CN108183789B - Electronic code generation and authentication method - Google Patents
Electronic code generation and authentication method Download PDFInfo
- Publication number
- CN108183789B CN108183789B CN201711467400.3A CN201711467400A CN108183789B CN 108183789 B CN108183789 B CN 108183789B CN 201711467400 A CN201711467400 A CN 201711467400A CN 108183789 B CN108183789 B CN 108183789B
- Authority
- CN
- China
- Prior art keywords
- character string
- enterprise
- electronic
- key
- electronic code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 230000008520 organization Effects 0.000 claims abstract description 20
- 238000007726 management method Methods 0.000 claims description 35
- 238000012550 audit Methods 0.000 claims description 8
- 238000005516 engineering process Methods 0.000 claims description 3
- 230000008707 rearrangement Effects 0.000 abstract 1
- 238000013478 data encryption standard Methods 0.000 description 13
- 238000012790 confirmation Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method for generating and authenticating an electronic code, wherein the electronic code is a quota valuable electronic code aiming at specific scientific and technical services, circulates between an enterprise and a service organization and is uniformly managed through an electronic code management system; the generation and authentication of the electronic code comprise five processes of enterprise claiming, enterprise signing, mechanism claiming, mechanism cashing and enterprise auditing; in each process, a new public key is generated through public key rearrangement and binarization, then an encrypted character string is generated by taking a private key as a secret key on the basis of the new public key, and the encrypted character string is secondarily encrypted to generate a final encrypted character string result; the authentication takes the result of the encrypted character string as the check basis. The method of the invention ensures that the electronic code cannot be copied and embezzled, the electronic code after signing is not redeemed by others at will, and the security of cashing is enhanced.
Description
Technical Field
The invention relates to the field of information data processing, in particular to a method for generating and authenticating electronic codes.
Background
In order to encourage support and better service of 'public entrepreneurship and universal innovation', a quota valuable electronic code aiming at specific scientific and technical service is designed and issued by many companies, and the quota valuable electronic code can be circulated and redeemed through an 'internet management system'. The quota valuable electronic code corresponds to an application enterprise or an individual, a service pack (for a special service of a certain innovation and entrepreneur behavior, the special service is purchased by a third party organization capable of providing the special service by a government and is provided for an innovator and an entrepreneur in free) and the achieved effect one by one, and the management and the use of the quota valuable electronic code follow the principles of open popularization, independent application and special fund and cannot be split, transferred, purchased and pledged. The current quota-value electronic coding system comprises five service packages: the system comprises a high and new technology enterprise service package, an intellectual property service package, an analysis test service package, a new three-board listing service package and an initial service package.
The electronic encryption of the quota valuable electronic code is to encrypt data after an enterprise receives the quota valuable electronic code in order to ensure the security of the quota valuable electronic code and prevent the quota valuable electronic code from being copied and stolen by others, establish a private key and a public key, send the public key to the enterprise, and store the private key in a system. When signing a contract, an enterprise needs to input a public key to confirm a quota valuable electronic code, the quota valuable electronic code is used for establishing an encryption key for the organization after signing the contract, the public key is sent to the organization, the private key is stored in the system, the organization needs to input own public key for confirmation in the cashing process, and the enterprise can finish cashing only by inputting own public key for confirmation. Thus, double encryption is a protection for the entire flow of the stream of quotum valued electronic codes. It is therefore desirable to design an encryption method.
Disclosure of Invention
The invention provides a method for generating and authenticating an electronic code, aiming at solving the problems.
The invention is implemented according to the following technical scheme.
