[go: up one dir, main page]

CN106878318A - A kind of block chain real time polling cloud system - Google Patents

A kind of block chain real time polling cloud system Download PDF

Info

Publication number
CN106878318A
CN106878318A CN201710121982.3A CN201710121982A CN106878318A CN 106878318 A CN106878318 A CN 106878318A CN 201710121982 A CN201710121982 A CN 201710121982A CN 106878318 A CN106878318 A CN 106878318A
Authority
CN
China
Prior art keywords
authentication
block chain
clouds
authentication module
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710121982.3A
Other languages
Chinese (zh)
Other versions
CN106878318B (en
Inventor
钱德君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chain Mdt Infotech Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710121982.3A priority Critical patent/CN106878318B/en
Publication of CN106878318A publication Critical patent/CN106878318A/en
Application granted granted Critical
Publication of CN106878318B publication Critical patent/CN106878318B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of block chain real time polling cloud system, including:Client database, authentication module, request authentication module, transport module, the high in the clouds authentication module module, base station stored system, high in the clouds authentication module, base station poll exchange system;Workflow is:NFC is a unique electronic tag in the whole world ensured by rivest, shamir, adelman in invention, and false distinguishing checking can be carried out by regular handset simultaneously for for block chain user by the embedded NFC of block chain of particular design;After other VeChain block chain network information Stores, after being verified by the true and false, apply and the product information of distributed storage in special block chain will be read out in mobile terminal, these information can include all information of commodity design, production, logistics, sale etc., to reach the supply chain all-transparent to manufacturing enterprise, marketing channel, supervision department and final block chain user.

