CN109977688A - A kind of top secret data encryption system and method based on block chain - Google Patents

A kind of top secret data encryption system and method based on block chain Download PDF

Info

Publication number
CN109977688A
CN109977688A CN201910270105.1A CN201910270105A CN109977688A CN 109977688 A CN109977688 A CN 109977688A CN 201910270105 A CN201910270105 A CN 201910270105A CN 109977688 A CN109977688 A CN 109977688A
Authority
CN
China
Prior art keywords
module
output end
input terminal
input
connect
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910270105.1A
Other languages
Chinese (zh)
Inventor
李恒
陆宁
高一丹
包明月
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gome Dollar Control Investment Co Ltd
Original Assignee
Gome Dollar Control Investment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gome Dollar Control Investment Co Ltd filed Critical Gome Dollar Control Investment Co Ltd
Priority to CN201910270105.1A priority Critical patent/CN109977688A/en
Publication of CN109977688A publication Critical patent/CN109977688A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention discloses a kind of top secret data encryption systems and method based on block chain, including block catenary system, Information System, diagnostic system and encryption system, the block catenary system is in be bi-directionally connected with Information System, the diagnostic system is in be bi-directionally connected with antivirus system, and the output end for system of killing virus and the input terminal of Information System connect, the Information System includes database, input module one, output module and verifying system, the output end of the database is connect with the input terminal of input module one, the database is in be bi-directionally connected with input module one and verifying system.It is related to block chain correlative technology field.The top secret data encryption system and method based on block chain; has the function of stronger encipherment protection; the case where avoiding data leakage; and during data is enrolled and is acquired; it can kill virus to data; the intrusion of virus is avoided, caused consequence improves the integrality and functionality of block catenary system to a certain degree.

Description

A kind of top secret data encryption system and method based on block chain
Technical field
The present invention relates to block chain correlative technology field, specially a kind of top secret data encryption system based on block chain and Method.
Background technique
Block chain is the novel of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm Application model.Block chain is a key concept of bit coin, it is substantially the database of a disintermediation, while conduct The Floor layer Technology of bit coin is a string of data blocks using the associated generation of cryptography method, contains in each data block The information of bit coin network trading, for verifying the validity (anti-fake) of its information and generating next block.Narrow sense is come It says, block chain is a kind of a kind of chained record knot for being sequentially in time combined into data block in such a way that sequence is connected Structure, and the distributed account book that can not be distorted He can not forge guaranteed in a manner of cryptography.Broadly, block chain technology is benefit Verified with block linked data structure with storing data, using distributed node know together algorithm come generate and more new data, utilize The mode of cryptography is guaranteed the safety of data transmission and access, is programmed using the intelligent contract being made of automatized script code Completely new distributed basis framework and calculation with one kind of operation data.It is, in general, that block catenary system is by data Layer, net Network layers, common recognition layer, excitation layer, contract layer and application layer composition.
In actual life, there are some disadvantages, such as the relevant system of existing block chain for the relevant system of block chain System when being acquired and store to data, cannot data be acquired and be stored well, especially when do not have well Encryption function, so that exactly losing the protection to top secret data file, and provide again in the case where top secret data file During material acquisition admission, do not have corresponding antivirus function, so that certain data carry some viruses, without place Reason, will cause serious damage, or even be easy to cause paralysis to system.
Summary of the invention
(1) the technical issues of solving
In view of the deficiencies of the prior art, the present invention provides a kind of based on the top secret data encryption system of block chain and side Method solves without good encryption function, does not have corresponding antivirus function and the serious function of identity, is easy to system Cause badly damaged problem.
(2) technical solution
In order to achieve the above object, the present invention is achieved by the following technical programs: a kind of top-secret money based on block chain Expect encryption system, including block catenary system, Information System, diagnostic system and encryption system, the block catenary system and data system System is in being bi-directionally connected, and the diagnostic system and antivirus system are in be bi-directionally connected, and the output end and Information System for system of killing virus Input terminal connection, the Information System include database, input module one, output module and verifying system, the database Output end connect with the input terminal of input module one, the database with input module one and verifying system be in two-way company It connects, the verifying system includes identity information acquisition module, data transmission module, identity information matching module, background monitoring end End, card reader of ID card and finger-print recognising instrument, the output end and data transmission module input terminal of the identity information acquisition module Connection, the output end of the data transmission module are connect with identity information matching module input terminal, and the identity information matches mould The output end of block is connect with background monitoring terminal input terminal, and the input terminal of the identity information acquisition module is read with identity card respectively Card device is connected with the output end of finger-print recognising instrument, and the diagnostic system includes input module two, memory module one, central processing unit It is connect with the output end of display module one, the input module two with the input terminal of memory module one, the memory module one The connection of the input terminal of output end and central processing unit, the output end of the central processing unit are connect with one input terminal of display module, The encryption system includes input module three, encrypting module, memory module two and display module two, the input module three it is defeated The connection of the input terminal of outlet and encrypting module.
Further, the output end of the encrypting module is connect with the input terminal of memory module two, the memory module two Output end connect with the output end of display module two.
Further, the output end of the database is connect with the input terminal of display module two, the central processing unit Output end is connect with the input terminal of memory module two.
Further, the output end of the output module is connect with the input terminal of input module two.
Further, the display module one is bi-directionally connected with the presentation of antivirus system, the output end of the central processing unit It is connect with the input terminal of encrypting module.
Further, the background monitoring terminal and database be in being bi-directionally connected, and the output end of central processing unit with The input terminal of database connects.
Further, the output end of the antivirus system is connect with the input terminal of input module one.
A method of the top secret data encryption system based on block chain includes the following steps:
S1, block catenary system is written into topsecret papers, the inside of Information System is transferred to by block catenary system;
S2, antivirus processing at this moment carried out by topsecret papers of the antivirus system to transmission, the topsecret papers after antivirus passes again It is defeated to arrive output module, it is transferred to inside diagnostic system in input module two by output module, input module two is transferred to storage It inside module one, is transferred in central processing unit, is transferred to topsecret papers by central processing unit aobvious by memory module one Show the interior of module one and encryption system;
S3, topsecret papers is encrypted by encrypting module, and topsecret papers storage is carried out by memory module two;
S4, when staff needs to extract top secret data, only corresponding identity card need to be placed on identity card card reading On device, information is read out by card reader of ID card, then information collection is carried out by identity information acquisition module, or by hand Portion's fingerprint press on finger-print recognising instrument, by finger-print recognising instrument carry out fingerprint recognition, and by identity information acquisition module into Row information acquisition, then by data transmission module progress information transmission, followed by identity information matching module to data into Row judgement when successful match, then by being monitored by background monitoring terminal, finally can carry out information to topsecret papers It extracts.
(3) beneficial effect
The invention has the following advantages:
(1), it is somebody's turn to do top secret data encryption system and method based on block chain, by the way that block linkwork is written in topsecret papers System, the inside of Information System is transferred to by block catenary system, is at this moment killed by topsecret papers of the antivirus system to transmission Poison processing, the topsecret papers after antivirus are transferred to output module again, are transferred to inside diagnostic system by output module and input mould In block two, input module two is transferred to inside memory module one, is transferred in central processing unit by memory module one, in Topsecret papers is transferred in display module one and encryption system by central processor, is added by encrypting module to topsecret papers It is close, and topsecret papers storage is carried out by memory module two, it can be very good to store topsecret papers and acquired, and The case where having the function of stronger encipherment protection, avoiding data leakage well, and during data is enrolled and acquired, It can kill virus to data, avoid the intrusion of virus well, caused consequence improves block catenary system to a certain degree Integrality and functionality.
(2), it is somebody's turn to do top secret data encryption system and method based on block chain, by the way that corresponding identity card is placed on body In part card card reader, information is read out by card reader of ID card, then information collection is carried out by identity information acquisition module, Or press hand fingerprint on finger-print recognising instrument, fingerprint recognition is carried out by finger-print recognising instrument, and adopt by identity information Collect module and carry out information collection, then information transmission is carried out by data transmission module, followed by identity information matching module Data are judged, it, finally can be to topsecret papers when successful match, then by being monitored by background monitoring terminal Carry out information extraction, when carrying out information extraction, need to carry out authentication, and verification method be it is a variety of, there is no individually The information extraction of operator is convenient in verifying measure to a certain extent, and during extraction, have background monitoring terminal into Row control, controls the safety of information extraction well.
Certainly, it implements any of the products of the present invention and does not necessarily require achieving all the advantages described above at the same time
Detailed description of the invention
Fig. 1 is present system schematic illustration;
Fig. 2 is Information System schematic illustration of the present invention;
Fig. 3 is present invention verifying system principle schematic diagram;
Fig. 4 is diagnostic system schematic illustration of the present invention;
Fig. 5 is encryption system schematic illustration of the present invention.
In figure, 1- block catenary system, 2- Information System, 3- diagnostic system, 4- encryption system, 5- antivirus system, 6- data Library, 7- input module one, 8- output module, 9- verify system, 10- identity information acquisition module, 11- data transmission module, 12- Identity information matching module, 13- background monitoring terminal, 14- card reader of ID card, 15- finger-print recognising instrument, 16- input module two, 17- memory module one, 18- central processing unit, 19- display module one, 20- input module three, 21- encrypting module, 22- store mould Block two, 23- display module two.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that, term " aperture ", "upper", "lower", " thickness ", "top", " in ", Indicating positions or the positional relationship such as " length ", "inner", " surrounding ", are merely for convenience of description of the present invention and simplification of the description, without It is that the component of indication or suggestion meaning or element must have a particular orientation, is constructed and operated in a specific orientation, therefore not It can be interpreted as limitation of the present invention.
Fig. 1-5 is please referred to, the embodiment of the present invention provides a kind of technical solution: a kind of top secret data encryption based on block chain System includes block catenary system 1, Information System 2, diagnostic system 3 and encryption system 4, and the electronic contract release unit reception is prolonged It protects electronic contract and accesses block chain support platform, the block chain that electronic contract relevant information is written in block catenary system is supported On platform, for block catenary system with Information System 2 in being bi-directionally connected, diagnostic system 3 is in be bi-directionally connected, and kill with antivirus system 5 The output end of malicious system 5 is connect with the input terminal of Information System 2, and Information System 2 includes database 6, input module 1, output Module 8 and verifying system 9, the output end of database 6 connect with the input terminal of input module 1, and database 6 is and input module 1 and verifying system 9 in being bi-directionally connected, verifying system 9 includes identity information acquisition module 10, data transmission module 11, identity Information matches module 12, background monitoring terminal 13, card reader of ID card 14 and finger-print recognising instrument 15, identity information acquisition module 10 Output end connect with 11 input terminal of data transmission module, the output end of data transmission module 11 and identity information matching module 12 Input terminal connection, the output end of identity information matching module 12 are connect with 13 input terminal of background monitoring terminal, identity information acquisition The input terminal of module 10 is connect with the output end of card reader of ID card 14 and finger-print recognising instrument 15 respectively, card reader of ID card 14, The certification of identity card is mainly used, and passes through the setting of finger-print recognising instrument 15, a fingerprint recognition work can be provided for system Make, purpose is exactly to be authenticated in the case where writing certificate troactively, and diagnostic system 3 includes input module 2 16, memory module One 17, central processing unit 18 and display module 1, the output end of input module 2 16 and the input terminal of memory module 1 connect It connects, the output end of memory module 1 is connect with the input terminal of central processing unit 18, the output end of central processing unit 18 and display The connection of one 19 input terminal of module, encryption system 4 include input module 3 20, encrypting module 21, memory module 2 22 and display mould The output end of block 2 23, input module 3 20 is connect with the input terminal of encrypting module 21, the output end of encrypting module 21 and storage The input terminal of module 2 22 connects, and the asymmetric encryption and authoring system are used for block catenary system, so that being stored in block The file information on chain is disclosed, but the file information is that height encrypts, only in the case where data owner authorizes It can just be accessed, the output end of memory module 2 22 is connect with the output end of display module 2 23, the output end of database 6 and aobvious Show the input terminal connection of module 2 23, the output end of central processing unit 18 is connect with the input terminal of memory module 2 22, exports mould The output end of block 8 is connect with the input terminal of input module 2 16, and display module 1 is bi-directionally connected with the presentation of antivirus system 5, in The output end of central processor 18 is connect with the input terminal of encrypting module 21, and background monitoring terminal 13 is in be bi-directionally connected with database 6, And the output end of central processing unit 18 is connect with the input terminal of database 6, the output end and input module 1 of system 5 of killing virus Input terminal connection.
A method of the top secret data encryption system based on block chain includes the following steps:
S1, block catenary system 1 is written into topsecret papers, the inside of Information System 2, institute is transferred to by block catenary system 1 The content person of being managed for stating topsecret papers is written in the block chain support platform in block catenary system;
S2, the topsecret papers at this moment transmitted by 5 Duis of antivirus system carry out antivirus processing, and the topsecret papers after antivirus passes again It is defeated to arrive output module 8, it is transferred in 3 inside input module 2 16 of diagnostic system by output module 8, input module 2 16 transmits To inside memory module 1, it is transferred in central processing unit 18 by memory module 1, it will be exhausted by central processing unit 18 Ciphertext part is transferred to the interior of display module 1 and encryption system 4;
S3, topsecret papers is encrypted by encrypting module 21, and topsecret papers is carried out by memory module 2 22 Storage;
S4, when staff needs to extract top secret data, only corresponding identity card need to be placed on identity card card reading On device 14, information is read out by card reader of ID card 14, then information collection is carried out by identity information acquisition module 10, or Person presses hand fingerprint on finger-print recognising instrument 15, carries out fingerprint recognition by finger-print recognising instrument 15, and pass through identity information Acquisition module 10 carries out information collection, then carries out information transmission by data transmission module 11, followed by identity information Data are judged with module 12, when successful match, then by being monitored by background monitoring terminal 13, finally Information extraction is carried out to topsecret papers.
In use, S1, by topsecret papers be written block catenary system 1, Information System 2 is transferred to by block catenary system 1 It is internal;At this moment the topsecret papers transmitted by 5 Duis of antivirus system carries out antivirus processing, and the topsecret papers after antivirus is transferred to defeated again Module 8 out are transferred in 3 inside input module 2 16 of diagnostic system by output module 8, and input module 2 16 is transferred to storage It inside module 1, is transferred in central processing unit 18 by memory module 1, by central processing unit 18 by topsecret papers It is transferred to the interior of display module 1 and encryption system 4;Topsecret papers is encrypted by encrypting module 21, and by depositing It stores up module 2 22 and carries out topsecret papers storage;It, only need to be by corresponding identity card when staff needs to extract top secret data It is placed on card reader of ID card 14, information is read out by card reader of ID card 14, then pass through identity information acquisition module 10 carry out information collection, or hand fingerprint is pressed on finger-print recognising instrument 15, carry out fingerprint recognition by finger-print recognising instrument 15, And information collection is carried out by identity information acquisition module 10, then information transmission is carried out by data transmission module 11, immediately Data are judged by identity information matching module 12, when successful match, then by by background monitoring terminal 13 into Row monitoring finally can carry out information extraction to topsecret papers.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodiment All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification, It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to better explain the present invention Principle and practical application, so that skilled artisan be enable to better understand and utilize the present invention.The present invention is only It is limited by claims and its full scope and equivalent.

Claims (8)

1. a kind of top secret data encryption system based on block chain, including block catenary system (1), Information System (2), diagnostic system (3) and encryption system (4), it is characterised in that: the block catenary system () and Information System (2) are in being bi-directionally connected, the diagnosis System (3) is in be bi-directionally connected, and the output end of system of killing virus (5) and the input terminal of Information System (2) connect with antivirus system (5) It connects, the Information System (2) includes database (6), input module one (7), output module (8) and verifying system (9), the number Connect according to the output end of library (6) with the input terminal of input module one (7), the database (6) with input module one (7) and test Card system (9) in being bi-directionally connected, the verifying system (9) include identity information acquisition module (10), data transmission module (11), Identity information matching module (12), background monitoring terminal (13), card reader of ID card (14) and finger-print recognising instrument (15), the body The output end of part information acquisition module (10) is connect with data transmission module (11) input terminal, the data transmission module (11) Output end is connect with identity information matching module (12) input terminal, the output end of the identity information matching module (12) and backstage Monitor terminal (13) input terminal connection, the input terminal of the identity information acquisition module (10) respectively with card reader of ID card (14) It is connected with the output end of finger-print recognising instrument (15), the diagnostic system (3) includes input module two (16), memory module one (17), central processing unit (18) and display module one (19), the output end and memory module one of the input module two (16) (17) input terminal connection, the output end of the memory module one (17) is connect with the input terminal of central processing unit (18), described The output end of central processing unit (18) is connect with display module one (19) input terminal, and the encryption system (4) includes input module Three (20), encrypting module (21), memory module two (22) and display module two (23), the output end of the input module three (20) It is connect with the input terminal of encrypting module (21).
2. a kind of top secret data encryption system based on block chain according to claim 1, it is characterised in that: the encryption The output end of module (21) is connect with the input terminal of memory module two (22), the output end of the memory module two (22) and display The output end of module two (23) connects.
3. a kind of top secret data encryption system based on block chain according to claim 1, it is characterised in that: the data The output end in library (6) is connect with the input terminal of display module two (23), the output end and storage mould of the central processing unit (18) The input terminal of block two (22) connects.
4. a kind of top secret data encryption system based on block chain according to claim 1, it is characterised in that: the output The output end of module (8) is connect with the input terminal of input module two (16).
5. a kind of top secret data encryption system based on block chain according to claim 1, it is characterised in that: the display Module one (19) is presented with antivirus system (5) and is bi-directionally connected, the output end of the central processing unit (18) and encrypting module (21) Input terminal connection.
6. a kind of top secret data encryption system based on block chain according to claim 1, it is characterised in that: the backstage Monitor terminal (13) and database (6) are in being bi-directionally connected, and the input of the output end of central processing unit (18) and database (6) End connection.
7. a kind of top secret data encryption system based on block chain according to claim 1, it is characterised in that: the antivirus The output end of system (5) is connect with the input terminal of input module one (7).
8. a kind of method of the top secret data encryption system based on block chain, which comprises the steps of:
S1, block catenary system (1) is written into topsecret papers, the inside of Information System (2) is transferred to by block catenary system (1);
S2, antivirus processing at this moment carried out by topsecret papers of the antivirus system (5) to transmission, the topsecret papers after antivirus transmits again To output module (8), it is transferred in the internal input module two (16) of diagnostic system (3) by output module (8), input module two (16) it is internal to be transferred to memory module one (17), is transferred in central processing unit (18) by memory module one (17), in Topsecret papers is transferred to the interior of display module one (19) and encryption system (4) by central processor (18);
S3, topsecret papers is encrypted by encrypting module (21), and topsecret papers is carried out by memory module two (22) Storage;
S4, when staff needs to extract top secret data, only corresponding identity card need to be placed on card reader of ID card (14) on, information is read out by card reader of ID card (14), then carry out information by identity information acquisition module (10) and adopt Collection, or hand fingerprint is pressed on finger-print recognising instrument (15), fingerprint recognition is carried out by finger-print recognising instrument (15), and pass through Identity information acquisition module (10) carries out information collection, then carries out information transmission by data transmission module (11), and then leads to Identity information matching module (12) is crossed to judge data, when successful match, then by by background monitoring terminal (13) into Row monitoring finally can carry out information extraction to topsecret papers.
CN201910270105.1A 2019-04-04 2019-04-04 A kind of top secret data encryption system and method based on block chain Pending CN109977688A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910270105.1A CN109977688A (en) 2019-04-04 2019-04-04 A kind of top secret data encryption system and method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910270105.1A CN109977688A (en) 2019-04-04 2019-04-04 A kind of top secret data encryption system and method based on block chain

Publications (1)

Publication Number Publication Date
CN109977688A true CN109977688A (en) 2019-07-05

Family

ID=67083002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910270105.1A Pending CN109977688A (en) 2019-04-04 2019-04-04 A kind of top secret data encryption system and method based on block chain

Country Status (1)

Country Link
CN (1) CN109977688A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535832A (en) * 2019-08-05 2019-12-03 慧镕电子系统工程股份有限公司 A kind of domestic server platform framework for data encryption
CN111159674A (en) * 2020-01-02 2020-05-15 惠州学院 Novel safe and confidential intelligent information acquisition device and method
CN112181976A (en) * 2019-08-08 2021-01-05 北京天德博源科技有限公司 Small loan deposit certificate based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN206021271U (en) * 2016-08-05 2017-03-15 成都因纳伟盛科技股份有限公司 A kind of identity card and finger print information checking system
CN106815526A (en) * 2016-12-27 2017-06-09 苏州春禄电子科技有限公司 A kind of safety-type database storage system based on block chain technology
CN108099846A (en) * 2017-12-21 2018-06-01 北京智帮帮科技有限公司 A kind of accidental enciphering physical message block chain anti-counterfeiting system
CN109376534A (en) * 2018-09-26 2019-02-22 百度在线网络技术(北京)有限公司 Method and apparatus for detecting application

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN206021271U (en) * 2016-08-05 2017-03-15 成都因纳伟盛科技股份有限公司 A kind of identity card and finger print information checking system
CN106815526A (en) * 2016-12-27 2017-06-09 苏州春禄电子科技有限公司 A kind of safety-type database storage system based on block chain technology
CN108099846A (en) * 2017-12-21 2018-06-01 北京智帮帮科技有限公司 A kind of accidental enciphering physical message block chain anti-counterfeiting system
CN109376534A (en) * 2018-09-26 2019-02-22 百度在线网络技术(北京)有限公司 Method and apparatus for detecting application

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535832A (en) * 2019-08-05 2019-12-03 慧镕电子系统工程股份有限公司 A kind of domestic server platform framework for data encryption
CN112181976A (en) * 2019-08-08 2021-01-05 北京天德博源科技有限公司 Small loan deposit certificate based on block chain
CN111159674A (en) * 2020-01-02 2020-05-15 惠州学院 Novel safe and confidential intelligent information acquisition device and method

Similar Documents

Publication Publication Date Title
US8447991B2 (en) Card authentication system
US8799670B2 (en) Biometric authentication method, computer program, authentication server, corresponding terminal and portable object
CN109977688A (en) A kind of top secret data encryption system and method based on block chain
TW201528027A (en) Data encryption and smartcard storing encrypted data
WO2009152677A1 (en) Payment system and payment method thereof
CN105550928A (en) System and method of network remote account opening for commercial bank
CN107393220A (en) Bank self-help cash terminals and withdrawal method based on recognition of face
CN107169726A (en) The method and apparatus that a kind of Quick Response Code work attendance is checked card
WO2002078248A1 (en) Portable information storage medium and its authentification method
CN107453873A (en) A kind of intellective IC card data verification method and system
CN107122977A (en) A kind of payment system based on bio-identification
CN109067544A (en) A kind of private key verification method, the apparatus and system of soft or hard combination
CN107506998A (en) Fingerprint password payment method, device and system based on NFC verification
CN107995227A (en) The authentication method and device of movable storage device
CN107077679A (en) Method of calibration, device and transaction system based on fingerprint recognition
DE102015225275A1 (en) ID token with protected microcontroller
CN106709534A (en) Anti-counterfeit verification system of electronic certificate
CN107229958A (en) A kind of intellective IC card data detection method and device
WO2016206637A1 (en) System and method for generating medical information identification card of implantable medical instrument
CN108229202A (en) A kind of automatic full inspection method and device of smart card, computer installation, storage medium
CN108122108A (en) Mobile device authentication system and mobile equipment authentication method
CN101303755A (en) Electronic mobile apparatus and electronic transaction method
CN105989481A (en) Data interaction method and system
CN109377350A (en) A kind of support more banks identity authentication method and device
CN111524000B (en) Identity authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190705