A generation and authentication method of electronic code, the said electronic code is a quota valuable electronic code to the particular science and technology service, circulate between enterprise and service organization, manage through the electronic code management system unitedly; the generation and the authentication of the electronic code comprise five processes of enterprise claiming, enterprise signing, organization claiming, organization cashing and enterprise auditing;
the enterprise claiming process comprises the following steps:
a1: applying electronic codes by enterprises, wherein an electronic code management system generates a random number M1 as a public key and a random character string M2 as a private key; the random number M1 is an 8-bit random number; the public key M1 is sent to the enterprise through a short message;
a2: the electronic code management system rearranges the 8-bit number of M1 to form a new key M3;
a3: the electronic coding management system converts the secret key M3 into a binary digit B1, uses a private key M2 as the secret key, and encrypts the B1 by using a DES symmetric encryption algorithm to obtain an encrypted character string MB1;
a4: the electronic coding management system uses an MD5 encryption algorithm to encrypt MB1 to obtain a final encrypted character string result MB2, and the final encrypted character string result MB2 is stored in the electronic coding data information, wherein the electronic coding data information corresponds to the enterprise ID;
the enterprise signing process comprises the following steps:
q1: an enterprise inputs a public key character string M3 in an electronic coding management system, and searches a corresponding private key character string M2 through enterprise ID and signed electronic coding data;
q2: carrying out binarization on the M3, using a private key M2 as a secret key, encrypting the binarized sequence by using a DES symmetric encryption algorithm, and obtaining an encrypted character string result MB3 by using an MD5 encryption algorithm as an encryption result; judging whether MB3= MB2, if yes, the subscription is successful; otherwise, the subscription fails.
The mechanism claim comprises the following steps:
p1: the electronic coding management system generates a random number M4 as a public key and a random character string M5 as a private key; the random number M4 is an 8-bit random number; the public key M4 is sent to the organization through a short message;
p2: the electronic code management system rearranges the 8-bit number of M4 to form a new key M6;
p3: the electronic coding management system converts the secret key M6 into a binary digit B2, uses a private key M5 as the secret key, and encrypts the B2 by using a DES symmetric encryption algorithm to obtain an encrypted character string MB4;
p4: the electronic coding management system uses an MD5 encryption algorithm to encrypt MB4 to obtain a final encrypted character string result MB5, and the final encrypted character string result MB5 is stored in the electronic coding data information which corresponds to the organization ID;
the mechanism cashing comprises the following steps:
n1: the mechanism inputs a public key character string M6 in the electronic coding management system, and searches a corresponding private key character string M5 through the mechanism ID and the signed electronic coded data;
n2: carrying out binarization on the M6, using a private key M5 as a secret key, encrypting the binarized sequence by using a DES (data encryption standard) symmetric encryption algorithm, and obtaining an encrypted character string result MB6 by using an MD5 encryption algorithm as an encryption result; if the MB6= MB3 is judged, the cashing is successful; otherwise, the redemption fails.
The enterprise audit comprises the following steps:
e1: the enterprise inputs the public key character string M6, searches the corresponding private key character string M2 through logging in the account user ID and signing electronic coding data,
e2: carrying out binarization on the M6, using a private key M2 as a secret key, encrypting the binarized sequence by using a DES (data encryption standard) symmetric encryption algorithm, and obtaining an encryption character string result MB7 by using an MD5 encryption algorithm as an encryption result; if the MB7= MB2 is judged, the audit is successful; otherwise, the audit fails.
Further, M3 is generated by using the public key M1 in step A2 by breaking M1 into 8 independent characters, S1, S2, S3, S4, S5, S6, S7, S8, and rearranging to form a new key M3= S6+ S4+ S5+ S2+ S1+ S7+ S8+ S3.
Further, M6 is generated by using the public key M4 in step P2 by splitting M4 into 8 independent characters, R1, R2, R3, R4, R5, R6, R7, R8, and rearranging to form a new key M6= R6+ R4+ R5+ R2+ R1+ R7+ R8+ R3.
The present invention obtains the following advantageous effects.
The electronic code is encrypted, and the electronic code cannot be copied and embezzled, so that the electronic code can be used for signing only by inputting a correct key and using the correct account for logging in the signing process of an enterprise. The electronic code signing and secondary encryption are carried out on the signing mechanism, in order to ensure that the signed electronic code cannot be redeemed by others at will and enhance the security of redemption, the mechanism needs to log in a correct account and input a correct key to perform redemption application, and the mechanism is ensured not to make mistakes. The double confirmation cashing mode not only ensures the safety and the accuracy of electronic code cashing, but also ensures that an organization can not be cashed without authorization under the condition of in-place service, and after the organization applies for cashing, an enterprise needs to log in a normal account and input a correct key to confirm cashing. The encryption of the electronic code, the verification of the signing and cashing processes are all used for ensuring that the electronic code enables enterprises to obtain due services under the conditions of safety and reliability, and the institutions obtain due rewards.
