US12124600B1 (en) 2023-11-04 2024-10-22 Jun Chen Identification method and identification system and storage medium

Also Published As

Publication number Publication date
CN113904774B (en) 2024-09-06

Similar Documents

Publication Publication Date Title
CN110349056B (en) Service processing system and method based on block chain
US12039366B2 (en) Task processing method, system, device, and storage medium
CN109981679B (en) Method and apparatus for performing transactions in a blockchain network
CN108551437B (en) Method and apparatus for authenticating information
CN108898389A (en) Based on the content verification method and device of block chain, electronic equipment
JP6574168B2 (en) Terminal identification method, and method, system, and apparatus for registering machine identification code
US20070220009A1 (en) Methods, systems, and computer program products for controlling access to application data
CN108960825A (en) Electric endorsement method and device, electronic equipment based on block chain
TWI756200B (en) Method and device for account binding and business processing
WO2015116998A2 (en) Electronic transfer and obligation enforcement system
US20200294039A1 (en) Retail blockchain method and apparatus
WO2024011863A1 (en) Communication method and apparatus, sim card, electronic device, and terminal device
CN113904774B (en) Block chain address authentication method and device and computer equipment
CN113179282A (en) Method and device for merging account numbers and server
CN109818965B (en) Personal identity verification device and method
CN111242591A (en) Block chain transaction processing method, system and storage medium based on joint signature
CN112181599B (en) Model training method, device and storage medium
CN114266680A (en) Block chain-based electronic contract signing method, device and system
CN110599184A (en) Method and device for network service account transaction, server and storage medium
US10713655B1 (en) Migrating user accounts from assisted to self-managed
CN115801317A (en) Service providing method, system, device, storage medium and electronic equipment
CN111507728A (en) Payment configuration method and device
CN113810426B (en) Access system, method and device of instant messaging service
CN114417424B (en) Block chain identity privacy protection method, device and equipment and readable storage medium
CN112311716A (en) Data access control method and device based on openstack and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant