CN109639632B - User information management method based on block chain, electronic equipment and storage medium - Google Patents
User information management method based on block chain, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN109639632B CN109639632B CN201811298890.3A CN201811298890A CN109639632B CN 109639632 B CN109639632 B CN 109639632B CN 201811298890 A CN201811298890 A CN 201811298890A CN 109639632 B CN109639632 B CN 109639632B
- Authority
- CN
- China
- Prior art keywords
- user
- information
- identity
- file
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Finance (AREA)
- Biomedical Technology (AREA)
- Economics (AREA)
- Biodiversity & Conservation Biology (AREA)
- Development Economics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a user information management method based on a block chain, electronic equipment and a storage medium. The user information management method comprises the steps that a user node obtains registered biological characteristics input by a user, and hash calculation is carried out on the registered biological characteristics to obtain corresponding registered digital fingerprints; acquiring registration identity information input by the user; and associating the registered digital fingerprint with the registered identity information and storing the registered digital fingerprint and the registered identity information in the blockchain network so that an accounting node of the blockchain network accounts the registered digital fingerprint and the registered identity information to finish the identity registration of the user on the blockchain network. By the method, the digital fingerprint and the identity information of the user are linked up in a correlated manner, so that the privacy of the user is ensured to be less prone to being disclosed, the identity authentication of the user can be more accurately carried out when the user subsequently utilizes the block chain network to carry out related transactions, and the condition of identity authentication errors is reduced.
Description
Technical Field
The present disclosure relates to the field of block chain technologies, and in particular, to a user information management method based on a block chain, an electronic device, and a storage medium.
Background
The block chain technology is a novel application technology set of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. From the data perspective, the block chain combines the data blocks in a sequential connection mode into a chain data structure according to the time sequence, and the data structure is guaranteed to be not falsifiable and not to be forged in a cryptographic mode. From a technical perspective, the blockchain technology integrates a plurality of different technologies, and by constructing a blockchain network, each node in the network is allowed to obtain a complete copy of a data block, and updates of the blockchain-based data blocks are maintained based on a consensus mechanism and competition calculation. Therefore, the decentralization and the distrust of data storage and management are realized through an end-to-end network formed by multi-node communication.
In a blockchain network, all operating rules and data information are public for all nodes, so each record is visible to all nodes. Meanwhile, the block chain technology has excellent security, the modification of the database by a single node or even multiple nodes cannot affect the databases of other nodes, and the data recorded by the block chain cannot be modified unless more than half of the nodes in the whole network can be controlled to be modified, and the probability of the situation is very small.
Currently, the blockchain technology manages the identity information of a user, such as physical certificate, biometric features, and the like. In the prior art, the identity information of these users is still stored in the central database, and each time the identity information of a user is authenticated, the central database needs to be accessed to obtain the corresponding identity information. Therefore, the user client cannot perform identity authentication autonomously, the efficiency and convenience of identity authentication are reduced, and the security problem that data is leaked or tampered due to invasion exists in the central database.
Disclosure of Invention
The technical problem mainly solved by the application is to provide a user information management method based on a block chain, an electronic device and a storage medium.
In order to solve the above problem, a first aspect of the present application provides a block chain-based user information management method, where the user information management method includes:
a user node acquires registered biological characteristics input by a user, and performs hash calculation on the registered biological characteristics to obtain corresponding registered digital fingerprints;
acquiring registration identity information input by the user;
and associating the registered digital fingerprint with the registered identity information and storing the registered digital fingerprint and the registered identity information in the blockchain network so that an accounting node of the blockchain network accounts the registered digital fingerprint and the registered identity information to finish the identity registration of the user on the blockchain network.
In order to solve the above-mentioned problems, a second aspect of the present application provides an electronic device comprising a memory and a processor, wherein,
the memory stores computer instructions for execution by the processor;
the processor is used for executing the computer instructions to execute the user information management method.
In order to solve the above problem, a third aspect of the present application provides a computer-readable storage medium storing computer instructions executable by a processor to perform the above-mentioned user information management method.
In the scheme, the user information management method based on the block chain calculates and obtains the corresponding digital fingerprint by using the biological characteristics input during the registration of the user, associates and links the digital fingerprint with the identity information, can ensure that the privacy of the user is not easy to be revealed, can more accurately perform identity authentication on the user when the user subsequently performs related transactions by using the block chain network, and reduces the condition of identity authentication errors.
Drawings
FIG. 1 is a block chain platform infrastructure of the present application;
FIG. 2 is a block chain technology-based file management network infrastructure according to the present application;
FIG. 3 is a block diagram of a block chain used in an embodiment of the present application;
FIG. 4 is a schematic diagram of an embodiment of a file management network;
FIG. 5 is a flowchart illustrating a first embodiment of a file management method according to the present application;
FIG. 6 is a flowchart illustrating a second embodiment of a file management method according to the present application;
FIG. 7 is a flowchart illustrating a file management method according to a third embodiment of the present application;
FIG. 8 is a diagram illustrating a structure of a file management network corresponding to the file management method shown in FIG. 7;
FIG. 9 is a flowchart illustrating a file management method according to a fourth embodiment of the present application;
FIG. 10 is a flowchart illustrating a first embodiment of a user information management method according to the present application;
FIG. 11 is a flowchart illustrating a second embodiment of a user information management method according to the present application;
FIG. 12 is a schematic flow chart diagram illustrating one embodiment of step S53 of FIG. 11;
FIG. 13 is a schematic flow chart diagram illustrating another embodiment of step S53 of FIG. 11;
FIG. 14 is a flowchart illustrating a user information management method according to a third embodiment of the present application;
FIG. 15 is a schematic structural diagram of an embodiment of an electronic device of the present application;
FIG. 16 is a schematic structural diagram of an embodiment of a computer-readable storage medium according to the present application.
Detailed Description
The following describes in detail the embodiments of the present application with reference to the drawings attached hereto.
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, interfaces, techniques, etc. in order to provide a thorough understanding of the present application.
The terms "system" and "network" are often used interchangeably herein. The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The block chain technology is a novel distributed data organization method and an operation mode which are developed along with digital encryption currencies such as bitcoin and the like. The method is characterized in that: decentralization enables the data to realize distributed collective maintenance, and greatly improves the efficiency of data operation, management and maintenance; the consensus nodes are based on a set of consensus mechanism, the whole block chain is maintained together through competition calculation, any node fails, and other nodes can still work normally. Meanwhile, the block chain carrying the asymmetric encryption technology has high safety and traceability, and can effectively prevent data leakage or illegal tampering. The present application proposes to use the block chain technique to realize the archive management, such as storage, loan, return, etc. of the archive, wherein the archive can be any type such as accounting archive, transaction agreement, etc. the present application takes accounting archive as an example for illustration.
To facilitate understanding of the blockchain network of the present application, the blockchain technique employed in the present application is first exemplified. In one embodiment, the electronic device runs the blockchain technique to become a node of the blockchain network, and the basic architecture of the blockchain platform is shown in fig. 1 and comprises a data layer, a network layer, a consensus layer, a contract layer, a service layer and an application layer of the blockchain.
The data layer is used for encapsulating underlying data blocks and related data encryption and time stamping technologies. Also, at least one (e.g., two) computations may be performed on the file data using an irreversible encryption algorithm (e.g., SHA256 algorithm) to generate a unique blockchain ID, i.e., a Hash (Hash) value. Specifically, the blockchain may be a blockchain, ensuring that the blockchain is not fully public and only accessible to registered member nodes. And the network layer encapsulates elements such as a P2P networking mode, a message propagation protocol, a data verification mechanism and the like of the blockchain network system, so that the nodes are equal in status and mutually communicated in a flat topological structure, and the characteristics of distribution, autonomy, openness, free access and the like are possessed. Each node in the block chain network can participate in the checking and accounting process of the block data, and the block chain can be recorded only after the block data passes verification of most nodes in the whole network. The decentralized design of the block chain ensures that the file data cannot be tampered and forged. And the consensus layer participates in a consensus mechanism of the block chain network. The contract layer is packaged with contract codes for clearing and settling the electric power, when conditions in the contract codes are triggered, corresponding transactions are automatically executed, and corresponding electric power transaction prices, settlement rules and the like can be specified through contract contents. And the service layer is used for customizing personalized BaaS service according to different application scenes, and deploying intelligent contract codes with different settlement rules on a bottom platform of the block chain for calling under various conditions. The application layer applies blockchain techniques to various related processes of archive management, such as user registration, user identity management, loan and return of archive, data access control, and the like.
The blockchain network collects, packages and securely protects archive file related information data such as archive file related identification, archive file lending information, and archive file returning information in a decentralized manner, and anchors the information data to the blockchain. In particular, the blockchain may be implemented using a network of blockfederation chains or blockchain private chains. The nodes of the block chain continuously change the responsibility born by the network system, and only one node can never control the whole network system, namely only one accounting node can not carry out accounting. Each node is only part of the network system. The node timing of the blockchain changes roles, e.g., once every minute, and no node will permanently control any part of the network system.
In this embodiment, the basic architecture of the blockchain platform shown in fig. 1 can be applied to the archive management network based on blockchain proposed in the present application, and the user node in the archive management network is deployed with the basic architecture of the blockchain platform shown in fig. 1, and the basic architecture of the archive management network can be as shown in fig. 2.
Further, in one embodiment, the block packing of the block chain may be as shown in fig. 3. The block of the blockchain includes a block Header 31(Header) and a block Body 32 (Body). The block 32 stores at least one Hash value (Hash) obtained by performing a Hash operation on data information related to the archive file. The block header 31 may be packaged with information such as a current version number 311, a previous block address 312, a target hash value 313 of the current block, a solution random number 314 of a PoW (workload proof) consensus process of the current block, a Merkle root 315(Merkle-root), and a timestamp 316. Wherein, the current version number 311 is used for marking the relevant version information of the software and the protocol; the previous block address 312, which may also be referred to as a previous block hash value, by which each block is end-to-end grouped into a block chain; the solution random number 314 is a value of the answer for recording the decryption block-related mathematical question; the Merkle root 315 is calculated from all hash values of the data in the block 32 and is used to check whether the file data exists in the block; the timestamp 316 is used to record the time when the block 30 was generated. It is understood that the structure of the block may be adjusted according to the block chain technique, for example, the above solution random number does not exist without using the Pow consensus mechanism.
In one embodiment, the Block chain underlying system may be comprised of hierarchically structured blocks (blocks). The root is a Directory Block (Directory Block). These blocks form a mini chain, on which compressed references (references) are stored. In order to avoid the data size being too large, the reference in the Directory Block (Directory Block) is only the hash value of the recording Block (Entry Block).
The directory block corresponds to the first layer of the system and records the integrity (Hash value) proof block of the recording block. The directory block is created by combining all the recording blocks defined in all the servers together. Thus, each server has all recording blocks, all directory blocks, and all records (entries).
The recording Block (Entry Block) corresponds to the second layer of the system and is a Block for recording an Entry integrity (Hash value) certificate. The application seeking a record may require a block of records from which all records of storage, loan, return, etc. of potentially related archive files may be searched. The recording block contains the electronically recorded hash value. The electronically recorded hash value simultaneously proves the existence of the data and the key to find the record in a Distributed Hash Table (DHT) network.
The recording Block (Entry Block) contains all entries associated with one chain ID. An Entry may be considered not to exist if it is associated to a recording Block (Entry Block). The design can ensure that the application program can be easily certified and can conveniently identify which entries are real and reliable.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an embodiment of a file management network based on a block chain technology according to the present application. As shown in fig. 4, the archive management network 41 in this embodiment is a block chain network, which includes at least a user node 411 and a billing node 412.
In one embodiment, all of the user nodes 411 may correspond to all of the staff members of the archive management, and in other embodiments, some of the user nodes 411 may also correspond to general lending users and/or returning users. The user node can upload an electronic archive file formed by scanning a paper archive file to a block chain network for storage; in addition, the archive identification formed by scanning the content of the archive file can be uploaded to a block chain network for storage, and the storage state, the lending information and/or the returning information and other information data of the archive file can be retrieved and checked by scanning the archive identification corresponding to the archive file. Furthermore, when the archive file generates transaction events such as loan and return through the user node, the related transaction information can be uploaded to the block chain network for storage.
In this embodiment, the node corresponding to the department related to the archive file serves as the bookkeeping node 412, and in this embodiment, the archive file is taken as an accounting archive file for example, and accordingly, the accounting department, the financial department, the auditing department, the file management department, the legal department, and the like related to generation and supervision of the accounting archive file can all be added to the blockchain network as the bookkeeping node 412. The accounting nodes 412 can perform accounting of the blockchain network, each accounting node 412 is a node having competitive accounting capability to store the related transaction data of the transactions such as storage, loan, return and the like, which are generated by the user nodes 411 and related to the archive file, and each accounting node 412 stores the transaction data generated by the user nodes 411 and related to the archive file, so as to realize distributed storage of the transaction data generated by each user node 411 and related to the archive file.
The blockchain network may further include a management node 413, which is used for identity registration of the user node 411 and the billing node 412, managing identity information and real-name authentication of the user node 411 and the billing node 412, and processing various service functions such as contract template.
The user node 411, the billing node 412 and the management node 413 may be any electronic devices, such as a server, a mobile phone, a computer, a tablet computer, and the like, in one embodiment, the billing node 412 is a blockchain server, and the management node 413 is an application server with service processing capability and can be used as a bankchain network-based deposit-evidence system. It is to be understood that the user node 411, the accounting node 412 and the management node 413 may communicate, and the user node 411 and the management node 413 in this embodiment are regarded as blockchain nodes, for example, as lightweight accounting nodes of a blockchain, but in other embodiments, the user node 411 and the management node 413 are not limited to be blockchain nodes, that is, at least part of the user node 411 and the management node 413 do not necessarily participate in the blockchain. In addition, the distinction of the nodes is determined according to the identity information registered by the nodes. Therefore, the corresponding entities of the above nodes, such as staff managing archive files, accounting departments, financial departments, auditing departments, monitoring agencies, etc., all need to complete registration in advance on the blockchain platform (in an application, the blockchain is a blockchain private chain or a blockchain alliance, and the story completes identity registration on the blockchain platform first), acquire corresponding public keys and private keys, and after determining that the identity is trusted, allow the following archive management services to be developed.
In one embodiment, the management node 413 is used for identity management and identity authentication of the user node 411 and the accounting node 412. The identity authentication is used for registering a new node user into a block chain network, and matching a corresponding intelligent contract according to related identity information when related transaction of the archive file occurs. Specifically, for example, the new node sends an account registration request to the management node, where the account registration request includes an account name (provided that the user logs in the blockchain network after successful registration) for requesting registration and identity information of the new node, such as an identification number, a passport number, an enterprise number, and other information that can prove the identity of the user. The account registration request may also only include identity information of the user node. The management node compares the identity information in the account registration request with the identity information in a preset identity database; if the preset identity database does not have matched identity information, the authentication is not passed, and a registration failure message containing a failure reason is returned; if the preset identity database is stored in the matched identity information, the authentication is passed, and a registration success message is sent. Furthermore, the management node can also store the identity information in the account registration request to a setting management database so as to uniformly manage the identity of the user participating in the blockchain. After receiving the registration success message, the new node runs a related algorithm in the blockchain technology or generates a blockchain address for the new node by other nodes of the blockchain network, and the blockchain address is used as the blockchain address of the registered account; and a related algorithm in the block chain technology is run by the system, such as hash operation, to generate a group of public keys and private keys as public keys and private keys of the registered account. Then, the new node broadcasts the public key to the blockchain network, so that other nodes in the network all receive and store the account public key registered by the user. And the new node saves the private key and the block chain address in the local, or the private key can be sent to a set trusted node for storage so as to backup. At this point, account registration is complete.
The blockchain network of this embodiment is exemplified by a alliance-chain network or a private-chain network, that is, when a node joins the blockchain network, an identity information registration needs to be performed, and only a member node of the registered identity information can access the blockchain network.
Referring to fig. 5, fig. 5 is a flowchart illustrating a file management method according to a first embodiment of the present application. As shown in fig. 5, the file management method of the present embodiment may include the following steps:
in step S11, the user node acquires a first profile identification corresponding to the profile to be borrowed stored in the block chain network.
The user node obtains the first file identification corresponding to the archive file to be borrowed, which is filed and stored from the block chain network, and it can be understood that the first file identification is the archive identification generated by scanning the content of the archive file to be borrowed when the archive file to be borrowed is filed and stored, that is, the first file identification corresponds to the content of the archive file to be borrowed when the archive file to be borrowed is filed and stored. Further, the first archive identifier may be a first archive two-dimensional code corresponding to the content of the archive file to be borrowed when the archive file is archived and stored.
