Nothing Special   »   [go: up one dir, main page]

CN112583605B - Block chain-based secret-free authentication method, system, terminal and storage medium - Google Patents

Block chain-based secret-free authentication method, system, terminal and storage medium Download PDF

Info

Publication number
CN112583605B
CN112583605B CN202011480772.1A CN202011480772A CN112583605B CN 112583605 B CN112583605 B CN 112583605B CN 202011480772 A CN202011480772 A CN 202011480772A CN 112583605 B CN112583605 B CN 112583605B
Authority
CN
China
Prior art keywords
transmission data
secret
free authentication
party system
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011480772.1A
Other languages
Chinese (zh)
Other versions
CN112583605A (en
Inventor
植挺生
陈建生
庄广壬
庾浩谦
刘勇
冼永乐
文青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Guangyu Technology Development Co Ltd
Original Assignee
Guangdong Guangyu Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Guangyu Technology Development Co Ltd filed Critical Guangdong Guangyu Technology Development Co Ltd
Priority to CN202011480772.1A priority Critical patent/CN112583605B/en
Publication of CN112583605A publication Critical patent/CN112583605A/en
Application granted granted Critical
Publication of CN112583605B publication Critical patent/CN112583605B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a block chain-based secret-free authentication method, a system, a terminal and a storage medium, wherein the method comprises the following steps: establishing a secret-free authentication system, dividing the secret-free authentication system into functional modules and respectively deploying the functional modules to DApp of a public chain platform; when the third-party system sends the first transmission data to the back-end service, the first transmission data after encryption of the third-party system is received, and whether the third-party system is a legal user is judged; carrying out validity verification on the encrypted transmission data I; decrypting the legal encrypted transmission data I; carrying out validity verification on the decrypted transmission data I; transmitting the legal decrypted transmission data I to a back-end service system; and when the back-end service system returns the transmission data II to the third-party system, sending the encrypted transmission data II and the callback data to the third-party system. The invention can avoid the problems of easy leakage and logic coupling of an encryption mode in the secret-free authentication technology, thereby improving the safety, the usability and the flexibility of the secret-free authentication technology.

Description

Block chain-based secret-free authentication method, system, terminal and storage medium
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a block chain-based secret-free authentication method, system, terminal, and storage medium.
Background
The existing third-party secret-free authentication system is generally a service system which is used for a system platform to open partial data interfaces or pages for a third-party access party and needs to authenticate the identity of the access party, and generally, secret-free authentication needs the third party to provide reliable authentication information to verify the identity of the third party.
In the existing secret-free authentication system realized based on public and private key technology, parameters such as appkey, private key and the like need to be informed to a third-party system in advance, the process of stipulating encryption and the encryption mode need to be realized, the encrypted content is transmitted to a service system, the service system decrypts the data according to a specific rule, and the data is fed back to the third-party service system after the verification is successful. However, the secret-less authentication system of this type has the following problems:
(1) a public-private key-based password-free authentication system needs to inform a third-party system of the contents of an appkey and a public key, the third-party system stores the appkey and the public key in a code or a database, and if the third-party system is attacked by a hacker to cause the leakage of the appkey and the public key, the risk of data leakage is caused.
(2) Due to the fact that an appointed encryption mode needs to be achieved, if the encryption mode is leaked due to the fact that third-party service personnel are leaked, other unauthorized personnel can easily conduct authentication interface calling by simulating the data encryption mode, and loss is caused to a service system and a third-party system.
(3) In the authentication process, if the appkey and the public key are leaked, the encryption mode is exposed and the like, an attacker can perform interface calling by disguising the implementation mode and data, and under the condition of the problem, the identity validity of the attacker cannot be verified by the password-free authentication system.
(4) The secret-free authentication system is generally deployed on the same server as a service system for providing data at the rear, and if the server is unavailable, the secret-free authentication system cannot provide services to the outside, which easily causes service loss of a service provider and a third-party system.
Disclosure of Invention
The present invention is directed to overcome the disadvantages and shortcomings of the prior art, and provides a block chain-based secret-free authentication method, system, terminal and storage medium, which can avoid the problems of easy leakage and logical coupling of the encryption method in the current secret-free authentication technology, thereby improving the security, usability and flexibility of the secret-free authentication technology.
The invention aims to provide a block chain-based secret-free authentication method.
The second purpose of the invention is to provide a block chain-based secret-free authentication system.
A third object of the present invention is to provide a terminal.
It is a fourth object of the present invention to provide a storage medium.
The first purpose of the invention can be achieved by adopting the following technical scheme:
a block chain-based secret-free authentication method is characterized by comprising the following steps: the method comprises the following steps:
establishing a secret-free authentication system, dividing the secret-free authentication system into functional modules and respectively deploying the functional modules to DApp of a public chain platform; taking the Etheng as a public chain platform;
when the third-party system sends the first transmission data to the back-end service, the encryption-free authentication system receives the first transmission data after encryption of the third-party system, and identifies the third-party system through a white list to judge whether the third-party system is a legal user; the password-free authentication system carries out validity verification on the encrypted transmission data I of the third-party system which is confirmed to be a legal user;
the secret-free authentication system decrypts the legal encrypted transmission data I to obtain the decrypted transmission data I; the password-free authentication system performs validity verification on the decrypted transmission data I;
the secret-free authentication system transmits legal decrypted transmission data I to a back-end service system;
and when the back-end service system returns the transmission data II to the third-party system, the password-free authentication system receives and encrypts the transmission data II of the back-end service system, and sends the encrypted transmission data II and the callback data to the third-party system.
Further, the third-party system encrypts the first transmission data by adopting a block chain Hash SHA-256 algorithm;
the block chain Hash SHA-256 algorithm is adopted by the password-free authentication system to decrypt the legal encrypted transmission data I.
Further, the determining whether the third-party system is a valid user by identifying the third-party system through the white list means: if the identity information of the third-party system is identified to be in the white list, judging that the third-party system is a legal user; otherwise, judging that the third-party system is an illegal user, and stopping sending the encrypted transmission data I;
the identity information of the third-party system comprises the IP of the server where the third party is located, the IP area and the type of the third-party server.
Further, before the secret-free authentication system receives the encrypted transmission data one of the third-party system, the method further includes:
and the third-party system performs complete validity check on the encrypted first transmission data, generates a 256-bit hash value by using a hash algorithm, and sends the hash value and the encrypted first transmission data to the secret-free authentication system.
Further, the verification of the validity of the encrypted transmission data one of the third-party system confirmed as a valid user by the secret-free authentication system means: the secret-free authentication system verifies the validity of the encrypted transmission data I in a hash value comparison mode, and if the encrypted transmission data I is judged to be illegal, the encrypted transmission data I is stopped being sent.
Further, the verification of the validity of the decrypted transmission data by the secret-free authentication system means:
establishing a data model and presetting legal deviation; training the data model by adopting a machine learning algorithm and training data to obtain a trained data model;
inputting the decrypted transmission data I into the trained data model to obtain an output value, and judging whether the output value exceeds a legal deviation degree: and if the output value exceeds the legal deviation, sending a prompt and stopping sending the decrypted transmission data one.
Further, the secret-free authentication system encrypts the second transmission data by adopting a random type hash algorithm;
the callback data comprise the id of the locally returned encrypted transmission data II and the encryption algorithm name of the returned encrypted transmission data II;
after the encrypted transmission data II and the callback data are sent to the third-party system, the method further comprises the following steps: and the third party system judges the legality of the second encrypted transmission data according to the id of the second encrypted transmission data and decrypts the returned second encrypted transmission data according to the encryption algorithm corresponding to the name of the encryption algorithm.
The second purpose of the invention can be achieved by adopting the following technical scheme:
a block chain-based secret-free authentication system is characterized in that: the method comprises the following steps:
the data receiving module DApp is used for receiving the encrypted transmission data I of the third-party system and identifying the third-party system through a white list to judge whether the third-party system is a legal user; the password-free authentication system carries out validity verification on the encrypted transmission data I of the third-party system which is confirmed to be a legal user;
the core logic module DApp is used for decrypting the legal encrypted transmission data I to obtain decrypted transmission data I; the password-free authentication system performs validity verification on the decrypted transmission data I;
the data output module DApp is used for transmitting the legal decrypted transmission data I to the back-end service system; the second transmission data and the callback data are sent to a third-party system;
the data receiving module DApp, the core logic module DApp and the data output module DApp are all arranged on a public chain platform; the public chain platform is an Ether workshop.
The third purpose of the invention can be achieved by adopting the following technical scheme:
a privacy-exempt authentication terminal comprising a processor and a memory for storing processor-executable programs, characterized in that: the block chain-based secret-free authentication method is realized.
The fourth purpose of the invention can be achieved by adopting the following technical scheme:
a storage medium, characterized by: wherein the storage medium stores a computer program which, when executed by a processor, causes the processor to perform the above-described block chain based privacy-exempt authentication method.
The invention has the characteristics that:
1. the invention solves the problems that the third-party system leaks appkey and public key and leaks the encryption mode, changes the mode of encrypting data without using the public key into the mode of using an IP white list by improving the current encryption mode, and authenticates the access user based on a set of brand-new verification mode.
2. The invention is a brand new authentication mode based on a block chain, improves the current encryption mode and decryption mode, and removes the key encryption process so as to achieve the characteristic that the decryption cannot be carried out in a mode without characteristics.
3. The invention transfers the secret-free authentication system to the DApp of the public chain platform for deployment of the secret-free authentication system deployed on the back-end service system, thereby greatly reducing the problem that the back-end service system server is unavailable.
4. The authentication process of the invention is based on the non-encryption authentication of the third-party system, and is accurate to the identity of the third-party service system, so that an attacker can not disguise.
5. The invention solves the coupling of the received data part and the decryption logic part in the current stage of the encryption-free authentication system, can independently replace the module and more flexibly modify the whole encryption and decryption logic.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. the invention can avoid the problems of easy leakage and logical coupling of the encryption mode in the existing secret-free authentication technology, thereby improving the safety, the usability and the flexibility of the secret-free authentication technology.
2. The invention is moved from the traditional centralized architecture to the distributed architecture based on the block chain, can save the cost of the server and the bandwidth by more than 80 percent, improves the integral availability of the system to more than 99.999 percent, and has subversive improvement compared with the traditional centralized architecture.
3. The invention migrates the secret-free authentication system to the DAPP based on the Etheng to operate, the security of the DAPP operation logic structure is greatly improved, and the encryption and decryption logic in the data transmission process reduces the probability of being broken by brute force to 0.001 percent due to the characteristic of decentralized architecture.
4. Because different logic function modules of the secret-free system are deployed on the DApp, the secret-free authentication system is logically decoupled, and the system can be updated and upgraded more flexibly under the condition that the system function needs to be upgraded subsequently.
Drawings
FIG. 1 is a schematic diagram of a privacy-exempt authentication system;
FIG. 2 is a flow diagram of a third party system sending a transfer data one to a back-end service;
fig. 3 is a flow chart of the back-end service system returning the transfer data two to the third-party system.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
Example one
The invention relates to a block chain-based secret-free authentication method, which comprises the following steps:
and establishing a secret-free authentication system, dividing the secret-free authentication system into functional modules and respectively deploying the functional modules to the DApp of the public chain platform. As the safety of the Ether house is higher than the fault tolerance and the easy recoverability of the privatization deployment, the Ether house is used as a public chain platform.
As shown in fig. 2, when the third-party system sends the transmission data one to the back-end service:
(1) the third-party system encrypts the first transmission data by adopting a block chain Hash SHA-256 algorithm; and the third-party system performs complete validity check on the encrypted first transmission data, generates a 256-bit hash value by using a hash algorithm, and sends the hash value and the encrypted first transmission data to the secret-free authentication system.
(2) The secret-free authentication system receives the encrypted transmission data I of the third-party system, and when the identity information of the third-party system is identified to be in the white list, the third-party system is judged to be a legal user; otherwise, judging that the third-party system is an illegal user, and stopping sending the encrypted transmission data I; the identity information of the third-party system comprises the IP (Internet protocol) of the server where the third party is located, the IP area and the type of the third-party server.
(3) The secret-free authentication system verifies the validity of the encrypted transmission data I in a hash value comparison mode, and if the encrypted transmission data I is judged to be illegal, the encrypted transmission data I is stopped being sent.
(4) The encryption-free authentication system decrypts the legal encrypted transmission data I by adopting a block chain Hash SHA-256 algorithm to obtain decrypted transmission data I; and the secret-free authentication system performs validity verification on the decrypted transmission data I:
establishing a data model and presetting legal deviation; training the data model by adopting a machine learning algorithm and training data to obtain a trained data model;
inputting the decrypted transmission data I into the trained data model to obtain an output value, and judging whether the output value exceeds a legal deviation degree: if the output value exceeds the legal deviation degree, sending a prompt and stopping sending the decrypted transmission data I; otherwise, the secret-free authentication system transmits the legal decrypted transmission data I to the back-end service system.
As shown in fig. 3, when the back-end service system returns the second transmission data to the third-party system:
I. and the secret-free authentication system receives the second transmission data of the back-end service system, encrypts the second transmission data by adopting a random type Hash algorithm, and sends the encrypted second transmission data and the callback data to a third-party system. And the callback data comprises the id of the locally returned encrypted transmission data II and the encryption algorithm name of the returned encrypted transmission data II.
And II, the third party system judges the legality of the second encrypted transmission data according to the id of the second encrypted transmission data and carries out decryption operation on the returned second encrypted transmission data according to the encryption algorithm corresponding to the name of the encryption algorithm.
The method can be used for various back-end service systems based on B/S architecture, public deployment and private deployment, or can be used for the back-end service system which needs to open a third party to the outside without secret authentication, or comprises a secret-free authentication module. In the application process, the secret-free authentication system can be upgraded only without involving the functional module of the back-end service system.
Example two
In order to implement the block chain-based secret-free authentication method according to the first embodiment, this embodiment provides a block chain-based secret-free authentication system, which includes:
the data receiving module DApp is used for receiving the encrypted transmission data I of the third-party system and identifying the third-party system through a white list to judge whether the third-party system is a legal user; and the password-free authentication system performs validity verification on the encrypted transmission data I of the third-party system which is confirmed to be a legal user.
The core logic module DApp is used for decrypting the legal encrypted transmission data I to obtain decrypted transmission data I; and the password-free authentication system performs validity verification on the decrypted transmission data I.
The data output module DApp is used for transmitting the legal decrypted transmission data I to the back-end service system; and the second transmission data and the callback data are sent to a third-party system after being encrypted.
The data receiving module DApp, the core logic module DApp and the data output module DApp are all arranged on a public chain platform, and the public chain platform is an Etherhouse.
EXAMPLE III
The embodiment is a secret-free authentication terminal, including a processor and a memory for storing executable programs of the processor, and characterized in that: the block chain-based secret-free authentication method according to the first embodiment is implemented.
Example four
The present embodiment is a storage medium, characterized in that: wherein the storage medium stores a computer program which, when executed by a processor, causes the processor to execute the block chain based privacy-exempt authentication method of the embodiment one.
The above embodiments are preferred embodiments of the present invention, but the present invention is not limited to the above embodiments, and any other changes, modifications, substitutions, combinations, and simplifications which do not depart from the spirit and principle of the present invention should be construed as equivalents thereof, and all such changes, modifications, substitutions, combinations, and simplifications are intended to be included in the scope of the present invention.

Claims (10)

1. A block chain-based secret-free authentication method is characterized by comprising the following steps: the method comprises the following steps:
establishing a secret-free authentication system, dividing the secret-free authentication system into functional modules and respectively deploying the functional modules to DApp of a public chain platform; taking the Etheng as a public chain platform;
when the third-party system sends the first transmission data to the back-end service, the encryption-free authentication system receives the first transmission data after encryption of the third-party system, and identifies the third-party system through a white list to judge whether the third-party system is a legal user; the password-free authentication system carries out validity verification on the encrypted transmission data I of the third-party system which is confirmed to be a legal user;
the secret-free authentication system decrypts the legal encrypted transmission data I to obtain decrypted transmission data I; the password-free authentication system performs validity verification on the decrypted transmission data I;
the secret-free authentication system transmits legal decrypted transmission data I to a back-end service system;
and when the back-end service system returns the transmission data II to the third-party system, the password-free authentication system receives and encrypts the transmission data II of the back-end service system, and sends the encrypted transmission data II and the callback data to the third-party system.
2. The block chain-based secret-free authentication method according to claim 1, wherein: the third-party system encrypts the first transmission data by adopting a block chain Hash SHA-256 algorithm;
the block chain Hash SHA-256 algorithm is adopted by the password-free authentication system to decrypt the legal encrypted transmission data I.
3. The block chain-based secret-free authentication method according to claim 1, wherein: the step of identifying the third-party system through the white list to judge whether the third-party system is a legal user means that: if the identity information of the third-party system is identified to be in the white list, judging that the third-party system is a legal user; otherwise, judging that the third-party system is an illegal user, and stopping sending the encrypted transmission data I;
the identity information of the third-party system comprises the IP (Internet protocol) of the server where the third party is located, the IP area and the type of the third-party server.
4. The block chain-based secret-free authentication method according to claim 1, wherein: before the secret-free authentication system receives the encrypted transmission data I of the third-party system, the method further comprises the following steps:
and the third-party system performs complete validity check on the first encrypted transmission data, generates a 256-bit hash value by using a hash algorithm, and sends the hash value and the first encrypted transmission data to the secret-free authentication system.
5. The block chain-based secret-free authentication method according to claim 4, wherein: the verification of the validity of the encrypted transmission data I of the third-party system confirmed to be a legal user by the secret-free authentication system is as follows: the secret-free authentication system verifies the validity of the encrypted transmission data I in a hash value comparison mode, and if the encrypted transmission data I is judged to be illegal, the encrypted transmission data I is stopped being sent.
6. The block chain-based secret-free authentication method according to claim 1, wherein: the verification of the validity of the decrypted transmission data by the secret-free authentication system is as follows:
establishing a data model and presetting legal deviation; training the data model by adopting a machine learning algorithm and training data to obtain a trained data model;
inputting the decrypted transmission data I into the trained data model to obtain an output value, and judging whether the output value exceeds a legal deviation degree: and if the output value exceeds the legal deviation, sending a prompt and stopping sending the decrypted transmission data I.
7. The block chain-based secret-free authentication method according to claim 1, wherein: the secret-free authentication system encrypts the second transmission data by adopting a random type Hash algorithm;
the callback data comprise the id of the locally returned encrypted transmission data II and the encryption algorithm name of the returned encrypted transmission data II;
after the encrypted transmission data II and the callback data are sent to the third-party system, the method further comprises the following steps: and the third party system judges the legality of the second encrypted transmission data according to the id of the second encrypted transmission data and decrypts the returned second encrypted transmission data according to the encryption algorithm corresponding to the name of the encryption algorithm.
8. A block chain-based secret-free authentication system is characterized in that: the method comprises the following steps:
the data receiving module DApp is used for receiving the first encrypted transmission data of the third-party system and identifying the third-party system through a white list to judge whether the third-party system is a legal user; the password-free authentication system carries out validity verification on the encrypted transmission data I of the third-party system which is confirmed to be a legal user;
the core logic module DApp is used for decrypting the legal encrypted transmission data I to obtain decrypted transmission data I; the password-free authentication system performs validity verification on the decrypted transmission data I;
the data output module DApp is used for transmitting the legal decrypted transmission data I to the back-end service system; the second transmission data and the callback data are sent to a third-party system;
the data receiving module DApp, the core logic module DApp and the data output module DApp are all arranged on a public chain platform; the public chain platform is an Ether house.
9. A privacy-exempt authentication terminal comprising a processor and a memory for storing processor-executable programs, characterized in that: implementing the block chain based secret-free authentication method of any of claims 1-7.
10. A storage medium, characterized by: wherein the storage medium stores a computer program which, when executed by a processor, causes the processor to perform the blockchain based privacy authentication method of any one of claims 1 to 7.
CN202011480772.1A 2020-12-16 2020-12-16 Block chain-based secret-free authentication method, system, terminal and storage medium Active CN112583605B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011480772.1A CN112583605B (en) 2020-12-16 2020-12-16 Block chain-based secret-free authentication method, system, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011480772.1A CN112583605B (en) 2020-12-16 2020-12-16 Block chain-based secret-free authentication method, system, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN112583605A CN112583605A (en) 2021-03-30
CN112583605B true CN112583605B (en) 2022-08-16

Family

ID=75135428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011480772.1A Active CN112583605B (en) 2020-12-16 2020-12-16 Block chain-based secret-free authentication method, system, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN112583605B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106790079A (en) * 2016-12-22 2017-05-31 深圳新众诚科技有限公司 A kind of identity identifying method and its device of secure communication of network method
CN107169364B (en) * 2017-05-05 2019-10-25 国信嘉宁数据技术有限公司 A kind of data security method and related system
CN107634904A (en) * 2017-11-07 2018-01-26 北京恒华伟业科技股份有限公司 A kind of instant messaging interaction method and system
CN109756343B (en) * 2019-01-31 2021-07-20 平安科技(深圳)有限公司 Authentication method and device for digital signature, computer equipment and storage medium
CN111355786B (en) * 2020-02-20 2023-06-09 中科全维科技(苏州)有限公司 Internet of things equipment control method based on alliance block chain

Also Published As

Publication number Publication date
CN112583605A (en) 2021-03-30

Similar Documents

Publication Publication Date Title
CN109347835B (en) Information transmission method, client, server, and computer-readable storage medium
CN101019369B (en) Method for delivering direct proof private keys to devices using online services
US8321924B2 (en) Method for protecting software accessible over a network using a key device
US20050149722A1 (en) Session key exchange
CN110990827A (en) Identity information verification method, server and storage medium
WO2000045273A1 (en) Authentication enforcement using decryption and authentication in a single transaction in a secure microprocessor
CN110690956B (en) Bidirectional authentication method and system, server and terminal
CN112685786B (en) Financial data encryption and decryption method, system, equipment and storage medium
KR20200104084A (en) APPARATUS AND METHOD FOR AUTHENTICATING IoT DEVICE BASED ON PUF
CN109379345B (en) Sensitive information transmission method and system
CN113612852A (en) Communication method, device, equipment and storage medium based on vehicle-mounted terminal
CN115473655B (en) Terminal authentication method, device and storage medium for access network
CN104468074A (en) Method and equipment for authentication between applications
CN111224958A (en) Data transmission method and system
CN111464554B (en) Vehicle information safety control method and system
CN101305542A (en) Method for downloading digital certificate and secret key
CN104901967A (en) Registration method for trusted device
CN100561913C (en) A kind of method of access code equipment
CN112583605B (en) Block chain-based secret-free authentication method, system, terminal and storage medium
US11550932B2 (en) Method for a terminal to acquire and access data
CN112217797B (en) Intelligent gateway Internet of things control system and method applying block chain technology
CN114553557A (en) Key calling method, key calling device, computer equipment and storage medium
CN112769560B (en) Key management method and related device
CN117118759B (en) Method for reliable use of user control server terminal key
CN113766344B (en) Method and system for constructing dynamic trust root based on high-security set top box

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20210330

Assignee: HODI TECHNOLOGIES Co.,Ltd.

Assignor: GUANGDONG GUANGYU SCIENCE AND TECHNOLOGY DEVELOPMENT CO.,LTD.

Contract record no.: X2022980026524

Denomination of invention: A secret free authentication method, system, terminal and storage medium based on blockchain

Granted publication date: 20220816

License type: Common License

Record date: 20221214

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A blockchain based secure authentication method, system, terminal, and storage medium

Effective date of registration: 20230830

Granted publication date: 20220816

Pledgee: Bank of China Limited by Share Ltd. Foshan branch

Pledgor: GUANGDONG GUANGYU SCIENCE AND TECHNOLOGY DEVELOPMENT CO.,LTD.

Registration number: Y2023980054478

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20210330

Assignee: GUANGDONG CHENYI INFO TECHNOLOGY CO.,LTD.

Assignor: GUANGDONG GUANGYU SCIENCE AND TECHNOLOGY DEVELOPMENT CO.,LTD.

Contract record no.: X2024980001458

Denomination of invention: A blockchain based secure authentication method, system, terminal, and storage medium

Granted publication date: 20220816

License type: Common License

Record date: 20240125