Asymmetric encryption block chain identity information authentication method and device

An asymmetric encryption and identity information technology, applied in the field of asymmetric encrypted blockchain identity information verification, can solve the problems of single verification information and methods, unfavorable transaction information protection blockchain technology development, etc., to improve verification security, The effect of enhancing verification security and enhancing convenience

Active Publication Date: 2016-11-09
惠众商务顾问(北京)有限公司
View PDF4 Cites 116 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The verification information and methods are relatively single, which is not conduci

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric encryption block chain identity information authentication method and device
  • Asymmetric encryption block chain identity information authentication method and device
  • Asymmetric encryption block chain identity information authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] like figure 1 As shown, the transaction information is broadcast to all nodes;

[0080] the node collects transaction information in a block;

[0081] The node starts to generate random strings continuously, and calculates the random number answer;

[0082] When a node's answer matches a random number, it broadcasts the generated block to all other nodes;

[0083] All other nodes verify the transaction, and when it is determined that the transaction contained in the block is valid, all other nodes accept the block.

[0084] All the other nodes start creating new blocks and add the cryptographic hash of the block just accepted.

Embodiment 2

[0086] like figure 2 As shown, the blocks are randomly hashed and linked into a blockchain.

[0087] The cryptographic hash formed by the previous block is used to connect the blocks to realize the ordering of past transactions.

[0088] The blockchain must be linked to the previous block before the transaction can be further confirmed.

Embodiment 3

[0090] like image 3 shown, the verification includes a key pair;

[0091] The key pair includes a public key and a private key;

[0092] The public key has publicity and is used to encrypt a piece of information and prove the authenticity of the information;

[0093] The private key has privacy, and the private key is only mastered by the information owner to decrypt the information encrypted by the public key;

[0094] The information encrypted by the public key can only be decrypted by the person who has the corresponding private key;

[0095] The public key and the private key code have asymmetry, that is, the private key cannot be derived from the public key;

[0096] The private key signs the information, and the public key verifies the signature;

[0097] The information verified by the public key signature is confirmed to be issued by the private key holder;

[0098] The public key is issued by the previous block, and the private key is owned by the next block hol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an asymmetric encryption block chain identity information authentication method, which is characterized by comprising the following steps that: transaction information is broadcasted to all the nodes; the node collects the transaction information in one block; the node starts to continually generate random character strings, and calculates a random number answer; when the answer obtained by one node is matched with a random number, the node broadcasts the generated block to all the other nodes; and all the other nodes authenticate the transaction, and accept the block when confirming that the transaction contained in the block is valid. All the other nodes start to create a new block, and add an encryption hash of the block accepted just now. The blocks are randomly hashed and chained together to form a block chain. The encryption hash formed by the previous block is used for connecting the blocks together, and arranging the blocks according to an order of past transaction. After the block chain is chained together with the previous block, transaction can be further confirmed.

Description

technical field [0001] The present application relates to the technical field of blockchain, and in particular, to a method and device for verifying identity information of an asymmetric encrypted blockchain. Background technique [0002] The Internet TCP / IP protocol has brought us into the era of free transmission of information, and the innovation of blockchain will bring us into the era of free notarization of information! The blockchain establishes "credit" through the whole network accounting and P2P collaboration. It is the fourth milestone in the history of human credit evolution after blood kinship credit, precious metal credit, and central bank banknote credit. There are extensive and in-depth application scenarios in many fields such as global market remittance, intellectual property protection, property micro-notarization, Internet of Things finance, and smart agreements. [0003] The existing blockchain link encrypts the information content and sends it to a spe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0866H04L9/0869H04L9/3231H04L9/3236H04L9/3249
Inventor 李立中
Owner 惠众商务顾问(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products