In this embodiment, the user node is taken as an example of a staff for file management. When the borrowing user puts forward the borrowing demand of the archive file to the staff of archive management, the archive information of the archive file to be borrowed is input through the user node, such as the archive category, the archive name, the date to which the archive belongs, the archive voucher number and the like. And the user node acquires a first file identification which is filed and stored and corresponds to the file to be borrowed from the block chain network according to the input file information.
When the archive files to be borrowed are filed and stored, the content of the archive files to be borrowed can be scanned, a first archive identification corresponding to the content of the archive files to be borrowed is generated and stored when the archive files to be borrowed are to be borrowed, the first archive identification is acquired by the user node and is sent to the block chain network, and therefore the accounting node in the block chain network accounts for the first archive identification. Further, the archive file to be borrowed can be a paper archive file, an electronic archive file, or a paper archive file and an electronic archive file copy formed by the paper archive file. If the archive file to be borrowed comprises the electronic archive file, the electronic archive file can also be uploaded to the block chain network, so that the electronic archive file is booked by a bookkeeping node in the block chain network and is also stored in the block chain network.
In other embodiments, the staff who manages archives can scan the first archive identification of the archive file to be borrowed through the scanning device, look up the corresponding archive file to be borrowed, can look over information such as storage information, borrowing record, return record of the archive file to be borrowed, and realize tracing back the life cycle of the archive file. If the archive file has a management period, when the archive file is destroyed or cancelled due to the expiration of the management period, the information such as the storage information, the borrowing record, the returning record and the like of the archive file to be borrowed can still be consulted by scanning the first file identification of the archive file to be borrowed, so that the life cycle tracing is carried out.
In step S12, a second profile identification generated based on the content of the archive file to be borrowed is acquired.
Further, when the borrowing user puts forward the borrowing demand of the archive file to the staff of the archive management, the archive information of the archive file to be borrowed, such as the archive category, the archive name, the date to which the archive belongs, the archive certificate number and the like, is input through the user node. And the user node can obtain a second file identification corresponding to the content of the corresponding file to be borrowed according to the entered file information.
In this embodiment, the second file identifier is a file identifier generated according to the content of the archive file to be borrowed, which is found according to the archive information provided by the borrowing user currently, that is, the second file identifier corresponds to the found current content of the archive file to be borrowed. Further, the second archive identifier may be a second archive two-dimensional code corresponding to the found current content of the archive file to be borrowed.
It is understood that the execution contents of step S11 and step S12 are respectively used to obtain a first profile identifier corresponding to the content of the archive file to be borrowed during archival storage and a second profile identifier corresponding to the content of the archive file to be borrowed currently, and there is no specific sequential execution order between the first profile identifier and the second profile identifier, that is, in other embodiments, step S12 may be executed first and step S11 is executed later, which is not limited in this application.
In step S13, the first file identifier and the second file identifier are compared, and whether the file to be borrowed is correct or not is determined according to the comparison result, and whether verification passing information for performing identity verification on the borrowing user is received or not is determined.
And further, comparing the acquired first file identification with the acquired second file identification, and judging whether the file to be borrowed is correct or not according to a comparison result. The first file identification and the second file identification respectively correspond to the current content of the archive file to be borrowed and the content of the archive file to be borrowed during filing and storage; therefore, if the first file identifier is consistent with the second file identifier, it is indicated that the current content of the archive file to be borrowed is also consistent with the content of the archive file to be borrowed when the archive file to be borrowed is archived and stored, in other words, it can be determined that the archive file to be borrowed is correct; if the first file identifier is inconsistent with the second file identifier, it indicates that the searched archive file to be borrowed is inconsistent with the archive file to be borrowed stored in the block chain network, and at this time, the archive file to be borrowed may be found to be wrong, or the archive file to be borrowed is modified, damaged, and partially lost during the period from the filing and storing to the searching, in other words, it may be determined that the archive file to be borrowed is incorrect, and thus cannot be borrowed.
Further, when the borrowing user borrows the archive file, the identity authentication of the borrowing user is required, namely the archive management user node is required to determine whether the identity authentication of the borrowing user passes or not. The file management user node also needs to determine whether verification passing information for verifying the identity of the lending user is received, and if the file management user node receives the verification passing information corresponding to the lending user, the file management user node indicates that the identity of the lending user is verified and passes the identity verification; if the file management user node does not receive verification passing information corresponding to the borrowing user, the verification passing information indicates that the identity of the borrowing user is not verified or is abnormal, and at the moment, the file to be borrowed cannot be borrowed from the borrowing user.
In step S14, a borrowing record is generated according to the identity information of the borrowing user and the archive file to be borrowed, and the borrowing record is sent to the block chain network.
According to the comparison and judgment in step S13, when the judgment result is that the archive file to be borrowed is correct and the verification passing information corresponding to the lending user is received, it is indicated that the archive file to be borrowed can be borrowed from the lending user. At the moment, identity information of a borrowing user, related archive information of an archive file to be borrowed, borrowing time information and the like are recorded, a borrowing record corresponding to the archive file to be borrowed is generated according to the information, the borrowing record is sent to a block chain network, and a bookkeeping node in the block chain network performs consensus bookkeeping on the borrowing record to form a new block and stores the new block in the block chain network.
In step S15, borrowing failure information is fed back.
According to the comparison and judgment in step S13, when the judgment result is that the document to be borrowed is incorrect and/or the verification pass information corresponding to the borrowing user is not received, it may be determined that the archive file to be borrowed cannot be borrowed to the borrowing user, and the borrowing failure information is fed back, and in addition, the specific content of the judgment result may be further fed back to the staff of the archive management.
When the determination result is that the archive file to be borrowed is incorrect, the archive file to be borrowed may be found to be incorrect, or the archive file to be borrowed is modified, damaged, and part of the content is lost during the period from filing and storing to the current search, and the colleague who feeds back the borrowing failure information may also prompt that the archive file to be borrowed is incorrect. When the verification passing information corresponding to the borrowing user is not received, the fact that the identity of the borrowing user is not verified is shown, or the identity of the borrowing user is abnormal, and when the borrowing failure information is fed back, the verification result that the identity of the borrowing user is not verified can be prompted, or the fact that the identity of the borrowing user is not verified is informed.
This embodiment is when the user of borrowing treats the archive file of borrowing and borrows, make user's node utilize with when filing the storage wait to borrow the first file sign that the content of archive file corresponds and with treat the second file sign that the content of archive file of borrowing corresponds at present and confirm in order to treat the content of the archive file of borrowing, when having ensured to borrow and treat the archive file of borrowing, should treat the uniformity of the content of the archive file of borrowing, especially treat that the archive file of borrowing is when the form of paper document is preserved the management, can guarantee the exactness of paper document, and the condition of borrowing of treating the archive file of borrowing of accessible block chain network is saved, be convenient for managers treat the condition of borrowing of archive file, the storage condition is inquired through block chain network. Further, in this embodiment, only when the archive file to be borrowed is correct and the authentication of the borrowing user passes, the file can be borrowed from the borrowing user, and the case of the file being borrowed is avoided through the dual authentication process of the archive file to be borrowed and the identity of the borrowing user.
Further, please refer to fig. 6, which shows a further expansion based on the first embodiment of the file management method shown in fig. 5. As shown in fig. 6, before step S11 shown in fig. 5, the following steps may be further included:
in step S16, the user node obtains the archive borrowing request, obtains the storage address of the corresponding archive file to be borrowed based on the archive borrowing request, and generates the corresponding second archive identifier based on the content of the archive file to be borrowed found by using the storage address.
The borrowing user provides a file borrowing request of the file to a file management worker, and the file borrowing request can be provided by the borrowing user directly through the user node of the appeal, and can also be provided through other electronic equipment of the borrowing user. The file borrowing request can include relevant file information of the to-be-borrowed file to be borrowed, such as file type, file name, file belonging date, file certificate number and the like. In different specific applications, the archive files to be borrowed can be stored and managed in the form of paper archive files; can also be stored and managed in the form of electronic archive files; the electronic archive file copy can be stored and managed in the form of the paper archive file, and meanwhile, the electronic archive file copy is formed according to the paper archive file and stored and managed in the form of the electronic archive file. The electronic archive file can be stored in the blockchain network, or in a database outside the blockchain network, and in addition, part of the electronic archive file can be stored in the blockchain network by adopting other storage methods, and the other part of the electronic archive file can be stored in the database outside the blockchain network.
In this embodiment, the user node may query the storage address of the archive file to be borrowed according to the archive information included in the archive borrowing request. The corresponding archive file to be borrowed can be searched through the storage address, and in one embodiment, the electronic device corresponding to the user node can have a scanning function or can be connected with a scanning device; therefore, after the archive file to be borrowed is found, the archive file to be borrowed is scanned by utilizing the scanning function of the user node or scanning equipment connected with the user node, and then a second archive identification corresponding to the content of the archive file to be borrowed is generated. It will be appreciated that the second archive identification corresponds to the current content of the located archive to be borrowed.