Drawings
FIG. 1 is a flowchart of the steps of an enterprise claiming electronic code in the present invention;
FIG. 2 is a flowchart of the steps of the present invention for signing an electronic code for an enterprise;
FIG. 3 is a flow chart of steps in the mechanism claimed electronic code of the present invention;
FIG. 4 is a flowchart of the steps of the present invention for an institution redeeming an electronic code;
FIG. 5 is a flowchart of the steps of the present invention for an enterprise to review electronic codes.
Detailed Description
The present invention will be further explained below with reference to the drawings and examples.
As shown in fig. 1 to 5, a method for generating and authenticating an electronic code, which is a quota valuable electronic code for a specific scientific and technical service, circulated between an enterprise and a service organization, and managed uniformly by an electronic code management system; the generation and authentication of the electronic code comprise five processes of enterprise claiming, enterprise signing, mechanism claiming, mechanism cashing and enterprise auditing;
the enterprise claiming process comprises the following steps:
a1: applying electronic codes by enterprises, wherein an electronic code management system generates a random number M1 as a public key and a random character string M2 as a private key; the random number M1 is an 8-bit random number; the public key M1 is sent to the enterprise through a short message;
a2: the electronic code management system rearranges the 8-bit number of M1 to form a new key M3;
a3: the electronic coding management system converts the secret key M3 into a binary digit B1, uses a private key M2 as the secret key, and encrypts the B1 by using a DES symmetric encryption algorithm to obtain an encrypted character string MB1;
a4: the electronic coding management system uses an MD5 encryption algorithm to encrypt MB1 to obtain a final encrypted character string result MB2, and the final encrypted character string result MB2 is stored in the electronic coding data information, wherein the electronic coding data information corresponds to the enterprise ID;
the enterprise signing process comprises the following steps:
q1: an enterprise inputs a public key character string M3 in an electronic coding management system, and searches a corresponding private key character string M2 through enterprise ID and signed electronic coding data;
q2: carrying out binarization on the M3, using a private key M2 as a secret key, encrypting the binarized sequence by using a DES symmetric encryption algorithm, and obtaining an encrypted character string result MB3 by using an MD5 encryption algorithm as an encryption result; judging whether MB3= MB2, if yes, the subscription is successful; otherwise, the subscription fails.
The mechanism claim comprises the following steps:
p1: the electronic coding management system generates a random number M4 as a public key and a random character string M5 as a private key; the random number M4 is an 8-bit random number; the public key M4 is sent to the organization through a short message;
p2: the electronic code management system rearranges the 8-bit number of M4 to form a new key M6;
p3: the electronic coding management system converts the secret key M6 into a binary digit B2, uses a private key M5 as the secret key, and encrypts the B2 by using a DES symmetric encryption algorithm to obtain an encrypted character string MB4;
p4: the electronic coding management system uses an MD5 encryption algorithm to encrypt MB4 to obtain a final encrypted character string result MB5, and the final encrypted character string result MB5 is stored in the electronic coding data information which corresponds to the organization ID;
the mechanism cashing comprises the following steps:
n1: the mechanism inputs a public key character string M6 in the electronic coding management system, and searches a corresponding private key character string M5 through the mechanism ID and the signed electronic coding data;
n2: carrying out binarization on the M6, using a private key M5 as a secret key, encrypting the binarized sequence by using a DES symmetric encryption algorithm, and obtaining an encrypted character string result MB6 by using an MD5 encryption algorithm as an encryption result; if the MB6= MB3 is judged, the cashing is successful; otherwise, the redemption fails.
The enterprise audit comprises the following steps:
e1: the enterprise inputs the public key character string M6, searches the corresponding private key character string M2 through logging in the account user ID and signing electronic coding data,
e2: carrying out binarization on the M6, using a private key M2 as a secret key, encrypting the binarized sequence by using a DES (data encryption standard) symmetric encryption algorithm, and obtaining an encryption character string result MB7 by using an MD5 encryption algorithm as an encryption result; if the MB7= MB2 is judged, the audit is successful; otherwise, the auditing is failed.
The method of generating M3 using the public key M1 in step A2 is to split M1 into 8 independent characters, S1, S2, S3, S4, S5, S6, S7, S8, and rearrange them to form a new key M3= S6+ S4+ S5+ S2+ S1+ S7+ S8+ S3.
The method for generating M6 using the public key M4 in step P2 is to split M4 into 8 independent characters, R1, R2, R3, R4, R5, R6, R7, R8, and rearrange them to form a new key M6= R6+ R4+ R5+ R2+ R1+ R7+ R8+ R3.
