CN112291065A - Energy interaction system and method based on block chain - Google Patents

Energy interaction system and method based on block chain Download PDF

Info

Publication number
CN112291065A
CN112291065A CN202011093993.3A CN202011093993A CN112291065A CN 112291065 A CN112291065 A CN 112291065A CN 202011093993 A CN202011093993 A CN 202011093993A CN 112291065 A CN112291065 A CN 112291065A
Authority
CN
China
Prior art keywords
information
control panel
login information
password
energy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011093993.3A
Other languages
Chinese (zh)
Inventor
汪国川
燕飞
吴礼云
郑狄
凌晨
李桂明
陈恩军
陈素君
吴刚
杨天亮
王晓庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shougang Jingtang United Iron and Steel Co Ltd
Original Assignee
Shougang Jingtang United Iron and Steel Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shougang Jingtang United Iron and Steel Co Ltd filed Critical Shougang Jingtang United Iron and Steel Co Ltd
Priority to CN202011093993.3A priority Critical patent/CN112291065A/en
Publication of CN112291065A publication Critical patent/CN112291065A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an energy interaction system based on a block chain, which comprises: the information security control panel is used for receiving login information from the energy interaction control panel, verifying the login information by using verification password information, judging whether the login information is correct or not according to a login information verification result, if the login information is incorrect, performing secondary encryption on the login information, generating a secondary encryption password, sending the secondary encryption password to the energy interaction control panel, and if the login information is correct, sending verification passing information to the energy interaction control panel; and the energy interaction control panel is used for sending the secondary encryption password to the account number corresponding to the login information, or acquiring data information from the block chain network equipment according to the verification passing information, and then forwarding the data information to the terminal equipment. The invention solves the problems of information exposure and economic loss caused by the fact that account numbers and passwords are easy to be stolen when energy interaction is carried out on the Internet.