Further, please refer to fig. 7, wherein fig. 7 is a flowchart illustrating a file management method of a file management network according to a third embodiment of the present application. As shown in fig. 7, the file management method of the present embodiment may include the following steps:
in step S21, the user node acquires a first profile identification corresponding to the profile to be borrowed stored in the block chain network.
In step S22, a second profile identification generated based on the content of the archive file to be borrowed is acquired.
In step S23, the first file identifier and the second file identifier are compared, and whether the file to be borrowed is correct is determined according to the comparison result, and the identity of the borrowing user is verified.
In this embodiment, the steps S21 and S22 are the same as the steps S11 and S12 in the first embodiment of the file management method shown in fig. 5, and are not repeated here. Further, in the present embodiment, the comparison between the first file identifier and the second file identifier is performed in step S23, and the determination content of whether the file to be borrowed is correct according to the comparison result is the same as the comparison between the first file identifier and the second file identifier, which is described in step S13 of the first embodiment of the file management method shown in fig. 5, and the determination content of whether the file to be borrowed is correct according to the comparison result, which is not described herein again.
Further, in this embodiment, the user node may also perform authentication on the lending user. Specifically, the user node may obtain the authentication biometric feature and the identity information entered by the lending user, obtain the corresponding registration biometric feature from the block chain network according to the identity information, and perform identity verification on the lending user by using the authentication biometric feature and the registration biometric feature.
In this embodiment, the user node is also used as an equipment end for performing identity verification on the lending user, at this time, when the lending user needs to lend the archive file to be borrowed, the authentication biological feature and the identity information for performing identity verification of the lending user are input through the user node (in this embodiment, the archive management user node is taken as an example), so that the user node searches the registration biological feature corresponding to the identity information in the block chain network according to the identity information, further compares the obtained authentication biological feature with the searched registration biological feature, and performs identity verification on the lending user according to the comparison result.
In this embodiment, users including the staff for file management and the borrowing user need to register the blockchain network in advance. When a user registers, inputting the biological characteristics of the user as the registered biological characteristics through corresponding node equipment, and inputting the identity information of the user at the same time, wherein the user node associates the registered biological characteristics with the identity information and uploads the information to a block chain network; and the accounting node in the block chain network accounts and stores the correlated registered biological characteristics and the identity information so as to conveniently perform identity authentication on the user when events such as borrowing and returning occur in the later period.
Further, in this embodiment, the user node may perform hash calculation on the registered biometric feature by using a hash algorithm to obtain a corresponding registered digital fingerprint, where it can be understood that the registered digital fingerprint is a character string of a fixed number obtained through the hash calculation. And further associating the registered biological characteristics and the identity information by the user node, namely associating the calculated registered digital fingerprint with the identity information.
Further, based on the above-mentioned user registration and association implementation, in another implementation, after the user node obtains the authentication biometric features entered by the borrowed user, the user node may perform hash calculation on the authentication biometric features by using a hash algorithm to obtain corresponding authentication digital fingerprints; further, the user node acquires a registered digital fingerprint corresponding to the identity information from the block chain network according to the identity information; and comparing the authentication digital fingerprint with the registration digital fingerprint, and authenticating the identity of the borrowing user according to the comparison result. If the authentication digital fingerprint is consistent with the registered digital fingerprint, the result of identity authentication of the borrowed user is verified; and if the authentication digital fingerprint is not consistent with the registered digital fingerprint, the result of the identity authentication of the borrowed user is that the authentication is not passed.
In step S24, a borrowing record is generated according to the identity information of the borrowing user and the archive file to be borrowed, and the borrowing record is sent to the block chain network, so that the borrowing record is booked by a bookkeeping node in the block chain network.
In step S25, borrowing failure information is fed back.
In this embodiment, the steps S24 and S25 are the same as the steps S14 and S15 in the first embodiment of the file management method shown in fig. 5, and are not repeated here.
Referring to fig. 8, a file management method of the present embodiment is further described with reference to a flowchart of a third embodiment of the file management method shown in fig. 7, in the present embodiment, a user node 811 is taken as an electronic device corresponding to a staff in file management, and a biological feature collecting device 812 and a scanning device 813 are connected to the user node 811 for respectively collecting biological features and scanning file; further, the embodiment describes the archive file to be borrowed as a paper archive file.
In this embodiment, when the accounting archive files filed in a book are stored in a storage, the accounting archive files are scanned by the scanning device 813 to form corresponding archive identifiers, where the archive identifiers are the first archive identifiers, and the archive identifiers may be two-dimensional archive codes; after the file identifier is generated, the file identifier is uploaded to the blockchain network 814 through the user node 811, and the file identifier is booked by a bookkeeping node (not shown in the figure) in the blockchain network 814 and stored in the blockchain network 814; the corresponding accounting archive file is stored in the corresponding accounting archive database.
In addition, between the occurrence of accounting archive borrowing, the borrowing user and/or the staff and other nodes of archive management need to perform identity registration; during registration, each user inputs own biological characteristics as registration biological characteristics through the electronic equipment of the corresponding node, and inputs own identity information, the user node 811 can perform hash calculation on the registration biological characteristics by using a hash algorithm to obtain corresponding registration digital fingerprints, and the registration digital fingerprints and the identity information are associated and uploaded to the block chain network 814; the accounting node in the blockchain network 814 accounts and stores the correlated registered digital fingerprint and identity information, so as to authenticate the identity of the user when events such as borrowing and returning occur, and the stored identity information is registered identity information.
Further, after the identity registration is completed, the user node 811 may also randomly generate a corresponding private key, and obtain a public key according to the private key calculation, upload the public key to each node in the block chain network 814, and store the private key in the user node. It should be noted that, in the present embodiment, the borrowing user also borrows the accounting archive file through the user node 811, so that the public key and the private key may not be generated for the borrowing user, but only generated for the node having the management authority (for example, staff in archive management).
Further, after the lending user completes the identity registration, the user node 811 may obtain a corresponding intelligent contract based on the registration identity information matching of the lending user, and deploy the intelligent contract to each node in the blockchain network 814, so that the blockchain network 814 performs a transaction related to the user based on the intelligent contract.
When a borrowing user needs to borrow an accounting archive file, file information of the accounting archive file to be borrowed (namely the accounting archive file to be borrowed) to be borrowed, such as an archive type, an archive name, an archive belonging date, an archive certificate number and the like, is provided for an archive management worker; in addition, the identity information of the borrowing user needs to be provided to the staff of the archive management, the staff of the archive management enters the provided archive information and the identity information into the user node 811, and the user node 811 obtains the archive information and the identity information. It should be noted that, in this embodiment, before the provided archive information and identity information are entered into the user node 811, the staff for archive management needs to log in through the user node 811, at this time, the staff for archive management enters corresponding login information (which may include one or more of biometric information, identity information, and account information) into the user node 811, the user node 811 obtains the login information, encrypts the login information by using a locally stored private key, transmits the encrypted login information to the blockchain network 814, the verification node in the blockchain network 814 obtains a corresponding public key, decrypts the encrypted login information by using the public key, and completes the identity verification and login operation of the staff for archive management according to the login information obtained after decryption.
Further, on the one hand, the user node 811 searches for a storage address for storing the to-be-borrowed accounting archive file from the accounting archive database according to the archive information, so as to search for the to-be-borrowed accounting archive file according to the storage address, provides the searched to-be-borrowed accounting archive file to the scanning device 813, scans the content of the searched to-be-borrowed accounting archive file by the scanning device 813, forms an archive identifier corresponding to the searched to-be-borrowed accounting archive file, that is, the second archive identifier, and sends the second archive identifier to the user node 811. On the other hand, the user node 811 obtains the corresponding first file identifier from the block chain network 814 according to the file information, compares the first file identifier with the second file identifier, and verifies the correctness of the found accounting archive file to be borrowed according to the comparison result, that is, verifies whether the content of the found accounting archive file to be borrowed is consistent with the content of the accounting archive file to be borrowed when the archive file is archived and stored. In yet another aspect, the biometric characteristic collection device 812 is configured to allow the borrowed user to enter his or her biometric characteristic for authentication, and to send the biometric characteristic to the user node 811, and the user node 811 performs a hash calculation on the biometric characteristic for authentication to obtain an authenticated digital fingerprint, and further, the user node 811 obtains a corresponding registered digital fingerprint from the blockchain network 814 according to the identity information provided by the borrowed user, and performs an identity verification on the user using the authenticated digital fingerprint and the registered digital fingerprint (in other embodiments, calculating the authenticated digital fingerprint, and comparing the authentication digital fingerprint and the registered digital fingerprint may also be performed by the biometric characteristic collection device 812). If the user node 811 determines that the found accounting archive file to be borrowed is correct and the authentication of the borrowing user passes, it is determined that the found accounting archive file to be borrowed can be borrowed from the borrowing user, a corresponding borrowing record is formed, and the borrowing record is uploaded to the block chain network 814 for storage.