Claims (3)
1. A generation and authentication method of electronic code, the said electronic code is a quota valuable electronic code to the particular science and technology service, circulate between enterprise and service organization, manage through the electronic code management system unitedly; the method is characterized in that the generation and the authentication of the electronic code comprise five processes of enterprise application, enterprise signing, organization application, organization cashing and enterprise audit;
the enterprise claiming process comprises the following steps:
a1: applying electronic codes by enterprises, wherein an electronic code management system generates a random number M1 as a public key and a random character string M2 as a private key; the random number M1 is an 8-bit random number; the public key M1 is sent to the enterprise through a short message;
a2: the electronic code management system rearranges the 8-bit number of M1 to form a new key M3;
a3: the electronic coding management system converts the secret key M3 into a binary digit B1, encrypts the B1 by using a DES symmetric encryption algorithm by taking a private key M2 as the secret key, and obtains an encrypted character string MB1;
a4: the electronic coding management system uses an MD5 encryption algorithm to encrypt MB1 to obtain a final encrypted character string result MB2, and the final encrypted character string result MB2 is stored in the electronic coding data information, wherein the electronic coding data information corresponds to the enterprise ID;
the enterprise signing process comprises the following steps:
q1: an enterprise inputs a public key character string M3 in an electronic coding management system, and searches a corresponding private key character string M2 through enterprise ID and signed electronic coding data;
q2: carrying out binarization on the M3, using a private key M2 as a secret key, encrypting the binarized sequence by using a DES symmetric encryption algorithm, and obtaining an encrypted character string result MB3 by using an MD5 encryption algorithm as an encryption result; judging whether MB3= MB2, if yes, the subscription is successful; otherwise, the subscription fails;
the mechanism claim comprises the following steps:
p1: the electronic coding management system generates a random number M4 as a public key and a random character string M5 as a private key; the random number M4 is an 8-bit random number; the public key M4 is sent to the organization through a short message;
p2: the electronic code management system rearranges the 8-bit number of M4 to form a new key M6;
p3: the electronic coding management system converts the secret key M6 into a binary digit B2, uses a private key M5 as the secret key, and encrypts the B2 by using a DES symmetric encryption algorithm to obtain an encrypted character string MB4;
p4: the electronic coding management system uses an MD5 encryption algorithm to encrypt MB4 to obtain a final encrypted character string result MB5, and the final encrypted character string result MB5 is stored in the electronic coding data information which corresponds to the organization ID;
the mechanism cashing comprises the following steps:
n1: the mechanism inputs a public key character string M6 in the electronic coding management system, and searches a corresponding private key character string M5 through the mechanism ID and the signed electronic coded data;
n2: carrying out binarization on the M6, using a private key M5 as a secret key, encrypting the binarized sequence by using a DES symmetric encryption algorithm, and obtaining an encrypted character string result MB6 by using an MD5 encryption algorithm as an encryption result; if the MB6= MB3, the cashing is successful; otherwise, the cashing fails;
the enterprise audit comprises the following steps:
e1: the enterprise inputs the public key character string M6, searches the corresponding private key character string M2 through logging in the account user ID and signing electronic coding data,
e2: carrying out binarization on the M6, using a private key M2 as a secret key, encrypting the binarized sequence by using a DES symmetric encryption algorithm, and obtaining an encrypted character string result MB7 by using an MD5 encryption algorithm as an encryption result; if the MB7= MB2 is judged, the audit is successful; otherwise, the auditing is failed.
2. A method of generating and authenticating an electronic code according to claim 1, wherein the public key M1 is used to generate M3 in step A2 by splitting M1 into 8 individual characters, S1, S2, S3, S4, S5, S6, S7, S8, and rearranging to form a new key M3= S6+ S4+ S5+ S2+ S1+ S7+ S8+ S3.