Description

Energy interaction system and method based on block chain
Technical Field
The invention relates to the technical field of block chain energy information, in particular to an energy interaction system and method based on a block chain.
Background
Block chains (English: block chains or block chains) are intelligent peer-to-peer networks that use distributed databases to identify, spread, and record information, also known as value Internet. In 2008, the chinese treasury proposed the concept of "block chain" in "white paper of bitcoin", created a bitcoin social network in 2009, and developed the first block, i.e., "created block". The blockchain shared value system is firstly imitated by a plurality of cryptocurrencies, and is improved in workload certification and algorithm, such as right certification and Scrypt algorithm. Subsequently, the block chain ecosystem evolved continuously around the world, with the appearance of the first token selling ICO; an intelligent contract block chain Ether house; a "light ownership, heavy usage right" asset tokenization share economy; and blockchain countries. People are developing Decentralized computer programs (Dapp) in various industries and establishing Decentralized autonomous organizations and Decentralized autonomous communities (DAS) in various parts of the world by using the shared value system.
When energy interaction is carried out on the Internet, the account number and the password are easy to steal and use by hackers, so that information exposure and economic loss are easy to cause.
Disclosure of Invention
The embodiment of the application provides an energy interaction system and method based on a block chain, and solves the problems that in the prior art, when energy interaction is performed on the Internet, an account password is easy to steal by a hacker, information exposure is easy to cause, and economic loss is easy to cause.
The invention provides an energy interaction system based on a block chain, which comprises: the system comprises an energy interaction control panel, an information safety control panel and a block chain network device;
the information security control panel is in communication connection with the energy interaction control panel and is used for receiving login information from the energy interaction control panel, verifying the login information by using verification password information, judging whether the login information is correct or not according to a login information verification result, if the login information is incorrect, performing secondary encryption on the login information, generating a secondary encryption password, sending the secondary encryption password to the energy interaction control panel, and if the login information is correct, sending verification passing information to the energy interaction control panel;
the energy interaction control panel is in communication connection with the block chain network equipment and is used for receiving the login information sent by the terminal equipment, sending the login information to the information safety control panel, sending the secondary encryption password to an account owner corresponding to the login information, or acquiring data information from the block chain network equipment according to the verification passing information and forwarding the data information to the terminal equipment.
Preferably, the energy source interaction control panel comprises: the energy resource management system comprises a communication network node module and an energy information acquisition module;
the communication network node module is used for acquiring the data information from the block chain network equipment according to the verification passing information;
and the energy information acquisition module is used for sending the data information to the terminal equipment or sending the secondary encryption password to the account number corresponding to the login information.
Preferably, the information security control panel includes: the system comprises a security password verification module, an information encryption module and an encrypted information sending module;
the safety password verification module is used for verifying the login information by using the verification password information and judging whether the login information is correct or not according to the login information verification result;
the information encryption module is used for carrying out secondary encryption on the login information when the login information is incorrect and generating a secondary encryption password;
and the encrypted information sending module is used for sending the secondary encrypted password or the verification passing information to the energy interaction control panel.
Preferably, the method further comprises the following steps:
and the cloud database is in communication connection with the energy interaction control panel through a communication network port and is used for receiving the secondary encryption password uploaded by the energy interaction control panel and storing the secondary encryption password.
Preferably: and the external power supply is electrically connected with the energy interactive control panel or the built-in power supply is arranged in the energy interactive control panel.
Preferably, the secondary encryption password is a mixed password of numbers and letters.
The invention also provides an energy interaction method based on the block chain, which comprises the following steps:
the energy interaction control panel receives the login information sent by the terminal equipment and uploads the login information;
the information security control panel receives login information from the energy interaction control panel, verifies the login information by using verification password information, judges whether the login information is correct or not according to a login information verification result, secondarily encrypts the login information if the login information is incorrect, generates a secondary encryption password, sends the secondary encryption password to the energy interaction control panel, and sends verification passing information to the energy interaction control panel if the login information is correct;
and the energy interaction control panel sends the secondary encryption password to an account number corresponding to the login information, or acquires data information from the block chain network equipment according to the verification passing information, and forwards the data information to the terminal equipment.
Preferably, the sending, by the energy interaction control board, the secondary encrypted password to the account owner corresponding to the login information, or acquiring, according to the verification passing information, data information from the block chain network device, and forwarding the data information to the terminal device includes:
the communication network node module acquires the data information from the block chain network equipment according to the verification passing information;
and the energy information acquisition module sends the data information to the terminal equipment, or sends the secondary encryption password to the account number corresponding to the login information.
Preferably, the method further comprises the following steps:
and the energy interaction control panel uploads the secondary encryption password to the cloud database for storage.
Preferably, the secondary encryption password is a mixed password of numbers and letters.
The system and the method provided by the application have the following beneficial effects: when a user inputs a correct account password, after the information security control panel passes verification, verification passing information is sent to the energy interaction control panel, the energy interaction control panel acquires data information from the blockchain network equipment and sends the acquired data information to the terminal equipment; if an illegal person inputs an error password through a terminal equipment login account, the information security control panel encrypts the login information to generate a secondary encryption password, and the secondary encryption password is sent to an account owner of the login information, so that the exposure of information and data in the account is prevented, and economic loss caused by the fact that the illegal person steals the interactive data is prevented.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 is a schematic block diagram of a blockchain-based energy interactive system provided by the present invention;
FIG. 2 is a main flow diagram of a block chain based energy source interaction method provided by the present invention;
FIG. 3 is a flow chart of password authentication in the energy interaction method based on the blockchain provided by the invention;
fig. 4 is a flowchart of information encryption processing in the energy source interaction method based on the blockchain according to the present invention;
fig. 5 is a flowchart of secondary encryption password sending processing in the energy interaction method based on the blockchain provided by the present invention.
Detailed Description
In order to make the present application more clearly understood by those skilled in the art to which the present application pertains, the following detailed description of the present application is made with reference to the accompanying drawings by way of specific embodiments.
The invention provides an energy interaction system based on a block chain, as shown in fig. 1, comprising: the system comprises an energy interaction control panel 1, an information safety control panel 2 and a block chain network device 4.
The information safety control panel 2 is in communication connection with the energy interactive control panel 1 and is used for receiving login information from the energy interactive control panel 1, the login information comprises an account number and a password, verification password information is used for verifying the login information, whether the login information is correct or not is judged according to a login information verification result, if the login information is incorrect, secondary encryption is carried out on the login information, a secondary encryption password is generated, the secondary encryption password is sent to the energy interactive control panel 1, and if the login information is correct, verification passing information is sent to the energy interactive control panel 1.
In another embodiment, the secondary encryption password is a mixed password of numbers and letters, so that the randomness of the password is improved, and textile offenders can successfully log in the account. The secondary encrypted password may be sent to the account owner's terminal device 3 by short message.
The energy interaction control panel 1 is in communication connection with the block chain network equipment 4 and is used for receiving login information sent by the terminal equipment 3, sending the login information to the information safety control panel 2, sending a secondary encryption password to an account owner corresponding to the login information, or acquiring data information from the block chain network equipment 4 according to verification passing information and forwarding the data information to the terminal equipment 3. Here, the terminal device 3 may be a mobile phone.
The energy source interaction control panel 1 comprises: a communication network node module 101 and an energy information obtaining module 102.
The communication network node module 101 is configured to obtain data information from the blockchain network device 4 according to the verification passing information.
The energy information obtaining module 102 is configured to send data information to the terminal device 3, or send a secondary encryption password to an account corresponding to the login information.
The information security control panel 2 includes: a security password authentication module 201, an information encryption module 202 and an encrypted information transmission module 203.
The security password verification module 201 is configured to verify the login information by using the verification password information, and determine whether the login information is correct according to a login information verification result, that is, determine whether an account and a password in the login information are matched.
The information encryption module 202 is configured to perform secondary encryption on the login information when the login information is incorrect, and generate a secondary encryption password.
The encrypted information sending module 203 is used for sending the secondary encrypted password or the verification passing information to the energy interaction control panel 1.
The energy interaction system based on the block chain further comprises: a cloud database 5. The cloud database 5 is in communication connection with the energy interaction control panel 1 through a communication network port and is used for receiving the secondary encryption password uploaded by the energy interaction control panel 1 and storing the secondary encryption password.
The energy interaction control panel 1 is further configured to receive a secondary encryption password from the information security control panel 2, and forward the secondary encryption password to the cloud database 5.
The energy interaction system based on the block chain further comprises: the external power supply 6 is electrically connected with the energy interactive control panel 1 or the internal power supply is arranged in the energy interactive control panel 1.
The invention also provides an energy interaction method based on the block chain, which comprises the following steps:
the energy interaction control panel 1 receives login information sent by the terminal equipment 3 and uploads the login information, wherein the login information comprises an account and a password;
the information security control panel 2 receives login information from the energy interaction control panel 1, verifies the login information by using verification password information, judges whether the login information is correct or not according to a login information verification result, secondarily encrypts the login information if the login information is incorrect, generates a secondary encryption password, sends the secondary encryption password to the energy interaction control panel 1, and sends verification passing information to the energy interaction control panel 1 if the login information is correct;
the energy interaction control panel 1 sends the secondary encryption password to the account number corresponding to the login information, or obtains data information from the block chain network device 4 according to the verification passing information, and forwards the data information to the terminal device 3. In another embodiment, the secondary encryption password is a mixed number and letter password.
The energy interaction control panel 1 sends the secondary encryption password to the account number corresponding to the login information, or obtains the data information from the block chain network device 4 according to the verification passing information, and forwards the data information to the terminal device 3, including:
the communication network node module 101 acquires data information from the blockchain network device 4 according to the verification passing information;
the energy information acquisition module 102 sends the data information to the terminal device 3, or sends the secondary encryption password to the account corresponding to the login information.
The information security control panel 2 receives the login information from the energy interactive control panel 1, verifies the login information by using the verification password information, judges whether the login information is correct according to the login information verification result, if the login information is incorrect, secondarily encrypts the login information, generates a secondary encryption password, sends the secondary encryption password to the energy interactive control panel 1, and if the login information is correct, sends verification passing information to the energy interactive control panel 1, including:
the security password verification module 201 verifies the login information by using the verification password information, and judges whether the login information is correct according to the login information verification result;
if the login information of the information encryption module 202 is incorrect, the login information is secondarily encrypted, and a secondary encryption password is generated;
the encrypted information sending module 203 sends the secondary encrypted password or the authentication pass information to the energy interactive control panel 1.
The energy interaction method based on the block chain further comprises the following steps:
the energy interaction control panel 1 uploads the secondary encryption password to the cloud database 5 for storage.
In another embodiment, as shown in fig. 2, the energy source interaction method based on the blockchain includes the following specific steps:
A. starting a software system;
B. starting security password authentication for authenticating the account number and the identity information of the terminal user;
C. opening information encryption for carrying out secondary encryption on the account and the identity information input by the terminal user;
D. starting encryption information transmission for transmitting the secondary encrypted password to an external mobile phone;
E. starting energy information acquisition for extracting data information stored in the block chain network device 4;
F. starting a communication network node for interacting information data of both parties;
G. and completing system startup.
As shown in fig. 3, step B includes: b1, opening network connection; b2, the information safety control panel 2 sends a password extraction command to the energy interactive control panel 1; b3, the information security control panel 2 receives the password sent by the energy interactive control panel 1; b4, checking the received password, and B5, sending the password checking result to the energy interaction control panel 1.
As shown in fig. 4, step C includes: c1, opening network connection; c2, the energy interactive control panel 1 sends a password proofreading result extraction command to the information security control panel 2; c3, the energy interactive control panel 1 receives the password proofreading result sent by the information security control panel 2; c4, when the password proofreading result is correct, executing the step E, when the password proofreading result is wrong, the information security control panel 2 randomly generates a six-digit secondary encryption password; c5, the information security control panel 2 sends a secondary encryption password to the energy interaction control panel 1.
As shown in fig. 5, step D includes: d1, opening network connection; d2, the energy interactive control panel 1 sends a secondary encryption password extraction command to the information security control panel 2; d3, receiving the secondary encryption password sent by the information security control panel 2, D4, editing the secondary encryption password into a short message; d5, sending the short message edited in the D4 to the external mobile phone of the account owner.
Preferably, the six-digit twice-encrypted password generated in step C4 is a mixed number and letter password.
In summary, according to the system and the method provided by the application, when the user inputs a correct account password, after the information security control panel 2 passes the verification, the verification passing information is sent to the energy interaction control panel 1, and the energy interaction control panel 1 acquires the data information from the blockchain network device 4 and sends the acquired data information to the terminal device 3; if an illegal person inputs an error password through the login account of the terminal equipment 3, the information security control panel 2 encrypts the login information to generate a secondary encryption password, and sends the secondary encryption password to the account owner of the login information, so that the information and data in the account are prevented from being exposed, and the economic loss caused by the fact that the interactive data is stolen by the illegal person is prevented.
Still be provided with in this application high in the clouds database 5, high in the clouds database 5 can record the six digit random passwords that information encryption module 202 generated, and the owner of account number can visit high in the clouds database 5 through energy interaction control panel 1, acquires the secondary encryption password of storage in high in the clouds database 5, and textile terminal equipment 3 can not receive the phenomenon that account number that the encryption password caused can not log in.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. An energy source interaction system based on a block chain is characterized by comprising: the system comprises an energy interaction control panel, an information safety control panel and a block chain network device;
the information security control panel is in communication connection with the energy interaction control panel and is used for receiving login information from the energy interaction control panel, verifying the login information by using verification password information, judging whether the login information is correct or not according to a login information verification result, if the login information is incorrect, performing secondary encryption on the login information, generating a secondary encryption password, sending the secondary encryption password to the energy interaction control panel, and if the login information is correct, sending verification passing information to the energy interaction control panel;
the energy interaction control panel is in communication connection with the block chain network equipment and is used for receiving the login information sent by the terminal equipment, sending the login information to the information safety control panel, sending the secondary encryption password to an account owner corresponding to the login information, or acquiring data information from the block chain network equipment according to the verification passing information and forwarding the data information to the terminal equipment.
2. The blockchain-based energy interactive system according to claim 1, wherein the energy interactive control board comprises: the energy resource management system comprises a communication network node module and an energy information acquisition module;
the communication network node module is used for acquiring the data information from the block chain network equipment according to the verification passing information;
and the energy information acquisition module is used for sending the data information to the terminal equipment or sending the secondary encryption password to the account number corresponding to the login information.
3. The blockchain-based energy interactive system according to claim 1, wherein the information security control board comprises: the system comprises a security password verification module, an information encryption module and an encrypted information sending module;
the safety password verification module is used for verifying the login information by using the verification password information and judging whether the login information is correct or not according to the login information verification result;
the information encryption module is used for carrying out secondary encryption on the login information when the login information is incorrect and generating a secondary encryption password;
and the encrypted information sending module is used for sending the secondary encrypted password or the verification passing information to the energy interaction control panel.
4. The blockchain-based energy interactive system according to claim 1, further comprising:
and the cloud database is in communication connection with the energy interaction control panel through a communication network port and is used for receiving the secondary encryption password uploaded by the energy interaction control panel and storing the secondary encryption password.
5. The blockchain-based energy interactive system according to claim 1, further comprising: and the external power supply is electrically connected with the energy interactive control panel or the built-in power supply is arranged in the energy interactive control panel.
6. The blockchain-based energy interactive system according to claim 1, wherein the secondary encryption password is a mixed number and letter password.
7. A block chain-based energy interaction method is characterized by comprising the following steps:
the energy interaction control panel receives the login information sent by the terminal equipment and uploads the login information;
the information security control panel receives login information from the energy interaction control panel, verifies the login information by using verification password information, judges whether the login information is correct or not according to a login information verification result, secondarily encrypts the login information if the login information is incorrect, generates a secondary encryption password, sends the secondary encryption password to the energy interaction control panel, and sends verification passing information to the energy interaction control panel if the login information is correct;
and the energy interaction control panel sends the secondary encryption password to an account number corresponding to the login information, or acquires data information from the block chain network equipment according to the verification passing information, and forwards the data information to the terminal equipment.
8. The energy interaction method based on the blockchain according to claim 7, wherein the energy interaction control board sends the secondary encrypted password to an account corresponding to the login information, or obtains data information from the blockchain network device according to the verification passing information, and forwards the data information to the terminal device, and the method comprises:
the communication network node module acquires the data information from the block chain network equipment according to the verification passing information;
and the energy information acquisition module sends the data information to the terminal equipment, or sends the secondary encryption password to the account number corresponding to the login information.
9. The blockchain-based energy source interaction method of claim 7, further comprising:
and the energy interaction control panel uploads the secondary encryption password to the cloud database for storage.
10. The blockchain-based energy source interaction method according to claim 7, wherein the secondary encryption password is a mixed number and letter password.
CN202011093993.3A 2020-10-14 2020-10-14 Energy interaction system and method based on block chain Pending CN112291065A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011093993.3A CN112291065A (en) 2020-10-14 2020-10-14 Energy interaction system and method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011093993.3A CN112291065A (en) 2020-10-14 2020-10-14 Energy interaction system and method based on block chain

Publications (1)

Publication Number Publication Date
CN112291065A true CN112291065A (en) 2021-01-29

Family

ID=74496208

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011093993.3A Pending CN112291065A (en) 2020-10-14 2020-10-14 Energy interaction system and method based on block chain

Country Status (1)

Country Link
CN (1) CN112291065A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101908960A (en) * 2009-06-02 2010-12-08 上海科大智能科技股份有限公司 Multiple security method of electronic file concerning security matters
US20160057136A1 (en) * 2014-08-20 2016-02-25 Chi-Pei Wang Computer network system with single-key quick secure login function
CN107909358A (en) * 2017-11-01 2018-04-13 北京融链科技有限公司 The settlement method of the energy, device and system
CN108830110A (en) * 2018-09-10 2018-11-16 珠海格力电器股份有限公司 Energy interactive device, energy internet system and exchange method based on block chain
CN109615396A (en) * 2018-12-06 2019-04-12 广东电网有限责任公司信息中心 A kind of new energy operation system and method based on block chain technology
CN111046359A (en) * 2019-10-18 2020-04-21 安徽静深实业有限公司 Anti-theft system and method for portable equipment
US20200294032A1 (en) * 2019-03-14 2020-09-17 Alibaba Group Holding Limited Methods and devices for acquiring and recording tracking information on blockchain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101908960A (en) * 2009-06-02 2010-12-08 上海科大智能科技股份有限公司 Multiple security method of electronic file concerning security matters
US20160057136A1 (en) * 2014-08-20 2016-02-25 Chi-Pei Wang Computer network system with single-key quick secure login function
CN107909358A (en) * 2017-11-01 2018-04-13 北京融链科技有限公司 The settlement method of the energy, device and system
CN108830110A (en) * 2018-09-10 2018-11-16 珠海格力电器股份有限公司 Energy interactive device, energy internet system and exchange method based on block chain
CN109615396A (en) * 2018-12-06 2019-04-12 广东电网有限责任公司信息中心 A kind of new energy operation system and method based on block chain technology
US20200294032A1 (en) * 2019-03-14 2020-09-17 Alibaba Group Holding Limited Methods and devices for acquiring and recording tracking information on blockchain
CN111046359A (en) * 2019-10-18 2020-04-21 安徽静深实业有限公司 Anti-theft system and method for portable equipment

Similar Documents

Publication Publication Date Title
US20220058655A1 (en) Authentication system
US11271926B2 (en) System and method for temporary password management
US10771471B2 (en) Method and system for user authentication
US11388174B2 (en) System and method for securing a communication channel
RU2506637C2 (en) Method and device for verifying dynamic password
CN108989346B (en) Third-party valid identity escrow agile authentication access method based on account hiding
CN112000744B (en) Signature method and related equipment
CN109257391A (en) A kind of access authority opening method, device, server and storage medium
US9124571B1 (en) Network authentication method for secure user identity verification
CN1921395B (en) Method for improving security of network software
CN104426659B (en) Dynamic password formation method, authentication method and system, relevant device
CN103853950A (en) Authentication method based on mobile terminal and mobile terminal
CN104184709A (en) Verification method, device, server, service data center and system
CN110149323B (en) Processing device with ten-million-level TPS (platform secure protocol) contract processing capacity
CN104469736B (en) A kind of data processing method, server and terminal
CN105162604A (en) Feature image identification based verification method and system, and verification server
CN105162774A (en) Virtual machine login method and device used for terminal
CN110647583A (en) Block chain construction method, device, terminal and medium
CN112468293B (en) Identity authentication method, system, equipment and computer readable storage medium
CN109740319A (en) Digital identity verification method and server
CN105141624A (en) Login method, account management server and client system
CN102571341B (en) A kind of Verification System based on dynamic image and authentication method
CN116647345A (en) Method and device for generating permission token, storage medium and computer equipment
CN112291065A (en) Energy interaction system and method based on block chain
CN115086090A (en) Network login authentication method and device based on UKey

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210129

RJ01 Rejection of invention patent application after publication