Further, the intelligent contracts may specify loan terms for accounting archives and punishment mechanisms for overdue unreturned. When the borrowing record is uploaded to the block chain network 814, the corresponding intelligent contract can be triggered to start recording the borrowing time of the intelligent contract, and when the borrowing time limit of the accounting archive file is reached and the intelligent contract is not returned, the intelligent contract can be triggered to automatically send a return prompt to the borrowing user and/or automatically execute a punishment mechanism with overdue and non-return; for example, the return reminder is sent to the corresponding mobile phone or mailbox by sending the phone number or mailbox address contained in the identity information of the borrowing user. Furthermore, borrowing time can be further recorded when returning reminding is sent, and when the accounting archive file is not returned after a period of time, a corresponding punishment mechanism is automatically executed based on the intelligent contract.
In this embodiment, since the staff of the archive management has already undergone identity authentication when logging in, it is not necessary to perform identity authentication on the staff of the archive management by using the biometric features of the staff of the archive management, but in other embodiments, the above-mentioned method of using the digital fingerprint may be used to perform identity authentication on the staff of the archive management, for example, when the accounting archive file to be borrowed that needs to be lent has a higher privacy level, and the like, it is necessary to obtain the endorsement of a specific person to lend the accounting archive file. In addition, in other embodiments, the borrowing user may also join the blockchain network through a device such as a mobile phone or a computer, and at this time, the borrowing user may also adopt the above login authentication method.
Further, referring to fig. 9, fig. 9 is a schematic flowchart illustrating a fourth embodiment of the file management method according to the present application, and the embodiment of the file management method shown in fig. 5 performs file returning after the file to be borrowed is borrowed in the first embodiment. As shown in fig. 9, the file management method of the present embodiment may include the following steps:
in step S31, the user node acquires a third profile identification generated based on the content of the archive file to be returned.
When the archive file is returned by the returning user (corresponding to the above-mentioned lending user in general), the archive file to be returned is provided to the user node (taking the archive management user node as an example in this embodiment), and at this time, similarly to step S11, the user node obtains the third archive identifier corresponding to the content of the archive file to be returned according to the archive file to be returned provided by the returning user.
In another embodiment, the user node may scan the content of the archive file to be returned to obtain a third archive identifier corresponding to the content of the archive file to be returned.
In step S32, a first archive identifier corresponding to the archive file to be returned, which is stored in the blockchain network, is acquired.
In this embodiment, the archive file to be returned should correspond to the archive file to be borrowed that is borrowed, and thus the first archive identifier stored in the block chain network and corresponding to the archive file to be borrowed is the archive identifier corresponding to the archive file to be returned. The execution content is as shown in step S12 in fig. 5, and corresponding file information such as the file type, the file name, the file belonging date, the file voucher number and the like can be obtained according to the file to be returned provided by the returning user, so as to obtain the corresponding first file identifier from the blockchain network.
In step S33, the first file identifier and the third file identifier are compared, and whether the file to be returned is correct is determined according to the comparison result, and whether verification passing information for performing identity verification on the returning user is received is determined.
And the user node compares the first file identification with the third file identification and judges whether the file to be returned is correct or not according to the comparison result. It can be understood that, if the first file identifier is consistent with the third file identifier, it indicates that the archive file to be returned at this time is the archive file to be borrowed that was borrowed before, that is, the archive file to be returned is correct; if the first file identifier is consistent with the third file identifier, it indicates that the archive file to be returned at this time is different from the archive file to be borrowed that was borrowed before, that is, the archive file to be returned is incorrect, and at this time, the archive file to be returned may be returned incorrectly, or a part of the content may be lost during the lending process.
Further, in this embodiment, when returning the archive file to the user, the identity of the returning user needs to be verified, that is, the user node needs to determine whether the identity of the returning user passes the verification. That is, the user node needs to determine whether verification passing information for performing identity verification on the returning user is received, and if the user node receives the verification passing information corresponding to the returning user, it indicates that the returning user is authenticated and the identity verification passes; if the user node does not receive the verification passing information corresponding to the returning user, the verification passing information indicates that the identity verification of the returning user is not performed or the identity verification of the returning user is abnormal, and the returning operation of the returning user on the file to be returned cannot be completed at the moment.
In step S34, a return record is generated according to the identity information of the returning user and the archive file to be returned, and the return record is sent to the blockchain network.
According to the comparison and judgment in step S33, when the judgment result is that the archive file to be returned is correct and the verification passing information corresponding to the returning user is received, it indicates that the returning operation of the archive file to be returned by the returning user can be completed. At this time, the identity information of the returning user, the related archive information of the archive file to be returned, the returning time information and the like are recorded, the returning record corresponding to the archive file to be returned is generated according to the information, the returning record is sent to the block chain network, the returning record is subjected to consensus accounting by an accounting node in the block chain network, and a new block is formed and stored in the block chain network.
In step S35, return failure information is fed back.
According to the comparison and judgment in step S33, when the judgment result is that the document to be returned is incorrect and/or the verification pass information corresponding to the returning user is not received, it can be determined that the returning operation of the returning user on the archive document to be returned cannot be completed, and return failure information is fed back, and in addition, the specific content of the judgment result can be further fed back to the staff of the archive management. The specific content may be the content of step S15 shown in fig. 5, and is not described herein again.
The first to fourth embodiments of the file management method of the present application shown in fig. 5 to 9 can all be based on the file management network based on the blockchain technology shown in fig. 4.
Further, the present application also provides a user information management method based on the blockchain technology, and the user information management method of this embodiment may be applied to the archive management network based on the blockchain technology shown in fig. 4. Referring to fig. 10, fig. 10 is a schematic flowchart of a first embodiment of a user information management method according to the present application, and as shown in fig. 10, the present embodiment may include the following processes:
in step S41, the user node obtains the registered biometric feature entered by the user, and performs hash calculation on the registered biometric feature to obtain a corresponding registered digital fingerprint.
In this embodiment, the blockchain network may be a private chain network or an alliance chain network, and a user needs to register with the blockchain network in advance, and after the registration is successful, the user can be acknowledged by other nodes in the blockchain network to perform corresponding transactions through the blockchain network. In this embodiment, when the user registers the blockchain network, the biometric feature of the user is input as the registered biometric feature, the user node obtains the registered biometric feature, and obtains a set of irreversible character strings with fixed length by using hash calculation, where the character strings can be used as the registered digital fingerprint corresponding to the registered biometric feature.
In step S42, registration identity information entered by the user is acquired.
When a user registers a block chain network, the identity information of the user is input as registration identity information, and the user node acquires the registration identity information.
In this embodiment, the registered biometric feature may be any one or more of the physiological features of the user, such as at least one of the physiological features of a fingerprint, an iris, a face, a finger vein, and the like. The registered identity information may include one or more physical identity information of the user, such as at least one of identity card information (identity card number, native place, identity card photo, etc.), work information (work unit name, work part, position, etc.), household registration information, contact information (phone, mailbox, QQ, WeChat, etc.).
In step S43, the registered digital fingerprint is associated with the registered identity information and stored in the blockchain network.
Further, the user node associates the acquired registered digital fingerprint with the registered identity information and uploads the associated registered digital fingerprint to the block chain network, and an accounting node of the block chain network accounts the registered digital fingerprint and the registered identity information to complete identity registration of the user on the block chain network.
According to the user information management method, when the user registers the blockchain network, the user does not register by using the biological characteristics or the identity information independently, but registers by associating the two. In addition, the registered digital fingerprint obtained by calculation according to the registered biological characteristics of the user is linked when the user registers the blockchain network, and the registered digital fingerprint is irreversible and unique, so that the user information management method can ensure that the privacy of the user is not easy to leak, can more accurately perform identity authentication on the user when the user subsequently utilizes the blockchain network to perform related transactions, and reduces the condition of identity authentication errors.
Further, referring to fig. 11, fig. 11 is a flowchart illustrating a second embodiment of the user information management method according to the present application, and this embodiment is based on an embodiment that performs identity authentication on a user after the user registration is completed for the user in the first embodiment of the user information management method shown in fig. 10. As shown in fig. 11, the present embodiment may include the following processes:
in step S51, the user node obtains the authentication biometric feature entered by the user, and performs hash calculation on the authentication biometric feature to obtain a corresponding authentication digital fingerprint.
When a user conducts related transactions through the blockchain network, identity authentication needs to be conducted on the user. When the user is authenticated, the authentication biological characteristics are input by the user at the moment, and it can be understood that the authentication biological characteristics correspond to the registration biological characteristics, and the authentication biological characteristics and the registration biological characteristics can correspond to the same physiological characteristics, that is, the registration biological characteristics input by the user during registration are a fingerprint and an iris, and the authentication biological characteristics input during authentication also need to be the fingerprint and the iris. The user node further performs hash calculation on the authentication biological characteristics by using a hash algorithm to obtain a group of irreversible character strings with fixed length corresponding to the authentication biological characteristics, namely the authentication digital fingerprint.
It will be appreciated that both enrollment and authentication employ a hash algorithm, and thus, if the authentication biometric entered by the user matches the corresponding enrollment biometric, the resulting authentication digital fingerprint should be consistent with the enrollment digital fingerprint. If the authentication biometric feature entered by the user is different from the corresponding enrollment biometric feature, the resulting authentication digital fingerprint must necessarily be different from the enrollment digital fingerprint.
In step S52, authentication identity information entered by the user is acquired.
When a user performs identity authentication by using the block chain network, identity information for authentication is input as authentication identity information, and a user node acquires the authentication identity information.
In step S53, it is determined whether there is an association between the authenticated digital fingerprint and the authenticated identity information according to the registered digital fingerprint and the registered identity information recorded by the accounting node.
Further, the user node judges the incidence relation according to the obtained authentication digital fingerprint and authentication identity information and the registration digital fingerprint and registration identity information recorded by the accounting node, further judges whether the obtained authentication digital fingerprint and the obtained authentication identity information have the incidence relation, and obtains a corresponding judgment result.
As shown in fig. 12, in an embodiment, step S53 may include the following steps:
in step S531a, the corresponding registration identity information is searched for according to the authentication identity information.
The user node acquires authentication identity information input by the user when the user performs identity authentication, and searches the registration identity information consistent with the authentication identity information from a plurality of registration identity information recorded by the accounting node of the block chain network according to the authentication identity information. For example, at this time, if the user enters the authentication identity information as the id number 123456789, the registration identity information with the content of 123456789 is searched according to the id number.
In step S532a, a corresponding authenticated digital fingerprint is acquired according to the registered identity information.
Further, the authentication digital fingerprint associated with the found registered identity information can be obtained according to the found registered identity information. It will be appreciated that the enrollment identity information and the authentication digital fingerprint associated therewith both correspond to the same enrolled user.
In step S533a, it is determined whether the registered digital fingerprint matches the authenticated digital fingerprint, and it is determined whether an association exists between the authenticated digital fingerprint and the authentication identity information according to the determination result.
Further, whether the registered digital fingerprint is consistent with the authentication digital fingerprint acquired at the moment can be judged, and whether an association relationship exists between the authentication digital fingerprint and the authentication identity information is further determined.
If the registered digital fingerprint is consistent with the authenticated digital fingerprint, and the registered digital fingerprint is found based on the authentication identity information entered by the current user, it can be shown that the authentication identity information is the same as the registered identity information, and the authenticated digital fingerprint is the same as the registered digital fingerprint, in other words, there is an association relationship between the authenticated digital fingerprint and the authentication identity information, and the result of authenticating the user identity at this time is step S54. If the registered digital fingerprint is not consistent with the authenticated digital fingerprint, and the registered digital fingerprint is found based on the authentication identity information entered by the current user, it can be shown that the authentication identity information is the same as the registered identity information, but the authenticated digital fingerprint is different from the registered digital fingerprint, in other words, there is no association between the authenticated digital fingerprint and the authentication identity information, and the result of authenticating the user identity at this time is step S55.
As shown in fig. 13, in another embodiment, step S53 may further include the following steps:
in step S531b, the corresponding enrolled digital fingerprint is looked up from the authenticated digital fingerprint.
In step S532b, corresponding registered identity information is obtained according to the registered digital fingerprint.
In step S533b, it is determined whether the authentication identity information matches the registration identity information, and it is determined whether there is an association between the authentication digital fingerprint and the authentication identity information according to the determination result.
Fig. 13 shows another embodiment of step S53, which is similar to the embodiment shown in fig. 12, except that the embodiment searches for the registered digital fingerprint by the authenticated digital fingerprint, further searches for the associated registered identity information by the registered digital fingerprint, and determines whether there is an association relationship between the authenticated digital fingerprint and the authenticated identity information by determining whether the authenticated identity information and the registered identity information are consistent.
In step S54, it is determined that the result of the authentication of the user is authentication pass according to the determination result.
According to the determination result in step S53, if the determination result is that there is an association relationship between the authentication digital fingerprint and the authentication identity information, it is indicated that the authentication identity information, the authentication digital fingerprint, the registration identity information, and the registration digital fingerprint all correspond to the same user, and the result of performing the identity verification on the user can be determined as verification pass.
In step S55, it is determined that the result of the authentication of the user is authentication failure according to the determination result.
According to the determination result of step S53, if the determination result is that there is no association between the authenticated digital fingerprint and the authentication identity information, it indicates that the user corresponding to the entered authentication identity information and/or authenticated digital fingerprint and the user corresponding to the registered identity information and/or registered digital fingerprint are not the same user at this time, that is, it may be determined that the result of performing the identity verification on the user is verification failure.
Further, referring to fig. 14, fig. 14 is a flowchart illustrating a user information management method according to a third embodiment of the present application, and this embodiment is further extended after the user completes user registration based on the first embodiment of the user information management method shown in fig. 10. As shown in fig. 14, after step S43 shown in fig. 10, the present embodiment may further include the following steps:
in step S44, the user node generates a public key and a private key for the user, and broadcasts the public key into the blockchain network, with the private key being stored at the user node.
After the user finishes the registration of the block chain network, the user node randomly generates a private key for the user, and generates a corresponding public key based on the private key through a related algorithm of cryptography. The public key is broadcasted to the blockchain network, other nodes in the blockchain network can obtain the public key, and the private key is stored in a user node where the user registers.
Based on the public key and private key generation mechanism of the embodiment, when a user needs to perform related transactions by using a blockchain network, the user inputs login information through a user node in which a private key is stored, the user node encrypts the login information by using the private key and uploads the encrypted login information to a verification node in the blockchain network, the verification node further obtains a public key corresponding to the user, the encrypted login information is decrypted by using the public key to obtain the login information, the login information is verified, if the login information passes verification, the user is authenticated, and if the login information fails verification, the user is authenticated.
In this embodiment, the login information may be login biological characteristics of the user including at least one of physiological characteristics such as a fingerprint, an iris, a face, and a finger vein, or may be login identity information including at least one of identity card information (an identity card number, a native place, an identity card photo, and the like), work information (a work unit name, a work part, a position, and the like), household registration information, and a contact manner (a telephone, a mailbox, a QQ, a WeChat, and the like).
The first to third embodiments of the user information management method shown in fig. 10 to 14 can be applied to the first to fourth embodiments of the archive management method shown in fig. 5 to 9 for managing the user information of the lending user and the archive management staff, and the specific application manner thereof can refer to the detailed description contents of the first to fourth embodiments of the archive management method shown in fig. 5 to 9.
Further, please refer to fig. 15, fig. 15 is a schematic structural diagram of an embodiment of an electronic device according to the present application. As shown in fig. 15, the electronic device 150 of this embodiment may be the user node 411 or the accounting node 412 shown in fig. 4, or may be the user node 811 shown in fig. 8. The electronic device 150 may be embodied as a computer, a mobile phone, a tablet computer, or the like corresponding to the user node 411/811 or the billing node 412. The electronic device 150 of the present embodiment is deployed with an infrastructure of a blockchain platform as shown in fig. 1, and can join a blockchain network as a node in the blockchain network.
Further, the electronic device 150 of the present embodiment may include a processor 1501 and a memory 1502 provided inside the electronic device 150, and the processor 1501 and the memory 1502 are connected by a bus. The memory 1502 stores computer instructions executable by the processor 1501, and the processor 1501 executes the computer instructions to implement any one or more of the first to fourth embodiments of the archive management method shown in fig. 5 to 9 and/or any one or more of the first to third embodiments of the user information management method shown in fig. 10 to 14.