3. A method of generating and authenticating an electronic code according to claim 1, wherein the method of generating M6 using the public key M4 in step P2 is to split M4 into 8 independent characters, R1, R2, R3, R4, R5, R6, R7, R8, and rearrange them to form a new key M6= R6+ R4+ R5+ R2+ R1+ R7+ R8+ R3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711467400.3A CN108183789B (en) | 2017-12-28 | 2017-12-28 | Electronic code generation and authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711467400.3A CN108183789B (en) | 2017-12-28 | 2017-12-28 | Electronic code generation and authentication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108183789A CN108183789A (en) | 2018-06-19 |
CN108183789B true CN108183789B (en) | 2023-03-28 |
Family
ID=62548631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711467400.3A Active CN108183789B (en) | 2017-12-28 | 2017-12-28 | Electronic code generation and authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108183789B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1852093A (en) * | 2006-06-06 | 2006-10-25 | 北京易恒信认证科技有限公司 | Electronic-seal safety authentication system and method based on CPK |
WO2007091002A1 (en) * | 2006-02-07 | 2007-08-16 | Nextenders (India) Private Limited | Document security management system |
CN105635049A (en) * | 2014-10-29 | 2016-06-01 | 航天信息股份有限公司 | Anti-counterfeit tax control method and device based on client identifier password |
CN106779645A (en) * | 2017-02-08 | 2017-05-31 | 政和科技股份有限公司 | Information ciphering method and device |
-
2017
- 2017-12-28 CN CN201711467400.3A patent/CN108183789B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007091002A1 (en) * | 2006-02-07 | 2007-08-16 | Nextenders (India) Private Limited | Document security management system |
CN1852093A (en) * | 2006-06-06 | 2006-10-25 | 北京易恒信认证科技有限公司 | Electronic-seal safety authentication system and method based on CPK |
CN105635049A (en) * | 2014-10-29 | 2016-06-01 | 航天信息股份有限公司 | Anti-counterfeit tax control method and device based on client identifier password |
CN106779645A (en) * | 2017-02-08 | 2017-05-31 | 政和科技股份有限公司 | Information ciphering method and device |
Non-Patent Citations (1)
Title |
---|
天津首推"创通票"激发双创活力.《领导决策信息》.2016,(第34期),第12-13页. * |
Also Published As
Publication number | Publication date |
---|---|
CN108183789A (en) | 2018-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10419416B2 (en) | Encryption and decryption techniques using shuffle function | |
US10986073B2 (en) | Vaultless tokenization engine | |
CN106534092B (en) | The privacy data encryption method of key is depended on based on message | |
US7475250B2 (en) | Assignment of user certificates/private keys in token enabled public key infrastructure system | |
CN1985466B (en) | Method of delivering direct proof private keys in signed groups to devices using a distribution CD | |
JP2004534333A (en) | Integrated protection method and system for distributed data processing in computer networks | |
CN106027228B (en) | Encryption and decryption method and encryption and decryption system for webpage identifier | |
CN114982194A (en) | Block chain implemented data hiding scheme for improved data secure communication, storage and transmission | |
CN113348455A (en) | Apparatus and method for providing authentication, non-repudiation, managed access, and twin discrimination of data using data control signatures | |
WO2015144672A1 (en) | Method and system for encrypted data synchronization for secure data management | |
CN108777673B (en) | Bidirectional identity authentication method in block chain | |
CN109872154A (en) | A kind of identity real name Verification System based on block chain transaction data | |
CN102135944A (en) | Method for safe data storage in mobile communication equipment | |
CN110365468B (en) | Anonymization processing method, device, equipment and storage medium | |
CN113761578A (en) | Document true checking method based on block chain | |
CN111711521B (en) | Block chain account private key resetting method and system | |
CN107332663A (en) | Archive management method based on encryption technology | |
CN108183789B (en) | Electronic code generation and authentication method | |
CN113342802A (en) | Method and device for storing block chain data | |
CN105827411A (en) | Information processing method and apparatus | |
CN113726515B (en) | UKEY-based key processing method, storage medium and electronic device | |
CN112581285B (en) | Block chain-based account generation method, system and medium in stock right transaction system | |
CN109088734B (en) | Coding method and system | |
CN112291189B (en) | Method, device, equipment and storage medium for sending and checking ciphertext | |
KR101501508B1 (en) | Method and system for authentication by data encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 300384 Room 204, floor 2, Haitai building, No. 6, Meiyuan Road, Huayuan Industrial Zone, Binhai New Area, Tianjin Applicant after: CHUANGTONGPIAO TECHNOLOGY CO.,LTD. Address before: 300384 Room 204, 2 tower, Hai Tai Building, 6 Mei Yuan Road, Huayuan Industrial Area, Nankai District, Tianjin. Applicant before: CHUANGTONGPIAO TECHNOLOGY CO.,LTD. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |