CN110648235A - Cross-chain asset transfer method based on trusted computing environment (TEE) - Google Patents

Cross-chain asset transfer method based on trusted computing environment (TEE) Download PDF

Info

Publication number
CN110648235A
CN110648235A CN201910900066.9A CN201910900066A CN110648235A CN 110648235 A CN110648235 A CN 110648235A CN 201910900066 A CN201910900066 A CN 201910900066A CN 110648235 A CN110648235 A CN 110648235A
Authority
CN
China
Prior art keywords
black box
small black
chain
btc
computing environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910900066.9A
Other languages
Chinese (zh)
Inventor
刘佳
凌慧娇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910900066.9A priority Critical patent/CN110648235A/en
Publication of CN110648235A publication Critical patent/CN110648235A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/363Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The invention discloses a chain-crossing asset transfer method based on a trusted computing environment (TEE). firstly, a chain-crossing bridge based on the trusted computing environment (TEE) is established and defined as a small black box which is used as a transaction opponent for virtual asset transfer; establishing a BTC wallet and a NewBTC wallet in the small black box, and randomly generating private keys of the two wallets in the small black box; when a user transfers 1 BTC to a small black box on a BTC main chain, and the small black box receives and confirms for 6 times, automatically creating 1 NewBTC on a new public chain and transferring accounts to the user; when a user transfers 1 NewBTC to the small black box on a new public chain, the small black box destroys the NewBTC after receiving and confirming for 6 times, and transfers 1 BTC to the user. The method improves the convenience and safety of cross-chain asset transfer and has high practical value.

Description

Cross-chain asset transfer method based on trusted computing environment (TEE)
Technical Field
The invention relates to the technical field of virtual assets, in particular to a cross-chain asset transfer method based on a trusted computing environment (TEE).
Background
Today more and more people use digital currency like bitcoin, which is very decentralized (i.e. without manual intervention), but the transactions are slow. The new public chain transaction is fast, but centralized (and can be manually intervened under certain conditions). The chain crossing means that digital currencies such as bitcoin and the like can enter a new public chain to circulate, the transaction speed is greatly improved, and the digital currencies can also circulate back to the bitcoin network from the new public chain to keep decentralization. Public chain and coin's relation, just as the relation than cell-phone and APP, bit coin can only be operated on own public chain, can not directly run on other public chains, just as can not install the apple APP than android mobile phone, but through striding the chain, just as can be more than the red packet of each other of apple and android's little letter, the user can trade the cell-phone that the performance is good like this, comes the faster red packet of robbing, and the user can change the public chain of higher performance in striding the chain, comes faster account transfer bit coin.
The prior art cross-chain transfer generally employs a cold-hot wallet scheme that requires constant transfer of digital assets from a server wallet, called a hot wallet, to another, non-public wallet, called a cold wallet. The hot wallet retains only a small portion of the assets, and if too little, transfers from the cold wallet to the hot wallet are possible. Therefore, even if the wallet is stolen, the wallet only needs a small amount of assets in the hot wallet, and the cold wallet is not disclosed, so that the security is extremely high, and the wallet is not easy to steal. However, the scheme still has the possibility of coin theft, manual operation is needed, if the operator rolls money and runs, all digital assets can be rolled away, and the safety and the convenience cannot be guaranteed.
Disclosure of Invention
The invention aims to provide a chain-crossing asset transfer method based on a trusted computing environment (TEE), which improves the convenience and safety of chain-crossing asset transfer and has high practical value.
The purpose of the invention is realized by the following technical scheme:
a trusted computing environment, TEE, based cross-chain asset transfer method, the method comprising:
step 1, establishing a chain-crossing bridge based on a trusted computing environment TEE, and defining the chain-crossing bridge as a small black box which is used as a transaction opponent for virtual asset transfer;
step 2, establishing a BTC wallet and a NewBTC wallet in the small black box, and randomly generating private keys of the two wallets in the small black box; the private key cannot be replaced, deleted or obtained;
step 3, when a user transfers 1 BTC to a small black box on a BTC main chain, and the small black box receives and confirms for 6 times, automatically creating 1 New BTC on a new public chain and transferring accounts to the user;
and 4, when the user transfers 1 NewBTC to the small black box on the new public chain, the small black box destroys the NewBTC after receiving and confirming for 6 times, and transfers 1 BTC to the user.
According to the technical scheme provided by the invention, the method improves the convenience and safety of cross-chain asset transfer and has high practical value.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 is a schematic flowchart of a trusted computing environment TEE-based cross-chain asset transfer method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a small black box operating architecture according to an embodiment of the present invention;
fig. 3 is a schematic processing procedure of the trusted BTC node according to the embodiment of the present invention;
fig. 4 is a schematic processing procedure diagram of the new public link trusted node according to the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The embodiments of the present invention will be described in further detail with reference to the accompanying drawings, and as shown in fig. 1, a schematic flowchart of a trusted computing environment TEE-based cross-chain asset transfer method provided by the embodiments of the present invention is shown, where the method includes:
step 1, establishing a chain-crossing bridge based on a trusted computing environment TEE, and defining the chain-crossing bridge as a small black box which is used as a transaction opponent for virtual asset transfer;
step 2, establishing a bitcoin BTC wallet and a NewBTC wallet in the small black box, and randomly generating private keys of the two wallets in the small black box;
the BTC is an abbreviation of Bitcoin (Bitcoin), and the NewBTC is a new public chain constructed by imitating the BTC;
here, once the small black box is started, due to the adoption of the TEE technology, under the protection of the CPU hardware level, the private key cannot be replaced, deleted, or acquired, even the memory of the small black box cannot be detected, and the program of the small black box cannot be modified, i.e., cannot be manually intervened, as shown in fig. 2, which is a schematic diagram of the operation architecture of the small black box provided by the embodiment of the present invention, the small black box adopts a distributed architecture, so that even if a machine is broken, the operation is not affected, and a certain disaster tolerance exists; the small black box and the external data exchange do not contain sensitive data such as passwords, private keys and the like.
Step 3, when a user transfers 1 BTC to a small black box on a BTC main chain, and the small black box receives and confirms for 6 times, automatically creating 1 New BTC on a new public chain and transferring accounts to the user;
in this step, since the small blackbox only receives block data, including BTC blocks and new public link blocks, the returned data is also only BTC transfer signatures and NewBTC transfer signatures. Sensitive data such as passwords, private keys and the like are not available in data interaction, and cross-chain information is included in block data, so that the small black box can process cross-chain only by analyzing the information, and transfer signatures are generated, so that the block data submitted to the small black box needs to be credible. If the BTC is forked, the small black box receives the error block on the forked chain, the check can be passed, and due to the non-interference, no block can be connected with the error block in the small black box subsequently, so that the small black box is disabled. The solution of this example is as follows:
as shown in fig. 3, which is a schematic processing process diagram of a trusted BTC node according to an embodiment of the present invention, N trusted BTC nodes are specifically configured, each node signs a latest block hash with its own private key and submits the latest block hash to a small black box together, and the small black box collects M of the N nodes until successful reception, where N > = M, so as to implement M of N multiple signatures, for example, N =4 and M =3 may be set, thereby ensuring a certain disaster tolerance, and in case that one trusted node private key is lost, the entire system may still operate;
and storing public keys of N credible BTC nodes in the small black box, using the public keys to check block data submitted by the BTC nodes, putting the block data into a cache of the small black box as a block to be processed when at least M block data are completely consistent and are really signed by the credible BTC nodes, and starting to process the first block data when the cache is full of 6 to realize 6 times of confirmation.
In a specific implementation, each block to be processed, which is put into the small black box cache, must be able to correspond to the previous block; and blocks in the cache can be replaced to account for possible BTC forks, and subsequent corresponding blocks must be discarded once replaced.
In addition, the transfer data transferred to the small black box, i.e., tx, is added with the address of TONEW + NewBTC to the end script, for example:
TONEW0x633bb489d568b2241c6a0dfff6d847696aab642c, where TONEW is a fixed format and 0x633bb489d568b2241c6a0dfff6d847696aab642c is the transferred new public chain wallet address.
The arrangement can ensure that the small black box knows the address to which the created NewBTC is transferred, and if the address format is not the same, the small black box returns the received BTC as much as the number to protect the assets of the user.
In addition, the new public chain needs to prevent the new BTC transfer signature from being repeatedly submitted, in this embodiment, the hash of the transfer data in the BTC block is brought up and submitted to the contract of the new BTC, and if the same hash exists, the contract throws an exception to stop the transaction.
And 4, when the user transfers 1 NewBTC to the small black box on the new public chain, the small black box destroys the NewBTC after receiving and confirming for 6 times, and transfers 1 BTC to the user.
Here, similarly, a new public link node also needs to submit a block to a small black box, as shown in fig. 4, which is a schematic processing procedure of the new public link trusted node according to the embodiment of the present invention, N new public link trusted nodes are also provided, each node signs the latest block hash with its own private key and submits the signed latest block hash to the small black box together, and the small black box collects M of the N nodes until successful reception, where N > = M, so as to implement M of N multiple signatures, for example, N =4 and M =3 may be set;
and storing public keys of N new public chain credible nodes in the small black box, verifying block data submitted by the new public chain nodes by using the public keys, putting the block data into a cache of the small black box as a block to be processed when at least M block data are completely consistent and are really credible new public chain node signatures, and starting to process the first block data when the cache is full of 6 to realize 6 times of confirmation.
In addition, the transfer data transferred out of the small black box is added with the FROMNEW + NewBTC wallet address in the end script, for example:
fromenew 0x633bb489d568b2241c6a0dfff6d847696aab642c, where fromenew is a fixed format and 0x633bb489d568b2241c6a0dfff6d847696aab642c is the NewBTC wallet address.
Thereby achieving data integrity.
In this example, NewBTC is a new public link similar to BTC, and is only used to describe the chain spanning technology of this example, the chain spanning technology is not only the chain spanning between BTC and NewBTC, but also a variety of virtual currencies, through the chain spanning technology, the chain spanning between BTC and ETH, and the chain spanning between ETH and EOS can be used, and the number of validation times can also be different according to the characteristics of the public link itself, for example, BTC needs 6 validation, ETH needs 12 validation, EOS only needs 1 validation, and regardless of which public link, the chain spanning technology can be supported.
It is noted that those skilled in the art will recognize that embodiments of the present invention are not described in detail herein.
In conclusion, the method provided by the embodiment of the invention has great breakthrough in use convenience and safety, is fully automatic, and cannot be manually intervened. The small black box can be used not only in a cross-chain manner, but also in a digital asset exchange, so that the safety and efficiency of recharging and cash withdrawal are improved.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (8)

1. A trusted computing environment (TEE) -based cross-chain asset transfer method, the method comprising:
step 1, establishing a chain-crossing bridge based on a trusted computing environment TEE, and defining the chain-crossing bridge as a small black box which is used as a transaction opponent for virtual asset transfer;
step 2, establishing a bitcoin BTC wallet and a NewBTC wallet in the small black box, and randomly generating private keys of the two wallets in the small black box; the private key cannot be replaced, deleted or obtained;
step 3, when a user transfers 1 BTC to a small black box on a BTC main chain, and the small black box receives and confirms for 6 times, automatically creating 1 New BTC on a new public chain and transferring accounts to the user;
and 4, when the user transfers 1 NewBTC to the small black box on the new public chain, the small black box destroys the NewBTC after receiving and confirming for 6 times, and transfers 1 BTC to the user.
2. The trusted computing environment TEE based cross-chain asset transfer method according to claim 1, wherein in step 3, said method further comprises:
n credible BTC nodes are arranged, each node signs the latest block hash by using a private key of the node and submits the latest block hash to a small black box together, and the small black box collects M of the N nodes until the M nodes are successfully received, wherein N > = M, so that M of N multiple signatures are realized;
and storing public keys of N credible BTC nodes in the small black box, using the public keys to check block data submitted by the BTC nodes, putting the block data into a cache of the small black box as a block to be processed when at least M block data are completely consistent and are really signed by the credible BTC nodes, and starting to process the first block data when the cache is full of 6 to realize 6 times of confirmation.
3. The trusted computing environment TEE based cross-chain asset transfer method according to claim 2, further comprising:
each block to be processed which is put into the small black box cache must be corresponding to the previous block;
and blocks in the cache can be replaced to account for possible BTC forks, and subsequent corresponding blocks must be discarded once replaced.
4. The method for transferring across-chain assets based on the trusted computing environment TEE according to claim 1, wherein in step 3, the transfer data transferred to the small black box is added with the address of toe + NewBTC in the last script, so as to ensure that the small black box knows which address the created NewBTC is transferred to, and if the address format is not the same, the small black box returns the received BTC as a number to protect the assets of the user.
5. The trusted computing environment TEE based cross-chain asset transfer method according to claim 1, wherein in step 4, said method further comprises:
n new public-link trusted nodes are arranged, each node signs the latest block hash by using a private key of the node and submits the latest block hash to a small black box, and the small black box collects M of the N nodes until the M nodes are successfully received, wherein N > = M, so that M of N multiple signatures are realized;
and storing public keys of N new public chain credible nodes in the small black box, verifying block data submitted by the new public chain nodes by using the public keys, putting the block data into a cache of the small black box as a block to be processed when at least M block data are completely consistent and are really credible new public chain node signatures, and starting to process the first block data when the cache is full of 6 to realize 6 times of confirmation.
6. The method for trusted computing environment TEE based cross-chain asset transfer according to claim 1, wherein in step 4, the transfer data transferred out of the small black box is added with a fromenew + NewBTC wallet address in a tail script to achieve data integrity.
7. The trusted computing environment TEE based cross-chain asset transfer method according to claim 1,
the small black boxes adopt a distributed architecture.
8. The trusted computing environment TEE based cross-chain asset transfer method according to claim 1, wherein the data exchange between the small black box and the outside world does not contain sensitive data of passwords and private keys.
CN201910900066.9A 2019-09-23 2019-09-23 Cross-chain asset transfer method based on trusted computing environment (TEE) Pending CN110648235A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910900066.9A CN110648235A (en) 2019-09-23 2019-09-23 Cross-chain asset transfer method based on trusted computing environment (TEE)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910900066.9A CN110648235A (en) 2019-09-23 2019-09-23 Cross-chain asset transfer method based on trusted computing environment (TEE)

Publications (1)

Publication Number Publication Date
CN110648235A true CN110648235A (en) 2020-01-03

Family

ID=68992338

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910900066.9A Pending CN110648235A (en) 2019-09-23 2019-09-23 Cross-chain asset transfer method based on trusted computing environment (TEE)

Country Status (1)

Country Link
CN (1) CN110648235A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111401895A (en) * 2020-03-11 2020-07-10 北京价值互联科技有限公司 Decentralized chain-crossing transfer-in and transfer-out method and system
CN111967864A (en) * 2020-09-02 2020-11-20 上海思赞博微信息科技有限公司 Wallet integrating trusted computing chip with digital currency and working process thereof

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106447309A (en) * 2016-11-13 2017-02-22 杭州复杂美科技有限公司 Across-chain transaction of source chain and lateral chain
CN107679857A (en) * 2017-10-10 2018-02-09 马晶瑶 Across the chain method of commerce and storage medium of block chain
CN108876370A (en) * 2018-06-12 2018-11-23 北京航空航天大学 The architectural framework of the shared open data of transregional piece of chain under a kind of isomery multichain framework
CN109461076A (en) * 2018-10-09 2019-03-12 哈希(武汉)网络科技有限公司 A kind of block chain method of commerce
US20190095879A1 (en) * 2017-09-26 2019-03-28 Cornell University Blockchain payment channels with trusted execution environments
CN109743323A (en) * 2019-01-08 2019-05-10 中国石油大学(华东) A kind of Resources Sharing based on block chain technology
CN110008686A (en) * 2018-11-16 2019-07-12 阿里巴巴集团控股有限公司 The data processing method of transregional piece of chain, device, client, block catenary system
CN110035046A (en) * 2018-11-16 2019-07-19 阿里巴巴集团控股有限公司 The interactive system of transregional piece of chain
CN110175912A (en) * 2019-04-08 2019-08-27 西安西电链融科技有限公司 Across the chain assets transfer method of block chain, block chain information terminal based on the committee
US20190279206A1 (en) * 2018-12-13 2019-09-12 Alibaba Group Holding Limited Off-chain smart contract service based on trusted execution environment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106447309A (en) * 2016-11-13 2017-02-22 杭州复杂美科技有限公司 Across-chain transaction of source chain and lateral chain
US20190095879A1 (en) * 2017-09-26 2019-03-28 Cornell University Blockchain payment channels with trusted execution environments
CN107679857A (en) * 2017-10-10 2018-02-09 马晶瑶 Across the chain method of commerce and storage medium of block chain
CN108876370A (en) * 2018-06-12 2018-11-23 北京航空航天大学 The architectural framework of the shared open data of transregional piece of chain under a kind of isomery multichain framework
CN109461076A (en) * 2018-10-09 2019-03-12 哈希(武汉)网络科技有限公司 A kind of block chain method of commerce
CN110008686A (en) * 2018-11-16 2019-07-12 阿里巴巴集团控股有限公司 The data processing method of transregional piece of chain, device, client, block catenary system
CN110035046A (en) * 2018-11-16 2019-07-19 阿里巴巴集团控股有限公司 The interactive system of transregional piece of chain
US20190279206A1 (en) * 2018-12-13 2019-09-12 Alibaba Group Holding Limited Off-chain smart contract service based on trusted execution environment
CN109743323A (en) * 2019-01-08 2019-05-10 中国石油大学(华东) A kind of Resources Sharing based on block chain technology
CN110175912A (en) * 2019-04-08 2019-08-27 西安西电链融科技有限公司 Across the chain assets transfer method of block chain, block chain information terminal based on the committee

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111401895A (en) * 2020-03-11 2020-07-10 北京价值互联科技有限公司 Decentralized chain-crossing transfer-in and transfer-out method and system
CN111967864A (en) * 2020-09-02 2020-11-20 上海思赞博微信息科技有限公司 Wallet integrating trusted computing chip with digital currency and working process thereof

Similar Documents

Publication Publication Date Title
CN109075964B (en) Block chaining supporting multiple one-way functions for block verification
WO2016202952A1 (en) Digital token exchange system
CN101496344B (en) Method and system having self-setting authentication formula for webs bank payment and identification confirmation
EP3983979A1 (en) Dynamic off-chain digital currency transaction processing
CN111383021B (en) Node management method, device, equipment and medium based on block chain network
CN104038924B (en) Realize the method and system of Resource Exchange information processing
CN113570466B (en) Transaction data processing method and device and readable storage medium
CN115082065A (en) Cloud-based transaction method and system
CN101216915B (en) A secured mobile payment method
KR20160050876A (en) Bitcoin dealing method using public key and private key stored in smart card
US20160358164A1 (en) Method and system for digital currency transaction signature and digital currency transaction device thereof
US11102006B2 (en) Blockchain intelligent security implementation
CN101957958A (en) Method and mobile phone terminal for realizing network payment
CN106656993B (en) Dynamic verification code verification method and device
CN111815321A (en) Transaction proposal processing method, device, system, storage medium and electronic device
CN110428238A (en) The account cancelling method and system of block chain
CN110648235A (en) Cross-chain asset transfer method based on trusted computing environment (TEE)
CN108600259A (en) The certification of equipment and binding method and computer storage media, server
US7828218B1 (en) Method and system of communicating devices, and devices therefor, with protected data transfer
CN107369019B (en) Digital currency wallet unbinding method and system
CN106934623B (en) Account integrity checking method based on Ether house block chain technology
CN106327187A (en) Information processing method and apparatus
CN110428260A (en) The account model of block chain
CN101609391A (en) The PIN code secured inputting method of a kind of USB KEY
CN101639883B (en) Method for checking PIN code and intelligent key equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200103

RJ01 Rejection of invention patent application after publication