Further, referring to fig. 16, fig. 16 is a schematic structural diagram of an embodiment of a computer-readable storage medium according to the present application. As shown in fig. 16, the computer-readable storage medium 160 in the present embodiment stores a computer instruction 1601 capable of being executed, where the computer instruction 1601 is executed to implement any one or more of the first to fourth embodiments of the archive management method shown in fig. 5 to 9 and/or any one or more of the first to third embodiments of the user information management method shown in fig. 10 to 14.
In this embodiment, the computer-readable storage medium 160 may be a storage module of the smart terminal, a mobile storage device (such as a mobile hard disk, a usb disk, and the like), a network cloud disk, an application storage platform, a server, and other media with a storage function. In addition, the computer readable storage medium 160 may also be a storage device of a terminal corresponding to the user node 411 shown in fig. 4, or a server corresponding to the accounting node 412 and the management node 413; or the memory 1502 shown in fig. 15.
The scheme can realize the following beneficial effects:
(1) through the digital fingerprint comparison mode, the credible verification and tracking of the user identity are achieved, the credibility of the user involved in the whole period of file circulation is guaranteed, once events such as file loss and damage occur, the responsibility main body can be quickly determined, and the borrowing personnel is prevented from being repudiated after work.
(2) The digital file identification and the unique user identity characteristic biological characteristic of the paper file are stored in all nodes of the block chain network in a distributed mode and are maintained by nodes of the whole network together, malicious attack is prevented, file information cannot be lost even if a central database is destroyed, and the safety and the privacy of file management are improved.
(3) The circulation information of borrowing of archives all openly transparently between all participation nodes forms complete information flow, realizes the real-time credible tracking record and the effective audit of archives, ensures that the main part in time knows and finds the problem of looking after, guarantees the high compliance of user's action of borrowing.
(4) The intelligent contract is utilized to store the biological characteristics and the file identification with the data stored in advance in the distributed security database one by one, and the computer code for services such as expiration automatic handling of borrowing accounting files and the like on a block chain in an automatic triggering execution mode, so that the complex logic service is structured, the information friction and the interactive friction can be eliminated, the operation cost is reduced, and the whole file management process is more seamless and efficient.
(5) Borrowing out and returning of archives file all need scan the archives sign that corresponds, carries out credible comparison, ensures online archives and the archives sign one-to-one on the chain, and the prevention is borrowed by mistake, is leaked the still incident and takes place, simultaneously, eliminates the technique and explains the risk, avoids two-dimensional code to duplicate and make the fake.
(6) The asymmetric encrypted personal information is stored in the block chain, the generated private key is filed in a user terminal, and the application on the same block chain calls the interface to perform identity credible authentication, so that the biological characteristics of the user are 'one-record-multiple-purpose', and the method is applied to scenes such as login of a financial management and control system, personnel attendance and the like.
In the description above, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, interfaces, techniques, etc. in order to provide a thorough understanding of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
Claims (7)
1. A user information management method based on block chain technique is characterized in that,
a user node acquires registered biological characteristics input by a user, and performs hash calculation on the registered biological characteristics to obtain corresponding registered digital fingerprints;
acquiring registration identity information input by the user;
associating the registered digital fingerprint with the registered identity information, and storing the registered digital fingerprint and the registered identity information in a block chain network, so that an accounting node of the block chain network accounts the registered digital fingerprint and the registered identity information, and the identity registration of the user to the block chain network is completed;
wherein, the user information management method further comprises:
the user node acquires the authentication biological characteristics input by the user, and performs hash calculation on the authentication biological characteristics to obtain corresponding authentication digital fingerprints;
acquiring authentication identity information input by the user;
judging whether an incidence relation exists between the authentication digital fingerprint and the authentication identity information according to the registration digital fingerprint and the registration identity information recorded by the accounting node;
performing identity authentication on the user according to the judgment result;
wherein, the judging whether there is association between the authentication digital fingerprint and the authentication identity information according to the registration digital fingerprint and the registration identity information recorded by the accounting node comprises:
searching corresponding registration identity information according to the authentication identity information; acquiring the corresponding authentication digital fingerprint according to the registration identity information; judging whether the authentication digital fingerprint is consistent with the registered digital fingerprint or not, and determining whether an association relationship exists between the authentication digital fingerprint and the authentication identity information or not according to a judgment result; and/or the presence of a gas in the gas,
searching a corresponding registered digital fingerprint according to the authentication digital fingerprint; acquiring corresponding registration identity information according to the registration digital fingerprint; and judging whether the authentication identity information is consistent with the registration identity information or not, and determining whether an association relationship exists between the authentication digital fingerprint and the authentication identity information or not according to a judgment result.
2. The user information management method according to claim 1,
the registered biological characteristics comprise at least one of fingerprints, irises, faces and finger veins;
the registration identity information comprises at least one of identity card information, work information, household registration information and contact information.
3. The user information management method according to claim 1,
after the completion of the identity registration of the user to the blockchain network, the method includes:
the user node generates a public key and a private key for the user and broadcasts the public key to the block chain network, and the private key is stored in the user node;
the user information management method further includes:
the user node acquires login information input by the user, encrypts the login information by using the private key, and sends the encrypted login information to a verification node in the block chain network, so that the verification node decrypts the encrypted login information by using the public key to obtain corresponding login information, and performs identity verification on the user by using the login information;
the login information includes at least one of login biometric information and login identity information.
4. The user information management method according to claim 1,
after the completion of the identity registration of the user to the blockchain network, the method includes:
matching a corresponding intelligent contract according to the registration identity information;
deploying the intelligent contracts to respective nodes in the blockchain network to cause the blockchain network to perform transactions related to the user based on the intelligent contracts.
5. The user information management method according to claim 1 or 3,
the user information management method further includes:
the method comprises the steps that a user node obtains a first file identification which is stored in a block chain network and corresponds to a file to be borrowed;
acquiring a second file identification generated based on the content of the archive file to be borrowed;
comparing the first file identification with the second file identification, judging whether the file to be borrowed is correct or not according to a comparison result, and judging whether the identity verification of the user passes or not;
and if the archive file to be borrowed is correct and the identity verification of the user is passed, generating a borrowing record according to the identity information of the user and the archive file to be borrowed, and sending the borrowing record to a block chain network so as to enable the bookkeeping node in the block chain network to book the borrowing record.
6. An electronic device comprising a memory and a processor, wherein,
the memory stores computer instructions for execution by the processor;
the processor is configured to execute the computer instructions to perform the user information management method of any of claims 1 to 5.
7. A computer-readable storage medium storing computer instructions executable by a processor to perform the user information management method of any of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811298890.3A CN109639632B (en) | 2018-11-02 | 2018-11-02 | User information management method based on block chain, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811298890.3A CN109639632B (en) | 2018-11-02 | 2018-11-02 | User information management method based on block chain, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109639632A CN109639632A (en) | 2019-04-16 |
CN109639632B true CN109639632B (en) | 2021-06-22 |
Family
ID=66067178
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811298890.3A Active CN109639632B (en) | 2018-11-02 | 2018-11-02 | User information management method based on block chain, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109639632B (en) |
Families Citing this family (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110059503B (en) * | 2019-04-24 | 2023-03-24 | 成都派沃特科技股份有限公司 | Traceable social information anti-leakage method |
CN110336672B (en) * | 2019-04-29 | 2020-07-28 | 山东工商学院 | Method, system and storage medium for citizen privacy protection based on zero-knowledge proof |
CN110868300B (en) * | 2019-05-17 | 2023-08-11 | 北京安妮全版权科技发展有限公司 | Block chain evidence-storing method and system |
CN110263089B (en) * | 2019-05-20 | 2021-05-04 | 创新先进技术有限公司 | Receipt storage method and node combining conditional restrictions of transaction and event types |
CN110263088B (en) * | 2019-05-20 | 2021-04-02 | 创新先进技术有限公司 | Conditional receipt storage method and node combining code labeling and event type |
CN110287670A (en) * | 2019-06-26 | 2019-09-27 | 北京芯安微电子技术有限公司 | A kind of biological information and identity information correlating method, system and equipment |
EP3771143A1 (en) * | 2019-07-24 | 2021-01-27 | Robert Bosch GmbH | Computer-implemented method to provide secure interactions between users in a network |
CN110417896B (en) * | 2019-07-31 | 2022-01-28 | 中国工商银行股份有限公司 | System and method for dynamically networking block chain based on cloud |
CN110555296B (en) * | 2019-08-01 | 2020-08-18 | 阿里巴巴集团控股有限公司 | Identity verification method, device and equipment based on block chain |
WO2021022737A1 (en) * | 2019-08-08 | 2021-02-11 | 南京中诚区块链研究院有限公司 | Financial security depository receipt system and method based on blockchain |
CN110888938A (en) * | 2019-09-02 | 2020-03-17 | 腾讯科技(深圳)有限公司 | Student identity information processing method and device based on block chain network |
CN110633559A (en) * | 2019-09-05 | 2019-12-31 | 南京中诚区块链研究院有限公司 | Financial security evidence storage platform system and method based on block chain |
CN110740120B (en) * | 2019-09-06 | 2023-04-07 | 西安万像电子科技有限公司 | Account information processing method and device |
CN110719264B (en) * | 2019-09-18 | 2022-07-22 | 平安科技(深圳)有限公司 | Information processing method and device, electronic equipment and storage medium |
CN110851858B (en) * | 2019-10-16 | 2023-09-05 | 上海源庐加佳信息科技有限公司 | Hotel personal privacy data protection method based on zero knowledge proof |
CN110995670B (en) * | 2019-11-20 | 2022-02-25 | 深圳市雄帝科技股份有限公司 | Block chain-based digital identity information management method and system |
CN110889373B (en) * | 2019-11-27 | 2022-04-08 | 中国农业银行股份有限公司 | Block chain-based identity recognition method, information storage method and related device |
CN111242759A (en) * | 2019-12-25 | 2020-06-05 | 航天信息股份有限公司 | Accounting electronic file processing method and system based on network |
CN111541671A (en) * | 2020-04-16 | 2020-08-14 | 北京海益同展信息科技有限公司 | Personnel information storage and verification method, system and storage medium |
CN111526024A (en) * | 2020-05-06 | 2020-08-11 | 国网安徽省电力有限公司信息通信分公司 | Building construction monitoring implementation method based on block chain |
CN111553694A (en) * | 2020-05-21 | 2020-08-18 | 陈议尊 | Distributed storage block chain method and system |
CN111754658B (en) * | 2020-07-03 | 2023-04-07 | 中国工商银行股份有限公司 | Training management method and device and electronic equipment |
CN112287361A (en) * | 2020-09-11 | 2021-01-29 | 杭州鸽子蛋网络科技有限责任公司 | Data governance method, system, electronic device and storage medium |
CN112149073B (en) * | 2020-09-25 | 2023-09-29 | 山西特信环宇信息技术有限公司 | Cone blockchain management method and system |
CN112153151B (en) * | 2020-09-28 | 2024-02-02 | 山西万佳印业有限公司 | Intelligent manufacturing workshop safety management method and system based on blockchain |
CN112822687B (en) * | 2020-12-31 | 2023-03-24 | 山西特信环宇信息技术有限公司 | Cone block chain mobile terminal authentication method |
CN112651855A (en) * | 2021-01-05 | 2021-04-13 | 福建中科星泰数据科技有限公司 | Intelligent signing method and system based on alliance block chain |
CN112883414A (en) * | 2021-01-21 | 2021-06-01 | 贵州电网有限责任公司 | IT asset management and renovation platform |
CN112950376A (en) * | 2021-03-05 | 2021-06-11 | 广东电网有限责任公司 | Electric power industry digital identity card management method and system based on block chain technology |
CN112989300A (en) * | 2021-03-15 | 2021-06-18 | 京东数科海益信息科技有限公司 | Digital identity information processing method and device and electronic equipment |
CN113127902A (en) * | 2021-04-23 | 2021-07-16 | 苏州若拙科技有限公司 | File database encryption and evidence storage system based on block chain |
CN113381992B (en) * | 2021-06-07 | 2022-03-18 | 中国电子科技网络信息安全有限公司 | License management method based on block chain |
CN113468496A (en) * | 2021-07-26 | 2021-10-01 | 永旗(北京)科技有限公司 | Cipher information processing method based on block chain |
CN114610777A (en) * | 2022-03-06 | 2022-06-10 | 浙江数秦科技有限公司 | Intelligent management system for civil archives based on block chain |
CN114697043B (en) * | 2022-03-14 | 2023-11-14 | 国网山东省电力公司信息通信公司 | Identity authentication unified management platform based on blockchain technology and authentication method thereof |
CN114697044A (en) * | 2022-03-29 | 2022-07-01 | 国网山东省电力公司信息通信公司 | Identity authentication module integrated system based on block chain technology |
CN114880645A (en) * | 2022-06-07 | 2022-08-09 | 中关村科学城城市大脑股份有限公司 | Identity verification method and device based on block chain |
CN115439118B (en) * | 2022-08-02 | 2023-11-21 | 上海网商电子商务有限公司 | Digital certificate storage management method based on blockchain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453271A (en) * | 2016-09-21 | 2017-02-22 | 江苏通付盾科技有限公司 | Identity registration method and system, identity authentication method and system |
CN107257336A (en) * | 2017-06-15 | 2017-10-17 | 北京汇通金财信息科技有限公司 | A kind of user authen method and system |
WO2018114585A1 (en) * | 2016-12-22 | 2018-06-28 | Itext Group Nv | Improved blockchain-based method for registration and verification of a file |
CN108418680A (en) * | 2017-09-05 | 2018-08-17 | 矩阵元技术(深圳)有限公司 | A kind of block chain key recovery method, medium based on Secure computing technique |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107547514A (en) * | 2017-07-17 | 2018-01-05 | 招商银行股份有限公司 | Identity identifying method, system and computer-readable recording medium |
CN107888384B (en) * | 2017-11-30 | 2020-11-27 | 中链科技有限公司 | Identity data management method, system and computer readable storage medium |
-
2018
- 2018-11-02 CN CN201811298890.3A patent/CN109639632B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453271A (en) * | 2016-09-21 | 2017-02-22 | 江苏通付盾科技有限公司 | Identity registration method and system, identity authentication method and system |
WO2018114585A1 (en) * | 2016-12-22 | 2018-06-28 | Itext Group Nv | Improved blockchain-based method for registration and verification of a file |
CN107257336A (en) * | 2017-06-15 | 2017-10-17 | 北京汇通金财信息科技有限公司 | A kind of user authen method and system |
CN108418680A (en) * | 2017-09-05 | 2018-08-17 | 矩阵元技术(深圳)有限公司 | A kind of block chain key recovery method, medium based on Secure computing technique |
Also Published As
Publication number | Publication date |
---|---|
CN109639632A (en) | 2019-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109639632B (en) | User information management method based on block chain, electronic equipment and storage medium | |
CN109710823A (en) | Archive management method, file administration network and electronic equipment based on block chain | |
EP4035050B1 (en) | Consensus protocol for blockchain dag structure | |
KR102002509B1 (en) | Privite blockchain system including notarizing center and notarial method thereof | |
AU2021201911B2 (en) | Methods and devices for acquiring and recording tracking information on blockchain | |
Cai et al. | Enabling reliable keyword search in encrypted decentralized storage with fairness | |
US11429738B2 (en) | Blockchain endorsement with approximate hash verification | |
CN110771120B (en) | System and method for blockchain based authentication | |
CN111552955B (en) | Personal identity authentication method and device based on block chain and IPFS | |
US20210091960A1 (en) | Tracking and verification of physical assets | |
US20200014528A1 (en) | Strengthening non-repudiation of blockchain transactions | |
US20210089514A1 (en) | Tracking and verification of physical assets | |
CN110753944B (en) | System and method for blockchain-based data management | |
US11775556B2 (en) | Faster view change for blockchain | |
CN113259311B (en) | Decentralized identity authentication system based on block chain | |
US20200382309A1 (en) | Approximate hash verification for blockchain | |
US20220405765A1 (en) | Know your customer (kyc) and anti-money laundering (aml) verification in a multi-decentralized private blockchains network | |
WO2019178440A1 (en) | System and method for securing private keys behind a biometric authentication gateway | |
US11823194B2 (en) | Decentralized biometric authentication platform | |
CN114003959A (en) | Decentralized identity information processing method, device and system | |
US20230208648A1 (en) | Htlc with proof of elapsed time | |
WO2024221849A1 (en) | Data processing method and apparatus based on trusted execution environment, device, and medium | |
Sneha et al. | Blockchain identity management | |
Gupta et al. | Security, Privacy, and Trust Management and Performance Optimization of Blockchain | |
CN116166743A (en) | Digital asset inheritance system and method based on Hyperledger Fabric super ledger |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |