CN108183801A - A service authentication method, system and computer-readable storage medium - Google Patents
A service authentication method, system and computer-readable storage medium Download PDFInfo
- Publication number
- CN108183801A CN108183801A CN201711480294.2A CN201711480294A CN108183801A CN 108183801 A CN108183801 A CN 108183801A CN 201711480294 A CN201711480294 A CN 201711480294A CN 108183801 A CN108183801 A CN 108183801A
- Authority
- CN
- China
- Prior art keywords
- node
- business
- transaction
- identity token
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Finance (AREA)
- Entrepreneurship & Innovation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Data Mining & Analysis (AREA)
- Operations Research (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
本申请公开了一种业务认证方法、系统和计算机可读存储介质,所述方法通过基于区块链的身份令牌交易来完成业务人员数字身份的认证,使得业务人员更为便利高效地自证身份。并且消费者所在节点根据业务人员的身份令牌能够在业务平台节点更精确查询该业务人员的业务信息,避免了虚假信息的干扰,从而选择最佳的消费方案。
This application discloses a business authentication method, system, and computer-readable storage medium. The method completes the authentication of business personnel's digital identities through blockchain-based identity token transactions, so that business personnel can self-certify more conveniently and efficiently. identity. And the node where the consumer is located can more accurately query the business information of the business person on the business platform node according to the identity token of the business person, avoiding the interference of false information, so as to choose the best consumption plan.
Description
技术领域technical field
本申请涉及计算机技术领域,具体地,涉及区块链技术领域,更具体地,涉及一种业务认证方法、系统和计算机可读存储介质。The present application relates to the field of computer technology, specifically, to the field of blockchain technology, and more specifically, to a business authentication method, system, and computer-readable storage medium.
背景技术Background technique
区块链技术是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用技术集合。从数据角度来看,区块链按照时间顺序将数据区块以顺序相连的方式组合成的一种链式数据结构,所述数据结构通过密码学方式保证其不可篡改和不可伪造。从技术角度来看,区块链技术整合了多种不同的技术,通过构建区块链网络,使得网络内的每个节点都允许获得一份完整的数据库拷贝,并基于共识机制以及竞争计算来维护基于区块链的数据库的更新。由此,通过众多节点沟通构成的端到端网络实现数据存储和管理的去中心化和去信任。Blockchain technology is a collection of new application technologies of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. From a data point of view, the blockchain is a chained data structure that combines data blocks in a sequentially connected manner in chronological order, and the data structure is cryptographically guaranteed to be tamper-proof and unforgeable. From a technical point of view, blockchain technology integrates a variety of different technologies. By building a blockchain network, each node in the network is allowed to obtain a complete copy of the database, and based on consensus mechanisms and competitive computing. Maintain updates to the blockchain-based database. As a result, the decentralization and trustlessness of data storage and management are realized through the end-to-end network formed by the communication of many nodes.
在区块链网络中,所有的运行规则以及数据信息对于所有的节点均公开,因此,每一条记录对所有节点可见。同时,由于节点和节点之间是去信任的,因此节点之间无需公开身份,每个参与的节点都是匿名的。同时,区块链技术具有极佳的安全性,单个甚至多个节点对数据库的修改无法影响其他节点的数据库,除非能够控制整个网络中超过51%的节点同时修改,才可能修改区块链记载的数据,而这是几乎不可能发生的。In the blockchain network, all operating rules and data information are open to all nodes, so each record is visible to all nodes. At the same time, since nodes are trustless, there is no need to disclose identities between nodes, and each participating node is anonymous. At the same time, blockchain technology has excellent security. The modification of the database by a single or even multiple nodes cannot affect the database of other nodes. Unless it is possible to control more than 51% of the nodes in the entire network to modify at the same time, it is possible to modify the blockchain records. data, which is almost impossible.
目前,保险机构、医药等行业业务人员,由于典型行为多次影响人们对保险、医药等行业的信任,造成人们信任缺失。以保险为例,即使是非常优秀的保险业务,也会因为人们对保险业务人员的不信任而放弃购买,同样,有许多不正规的保险业务,得益于保险业务人员长期的诱导,伪造一些成功业务案例,导致一些老人深信不疑,花费的大价钱甚至不惜养老钱,也要购买。由于伪造业务信息记录、信息不对称的现象层出不穷,造成消费者对保险机构、医药代表等业务人员的信任严重缺失,进而损害双方权益。At present, typical behaviors of business personnel in insurance institutions and pharmaceutical industries have repeatedly affected people's trust in insurance, pharmaceutical and other industries, resulting in a lack of trust. Taking insurance as an example, even if it is a very good insurance business, people will give up buying it because of their distrust of the insurance business personnel. Similarly, there are many informal insurance businesses that benefit from the long-term induction of the insurance business personnel and forge some Successful business cases have led some elderly people to believe in it, and they have to buy it even after spending a lot of money. Due to the emergence of falsified business information records and information asymmetry, consumers' trust in insurance agencies, medical representatives and other business personnel is seriously lacking, which in turn damages the rights and interests of both parties.
发明内容Contents of the invention
有鉴于此,本申请公开了一种业务认证方法、系统和计算机可读存储介质,以使得业务人员更为便利高效地自证身份,并且使得消费者能够更精确查询该业务人员的业务信息,避免了虚假信息的干扰,从而选择最佳的消费方案。In view of this, the present application discloses a business authentication method, system, and computer-readable storage medium, so that business personnel can self-certify their identity more conveniently and efficiently, and consumers can query the business information of the business personnel more accurately. Avoid the interference of false information, so as to choose the best consumption plan.
第一方面,提供一种业务认证方法,包括:In the first aspect, a business authentication method is provided, including:
第一节点与第二节点执行基于区块链的身份令牌交易生成第一交易单,所述第一交易单包括所述第一节点的私钥签名、所述第一节点的身份令牌和所述第二节点的地址,所述第一节点的私钥是由所述第一节点对应的业务人员的生物特征经过预定的算法计算生成的信息,所述身份令牌包括预定的查询业务人员信息的标识;The first node and the second node perform block chain-based identity token transactions to generate a first transaction order, the first transaction order including the private key signature of the first node, the identity token of the first node and The address of the second node, the private key of the first node is information generated by calculating the biological characteristics of the business personnel corresponding to the first node through a predetermined algorithm, and the identity token includes the predetermined inquiry business personnel information identification;
在所述第一交易单被区块链中其他节点验证通过后,所述第二节点获取所述身份令牌;After the first transaction order is verified by other nodes in the block chain, the second node obtains the identity token;
所述第二节点向业务平台节点发起基于区块链的身份令牌交易生成第二交易单,所述第二交易单包括第二节点的私钥签名、所述身份令牌和所述业务平台节点的地址;The second node initiates a block chain-based identity token transaction to the service platform node to generate a second transaction ticket, the second transaction ticket includes the private key signature of the second node, the identity token and the service platform address of the node;
在所述第二交易单被验证通过并且所述业务平台节点接收到所述第二节点获取业务人员信息的请求后,所述业务平台节点根据所述身份令牌查询所述第一节点对应的业务人员信息并返回查询结果;After the second transaction ticket is verified and the service platform node receives the request from the second node to acquire business personnel information, the service platform node queries the corresponding transaction information of the first node according to the identity token Business personnel information and return query results;
其中,所述业务人员信息包括业务信息记录和信用记录;所述业务信息记录包括业务类型和所述第一节点地址。Wherein, the business personnel information includes business information records and credit records; the business information records include business types and the first node address.
进一步地,所述方法还包括:Further, the method also includes:
将所述第一节点对应的业务人员完成的每笔业务信息记录上传至所述业务平台节点并将所述每笔业务信息记录的哈希值入链存证。Upload each business information record completed by the business personnel corresponding to the first node to the business platform node, and store the hash value of each business information record in the chain.
进一步地,所述方法还包括:Further, the method also includes:
所述第二节点将获取的所述第一节点的业务信息记录的哈希值与所述第一节点在区块链上的存证记录进行对比以验证所述第一节点对应的业务人员信息的真实性。The second node compares the acquired hash value of the first node's business information record with the first node's record on the blockchain to verify the business personnel information corresponding to the first node authenticity.
进一步地,所述身份令牌在被所述业务平台节点使用后失效。Further, the identity token becomes invalid after being used by the service platform node.
进一步地,所述预定的算法是基于混沌系统的生物特征密钥产生算法。Further, the predetermined algorithm is a biometric key generation algorithm based on a chaotic system.
进一步地,在第一节点与第二节点执行基于区块链的身份令牌交易生成第一交易单之前,所述方法还包括:Further, before the first node and the second node execute a blockchain-based identity token transaction to generate a first transaction order, the method further includes:
所述第一节点在第三节点建立数字身份。The first node establishes a digital identity at a third node.
进一步地,所述第一节点在第三节点建立数字身份包括:Further, the first node establishing a digital identity at the third node includes:
所述第三节点采集所述第一节点对应的业务人员的生物特征以生成所述第一节点的私钥;The third node collects the biological characteristics of the business personnel corresponding to the first node to generate the private key of the first node;
所述第三节点向所述第一节点发起基于区块链的身份令牌交易生成第三交易单,所述第三交易单包括所述第三节点的私钥签名、所述身份令牌和所述第一节点的地址;The third node initiates a block chain-based identity token transaction to the first node to generate a third transaction ticket, the third transaction ticket includes the private key signature of the third node, the identity token and the address of the first node;
区块链中其他节点根据所述第三节点的公钥验证所述第三交易单;Other nodes in the block chain verify the third transaction order according to the public key of the third node;
若所述第三交易单被验证通过,所述第一节点的数字身份建立成功,所述第一节点获取所述身份令牌。If the third transaction slip is verified, the digital identity of the first node is established successfully, and the first node obtains the identity token.
第二方面,提供一种业务认证系统,包括:In the second aspect, a service authentication system is provided, including:
第一节点,被配置为与第二节点执行基于区块链的身份令牌交易生成第一交易单,所述第一交易单包括所述第一节点的私钥签名、所述第一节点的身份令牌和所述第二节点的地址,所述第一节点的私钥是由所述第一节点对应的业务人员的生物特征经过预定的算法计算生成的信息,所述身份令牌包括预定的查询业务人员信息的标识;The first node is configured to execute a blockchain-based identity token transaction with a second node to generate a first transaction ticket, the first transaction ticket includes the private key signature of the first node, the signature of the first node The identity token and the address of the second node, the private key of the first node is information generated by calculating the biological characteristics of the business personnel corresponding to the first node through a predetermined algorithm, and the identity token includes a predetermined The identification of the query business personnel information;
第二节点,被配置为向业务平台节点发起基于区块链的身份令牌交易生成第二交易单,所述第二交易单包括第二节点的私钥签名、所述身份令牌和所述业务平台节点的地址;以及The second node is configured to initiate a blockchain-based identity token transaction to a service platform node to generate a second transaction order, the second transaction order including the private key signature of the second node, the identity token and the The address of the business platform node; and
业务平台节点,被配置为在所述第二交易单被验证通过并且所述业务平台节点接收到所述第二节点获取业务人员信息的请求后根据所述身份令牌查询所述第一节点对应的业务人员信息并返回查询结果;The business platform node is configured to query the first node corresponding to The business personnel information and return the query results;
其中,所述业务人员信息包括业务信息记录和信用记录;所述业务信息包括业务类型和所述第一节点的地址。Wherein, the business personnel information includes business information records and credit records; the business information includes business types and the address of the first node.
进一步地,所述系统还包括:Further, the system also includes:
第三节点,被配置为建立所述第一节点对应的业务人员的数字身份。The third node is configured to establish the digital identity of the business personnel corresponding to the first node.
第三方面,提供一种计算机可读存储介质,其上存储计算机程序指令,所述计算机程序指令在被处理器执行时实现如上任一项所述的方法。In a third aspect, a computer-readable storage medium is provided, on which computer program instructions are stored, and when the computer program instructions are executed by a processor, the method described in any one of the above items is implemented.
在本申请实施例中,通过基于区块链的身份令牌交易来完成业务人员数字身份的认证,使得业务人员更为便利高效地自证身份。并且消费者所在节点根据业务人员的身份令牌能够在业务平台节点更精确查询该业务人员的业务信息,避免了虚假信息的干扰,从而选择最佳的消费方案。In the embodiment of this application, the authentication of the digital identity of the business personnel is completed through the identity token transaction based on the block chain, which makes it more convenient and efficient for the business personnel to self-certify their identities. And the node where the consumer is located can more accurately query the business information of the business person on the business platform node according to the identity token of the business person, avoiding the interference of false information, so as to choose the best consumption plan.
附图说明Description of drawings
通过以下参照附图对本申请实施例的描述,本申请的上述以及其它目的、特征和优点将更为清楚,在附图中:Through the following description of the embodiments of the application with reference to the accompanying drawings, the above and other purposes, features and advantages of the application will be more clear, in the accompanying drawings:
图1是本申请实施例的业务认证系统的示意图;Fig. 1 is the schematic diagram of the service authentication system of the embodiment of the present application;
图2是本申请实施例的业务认证方法的流程图;Fig. 2 is the flowchart of the business authentication method of the embodiment of the present application;
图3是本申请实施例的建立数字身份方法的流程图;Fig. 3 is a flow chart of the method for establishing a digital identity according to an embodiment of the present application;
图4是本申请实施例的业务信息认证方法的流程图;Fig. 4 is a flow chart of the business information authentication method of the embodiment of the present application;
图5是本申请实施例的电子设备的示意图。Fig. 5 is a schematic diagram of an electronic device according to an embodiment of the present application.
具体实施方式Detailed ways
以下基于实施例对本申请进行描述,但是本申请并不仅仅限于这些实施例。在下文对本申请的细节描述中,详尽描述了一些特定的细节部分。对本领域技术人员来说没有这些细节部分的描述也可以完全理解本申请。为了避免混淆本申请的实质,公知的方法、过程、流程、元件和电路并没有详细叙述。The present application is described below based on examples, but the present application is not limited only to these examples. In the following detailed description of the application, some specific details are set forth in detail. The present application can be fully understood by those skilled in the art without the description of these detailed parts. To avoid obscuring the essence of the present application, well-known methods, procedures, procedures, components and circuits have not been described in detail.
此外,本领域普通技术人员应当理解,在此提供的附图都是为了说明的目的,并且附图不一定是按比例绘制的。Additionally, those of ordinary skill in the art will appreciate that the drawings provided herein are for illustrative purposes and are not necessarily drawn to scale.
除非上下文明确要求,否则整个说明书和权利要求书中的“包括”、“包含”等类似词语应当解释为包含的含义而不是排他或穷举的含义;也就是说,是“包括但不限于”的含义。Unless the context clearly requires, throughout the specification and claims, "comprises", "comprises" and similar words should be interpreted in an inclusive sense rather than an exclusive or exhaustive meaning; that is, "including but not limited to" meaning.
在本申请的描述中,需要理解的是,术语“第一”、“第二”等仅用于描述目的,而不能理解为指示或暗示相对重要性。此外,在本申请的描述中,除非另有说明,“多个”的含义是两个或两个以上。In the description of the present application, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and should not be understood as indicating or implying relative importance. In addition, in the description of the present application, unless otherwise specified, "plurality" means two or more.
图1是本申请实施例的业务认证系统的示意图。如图1所示,业务认证系统包括第一节点1、第二节点2、第三节点3和业务平台节点4。其中,第一节点1是业务人员(如医药、保险等业务人员)所在节点,第二节点2是消费者所在节点,第三节点3是数字身份建立机关节点(也即公安部门)。第一节点1、第二节点2、第三节点3和业务平台节点4均可以连接到一个区块链网络,通过区块链进行连接通信。应理解,在基于区块链技术的网络中,装载有预定程序的通用数据处理设备可自由进入网络成为其中一个区块链节点。FIG. 1 is a schematic diagram of a service authentication system according to an embodiment of the present application. As shown in FIG. 1 , the service authentication system includes a first node 1 , a second node 2 , a third node 3 and a service platform node 4 . Among them, the first node 1 is the node where the business personnel (such as medicine, insurance and other business personnel) are located, the second node 2 is the node where the consumer is located, and the third node 3 is the node of the digital identity establishment agency (that is, the public security department). The first node 1, the second node 2, the third node 3 and the service platform node 4 can all be connected to a block chain network, and connect and communicate through the block chain. It should be understood that in a network based on blockchain technology, a general-purpose data processing device loaded with a predetermined program can freely enter the network and become one of the blockchain nodes.
在本申请实施例中,第三节点3(也即数字身份建立机关节点)被配置为采集第一节点1(也即业务人员所在节点)对应的业务人员的生物特征,根据该业务人员的生物特征生成第一节点1的私钥。其中,第一节点1的私钥是根据基于混沌系统的生物特征密钥产生算法计算而来的。In the embodiment of this application, the third node 3 (that is, the digital identity establishment authority node) is configured to collect the biological characteristics of the business personnel corresponding to the first node 1 (that is, the node where the business personnel are located), and according to the biological characteristics of the business personnel Characteristic Generate the private key of the first node 1. Wherein, the private key of the first node 1 is calculated according to a biometric key generation algorithm based on a chaotic system.