Description

A kind of block chain real time polling cloud system
Technical field
The present invention relates to a kind of field of anti-counterfeit technology, it is related to a kind of mode by using real-time adjustment to carry out real time polling cloud End is used to realize the amount of calculation device of the load of network and node.
Background technology
The anti-counterfeiting technology for commonly using at present includes product unique package, Quick Response Code, RFID, NFC label, but these technologies All be to improve fraud cost in the way of it is false proof come reach to a certain degree, and for Quick Response Code, RFID/NFC these numeral marks Know, all can be in theory what is be replicated due to information is isolated, and the cost for replicating is very low, can not accomplish It is false proof in complete meaning.Comparatively speaking, Vechain is based on block chain technology can accomplish can not distorting and safety for data Property, so that realizes truly is false proof.False proof based on block chain technology is made up of three parts:Part I is by spy The embedded NFC of block chain of different design, in this type of design, NFC is no longer electronic plaintext display label, but one It is individual by rivest, shamir, adelman ensure the unique electronic tag in the whole world, simultaneously for for block chain user pass through common hand Machine can carry out false distinguishing checking;Part II is block chain network information Store, after being verified by the true and false, mobile terminal application The product information of distributed storage in special block chain will be read out, these information can include commodity design, production, thing All information of stream, sale etc., to reach the supply to manufacturing enterprise, marketing channel, supervision department and final block chain user Chain all-transparent;Part III is directed to merchandise control and the distribution platform of production enterprise, and this platform can cause production enterprise Industry issue new product extremely easily and effectively, and increase the social public credibility of manufacturing enterprise.
But in block chain authentication, because block chain node needed password encryption before authentication is carried out Private key is decrypted, it is necessary to be not intended in time authentication information is made a summary and is added to block chain before authentication completion Whole network can be involved, and only needs to node associated therewith to add authentication;And the meeting before authentication terminates Current authentication information summary is added into block and is broadcast in the whole network, it is necessary to all active nodes are added to this process, This identity block is added in local high in the clouds, so as to reduce the load of network and the amount of calculation of node in this process.
The main object of the present invention be by a kind of block chain real time polling cloud system, using intelligentized method, It is so as to reduce the amount of calculation of load and node that network is reduced during this and offline increased by way of superposition Authentication trust degree.Therefore, it can be said that by it is this be achieved in that it is necessary.
The content of the invention
In view of this, the technical problem to be solved in the present invention is to provide a kind of block chain real time polling cloud system, is used for Solution cannot come real time polling high in the clouds to the mode of real-time adjustment and be used to realize the amount of calculation device of the load of network and node Problem.To reach the effect of above-mentioned technical proposal, the technical scheme is that:A kind of block chain real time polling cloud system, Including:Client database, authentication module, request authentication module, transport module, high in the clouds authentication module module, base station are deposited Storage system, high in the clouds authentication module, base station poll exchange system;
In P2P networks, base station poll exchange system receives the band of position and the identity information of block chain user;According to position The block chain user high in the clouds that the block chain ID carried in region and identity information stored from base station stored system is put to recognize In card information, go to inquire about the block chain ID correspondence high in the clouds authentication information of block chain user;
High in the clouds authentication module refers to the functional unit of administrative authentication information;Authentication module refers to authentication verification letter The functional unit of breath;Request authentication module refers to sending authentication information to the function of high in the clouds authentication module from authentication module Component;
High in the clouds authentication module collects all of block chain user high in the clouds authentication information under each region;According under each region All of block chain user high in the clouds authentication information generation block chain user high in the clouds authentication information, be used to reduce certification it is concurrent when meter Calculation amount, and memory block chain user high in the clouds authentication information is to high in the clouds authentication module;The band of position block chain user that will be inquired High in the clouds authentication information is sent to block chain user;
Wherein, the band of position of all of block chain user and identity information under each region is collected to be specially:Take turns base station Ask the authority that exchange system timing sends the band of position and identity information to all of block chain user to request authentication module It is required that;
Authentication module sends authentication acquisition request to its local block chain user is in;Authentication mould Block chain user under block directly returns to the band of position and the high in the clouds certification letter of oneself by transport module to high in the clouds authentication module Breath;And in return information, according to high in the clouds authentication module module addition mark, prevent both sides from denying, and the block chain for returning is used Family is added to the node in network, while block chain user is needed first from base station stored system downloads portion copy to number clients According to storehouse, authentication is then proceeded by again;
Base station stored system memory locations region and high in the clouds authentication information include:By the band of position and high in the clouds authentication information with Many helical structures are stored;Wherein, many helical structures include:Single linked list, and each are formed with the row that are designated of the band of position Area identification is associated as well to a circular linked list, and circular linked list includes the high in the clouds authentication information for belonging to block chain user, so that shape Into complete block chain;
Verification process is divided into request authentication module and high in the clouds authentication module two parts, asks authentication module to be recognized to high in the clouds first Card module initiates connection request;High in the clouds authentication module may require that request authentication module sends over the identity information of oneself;
Authentication starts to produce key pair by ECDSA, obtains private key:Public key is calculated with private key, And calculate PIN with by public key;Private key is carried out into ECDSA random hash and draws public key, with this Simultaneously, it is impossible to allow public key to calculate private key, PIN is calculated by public key, and is provided as bit coin address, then by public affairs Key carries out SHA256 Hash calculations, and identity request information is signed and encrypted with private key is put into all of block chain user's cloud Hold in the identity chain of authentication information, identity chain is the different block chain user's ID authentication information shape of high in the clouds authentication module generation Into block chain;Then obtain adding the PIN of high in the clouds authentication module by Hash calculation by public key, used bases64 Encoded;
Last-minute plea authentication module submits application request, including authentication voucher and digital signature to, using private key and cloud End authentication module is signed to request, and signature is used as mark head;With the voucher of public key encryption block chain authenticating user identification, Solicited message is transmitted by private network in the form of identifying head;
High in the clouds authentication module first divides public key after the ID authentication request for receiving request authentication module from identity chain Separate out and, verify the validity of signature;Authentication failed message is not returned to if if certification, authentication terminates;Then verify The validity of PIN, PIN include timestamp and verification and, if return authentication failed message, authentication Terminate;If being verified, request authentication module can return to a message acknowledgment being verified, while asking authentication module meeting The digital signature information of oneself is sent to by high in the clouds authentication module with the identity of request end, and broadcasts the summary of this transmission, bag Include the random number of the summary of block chain authenticating user identification voucher, random number and last authentication, P2P nodes meetings During this authentication added into high in the clouds authentication module by transport module, and then it is added to the client data in P2P networks In storehouse;
High in the clouds authentication module is received after the request authentication information sent of authentication module to asking the identity of authentication module Verified, if being verified, can also be returned to a message acknowledgment being verified, this checking is then broadcasted, in P2P networks Node can will ask the block chain user name of authentication module to be also added in the block of high in the clouds;If certification node is to add net for the first time Network, then need other nodes to network to ask to download the authentication high in the clouds safeguarded in P2P networks to node locally, above mistake Even if journey block chain authenticating user identification both sides have the side can also not carry out online, it is only necessary to which high in the clouds authentication module is when reaching the standard grade Authentication module is authenticated;
High in the clouds authentication module and the data of certification both sides can be intercepted during block chain authenticating user identification, to certification Both sides are transparent;If illegal node is wanted to pretend to be the side of being certified to complete authentication, it is necessary to change the content in the block of high in the clouds, and Again whole workloads of all blocks after this block are completed, due to the calculating of high in the clouds authentication module, is owned in network Node all can participation certificates authentication procedures each time, prevent from distorting the proof of work machine of transaction record using chain transaction System, and prevent certification from denying, distort, the behavior such as palm off to reach;
Base station poll exchange system includes access entity, Service Ticket, authentication mechanism, identity relying party, authentication domain Component is operated;
Access entity refers to the object of certification request, and only certification is by just allowing and accessed object communication;Certification Voucher is referred to before access entity and accessed object communication for proving the digital evidence of oneself identity;Authentication mechanism is referred to The methods that Service Ticket is produced and verified;Identity relying party refers to its behavior operation and depends on authentication module result The functional unit, it may be possible to authorized component;Authentication domain refers in same administration authority border Authentication part;
Base station poll exchange system effect is that block chain user determines various uncertain in identity-based verification process Factor, 3 classes are divided into by the element of trust of authentication:Ensure that Service Ticket is not compromised, be denoted as 1 class;Ensure Service Ticket not It is forged, is denoted as 2 classes;Ensure that Service Ticket is not held as a hostage, be denoted as 3 classes;Block chain user body in identity-based verification process Cause the influence degree of the generations such as compromised Service Ticket, forgery or abduction in part verification process because of certain uncertain factor, claim It is NOCONFIDENCE, block chain user certain uncertain factor in identity-based verification process causes Service Ticket to be let out The influence degree of the generations such as dew, forgery or abduction can represent that wherein x represents object with NOCONFIDENCE ()=(x, y, z) 1 class element of trust, y represents 2 class element of trusts of object, and z is represented the element of trust of 3 classes, is being based on by block chain user Certain uncertain factor causes the influence degree of the generations such as compromised Service Ticket, forgery or abduction in authentication procedures The several significant uncertain factor of NOCONFIDENCE (), analysis assumes block chain user in identity-based verification process Uncertainty, then calculate authentication trust value, the credible of high in the clouds authentication is judged with degree of safety, confidence level Degree;Degree of safety refers to the possibility that key object ensures that certification authority is not compromised, is not forged or is not held as a hostage, uses probability To represent;Confidence level is the method trusted for quantificational expression;In authentication mode, can lead in fixed authentication domain The degree of belief crossed between computing system entity represents the security of authentication mode, is equally represented with probability;Confidence level is divided into recognizes Card voucher confidence level, authentication secret confidence level, digital entities confidence level, physical entity confidence level.
Brief description of the drawings
Fig. 1 is a kind of structural representation of block chain real time polling cloud system of the invention.
Specific embodiment
In order that the technical problems to be solved by the invention, technical scheme and beneficial effect become more apparent, below tie Drawings and Examples are closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only used To explain the present invention, it is not intended to limit the present invention, can realizes that the product of said function belongs to equivalent and improvement, includes Within protection scope of the present invention.Specific method is as follows:
Embodiment one:As shown in Figure 1:In practice, base station poll exchange system receive block chain user the band of position and Identity information;The area that block chain ID according to being carried in the band of position and identity information has been stored from base station stored system In the authentication information of block chain user high in the clouds, go to inquire about the block chain ID correspondence high in the clouds authentication information of block chain user;
High in the clouds authentication module collects all of block chain user high in the clouds authentication information under each region;According under each region All of block chain user high in the clouds authentication information generation block chain user high in the clouds authentication information, be used to reduce certification it is concurrent when meter Calculation amount, and memory block chain user high in the clouds authentication information is to high in the clouds authentication module;The band of position block chain user that will be inquired High in the clouds authentication information is sent to block chain user;
Wherein, the band of position of all of block chain user and identity information under each region is collected to be specially:Take turns base station Ask the authority that exchange system timing sends the band of position and identity information to all of block chain user to request authentication module It is required that;
Authentication module sends authentication acquisition request to its local block chain user is in;Authentication mould Block chain user under block directly returns to the band of position and the high in the clouds certification letter of oneself by transport module to high in the clouds authentication module Breath;And in return information, added according to the high in the clouds authentication module module and marked, prevent both sides from denying, and the block for returning Chain user is added to the node in network, while block chain user is needed first from base station stored system downloads portion copy to client In client database, authentication is then proceeded by again.
Base station stored system memory locations region and high in the clouds authentication information include:By the band of position and high in the clouds authentication information with Many helical structures are stored;Wherein, many helical structures include:Single linked list, and each are formed with the row that are designated of the band of position Area identification is associated as well to a circular linked list, and circular linked list includes the high in the clouds authentication information for belonging to block chain user, so that shape Into complete block chain.
Authentication starts to produce key pair by ECDSA, obtains private key:Public key is calculated with private key, And calculate PIN with by public key;Private key is carried out into ECDSA random hash and draws public key, with this Simultaneously, it is impossible to allow public key to calculate private key, PIN is calculated by public key, it is provided as bit coin address.Public key is carried out SHA256 Hash calculations;Identity request information is signed with private key.
Verification process is divided into request authentication module and high in the clouds authentication module two parts, asks authentication module to be recognized to high in the clouds first Card module initiates connection request.High in the clouds authentication module may require that request authentication module sends over the identity information of oneself.It is real In border as shown in Figure 1.Key is produced:Key pair is produced using ECDSA algorithms;By key to producing private key;Private key is by ECDSA Calculate and produce public key K2, and encryption is put into identity chain, identity chain is the different block chain user of high in the clouds authentication module generation The block that authentication information is formed, referred to as identity chain;Obtain adding the PIN of timestamp by Hash calculation by K2, Then it is encoded with bases64;Submit application request to:Including authentication voucher and digital signature.Using private key pair Request is signed, and this signature is mark head.With public key encryption authentication voucher, will be asked with identifying head type Information is transmitted by private network, wherein the generation process of mark head is as follows.Produce a unique random number;By random number plus Enter in request;High in the clouds authentication module receive request authentication module ID authentication request after, first by public key from identity chain In separate, verify signature validity.Authentication failed message is not returned to if if certification, authentication terminates;Then Verify the validity of PIN.PIN include timestamp and verification and.Authentication failed message is returned to, identity is recognized Card terminates;If being verified, the request authentication module can return to a message acknowledgment being verified, while the request The digital signature information of oneself can be sent to A by authentication module with the identity of request end, and flow is consistent with shown in Fig. 1;And according to The principle as in chain transaction is added to bit coin block, this certification summary, including block chain authenticating user identification is broadcasted This authentication can be added high in the clouds by the random number of the summary of voucher, random number and last authentication, nodes In block, and then it is added in the high in the clouds in network.A is received after the authentication information that B sends according to authentication in practice The order of the first step is verified to the identity of B, if being verified, can also return to a message acknowledgment being verified, then This checking is broadcasted, can be also added to the block chain user name of B in the block of high in the clouds by nodes.If certification node is first Secondary addition network, then need to the authentication high in the clouds safeguarded in network other nodes request download P2P networks to node sheet Ground.Even if above procedure communicating pair has the side can also not carry out online, it is only necessary to communicate an other side when reaching the standard grade to please Authenticating party is asked to be authenticated, this mode agrees with P2P network environment needs.The strick precaution of network attack refers to recognizing in identity Attacker can intercept the data of certification both sides during card, the purpose to reach fraud system transparent to certification both sides.Bit body Part certification prevents Replay Attack using the high in the clouds authentication module mechanism, can all be wrapped in the certification message that authentication authorization and accounting both sides send The high in the clouds authentication module at close enough current time is included, and the high in the clouds authentication module of attacker will be relatively distant from Current time.Man-in-the-middle attack in authentication refer in the middle of attacker certification both sides with the authenticating party at two ends and be certified Side is authenticated respectively so that authenticating party and the side of being certified will not perceive the attacker of centre.In the present invention, password is will not Transmit in any form in a network, so as to cannot be intercepted and captured by the 3rd people.If illegal node is wanted to pretend to be the side of being certified to come Authentication is completed, it is necessary to change the content in the block of high in the clouds, and complete the whole of all blocks after this block again Workload, this is a huge test for the computing capability of computer, is hardly possible realization in reality.Due to Introduce high in the clouds mechanism, in network all nodes all can participation certificates authentication procedures each time, prevent from distorting using chain transaction The proof of work mechanism of transaction record, that high in the clouds most long is safeguarded in a network come reach prevent certification from denying, distort, it is false The behavior such as emit.The transaction of bit coin is no doubt reliable, but when being applied in authentication, also has some to ask in theory Topic needs overcome and solve.First, before one-time identity authentication terminates, certification both sides all can by certification summary-advertisement to the whole network, The problem for being so possible to broadcast storm occur when multiple nodes concurrently carry out authentication.On this problem, bit Coin designer is exactly the size for reducing block for the solution that big the brought Denial of Service attack of trading volume is proposed By block size from original without the upper limit, it is changed into having the upper limit, it means that the trading processing ability of bit coin only about per second 7 Pen, but the frequency of authentication should be higher with bit coin trading frequency in network, then in authentication, control While authentication processed concurrent quantity, it should improve the threshold value of authentication per second, so as in controlling network Broadcasting amount, reduces while broadcast causes excessive influence on network and also can guarantee that concurrent authentication quantity disclosure satisfy that network area The demand of block chain user.Bit identity verification scheme is a kind of side for being directly compatible with block chain user name or Email and password Case.In the present invention, when private key is stored, we are encrypted to prevent unexpected attack or threat using password.Bit identity The most special place of authentication method is that password can be transmitted in a network by any way in no instance.Using this Mechanism, block chain user still can be verified using block chain username and password, but be decrypted using password locally Private key, is then gone to sign ID authentication request with private key.Key is produced to for authentication number based on ECDSA algorithms Word is signed, and before authentication starts, the node being added in network needs first to download a high in the clouds copy to local data In storehouse, authentication is then proceeded by again.The basic procedure of bit authentication is described, then to present system characteristic Analyzed.Trust in invention in addition refers to that will not be led to by malefactor using certain technological means protection network platform Crossing direct physical access means carries out malicious operation.Ensure that the credible most straightforward approach of the network platform is to login system Block chain user carry out authentication, communicating pair needs the both sides to carry out two-way authentication before being communicated in the P2P networks. The present invention carries out logic analysis carrying out formalized description to authentication to its security, finally calculates authentication Confidence level, algorithm and step in this confidence level computing system is given below.Access entity refers to the object of certification request, Only certification is by just allowing and accessed object communication.Service Ticket is used before referring to access entity and accessed object communication To prove the digital evidence of oneself identity.Authentication mechanism refers to the methods that Service Ticket is produced and verified:High in the clouds certification Module refers to the functional unit of administrative authentication voucher.Authentication module refers to the functional unit of authentication verification voucher.Body Part relying party refers to the functional unit that its behavior operation depends on authentication module result, it may be possible to authorized component. Authentication domain refers to an authentication part in same administration authority border.Authentication mechanism, high in the clouds Authentication module, authentication module and access entity because its in the presence of uncertainty may influence whether identity authentication result can Reliability.The uncertainty of wherein authentication mechanism shows as certification authority may be cracked, and such as some AESs are cracked, this Certification authority will be caused compromised;The uncertainty of high in the clouds authentication module shows the tightness of management aspect, and management is not The problems such as certainty may result in that Service Ticket is compromised, be forged;The uncertainty of authentication module is mainly manifested in Whether information system and authentication protocol safe and reliable, this will cause Service Ticket be stolen leakage or be forged;Access entity Uncertainty refers to that visitor is not necessarily reliable, the storage of certification authority whether safety etc., this will cause certification authority to be stolen to let out Reveal, attacked or be held as a hostage.Various uncertain factors in identity-based verification process, by the element of trust of authentication point It is following 3 class:Ensure that Service Ticket is not compromised, be denoted as 1 class.Ensure that Service Ticket is not forged, be denoted as 2 classes.Ensure certification Voucher is not held as a hostage, and is denoted as 3 classes.The insincere factor is which kind of uncertain factor causes to recognize in key object in authentication procedures The influence degree of the generations such as compromised voucher, forgery or abduction is demonstrate,proved, NOCONFIDENCE, the insincere factor of key object is denoted as Can represent that wherein x represents the insincere factor of 1 class of object with NOCONFIDENCE ()=(x, y, z), Y represents the 2 of object The insincere factor of class, z represents the insincere factor of 3 classes.But comprehensive several significant uncertain factors, analysis assumes theirs Uncertainty, then calculates the trust value of authentication, can judge high in the clouds authentication with degree of safety, confidence level substantially Confidence level.Degree of safety refers to the possibility that key object ensures that certification authority is not compromised, is not forged or is not held as a hostage, uses Probability is represented.Confidence level is the method trusted for quantificational expression.In authentication mode, can in fixed authentication domain To represent the security of authentication mode by the degree of belief between computing system entity, equally represented with probability.Confidence level point It is Service Ticket confidence level, authentication secret confidence level, digital entities confidence level, physical entity confidence level.But due to high in the clouds and visitor Communication between the end of family is influenceed by many uncertain factors, causes the result of authentication service not absolute confidence.
Embodiment two, as shown in Figure 1:In practice by from can with the authentication based on dynamic password and public-key cryptosystem Reliability Analysis are calculated and authentication Analysis on confidence of the present invention based on high in the clouds is calculated, and both result of calculations are compared Compared with advantage of the analysis present invention in terms of confidence level.Step is:Setting authentication mechanism, Service Ticket is by body after public key and encryption Part mark and block chain user password composition;Dynamic password is randomly generated;By the block chain user password for comparing storage;High in the clouds Authentication module:Distribution block chain ID is to access entity;Authentication module:The public key distributed using elliptic curve systems Private key carries out key authentication, so authentication-access entity legitimacy;Request authentication module:Using public key encryption identity. Authentication mechanism:Service Ticket is made up of identity after public key and encryption and block chain user password;Digital signature keys are by ECC Algorithm is produced;By verifying digital signature validity and the whole network node participation certificates;High in the clouds authentication module:Identity information is not It is single to be present in certain authentication server database, but all node local datas in being present in network in the form of the high in the clouds Storehouse, and store be authentication voucher summary, useful identity information can't be revealed;Authentication module:Each Node can serve as authentication module, is authenticated using digital signature authentication method;Request authentication module:Key by ECDSA algorithms are produced, and private key is preserved by requests verification side with password encryption, needs to be decrypted with password during using private key signature.It is logical Cross the confidence level result that uncertain factor system degree of belief computational methods utilized above draw to show, uncertain factor includes identity Certain uncertain factor causes compromised Service Ticket, forgery or abduction etc., present system in key object in verification process Authentication Reliability ratio now the existing authentication based on dynamic password and elliptic curve it is with a high credibility, also thus demonstrate,prove The validity of bright present invention work.
The present invention can have the specific embodiment of various multi-forms, above by taking Fig. 1 as an example with reference to accompanying drawing to of the invention Technical scheme explanation for example, the present invention will be described in detail.It should be noted that specific embodiment described herein Only it is used to explain the present invention, is not intended to limit the present invention, can realizes that the product of said function belongs to equivalent and improvement, It is included within protection scope of the present invention.
The beneficial effects of the invention are as follows:Part I is by the embedded NFC of block chain of particular design, in this design In, NFC is no longer electronic plaintext display label, but the whole world by rivest, shamir, adelman guarantee is unique Electronic tag, simultaneously for can carry out false distinguishing checking by regular handset for block chain user;Part II is VeChain block chain network information Stores, after being verified by the true and false, mobile terminal application will be to distributed in special block chain The product information of storage is read out, and these information can include all information of commodity design, production, logistics, sale etc., with Reach the supply chain all-transparent to manufacturing enterprise, marketing channel, supervision department and final block chain user;Part III is directed to The merchandise control of production enterprise and distribution platform, this platform will can cause that manufacturing enterprise's issue extremely easily and effectively is newly produced Product, and increase the social public credibility of manufacturing enterprise.Therefore, it can be said that by it is this be achieved in that it is necessary.

Claims (1)

1. a kind of block chain real time polling cloud system, it is characterised in that:Including:Client database, authentication module, please Ask authentication module, transport module, timestamp module, base station stored system, high in the clouds authentication module, base station poll exchange system;
In P2P networks, the base station poll exchange system receives the band of position and the identity information of block chain user;According to institute State the area that the mark of the block chain user carried in the band of position and identity information has been stored from the base station stored system In the information of block chain user, the block chain ID for inquiring about the block chain user is gone to correspond to high in the clouds authentication information, and handle is looked into The result ask returns to the block chain user, obtains the high in the clouds authentication information of the block chain user, while the base station To in the client database, the copy includes query process, inquiry mode, inquiry ground to a copy of storage system storage Location, query time information;
The high in the clouds authentication module refers to the functional unit of administrative authentication information;The authentication module refers to checking and recognizes The functional unit of card information;The request authentication module refers to sending authentication information to the cloud from the authentication module Hold the functional unit of authentication module;
The high in the clouds authentication module collects all of block under each region that the base station poll exchange system is managed The high in the clouds authentication information of chain user;According to all of block under each region that the base station poll exchange system is managed Chain user high in the clouds authentication information generation block chain user high in the clouds authentication information array, be used to reduce certification it is concurrent when amount of calculation, And store block chain user high in the clouds authentication information array to the high in the clouds authentication module;Block chain user is inquired by described The band of position of high in the clouds authentication information is sent to the block chain user, notifies that the block chain user comes into corresponding base Stand the compass of competency of poll exchange system;
Wherein, the high in the clouds authentication module collects the base station poll exchange system and manages all of area under each region The step of block chain user high in the clouds authentication information, is specially:
The base station poll exchange system timing sends the position area to all of block chain user to request authentication module Domain and the jurisdictions mandate of identity information;
The authentication module sends authentication acquisition request to its local described block chain user is in;
The block chain user under the authentication module is by the transport module directly to the high in the clouds authentication module Return to the band of position and the high in the clouds authentication information of oneself;And in return information, according to the high in the clouds authentication module module Addition mark, prevents both sides from denying, and the block chain user for returning is added to the node in network, while the block chain User needs first from a copy of the base station stored system downloads to the client database, then start again into Row authentication;
The base station stored system stores the band of position and high in the clouds authentication information to be included:The band of position and identity are believed Breath is stored with many helical structures;Wherein, many helical structures include:Form single with the row that are designated of the band of position Chained list, and each area identification is associated as well to a circular linked list, the circular linked list is included and belongs to the block chain user's The high in the clouds authentication information, so as to form complete block chain;
Verification process is divided into described request authentication module and described high in the clouds authentication module two parts, request authentication module described first Connection request is initiated to the high in the clouds authentication module;The high in the clouds authentication module may require that it is described request authentication module by oneself Identity information is sended over;
The authentication starts to produce key pair by ECDSA, obtains private key;Public key is calculated with private key, And calculate PIN with by public key;Private key is carried out into ECDSA random hash and draws public key, with this Simultaneously, it is impossible to allow public key to calculate private key, it is described that PIN is calculated by public key, and bit coin address is provided as, then Public key is carried out into SHA256 Hash calculations, identity request information is signed and encrypted with private key is put into all of block chain use In the identity chain of family high in the clouds authentication information, the identity chain is that the different block chain of the high in the clouds authentication module generation is used The block chain that family authentication information is formed;Then obtain adding the individual of the high in the clouds authentication module by Hash calculation by public key Identification code, it is encoded with bases64;
The last request authentication module submits application request, including authentication voucher and digital signature, the high in the clouds certification to Module is signed to request, and the signature is used as mark head;With block chain authenticating user identification voucher described in public key encryption, Solicited message is transmitted by private network in the form of the mark head;
The high in the clouds authentication module receive it is described request authentication module ID authentication request after, first by public key from identity chain In separate, verify signature validity;Authentication failed message is not returned to if if certification, authentication terminates;Then Verify PIN validity, the PIN include timestamp and verification with, if authentication failed, authentication Terminate;If being verified, the request authentication module can return to a message acknowledgment being verified, while the request is recognized The digital signature information of oneself can be sent to the high in the clouds authentication module by card module with the identity of request end, and broadcast this hair The summary for sending, including block chain authenticating user identification voucher summary, the random number of random number and last authentication, P2P During this authentication can be added the high in the clouds authentication module by nodes by the transport module, and then it is added to In the client database in P2P networks;
The high in the clouds authentication module asks certification mould after receiving the authentication information that the request authentication module is sent to described The identity of block is verified, if being verified, can also return to a message acknowledgment being verified, and then broadcasts this checking, Can be also added to the block chain user name of the request authentication module in the block of high in the clouds by P2P nodes;If certification node It is to add network for the first time, then need the authentication high in the clouds for downloading maintenance in P2P networks to network other nodes request to arrive Node is local, even if the above procedure block chain authenticating user identification both sides have the side can also not carry out online, it is only necessary to The high in the clouds authentication module is authenticated when reaching the standard grade to the authentication module;
The high in the clouds authentication module and the data of certification both sides can be intercepted during the block chain authenticating user identification, it is right Certification both sides are transparent;If illegal node is wanted to pretend to be the side of being certified to complete authentication, it is necessary to change the corresponding block in high in the clouds In content, and whole calculation process of all blocks after this block are completed again, due to the high in the clouds authentication module Calculating, in network all nodes all can participation certificates authentication procedures each time, prevent from distorting transaction note using chain transaction The proof of work mechanism of record, and prevent certification from denying, distort, the behavior such as palm off to reach;
The base station poll exchange system includes access entity, Service Ticket, authentication mechanism, identity relying party, authentication domain Component is operated;
The access entity refers to the object of certification request, and only certification is by just allowing and accessed object communication;
The Service Ticket is referred to before access entity and accessed object communication for proving the digital evidence of oneself identity;
The authentication mechanism refers to the methods that Service Ticket is produced and verified;
The identity relying party refers to the functional unit that its behavior operation depends on authentication module result, it may be possible to Authorized component;
The authentication domain refers to an authentication part in same administration authority border;
Base station poll exchange system effect be the block chain user determine in identity-based verification process it is various not Determine factor, the element of trust of authentication is divided into 3 classes:Ensure that the Service Ticket is not compromised, be denoted as 1 class;Ensure institute State Service Ticket not to be forged, be denoted as 2 classes;Ensure that the Service Ticket is not held as a hostage, be denoted as 3 classes;The block chain user exists Because certain uncertain factor causes compromised Service Ticket, forgery or kidnaps in authentication procedures in identity-based verification process Deng the influence degree of generation, referred to as NOCONFIDENCE, the block chain user described in identity-based verification process certain Uncertain factor causes that Service Ticket is compromised, forge or the influence degree of generation such as kidnap can use NOCONFIDENCE () =(x, y, z) represents that wherein x represents 1 class element of trust of object, and y represents 2 class element of trusts of object, and z represents the letter of 3 classes Appoint element, Service Ticket quilt is caused by the block chain user certain uncertain factor described in identity-based verification process The several significant uncertain factor of influence degrees NOCONFIDENCE () of generation such as leakage, forgery or abduction, analysis is assumed Uncertainty of the block chain user in identity-based verification process, then calculates the trust value of authentication, with safety Degree, confidence level judge the confidence level of high in the clouds authentication;
The degree of safety refers to the possibility that key object ensures that certification authority is not compromised, is not forged or is not held as a hostage, Represented with probability;The confidence level is the method trusted for quantificational expression;In authentication mode, in fixed authentication The security of authentication mode can be represented in domain by the degree of belief between computing system entity, is equally represented with probability;Institute State confidence level and be divided into Service Ticket confidence level, authentication secret confidence level, digital entities confidence level, physical entity confidence level.
CN201710121982.3A 2017-03-03 2017-03-03 Block chain real-time polling cloud system Active CN106878318B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710121982.3A CN106878318B (en) 2017-03-03 2017-03-03 Block chain real-time polling cloud system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710121982.3A CN106878318B (en) 2017-03-03 2017-03-03 Block chain real-time polling cloud system

Publications (2)

Publication Number Publication Date
CN106878318A true CN106878318A (en) 2017-06-20
CN106878318B CN106878318B (en) 2020-01-07

Family

ID=59169605

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710121982.3A Active CN106878318B (en) 2017-03-03 2017-03-03 Block chain real-time polling cloud system

Country Status (1)

Country Link
CN (1) CN106878318B (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107295002A (en) * 2017-07-12 2017-10-24 联动优势科技有限公司 The method and server of a kind of high in the clouds data storage
CN107786553A (en) * 2017-10-23 2018-03-09 江苏通付盾科技有限公司 Identity identifying method, server and system based on proof of work
CN108376336A (en) * 2018-02-11 2018-08-07 思力科(深圳)电子科技有限公司 It is suitble to the RFID label chip and its control method of block chain application
CN108900531A (en) * 2018-07-31 2018-11-27 温州市图盛科技有限公司 A kind of data confidentiality tool suitable for electric power enterprise internal network
CN109033859A (en) * 2018-08-03 2018-12-18 苏州市千尺浪信息科技服务有限公司 A kind of information security storage system based on block chain technology
CN109087063A (en) * 2018-07-23 2018-12-25 浪潮软件股份有限公司 A kind of whole process electronization supervision and check method based on block chain
CN109218268A (en) * 2017-07-05 2019-01-15 中国银联股份有限公司 Safety data interactive system and method based on block chain structure
CN109327482A (en) * 2018-12-18 2019-02-12 陕西医链区块链集团有限公司 P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication
CN109360008A (en) * 2018-11-20 2019-02-19 吴祥富 Product anti-counterfeiting electronic label and product anti-counterfeiting certification update method and system
WO2019047631A1 (en) * 2017-09-07 2019-03-14 京信通信系统(中国)有限公司 Blockchain-based micro-base station communication management method, system and device
CN109544182A (en) * 2018-11-20 2019-03-29 孟凡富 Product false proof verification method and system
CN109639714A (en) * 2019-01-02 2019-04-16 浙江师范大学 A kind of Internet of Things identity registration and verification method based on block chain
CN110290108A (en) * 2019-05-17 2019-09-27 深圳市网心科技有限公司 Data processing method, system and related equipment in a block chain network
CN110348847A (en) * 2018-04-04 2019-10-18 触信(厦门)智能科技有限公司 A kind of information transmitting methods based on panorama VR block chain
CN110517045A (en) * 2019-10-22 2019-11-29 百度在线网络技术(北京)有限公司 Block chain data processing method, device, equipment and storage medium
CN110610418A (en) * 2018-06-15 2019-12-24 翟红鹰 Transaction state query method, system, device and storage medium based on block chain
CN111553710A (en) * 2020-04-08 2020-08-18 深圳壹账通智能科技有限公司 Enterprise data processing method, device, equipment and storage medium based on block chain
CN112311779A (en) * 2020-10-22 2021-02-02 腾讯科技(深圳)有限公司 Data access control method and device applied to block chain system
CN113015995A (en) * 2018-11-13 2021-06-22 社理透高头 Contract terminal and contract signing method using block chain mode of digital content original confirmation key
CN115118465A (en) * 2022-06-13 2022-09-27 北京寰宇天穹信息技术有限公司 Cloud edge-side cooperative zero trust access control method and system based on trusted label
CN116205735A (en) * 2023-02-27 2023-06-02 平安科技(深圳)有限公司 Block chain-based transaction polling method, device, equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101411134A (en) * 2006-03-31 2009-04-15 高通股份有限公司 Memory management for high speed media access control
CN105323064A (en) * 2014-07-01 2016-02-10 柯呈翰 System and method for adding real-time file dynamic tags and encryption online
CN106372940A (en) * 2016-08-31 2017-02-01 江苏通付盾科技有限公司 Identity authentication method based on block chain network, server and terminal device
US20170061398A1 (en) * 2014-06-19 2017-03-02 Jim Austin Joseph Cryptographic currency block chain based voting system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101411134A (en) * 2006-03-31 2009-04-15 高通股份有限公司 Memory management for high speed media access control
US20170061398A1 (en) * 2014-06-19 2017-03-02 Jim Austin Joseph Cryptographic currency block chain based voting system
CN105323064A (en) * 2014-07-01 2016-02-10 柯呈翰 System and method for adding real-time file dynamic tags and encryption online
CN106372940A (en) * 2016-08-31 2017-02-01 江苏通付盾科技有限公司 Identity authentication method based on block chain network, server and terminal device

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218268A (en) * 2017-07-05 2019-01-15 中国银联股份有限公司 Safety data interactive system and method based on block chain structure
CN107295002B (en) * 2017-07-12 2020-06-19 联动优势科技有限公司 Cloud data storage method and server
CN107295002A (en) * 2017-07-12 2017-10-24 联动优势科技有限公司 The method and server of a kind of high in the clouds data storage
WO2019047631A1 (en) * 2017-09-07 2019-03-14 京信通信系统(中国)有限公司 Blockchain-based micro-base station communication management method, system and device
CN107786553A (en) * 2017-10-23 2018-03-09 江苏通付盾科技有限公司 Identity identifying method, server and system based on proof of work
CN108376336B (en) * 2018-02-11 2021-02-05 莫冰 RFID tag chip suitable for block chain application and control method thereof
CN108376336A (en) * 2018-02-11 2018-08-07 思力科(深圳)电子科技有限公司 It is suitble to the RFID label chip and its control method of block chain application
CN110348847A (en) * 2018-04-04 2019-10-18 触信(厦门)智能科技有限公司 A kind of information transmitting methods based on panorama VR block chain
CN110610418A (en) * 2018-06-15 2019-12-24 翟红鹰 Transaction state query method, system, device and storage medium based on block chain
CN109087063A (en) * 2018-07-23 2018-12-25 浪潮软件股份有限公司 A kind of whole process electronization supervision and check method based on block chain
CN108900531A (en) * 2018-07-31 2018-11-27 温州市图盛科技有限公司 A kind of data confidentiality tool suitable for electric power enterprise internal network
CN109033859A (en) * 2018-08-03 2018-12-18 苏州市千尺浪信息科技服务有限公司 A kind of information security storage system based on block chain technology
CN113015995A (en) * 2018-11-13 2021-06-22 社理透高头 Contract terminal and contract signing method using block chain mode of digital content original confirmation key
CN113015995B (en) * 2018-11-13 2024-06-07 社理透高头 Blockchain-based contract terminal and contract signing method for confirming keys using digital content originals
CN109544182A (en) * 2018-11-20 2019-03-29 孟凡富 Product false proof verification method and system
CN109360008A (en) * 2018-11-20 2019-02-19 吴祥富 Product anti-counterfeiting electronic label and product anti-counterfeiting certification update method and system
CN109544182B (en) * 2018-11-20 2021-05-14 孟凡富 Product anti-counterfeiting verification method and system
CN109327482A (en) * 2018-12-18 2019-02-12 陕西医链区块链集团有限公司 P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication
CN109639714B (en) * 2019-01-02 2021-06-15 浙江师范大学 A blockchain-based IoT identity registration and verification method
CN109639714A (en) * 2019-01-02 2019-04-16 浙江师范大学 A kind of Internet of Things identity registration and verification method based on block chain
CN110290108A (en) * 2019-05-17 2019-09-27 深圳市网心科技有限公司 Data processing method, system and related equipment in a block chain network
CN110517045A (en) * 2019-10-22 2019-11-29 百度在线网络技术(北京)有限公司 Block chain data processing method, device, equipment and storage medium
CN111553710A (en) * 2020-04-08 2020-08-18 深圳壹账通智能科技有限公司 Enterprise data processing method, device, equipment and storage medium based on block chain
WO2021203590A1 (en) * 2020-04-08 2021-10-14 深圳壹账通智能科技有限公司 Blockchain-based enterprise data processing method and apparatus, device, and storage medium
CN111553710B (en) * 2020-04-08 2022-09-02 深圳壹账通智能科技有限公司 Enterprise data processing method, device, equipment and storage medium based on block chain
CN112311779A (en) * 2020-10-22 2021-02-02 腾讯科技(深圳)有限公司 Data access control method and device applied to block chain system
CN112311779B (en) * 2020-10-22 2023-06-30 腾讯科技(深圳)有限公司 Data access control method and device applied to block chain system
CN115118465A (en) * 2022-06-13 2022-09-27 北京寰宇天穹信息技术有限公司 Cloud edge-side cooperative zero trust access control method and system based on trusted label
CN115118465B (en) * 2022-06-13 2023-11-28 北京寰宇天穹信息技术有限公司 Cloud edge end cooperative zero trust access control method and system based on trusted label
CN116205735A (en) * 2023-02-27 2023-06-02 平安科技(深圳)有限公司 Block chain-based transaction polling method, device, equipment and medium
CN116205735B (en) * 2023-02-27 2025-09-02 平安科技(深圳)有限公司 Blockchain-based transaction polling method, device, equipment, and medium

Also Published As

Publication number Publication date
CN106878318B (en) 2020-01-07

Similar Documents

Publication Publication Date Title
CN106878318A (en) A kind of block chain real time polling cloud system
CN112487778B (en) Multi-user online signing system and method
CN111046352B (en) A blockchain-based identity information security authorization system and method
EP3661120B1 (en) Method and apparatus for security authentication
CN106789090B (en) Blockchain-based public key infrastructure system and semi-random joint certificate signature method
JP3595109B2 (en) Authentication device, terminal device, authentication method in those devices, and storage medium
CN103679436B (en) A kind of electronic contract security system and method based on biological information identification
CN108768652B (en) Coalition block chain bottom layer encryption method capable of resisting quantum attack
Babu et al. Robust authentication protocol for dynamic charging system of electric vehicles
US20190305955A1 (en) Push notification authentication
CN104798083B (en) Method and system for authenticating access requests
CN112953727A (en) Internet of things-oriented equipment anonymous identity authentication method and system
CN111464980A (en) Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment
Roh et al. A study on electronic voting system using private blockchain.
CN113472521A (en) Block chain-based real-name digital identity management method, signature device and verification device
JP2005223924A (en) Opinion registration application for universal pervasive transaction framework
CN110309663B (en) Privacy authentication method and system based on block chain
CN104767731A (en) Identity authentication protection method of Restful mobile transaction system
CN105207776A (en) Fingerprint authentication method and system
CN113468570A (en) Private data sharing method based on intelligent contract
CN109687965A (en) The real name identification method of subscriber identity information in a kind of protection network
Kravitz Transaction immutability and reputation traceability: Blockchain as a platform for access controlled iot and human interactivity
CN114091009B (en) Method for establishing safety link by using distributed identity mark
CN110505055A (en) Based on unsymmetrical key pond to and key card outer net access identity authentication method and system
Wang et al. An Efficient Data Sharing Scheme for Privacy Protection Based on Blockchain and Edge Intelligence in 6G‐VANET

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Lu Yang

Inventor before: Qian Dejun

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20170920

Address after: 200040, 4 floor, building 546, 4 Yuyuan Road, Jingan District, Shanghai

Applicant after: Shanghai chain Mdt InfoTech Ltd

Address before: 200131 Shanghai Fengxian District Shanghai free trade experimentation area, plus Road 39, 1, four, 39 parts

Applicant before: Qian Dejun

GR01 Patent grant
GR01 Patent grant