混沌系统是指在一个确定性系统中,存在着貌似随机的不规则运动,其行为表现为不确定性、不可重复、不可预测,这就是混沌现象。混沌是非线性动力系统的固有特性,是非线性系统普遍存在的现象。混沌系统具有生成密钥所必需的敏感性和随机性两项特征,因此可根据基于混沌系统的生物特征密钥产生算法来计算第一节点1的私钥。A chaotic system means that in a deterministic system, there is a seemingly random irregular movement, and its behavior is uncertain, non-repeatable, and unpredictable. This is the phenomenon of chaos. Chaos is an inherent characteristic of nonlinear dynamical systems, and is a ubiquitous phenomenon in nonlinear systems. The chaotic system has two characteristics of sensitivity and randomness necessary for key generation, so the private key of the first node 1 can be calculated according to the biometric key generation algorithm based on the chaotic system.
例如,假设第一节点1对应的业务人员的生物特征用一系列位于区间[0,1]的浮点数(c1,c2,…,cL)标识,采用一种基于TD-ERCS(tangent delay-ellipse cavity mapsystem,切延迟椭圆反射腔系统)(混沌系统的一种类型)的生物特征处理函数来生成私钥的步骤如下:For example, assuming that the biological characteristics of the business personnel corresponding to the first node 1 are identified by a series of floating-point numbers (c 1 ,c 2 ,...,c L ) in the interval [0,1], a TD-ERCS-based (tangent Delay-ellipse cavity mapsystem, cut delay ellipse reflection cavity system) (a type of chaotic system) biometric processing function to generate a private key The steps are as follows:
(1)初始化密钥:设置射线的起始点横坐标x0和角度α,切延迟m(为了弥补离散化导致的性能退化,反射切线取前m次反射点的椭圆切线,被称为切延迟m)和椭圆参数μ;(1) Initialization key: set the abscissa x 0 and angle α of the starting point of the ray, cut delay m (in order to compensate for the performance degradation caused by discretization, the reflection tangent takes the ellipse tangent of the first m reflection points, which is called cut delay m) and the ellipse parameter μ;
(2)正常态迭代:设置切线斜率Kn等于生物特征ci(生物特征按先顺序再逆序输入),对系统进行2L次迭代;(2) Normal state iteration: set the tangent slope K n equal to the biological characteristics c i (the biological characteristics are input in the first order and then the reverse order), and perform 2L iterations on the system;
(3)最终迭代:切延迟设为m,对系统作最后38次迭代;(3) Final iteration: set the cutting delay to m, and perform the last 38 iterations of the system;
(4)生成私钥:抽取最后32次迭代中的横坐标xn的最低8比特,组设256比特的私钥。(4) Generate a private key: extract the lowest 8 bits of the abscissa x n in the last 32 iterations, and set up a 256-bit private key.
迭代公式如下:The iteration formula is as follows:
其中,xn,yn,kn分别表示第n个反射点的横坐标、纵坐标以及反射线的斜率;Kn表示第n个反射点的切线斜率。Wherein, x n , y n , k n represent the abscissa, ordinate and the slope of the reflection line of the nth reflection point respectively; K n represents the slope of the tangent line of the nth reflection point.
应理解,以上举例仅仅是基于混沌系统由生物特征计算私钥的其中一种算法,也可以使用其他可利用的算法由生物特征计算私钥。It should be understood that the above example is only one of the algorithms for calculating the private key from the biometrics based on the chaotic system, and other available algorithms may also be used to calculate the private key from the biometrics.
区块链节点的公钥是通过将其私钥经过椭圆曲线加密算法后生成的信息。椭圆曲线加密算法的安全性基于椭圆曲线上离散对数的难解性。The public key of a blockchain node is information generated by passing its private key through an elliptic curve encryption algorithm. The security of the elliptic curve encryption algorithm is based on the intractability of the discrete logarithm on the elliptic curve.
椭圆曲线是由一个具有两个变元x和y的魏尔斯特拉斯方程:An elliptic curve is defined by a Weierstrass equation with two arguments x and y:
y2+axy+by=x3+cx2+dx+ey 2 +axy+by=x 3 +cx 2 +dx+e
所确定的所有点(x,y)组成的集合,外加一个无穷远点O∞(认为其y坐标无穷大)。A set of all determined points (x, y), plus an infinite point O∞ (considering its y coordinate is infinite).
常用于密码系统的椭圆曲线是将椭圆曲线定义到一个有限域Fp上,也即离散的椭圆曲线方程:The elliptic curve commonly used in cryptographic systems is to define the elliptic curve to a finite field Fp, that is, the discrete elliptic curve equation:
y2=x3+ax2+b(mod p)y 2 =x 3 +ax 2 +b(mod p)
所确定的所有点(x,y)组成的集合,外加一个无穷远点O∞。其中x,y,a,b均在有限域Fp上取值,且a,b满足4a3+27b2≠0,p是大于3的素数,通常使用Ep(a,b)来表示这类曲线。The set of all the determined points (x, y), plus a point O∞ at infinity. Among them, x, y, a, and b all take values on the finite field Fp, and a, b satisfy 4a 3 +27b 2 ≠0, p is a prime number greater than 3, and Ep(a,b) is usually used to represent this type of curve .
在椭圆曲线上的某个点P,存在一个最小的数n,使得nP=O∞,那么n就是点P的阶。At a certain point P on the elliptic curve, there is a minimum number n such that nP=O∞, then n is the order of point P.
假若K、G是Ep(a,b)上的点,并且K=kG,k为小于n(n是点G的阶)的整数。给定k和G,根据加法法则,计算K很容易,但是给定K和G,求k就比较困难了,至今没有有效的方法解决这个问题,这就是椭圆加密算法的原理(加法法则包括G+G=2G,也即kG为k个G相加)。If K and G are points on Ep(a,b), and K=kG, k is an integer smaller than n (n is the order of point G). Given k and G, according to the addition law, it is easy to calculate K, but given K and G, it is more difficult to find k. So far, there is no effective way to solve this problem. This is the principle of the elliptic encryption algorithm (the addition rule includes G +G=2G, that is, kG is the addition of k G).
其中,点G为用户在椭圆曲线Ep(a,b)上选择的基点。k便是用户选择的私钥(k<n,n为基点G的阶),K便是由私钥k计算而来的公钥。Wherein, point G is the base point selected by the user on the elliptic curve Ep(a,b). k is the private key selected by the user (k<n, n is the order of the base point G), and K is the public key calculated from the private key k.
在本实施例中,由业务人员的生物特征经过基于混沌系统的生物特征密钥产生算法获得第一节点1的私钥,然后第三节点3选定相应的椭圆曲线和基点来计算第一节点1的公钥。第一节点1的公钥可以通过一系列哈希运算得到第一节点1的地址,且这个推导过程在理论上是不可逆的。应理解,区块链节点的公钥和区块链节点对应的地址是可以对外公开的,因此均可作为该区块链节点的标识。本申请实施例使用节点在区块链网络的地址作为其唯一标识。In this embodiment, the private key of the first node 1 is obtained from the biological characteristics of the business personnel through the biometric key generation algorithm based on the chaotic system, and then the third node 3 selects the corresponding elliptic curve and the base point to calculate the first node 1's public key. The public key of the first node 1 can obtain the address of the first node 1 through a series of hash operations, and this derivation process is theoretically irreversible. It should be understood that the public key of the blockchain node and the address corresponding to the blockchain node can be disclosed to the outside world, and therefore both can be used as the identification of the blockchain node. The embodiment of this application uses the node's address in the blockchain network as its unique identifier.
应理解,所采集的生物特征为业务人员的至少一个生物特征的预订数量的明确特征点经过数据处理后的信息。生物特征可以为虹膜、DNA、心电图、视网膜、脑电波、红外温光谱图、静脉等信息中的一种或多种特征。It should be understood that the collected biometrics are the information after data processing of at least one predetermined number of definite feature points of the biometrics of the business personnel. The biometric feature can be one or more features of information such as iris, DNA, electrocardiogram, retina, brain wave, infrared temperature spectrum, and vein.
第三节点3(也即数字身份建立机关节点)还被配置为向第一节点1(也即业务人员所在节点)发起基于区块链的身份令牌交易生成第三交易单。第三交易单包括第三节点3的私钥签名、第一节点1的身份令牌和第一节点1的地址。其中,身份令牌包括预定的查询业务人员信息的标识。预定的查询业务人员信息的标识可以为第一节点1对应的业务人员的身份特征的哈希值或其他与该业务人员身份信息相关的信息。The third node 3 (that is, the digital identity establishment authority node) is also configured to initiate a blockchain-based identity token transaction to the first node 1 (that is, the node where the business personnel is located) to generate a third transaction ticket. The third transaction ticket includes the private key signature of the third node 3 , the identity token of the first node 1 and the address of the first node 1 . Wherein, the identity token includes a predetermined identifier for querying business personnel information. The predetermined identifier for querying business personnel information may be a hash value of the identity feature of the business personnel corresponding to the first node 1 or other information related to the identity information of the business personnel.
在第一节点1和第三节点3执行区块链交易后,第三交易单在区块链中广播。区块链中的其他节点使用第三节点3的公钥验证第三交易单,若第三交易单被验证通过后,第一节点1对应的业务人员的数字身份建立成功。第一节点1获得第一节点1的身份令牌。After the first node 1 and the third node 3 execute the blockchain transaction, the third transaction order is broadcast in the blockchain. Other nodes in the blockchain use the public key of the third node 3 to verify the third transaction order. If the third transaction order is verified, the digital identity of the business personnel corresponding to the first node 1 is successfully established. The first node 1 obtains the identity token of the first node 1 .
在本申请实施例中,通过基于区块链的身份令牌交易完成业务人员数字身份的建立,使得业务人员的身份信息不再集中于中心数据库,能有效防止数据泄漏及伪造身份等安全问题。In the embodiment of this application, the establishment of digital identities of business personnel is completed through blockchain-based identity token transactions, so that the identity information of business personnel is no longer concentrated in the central database, which can effectively prevent security issues such as data leakage and forged identities.
第一节点1被配置为向第二节点2(也即消费者所在节点)发起基于区块链的身份令牌交易生成第一交易单。其中,第一交易单包括第一节点1的私钥签名、第一节点1的身份令牌和第二节点2的地址。The first node 1 is configured to initiate a blockchain-based identity token transaction to the second node 2 (that is, the node where the consumer is located) to generate a first transaction ticket. Wherein, the first transaction ticket includes the private key signature of the first node 1 , the identity token of the first node 1 and the address of the second node 2 .
在第一节点1和第二节点2进行区块链交易后,第一交易单在区块链中广播。区块链中的其他节点使用第一节点1的公钥验证第一交易单,若第一交易单被验证通过,第一节点1对应的业务人员的数字身份认证成功。第二节点2获取第一节点1的身份令牌。After the first node 1 and the second node 2 conduct blockchain transactions, the first transaction order is broadcast in the blockchain. Other nodes in the blockchain use the public key of the first node 1 to verify the first transaction order. If the first transaction order is verified, the digital identity authentication of the business personnel corresponding to the first node 1 is successful. The second node 2 obtains the identity token of the first node 1 .
在本申请实施例中,通过基于区块链的身份令牌交易完成业务人员数字身份的认证,使得业务人员更为便利高效地自证身份。In the embodiment of this application, the authentication of the digital identity of business personnel is completed through blockchain-based identity token transactions, making it more convenient and efficient for business personnel to self-certify their identities.
第二节点2被配置为向业务平台节点4发起基于区块链的身份令牌交易生成第二交易单,第二交易单包括第二节点2的私钥签名、第一节点1的身份令牌和业务平台节点4的地址。The second node 2 is configured to initiate a block chain-based identity token transaction to the business platform node 4 to generate a second transaction order, the second transaction order includes the private key signature of the second node 2, the identity token of the first node 1 and the address of the service platform node 4.
在第二节点2与业务平台节点4执行基于区块链的身份令牌交易后,第二交易单在区块链中广播。区块链中其他节点使用第二节点2的公钥验证第二交易单。在第二交易单被验证通过时,业务平台节点4获取第一节点1的身份令牌。该身份令牌包括预定的查询业务人员信息的标识。After the second node 2 and the service platform node 4 execute the blockchain-based identity token transaction, the second transaction order is broadcast in the blockchain. Other nodes in the blockchain use the public key of the second node 2 to verify the second transaction order. When the second transaction order is verified, the service platform node 4 acquires the identity token of the first node 1 . The identity token includes the identification of the predetermined query business personnel information.
业务平台节点4被配置为在所述第二交易单被验证通过并且所述业务平台节点接收到所述第二节点获取业务人员信息的请求后根据上述身份令牌中的查询业务人员信息的标识查询第一节点1对应的业务人员信息,并返回查询结果。其中,业务人员信息包括业务信息记录和信用记录。业务信息记录包括业务类型(如保险类型,医药类型等)和第一节点1的地址。业务平台节点4通过统计计算业务人员对应的业务信息记录来评估该业务人员的信用记录。The business platform node 4 is configured to, after the second transaction order is verified and the business platform node receives the request from the second node to obtain the business personnel information, according to the identification of the query business personnel information in the above-mentioned identity token Query the business personnel information corresponding to the first node 1, and return the query result. Wherein, the business personnel information includes business information records and credit records. The business information record includes the business type (such as insurance type, medicine type, etc.) and the address of the first node 1 . The business platform node 4 evaluates the credit records of the business personnel by statistically calculating the business information records corresponding to the business personnel.
应理解,第二节点2可以在第二交易单被验证通过后向业务平台节点发送获取业务人员信息的请求;也可以在向业务平台节点4发起基于区块链的身份令牌交易的同时,向业务平台节点发送获取业务人员信息的请求。It should be understood that the second node 2 may send a request to obtain business personnel information to the business platform node after the second transaction order is verified; it may also initiate a blockchain-based identity token transaction to the business platform node 4 while Send a request to obtain business personnel information to the business platform node.
优选地,在该身份令牌被用于登录业务平台节点4查询业务人员信息之后,设置此身份令牌失效以维护业务人员信息的安全。Preferably, after the identity token is used to log in to the service platform node 4 to query the information of the business personnel, the identity token is set to be invalid to maintain the security of the business personnel information.
在第二节点2获得第一节点1的身份令牌之后,可以通过基于区块链的身份令牌交易将第一节点1的身份令牌转发给其他消费者节点。但是,在第一节点1的身份令牌被发送给业务平台节点4并且进行业务人员信息查询后,该身份令牌在业务平台节点4处被销毁失效。也就是说,每个身份令牌只能进行一次查询。After the second node 2 obtains the identity token of the first node 1, the identity token of the first node 1 can be forwarded to other consumer nodes through a blockchain-based identity token transaction. However, after the identity token of the first node 1 is sent to the service platform node 4 and the business personnel information is queried, the identity token is destroyed and invalidated at the service platform node 4 . That is, only one query can be made per identity token.
优选地,将第一节点1对应的业务人员完成的每笔业务信息记录上传至业务平台节点4,同时将该业务人员的每笔业务信息记录的哈希值入链存证。Preferably, each business information record completed by the business person corresponding to the first node 1 is uploaded to the business platform node 4, and at the same time, the hash value of each business information record of the business person is stored in the chain.
进一步地,第二节点2将获取的第一节点1对应的业务人员的业务信息记录的哈希值与第一节点1在区块链上的存证记录进行对比。若获取的业务信息记录的哈希值与对应的区块链上的存证记录一致,则在业务平台节点查询获得的业务人员信息是真实的。若获取的业务信息记录的哈希值与对应的区块链上的存证记录不一致,则在业务平台节点查询获得的业务人员信息可能存在伪造现象。Further, the second node 2 compares the obtained hash value of the business information record of the business personnel corresponding to the first node 1 with the certificate record of the first node 1 on the blockchain. If the hash value of the obtained business information record is consistent with the certificate record on the corresponding blockchain, the business personnel information obtained by querying the business platform node is true. If the hash value of the obtained business information record is inconsistent with the certificate record on the corresponding blockchain, the business personnel information obtained by querying the business platform node may be forged.
综上所述,在本申请实施例中,通过基于区块链的身份令牌交易来建立业务人员的数字身份,使得业务人员的身份信息不再集中于中心数据库,能有效防止数据泄漏及伪造身份等安全问题。并且通过基于区块链的身份令牌交易来完成业务人员数字身份的认证,使得业务人员更为便利高效地自证身份。通过基于区块链的身份令牌交易来查询业务人员信息,消费者能够更精确查询该业务人员的业务信息并能够在区块链中验证该业务人员业务信息的真实性,避免了虚假信息的干扰,从而选择最佳的消费方案。To sum up, in the embodiment of this application, the digital identity of business personnel is established through blockchain-based identity token transactions, so that the identity information of business personnel is no longer concentrated in the central database, which can effectively prevent data leakage and forgery Identity and other security issues. And through the blockchain-based identity token transaction to complete the authentication of the digital identity of business personnel, making it more convenient and efficient for business personnel to self-certify their identities. Through blockchain-based identity token transactions to query business personnel information, consumers can more accurately query the business information of the business personnel and verify the authenticity of the business personnel's business information in the blockchain, avoiding false information. Interference, so as to choose the best consumption plan.
图2是本申请实施例的业务认证方法的流程图。如图2所示,在步骤S110,第三节点(也即数字身份建立机关节点)采集第一节点(也即业务人员所在节点)对应的业务人员的生物特征以生成第一节点的私钥。其中,根据基于混沌系统的生物特征密钥产生算法计算第一节点的私钥。第一节点的私钥经过椭圆曲线加密算法后生成第一节点的公钥。第一节点的公钥通过一系列哈希运算得到第一节点的地址。其中,所采集的生物特征为所述业务人员的至少一个生物特征的预订数量的明确特征点经过数据处理后的信息。所述生物特征可以为虹膜、DNA、心电图、视网膜、脑电波、红外温光谱图、静脉等信息中的一种或多种特征。Fig. 2 is a flow chart of the service authentication method in the embodiment of the present application. As shown in FIG. 2, in step S110, the third node (ie, the digital identity establishing authority node) collects the biometrics of the business personnel corresponding to the first node (ie, the node where the business personnel is located) to generate the private key of the first node. Wherein, the private key of the first node is calculated according to a biometric key generation algorithm based on a chaotic system. The private key of the first node generates the public key of the first node through an elliptic curve encryption algorithm. The public key of the first node obtains the address of the first node through a series of hash operations. Wherein, the collected biometric feature is the information after data processing of a predetermined number of definite feature points of at least one biometric feature of the business personnel. The biological feature may be one or more features of information such as iris, DNA, electrocardiogram, retina, brain wave, infrared temperature spectrum, and vein.
在步骤S120,第三节点与第一节点执行基于区块链的身份令牌交易生成第三交易单。第三交易单包括第三节点的私钥签名、第一节点的身份令牌和第一节点的地址。In step S120, the third node and the first node execute a blockchain-based identity token transaction to generate a third transaction ticket. The third transaction ticket includes the private key signature of the third node, the identity token of the first node and the address of the first node.
在步骤S130,第三交易单在区块链中广播,区块链中的其他节点根据第三节点的公钥验证第三交易单。若第三交易单通过验证,则第一节点对应的业务人员的数字身份成功建立。第一节点获得上述身份令牌。In step S130, the third transaction ticket is broadcast in the blockchain, and other nodes in the blockchain verify the third transaction ticket according to the public key of the third node. If the third transaction ticket passes the verification, the digital identity of the business personnel corresponding to the first node is successfully established. The first node obtains the aforementioned identity token.
在步骤S140,第一节点(业务人员所在节点)与第二节点(消费者所在节点)执行基于区块链的身份令牌交易生成第一交易单。第一交易单包括第一节点的私钥签名、第一节点的身份令牌和第二节点的地址。In step S140, the first node (the node where the business person is located) and the second node (the node where the consumer is located) perform a blockchain-based identity token transaction to generate a first transaction ticket. The first transaction ticket includes the private key signature of the first node, the identity token of the first node and the address of the second node.
在步骤S150,第一交易单在区块链中广播,区块链中的其他节点根据第一节点的公钥验证第一交易单。若第一交易单通过验证,则第一节点对应的业务人员的数字身份认证成功,第二节点获取第一节点的身份令牌。若第一交易单未通过验证,则第二节点对应的业务人员的数字身份认证失败。也就是说,该业务人员可能伪造了信息。In step S150, the first transaction ticket is broadcast in the blockchain, and other nodes in the blockchain verify the first transaction ticket according to the public key of the first node. If the first transaction ticket passes the verification, the digital identity authentication of the business personnel corresponding to the first node is successful, and the second node obtains the identity token of the first node. If the first transaction slip fails the verification, the digital identity authentication of the business personnel corresponding to the second node fails. That is, the business person may have falsified the information.
在步骤S160,第二节点向业务平台节点发起基于区块链的身份令牌交易生成第二交易单,第二交易单包括第二节点的私钥签名、第一节点的身份令牌和业务平台节点的地址。身份令牌包括预定的查询业务人员信息的标识。In step S160, the second node initiates a blockchain-based identity token transaction to the service platform node to generate a second transaction ticket, the second transaction ticket includes the private key signature of the second node, the identity token of the first node and the service platform The address of the node. The identity token includes the identification of the predetermined query business personnel information.
在步骤S170,第二交易单在区块链中广播,区块链中其他节点根据第二节点的公钥验证第二交易单。在第二交易单被验证通过时,业务平台节点获取第一节点的身份令牌。In step S170, the second transaction ticket is broadcast in the blockchain, and other nodes in the blockchain verify the second transaction ticket according to the public key of the second node. When the second transaction order is verified, the service platform node obtains the identity token of the first node.
在步骤S180,第二节点向业务平台节点发送获取业务人员信息的请求。其中,获取业务人员信息的请求包括第一节点的地址。In step S180, the second node sends a request to the service platform node to acquire information of the service personnel. Wherein, the request for acquiring business personnel information includes the address of the first node.
在步骤S190,业务平台节点根据第一节点的身份令牌中的查询业务人员信息的标识查询第一节点对应的业务人员信息,并返回查询结果。其中,业务人员信息包括业务信息记录和信用记录。业务信息记录包括业务类型(如保险类型,医药类型等)和第一节点的地址。业务平台节点通过统计计算业务人员对应的业务信息记录来评估该业务人员的信用记录。In step S190, the service platform node queries the service personnel information corresponding to the first node according to the identification of the service personnel information inquired in the identity token of the first node, and returns the query result. Wherein, the business personnel information includes business information records and credit records. The business information record includes the business type (such as insurance type, medicine type, etc.) and the address of the first node. The business platform node evaluates the business personnel's credit records by statistically calculating the business information records corresponding to the business personnel.
应理解,第二节点也可以在向业务平台节点发起基于区块链的身份令牌交易的同时,向业务平台节点发送获取业务人员信息的请求。It should be understood that the second node may also send a request for acquiring business personnel information to the business platform node while initiating a blockchain-based identity token transaction to the business platform node.
优选地,在该身份令牌被用于登录业务平台节点查询业务人员信息之后,设置此身份令牌失效以维护业务人员信息的安全。Preferably, after the identity token is used to log in to the service platform node to query the information of the business personnel, the identity token is set to be invalid to maintain the security of the business personnel information.
在第二节点获得第一节点的身份令牌之后,可以通过基于区块链的身份令牌交易将第一节点的身份令牌转发给其他消费者节点。但是,在第一节点的身份令牌被发送给业务平台节点并且进行业务人员信息查询后,该身份令牌在业务平台节点处被销毁失效。也就是说,每个身份令牌只能进行一次查询。After the second node obtains the identity token of the first node, the identity token of the first node can be forwarded to other consumer nodes through a blockchain-based identity token transaction. However, after the identity token of the first node is sent to the service platform node and the business personnel information is queried, the identity token is destroyed and becomes invalid at the service platform node. That is, only one query can be made per identity token.
在本申请实施例中,通过基于区块链的身份令牌交易来建立业务人员的数字身份,使得业务人员的身份信息不再集中于中心数据库,能有效防止数据泄漏及伪造身份等安全问题。并且通过基于区块链的身份令牌交易来完成业务人员数字身份的认证,使得业务人员更为便利高效地自证身份。通过基于区块链的身份令牌交易来查询业务人员信息,消费者能够更精确查询该业务人员的业务信息,避免了虚假信息的干扰,从而选择最佳的消费方案。In the embodiment of this application, the digital identity of business personnel is established through blockchain-based identity token transactions, so that the identity information of business personnel is no longer concentrated in the central database, which can effectively prevent security issues such as data leakage and forged identities. And through the blockchain-based identity token transaction to complete the authentication of the digital identity of business personnel, making it more convenient and efficient for business personnel to self-certify their identities. Through blockchain-based identity token transactions to query business personnel information, consumers can more accurately query the business information of the business personnel, avoid the interference of false information, and choose the best consumption plan.
优选地,业务认证方法还包括步骤S1A0。在步骤S1A0,将第一节点对应的业务人员完成的每笔业务信息记录上传至业务平台节点,同时,将该业务人员的每笔业务信息记录的哈希值入链存证。Preferably, the service authentication method further includes step S1A0. In step S1A0, each business information record completed by the business person corresponding to the first node is uploaded to the business platform node, and at the same time, the hash value of each business information record of the business person is stored in the chain.
优选地,业务认证方法还包括步骤S1B0。在步骤S1B0,第二节点将获取的第一节点对应的业务人员的业务信息记录的哈希值与第一节点在区块链上的存证记录进行对比。若获取的业务信息记录的哈希值与对应的区块链上的存证记录一致,则在业务平台节点查询获得的业务人员信息是真实的。若获取的业务信息记录的哈希值与对应的区块链上的存证记录不一致,则在业务平台节点查询获得的业务人员信息可能存在伪造现象。Preferably, the service authentication method further includes step S1B0. In step S1B0 , the second node compares the obtained hash value of the business information record of the business person corresponding to the first node with the certificate record of the first node on the blockchain. If the hash value of the obtained business information record is consistent with the certificate record on the corresponding blockchain, the business personnel information obtained by querying the business platform node is true. If the hash value of the obtained business information record is inconsistent with the certificate record on the corresponding blockchain, the business personnel information obtained by querying the business platform node may be forged.
图3是本申请实施例的建立数字身份方法的流程图。如图3所示,在步骤S100,第三节点(也即数字身份建立机关节点)采集第一节点对应的业务人员的生物特征以生成第一节点的私钥。其中,根据业务人员的生物特征并基于混沌系统的生物特征密钥产生算法计算第一节点的私钥。第一节点的私钥经过椭圆曲线加密算法后生成第一节点的公钥。第一节点的公钥通过一系列哈希运算得到第一节点的地址。其中,所采集的生物特征为业务人员的至少一个生物特征的预订数量的明确特征点经过数据处理后的信息。所述生物特征可以为虹膜、DNA、心电图、视网膜、脑电波、红外温光谱图、静脉等信息中的一种或多种特征。Fig. 3 is a flowchart of a method for establishing a digital identity according to an embodiment of the present application. As shown in FIG. 3 , in step S100 , the third node (that is, the digital identity establishment authority node) collects the biometrics of the business personnel corresponding to the first node to generate a private key of the first node. Wherein, the private key of the first node is calculated according to the biological characteristics of the business personnel and based on the biometric key generation algorithm of the chaotic system. The private key of the first node generates the public key of the first node through an elliptic curve encryption algorithm. The public key of the first node obtains the address of the first node through a series of hash operations. Wherein, the collected biological feature is the information after data processing of at least one predetermined number of specific feature points of the biological feature of the business personnel. The biological feature may be one or more features of information such as iris, DNA, electrocardiogram, retina, brain wave, infrared temperature spectrum, and vein.
在步骤S200,第三节点与第一节点执行基于区块链的身份令牌交易生成第三交易单。第三交易单包括第三节点的私钥签名、身份令牌和第一节点的地址。In step S200, the third node and the first node execute a blockchain-based identity token transaction to generate a third transaction ticket. The third transaction ticket includes the private key signature of the third node, the identity token and the address of the first node.
在步骤S300,第三交易单在区块链中广播,区块链中的其他节点根据第三节点的公钥验证第三交易单。若第三交易单通过验证,则第一节点对应的业务人员的数字身份成功建立。第一节点通过解密第三交易单获得上述身份令牌。In step S300, the third transaction ticket is broadcast in the blockchain, and other nodes in the blockchain verify the third transaction ticket according to the public key of the third node. If the third transaction ticket passes the verification, the digital identity of the business personnel corresponding to the first node is successfully established. The first node obtains the above-mentioned identity token by decrypting the third transaction slip.
在本申请实施例中,通过基于区块链的身份令牌交易完成业务人员数字身份的建立,使得业务人员的身份信息不再集中于中心数据库,能有效防止数据泄漏及伪造身份等安全问题。In the embodiment of this application, the establishment of digital identities of business personnel is completed through blockchain-based identity token transactions, so that the identity information of business personnel is no longer concentrated in the central database, which can effectively prevent security issues such as data leakage and forged identities.
图4是本申请实施例的业务信息认证方法的流程图。如图4所示,在步骤S400,第二节点(也即消费者所在节点)与第一节点(也即业务人员所在节点)执行基于区块链的身份令牌交易生成第一交易单。第一交易单包括第一节点的私钥签名、第一节点的身份令牌和第二节点的地址。其中,根据业务人员的生物特征并基于混沌系统的生物特征密钥产生算法计算第一节点的私钥。身份令牌包括预定的查询业务人员信息的标识。查询业务人员信息的标识可以为第一节点1对应的业务人员的身份特征的哈希值或其他与该业务人员身份信息相关的信息。Fig. 4 is a flow chart of a business information authentication method according to an embodiment of the present application. As shown in FIG. 4, in step S400, the second node (that is, the node where the consumer is located) and the first node (that is, the node where the business person is located) execute a blockchain-based identity token transaction to generate a first transaction ticket. The first transaction ticket includes the private key signature of the first node, the identity token of the first node and the address of the second node. Wherein, the private key of the first node is calculated according to the biological characteristics of the business personnel and based on the biometric key generation algorithm of the chaotic system. The identity token includes the identification of the predetermined query business personnel information. The identifier for querying the information of the business person may be a hash value of the identity feature of the business person corresponding to the first node 1 or other information related to the identity information of the business person.
在步骤S500,第一交易单在区块链中广播,区块链中的其他节点根据第一节点的公钥验证第一交易单。若第一交易单通过验证,则第一节点对应的业务人员的数字身份认证成功,第二节点获取第一节点的身份令牌。In step S500, the first transaction ticket is broadcast in the blockchain, and other nodes in the blockchain verify the first transaction ticket according to the public key of the first node. If the first transaction ticket passes the verification, the digital identity authentication of the business personnel corresponding to the first node is successful, and the second node obtains the identity token of the first node.
应理解,若第一交易单未通过验证,则第二节点对应的业务人员的数字身份认证失败。也就是说,该业务人员的信息可能是伪造的。It should be understood that if the first transaction slip fails the verification, then the digital identity authentication of the business personnel corresponding to the second node fails. That is, the information of the business person may be forged.
在步骤S600,第二节点与业务平台节点执行基于区块链的身份令牌交易生成第二交易单,第二交易单包括第二节点的私钥签名、第一节点的身份令牌和业务平台节点的地址。In step S600, the second node and the service platform node execute a block chain-based identity token transaction to generate a second transaction ticket, the second transaction ticket includes the private key signature of the second node, the identity token of the first node and the service platform The address of the node.
第二交易单在区块链中广播,区块链中的其他节点根据第二节点的公钥验证第二交易单。若第二交易单被验证通过,业务平台节点获得第一节点的身份令牌。The second transaction order is broadcast in the blockchain, and other nodes in the blockchain verify the second transaction order according to the public key of the second node. If the second transaction order is verified, the service platform node obtains the identity token of the first node.
在步骤S700,第二节点向业务平台节点发送获取业务人员信息的请求。其中,获取业务人员信息的请求包括第一节点的地址。In step S700, the second node sends a request for acquiring business personnel information to the service platform node. Wherein, the request for acquiring business personnel information includes the address of the first node.
在步骤S800,业务平台节点根据上述身份令牌中的查询业务人员信息的标识查询第一节点对应的业务人员信息,并返回查询结果。其中,业务人员信息包括业务信息记录和信用记录。业务信息记录包括业务类型(如保险类型,医药类型等)和第一节点的地址。业务平台节点通过统计计算业务人员对应的业务信息记录来评估该业务人员的信用记录。In step S800, the service platform node queries the service personnel information corresponding to the first node according to the identification of the service personnel information in the identity token, and returns the query result. Wherein, the business personnel information includes business information records and credit records. The business information record includes the business type (such as insurance type, medicine type, etc.) and the address of the first node. The business platform node evaluates the business personnel's credit records by statistically calculating the business information records corresponding to the business personnel.
应理解,第二节点也可以在向业务平台节点发起基于区块链的身份令牌交易的同时,向业务平台节点发送获取业务人员信息的请求。It should be understood that the second node may also send a request for acquiring business personnel information to the business platform node while initiating a blockchain-based identity token transaction to the business platform node.
优选地,在该身份令牌被用于登录业务平台节点查询业务人员信息之后,设置此身份令牌失效以维护业务人员信息的安全。Preferably, after the identity token is used to log in to the service platform node to query the information of the business personnel, the identity token is set to be invalid to maintain the security of the business personnel information.
在第二节点获得第一节点的身份令牌之后,可以通过基于区块链的身份令牌交易将第一节点的身份令牌转发给其他消费者节点。但是,在第一节点的身份令牌被发送给业务平台节点并且进行业务人员信息查询后,该身份令牌在业务平台节点处被销毁失效。也就是说,每个身份令牌只能进行一次查询。After the second node obtains the identity token of the first node, the identity token of the first node can be forwarded to other consumer nodes through a blockchain-based identity token transaction. However, after the identity token of the first node is sent to the service platform node and the business personnel information is queried, the identity token is destroyed and becomes invalid at the service platform node. That is, only one query can be made per identity token.
在本申请实施例中,通过基于区块链的身份令牌交易来完成业务人员数字身份的认证,使得业务人员更为便利高效地自证身份。并且消费者根据身份令牌中的信息查询该业务人员的业务人员信息,避免所查询到的业务人员信息是伪造的信息,避免了虚假信息的干扰,从而选择最佳的消费方案。In the embodiment of this application, the authentication of the digital identity of the business personnel is completed through the identity token transaction based on the block chain, which makes it more convenient and efficient for the business personnel to self-certify their identities. And the consumer inquires the business personnel information of the business personnel according to the information in the identity token, so as to avoid the inquired business personnel information being forged information and the interference of false information, so as to choose the best consumption plan.
进一步地,业务信息查询的方法还包括步骤900。在步骤900,将第一节点对应的业务人员完成的每笔业务信息记录上传至业务平台节点,同时,将该业务人员的每笔业务信息记录的哈希值入链存证。Further, the method for querying business information also includes step 900 . In step 900, each business information record completed by the business person corresponding to the first node is uploaded to the business platform node, and at the same time, the hash value of each business information record of the business person is stored in the chain.
进一步地,业务信息查询的方法还包括步骤A00。在步骤A00,第二节点将获取的第一节点对应的业务人员的业务信息记录的哈希值与第一节点在区块链上的存证记录进行对比。若获取的业务信息记录的哈希值与对应的区块链上的存证记录一致,则在业务平台节点查询获得的业务人员信息是真实的。若获取的业务信息记录的哈希值与对应的区块链上的存证记录不一致,则在业务平台节点查询获得的业务人员信息存在伪造现象。Further, the method for querying business information also includes step A00. In step A00, the second node compares the acquired hash value of the business information record of the business person corresponding to the first node with the certificate record of the first node on the blockchain. If the hash value of the obtained business information record is consistent with the certificate record on the corresponding blockchain, the business personnel information obtained by querying the business platform node is true. If the hash value of the obtained business information record is inconsistent with the certificate record on the corresponding blockchain, there will be forgery in the business personnel information obtained by querying the business platform node.
图5是本申请实施例的电子设备的示意图。图5所示的电子设备为通用数据处理装置,其包括通用的计算机硬件结构,其至少包括处理器51和存储器52。处理器51和存储器52通过总线53连接。存储器52适于存储处理器51可执行的指令或程序。处理器51可以是独立的微处理器,也可以是一个或者多个微处理器集合。由此,处理器51通过执行存储器52所存储的指令,从而执行如上所述的本申请实施例的方法流程实现对于数据的处理和对于其它装置的控制。总线53将上述多个组件连接在一起,同时将上述组件连接到显示控制器54和显示装置以及输入/输出(I/O)装置55。输入/输出(I/O)装置55可以是鼠标、键盘、调制解调器、网络接口、触控输入装置、体感输入装置、打印机以及本领域公知的其他装置。典型地,输入/输出装置55通过输入/输出(I/O)控制器56与系统相连。Fig. 5 is a schematic diagram of an electronic device according to an embodiment of the present application. The electronic equipment shown in FIG. 5 is a general-purpose data processing device, which includes a general-purpose computer hardware structure, which at least includes a processor 51 and a memory 52 . The processor 51 and the memory 52 are connected by a bus 53 . The memory 52 is suitable for storing instructions or programs executable by the processor 51 . Processor 51 may be an independent microprocessor, or a collection of one or more microprocessors. Thus, the processor 51 executes the instructions stored in the memory 52 to execute the above-mentioned method flow of the embodiment of the present application to process data and control other devices. The bus 53 connects the above-mentioned various components together, and also connects the above-mentioned components to a display controller 54 and a display device and an input/output (I/O) device 55 . The input/output (I/O) device 55 may be a mouse, a keyboard, a modem, a network interface, a touch input device, a motion input device, a printer, and other devices known in the art. Typically, input/output devices 55 are coupled to the system through input/output (I/O) controllers 56 .
本领域的技术人员应明白,本申请的实施例可提供为方法、装置(设备)或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可读存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品。Those skilled in the art should understand that the embodiments of the present application may be provided as methods, devices (devices) or computer program products. Accordingly, the present application can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may employ a computer program product embodied on one or more computer-readable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本申请是参照根据本申请实施例的方法、装置(设备)和计算机程序产品的流程图来描述的。应理解可由计算机程序指令实现流程图中的每一流程。The present application is described with reference to flowcharts of methods, apparatuses (devices) and computer program products according to embodiments of the present application. It should be understood that each procedure in the flowcharts can be implemented by computer program instructions.
这些计算机程序指令可以存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现流程图一个流程或多个流程中指定的功能。These computer program instructions may be stored in a computer readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising instruction means, the instruction means Implement the functions specified in one or more processes of the flowchart.
也可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程中指定的功能的装置。These computer program instructions may also be provided to a general purpose computer, special purpose computer, embedded processor, or processor of other programmable data processing equipment to produce a machine such that instructions executed by the processor of the computer or other programmable data processing equipment produce Means for implementing the functions specified in one or more procedures of the flowchart.
以上所述仅为本申请的优选实施例,并不用于限制本申请,对于本领域技术人员而言,本申请可以有各种改动和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。The above descriptions are only preferred embodiments of the present application, and are not intended to limit the present application. For those skilled in the art, various modifications and changes may be made to the present application. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of this application shall be included within the protection scope of this application.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711480294.2A CN108183801B (en) | 2017-12-29 | 2017-12-29 | A business authentication method, system and computer-readable storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711480294.2A CN108183801B (en) | 2017-12-29 | 2017-12-29 | A business authentication method, system and computer-readable storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN108183801A true CN108183801A (en) | 2018-06-19 |
| CN108183801B CN108183801B (en) | 2023-04-25 |
Family
ID=62549077
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201711480294.2A Active CN108183801B (en) | 2017-12-29 | 2017-12-29 | A business authentication method, system and computer-readable storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN108183801B (en) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108847931A (en) * | 2018-06-25 | 2018-11-20 | 北京奇虎科技有限公司 | Block chain key generation method and device based on biometric |
| CN109218012A (en) * | 2018-09-11 | 2019-01-15 | 重庆邮电大学 | A kind of distributed intelligence ammeter sale of electricity method and system with concentrator |
| CN109327312A (en) * | 2018-10-26 | 2019-02-12 | 阿里巴巴集团控股有限公司 | Authentication method and device and electronic equipment |
| CN109508521A (en) * | 2018-11-12 | 2019-03-22 | 四川长虹电器股份有限公司 | A kind of electric appliances service personnel's verification mechanism based on block chain |
| CN111340402A (en) * | 2020-03-27 | 2020-06-26 | 泰康保险集团股份有限公司 | Group insurance service management method, system, device and storage medium |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106533696A (en) * | 2016-11-18 | 2017-03-22 | 江苏通付盾科技有限公司 | Block chain-based identity authentication methods, authentication server and user terminal |
| CN106789911A (en) * | 2016-11-15 | 2017-05-31 | 深圳银链科技有限公司 | A kind of network identity validation method and system based on block chain |
| WO2017112019A1 (en) * | 2015-12-22 | 2017-06-29 | Thomson Reuters Global Resources | Methods and systems for identity creation, verification and management |
-
2017
- 2017-12-29 CN CN201711480294.2A patent/CN108183801B/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2017112019A1 (en) * | 2015-12-22 | 2017-06-29 | Thomson Reuters Global Resources | Methods and systems for identity creation, verification and management |
| CN106789911A (en) * | 2016-11-15 | 2017-05-31 | 深圳银链科技有限公司 | A kind of network identity validation method and system based on block chain |
| CN106533696A (en) * | 2016-11-18 | 2017-03-22 | 江苏通付盾科技有限公司 | Block chain-based identity authentication methods, authentication server and user terminal |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108847931A (en) * | 2018-06-25 | 2018-11-20 | 北京奇虎科技有限公司 | Block chain key generation method and device based on biometric |
| CN108847931B (en) * | 2018-06-25 | 2021-06-15 | 北京奇虎科技有限公司 | Blockchain key generation method and device based on biometric identification results |
| CN109218012A (en) * | 2018-09-11 | 2019-01-15 | 重庆邮电大学 | A kind of distributed intelligence ammeter sale of electricity method and system with concentrator |
| CN109218012B (en) * | 2018-09-11 | 2021-07-16 | 重庆邮电大学 | Distributed smart meter electricity selling method and system with concentrator |
| CN109327312A (en) * | 2018-10-26 | 2019-02-12 | 阿里巴巴集团控股有限公司 | Authentication method and device and electronic equipment |
| CN109327312B (en) * | 2018-10-26 | 2020-03-24 | 阿里巴巴集团控股有限公司 | Authentication method and device and electronic equipment |
| CN109508521A (en) * | 2018-11-12 | 2019-03-22 | 四川长虹电器股份有限公司 | A kind of electric appliances service personnel's verification mechanism based on block chain |
| CN111340402A (en) * | 2020-03-27 | 2020-06-26 | 泰康保险集团股份有限公司 | Group insurance service management method, system, device and storage medium |
| CN111340402B (en) * | 2020-03-27 | 2022-06-03 | 泰康保险集团股份有限公司 | Group insurance service management method, system, device and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108183801B (en) | 2023-04-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN108183801B (en) | A business authentication method, system and computer-readable storage medium | |
| CN108055258A (en) | A kind of identity data management method, system and computer readable storage medium | |
| CN108848063B (en) | Blockchain-based data processing method, system and computer-readable storage medium | |
| TWI703853B (en) | User identity authentication method and device in network | |
| JP7414734B2 (en) | Improved systems and methods for storing, generating and validating tokens used to control access to resources | |
| CN107888384B (en) | An identity data management method, system and computer-readable storage medium | |
| US20210266170A1 (en) | System and method of trustless confidential positive identification and de-anonymization of data using blockchain | |
| US10846372B1 (en) | Systems and methods for trustless proof of possession and transmission of secured data | |
| CN114008971B (en) | Binding decentralized identifiers to verified claims | |
| US11048690B2 (en) | Contribution of multiparty data aggregation using distributed ledger technology | |
| CN108234135A (en) | A kind of service authentication method, system and computer readable storage medium | |
| JP2019126021A (en) | System and method for realizing blockchain multi-factor personal identity authentication | |
| JP7139414B2 (en) | Authentication terminal, authentication device, and authentication method and system using the same | |
| KR102289419B1 (en) | Method and apparatus for authentification of user using biometric | |
| US20250111225A1 (en) | Apparatus and method for generating a compiled artificial intelligence (ai) model | |
| US20230254136A1 (en) | Apparatus and methods for validating user data | |
| WO2012097362A2 (en) | Protecting codes, keys and user credentials with identity and patterns | |
| WO2018140832A1 (en) | Managing distributed content using layered permissions | |
| CN114268447A (en) | File transmission method and device, electronic equipment and computer readable medium | |
| CN113901520A (en) | Data processing method, device, equipment and medium based on block chain | |
| CN114144783A (en) | Cryptographic pseudonym mapping method, computer system, computer program and computer-readable medium | |
| WO2023177725A1 (en) | Apparatus and methods for verifying lost user data | |
| US20240152904A1 (en) | Cold wallet apparatus and method of controlling the same | |
| JP6398483B2 (en) | Electronic signature apparatus, electronic signature system, electronic signature method and program | |
| US20240073027A1 (en) | System for providing non-fungible token access to a user |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| TA01 | Transfer of patent application right | ||
| TA01 | Transfer of patent application right |
Effective date of registration: 20210125 Address after: 215163 No. 9 Xuesen Road, Science and Technology City, Suzhou High-tech Zone, Jiangsu Province Applicant after: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Address before: 100000 4008, 4 floor, 9 building, 56 half moon street, Xicheng District, Beijing. Applicant before: SINOCHAIN TECHNOLOGY Co.,Ltd. |
|
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| EE01 | Entry into force of recordation of patent licensing contract | ||
| EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20180619 Assignee: Lianbang network technology service Nantong Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980045803 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231107 |
|
| EE01 | Entry into force of recordation of patent licensing contract | ||
| EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20180619 Assignee: Nantong Jiaerjie Labor Care Products Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980050378 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231206 Application publication date: 20180619 Assignee: Nantong Yaocheng mechanical equipment manufacturing Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980050154 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231206 Application publication date: 20180619 Assignee: Nantong Xinxin Pharmaceutical Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980050150 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231206 Application publication date: 20180619 Assignee: Nantong Juntai motor vehicle testing Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980049477 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231205 Application publication date: 20180619 Assignee: Nantong Chujie Electronic Equipment Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980050384 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231206 |
|
| EE01 | Entry into force of recordation of patent licensing contract | ||
| EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20180619 Assignee: Nantong Juguang Trading Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980050774 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231208 Application publication date: 20180619 Assignee: NANTONG YA TAI CANDLE ARTS & CRAFTS Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980050773 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231208 Application publication date: 20180619 Assignee: Nantong Weiai Home Textile Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980050668 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231208 |
|
| EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20180619 Assignee: Jiangsu Yichuang Packaging Materials Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051259 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231212 Application publication date: 20180619 Assignee: Nantong Jingxuan Textile Technology Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051252 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231212 Application publication date: 20180619 Assignee: Nantong Huanlian Textile Technology Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051246 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231212 Application publication date: 20180619 Assignee: Nantong Tongzhou Kangxintang Drugstore Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051234 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231212 Application publication date: 20180619 Assignee: American Antelope Home Textile (Nantong) Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051037 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231211 Application publication date: 20180619 Assignee: Nantong Tuoerpu Surveying and Mapping Information Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051034 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231211 Application publication date: 20180619 Assignee: Nantong TongZhou Jinfeng Textile Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051033 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231211 Application publication date: 20180619 Assignee: Nantong Chenghui Pharmacy Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051032 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231211 |
|
| EE01 | Entry into force of recordation of patent licensing contract | ||
| EE01 | Entry into force of recordation of patent licensing contract | ||
| EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20180619 Assignee: Nantong Yuma Electromechanical Manufacturing Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051794 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231215 Application publication date: 20180619 Assignee: Nantong Lingde Pharmaceutical Equipment Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051787 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231215 Application publication date: 20180619 Assignee: Yitong Intelligent Control Technology (Nantong) Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051745 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231215 Application publication date: 20180619 Assignee: Nantong Dongdong Steel Structure Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051732 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231215 Application publication date: 20180619 Assignee: Nantong Huaxin Price Evaluation Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051652 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231214 Application publication date: 20180619 Assignee: Nantong Jianwei Metal Technology Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051651 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231214 Application publication date: 20180619 Assignee: JIANGSU YATAI FITNESS CO.,LTD. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051650 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231214 Application publication date: 20180619 Assignee: JIANGSU KANGFEITE POWER TECHNOLOGY Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051649 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231214 Application publication date: 20180619 Assignee: Nantong Qiju Textile Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051534 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231213 Application publication date: 20180619 Assignee: Nantong Ansheng Textile Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051533 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231213 Application publication date: 20180619 Assignee: Nantong Steel Machinery Manufacturing Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051532 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231213 Application publication date: 20180619 Assignee: NANTONG FEIHAI ELECTRONIC TECHNOLOGY CO.,LTD. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980051531 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231213 |
|
| EE01 | Entry into force of recordation of patent licensing contract | ||
| EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20180619 Assignee: Nantong Huase Space Textile Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052536 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231221 Application publication date: 20180619 Assignee: Jiangsu guanan electromechanical Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052527 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231221 Application publication date: 20180619 Assignee: Nantong Anergu New Material Technology Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052518 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231221 Application publication date: 20180619 Assignee: Nantong Yijialai Woolen Knitting Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052512 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231221 Application publication date: 20180619 Assignee: Nantong Laiou Electronic Technology Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052377 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231219 Application publication date: 20180619 Assignee: Nantong Ouchen Electronic Technology Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052355 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231219 Application publication date: 20180619 Assignee: Nantong Laishang Electronic Technology Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052351 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231219 Application publication date: 20180619 Assignee: NANTONG KYLIN MACHINERY LTD. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052325 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231218 Application publication date: 20180619 Assignee: Haoshi new material technology Nantong Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052125 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231218 Application publication date: 20180619 Assignee: NANTONG YUQI METAL PRODUCTS Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052111 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231218 Application publication date: 20180619 Assignee: Nantong Runyuan structural parts Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052101 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231218 Application publication date: 20180619 Assignee: NANTONG LILIAN MACHINE TOOL MANUFACTURING CO.,LTD. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052076 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231218 |
|
| EE01 | Entry into force of recordation of patent licensing contract | ||
| EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20180619 Assignee: Nantong Zhili Machinery Technology Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052928 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231222 Application publication date: 20180619 Assignee: Nantong Nongchaoer Food Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052927 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231222 Application publication date: 20180619 Assignee: Nantong Bairun Catering Management Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052926 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231222 Application publication date: 20180619 Assignee: Nantong Jinbao Machinery Manufacturing Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052778 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231222 Application publication date: 20180619 Assignee: Nantong Tuoda Machinery Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052749 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231222 Application publication date: 20180619 Assignee: Weizhi New Material Technology (Nantong) Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052740 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231222 Application publication date: 20180619 Assignee: Honglei mechanical equipment (Nantong) Co.,Ltd. Assignor: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Contract record no.: X2023980052729 Denomination of invention: A business authentication method, system, and computer-readable storage medium Granted publication date: 20230425 License type: Common License Record date: 20231222 |
|
| TR01 | Transfer of patent right |
Effective date of registration: 20251203 Address after: 510288 Guangdong Province Guangzhou City Haizhu District Xinye Road 55 No. 21-B17-13 Patentee after: Guangdong Concept Verification Investment Development Partnership Enterprise (L.P.) Country or region after: China Address before: 215163 No. 9 Xuesen Road, Science and Technology City, Suzhou High-tech Zone, Jiangsu Province Patentee before: Suzhou Lang run innovation intellectual property operation Co.,Ltd. Country or region before: China |
|
| TR01 | Transfer of patent right |