CN106909852A - Intelligent contract encryption method and device based on triple md5 encryption algorithms - Google Patents

Intelligent contract encryption method and device based on triple md5 encryption algorithms Download PDF

Info

Publication number
CN106909852A
CN106909852A CN201710129301.8A CN201710129301A CN106909852A CN 106909852 A CN106909852 A CN 106909852A CN 201710129301 A CN201710129301 A CN 201710129301A CN 106909852 A CN106909852 A CN 106909852A
Authority
CN
China
Prior art keywords
character string
character
password
encryption
length
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710129301.8A
Other languages
Chinese (zh)
Other versions
CN106909852B (en
Inventor
毛明扬
肖红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201710129301.8A priority Critical patent/CN106909852B/en
Publication of CN106909852A publication Critical patent/CN106909852A/en
Application granted granted Critical
Publication of CN106909852B publication Critical patent/CN106909852B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/188Electronic negotiation

Abstract

The embodiment of the invention discloses a kind of intelligent contract encryption method and device based on triple md5 encryption algorithms, the embodiment of the present invention is used for the encryption of electronic contract, transaction cost can be reduced, signer is set to be one-to-one relationship with the encryption of electronic contract, stranger cannot distort, I cannot break the promise, and can be applied in block chain technology in future, and can be used in many transaction based on internet.Specifically, md5 encryption algorithm has preferable security, apply in electronic contract, be capable of achieving the aspects such as digital signature, file integrality checking and password encryption.

Description

Intelligent contract encryption method and device based on triple md5 encryption algorithms
Technical field
The present invention relates to intelligent contract field of encryption, more particularly to a kind of intelligent contract based on triple md5 encryption algorithms Encryption method and device.
Background technology
Into after 21 century, Internet technology is propagated its belief on a large scale, and is set up on internet and digital-scrambling techniques basis Digital cash rises, some associated Floor layer Technologies, and such as block chain technology and distributed bookkeeping methods comes one after the other.Number Word currency not only has public credibility as bank note, and can further reduce operating cost, and it all runs in going behind Heart mechanism, it is main that trust systems are set up by distributed bookkeeping methods.One complete block chain application, contains super account This, intelligent contract, secret protection and common recognition algorithm this four key technologies, it is ensured that the safe transfer of commercial assets, ensures Enterprise core business, contract is properly stored, and has high secret protection technology, can guarantee that any data are not blocked halfway Cut, reduce hacker attacks to the potential security risk of system failure.
Block chain is a kind of digital account book, and for recording the transaction on internet or other data, it has unusual The characteristics of:First, Encryption Design causes that the record in block chain can not be eliminated;Secondly, block chain can be by one group of company or individual People carries out sharing operation together, and this causes that some significant datas are no longer controlled by single entity or system.Many governments and grand duke Block chain technology is currently explored by department, and this is not because wanting using bit coin, and because the excellent data of block chain are closed Make mode.Block chain can make financial transaction, digital health record and manufacturing supply chain become more efficient and powerful.
Block chain can make the cooperation between company highly efficient and safe, data safely can be placed on into one and shared Neutral Systems on, rather than being locked in certain private system.
The rise of mobile Internet, greatly facilitates the life of people, from ecommerce, mobile social, then in life Clothing, food, lodging and transportion -- basic necessities of life, internet is further overturned and impacted to traditional industries.In Internet world, people can be mutual Oneself unnecessary thing or exhaustless thing are traded, such as in energy internet, it is renewable that everyone produces If the energy cannots be used up, can be traded with others, the process of transaction is stored in block chain node.Since having transaction, just The bargain transaction having in contract, and reality also has contract.In order to reduce the cost of Contract Signing, the electricity based on intelligent contract Sub- contract is expected in popularization and application in future.
Intelligent contract is that a kind of computer language substitution legal language goes to record the contract of clause.Intelligent contract can be by One computing system is performed automatically.If block chain is a database, intelligent contract can exactly make block chain technology application Application layer in the middle of to reality.Traditional contract does not join directly typically with the computer code for performing treaty content System.Papery contract is in most cases archived, and software understands the contract bar that object computer code form is write Money.The potential benefit of intelligent contract includes reducing the cost signed in terms of contract, execution and supervision;Therefore, to many low values Conclude the business for related contract, this can greatly reduce human cost.
Therefore it provides a kind of the contractor can be made cannot to deny contracted electronic contract, and other people is pretended to be I signs, and then causes that electronic contract and contractor are one-to-one relationships, and the encryption method for making intelligent contract come into force is this Art personnel's technical issues that need to address.
The content of the invention
A kind of intelligent contract encryption method and device based on triple md5 encryption algorithms are the embodiment of the invention provides, can So that contractor cannot deny contracted electronic contract, and other people are made to pretend to be my signature, therefore electronic contract It is one-to-one relationship with contractor, so that intelligent contract comes into force.
A kind of intelligent contract encryption method based on triple md5 encryption algorithms is the embodiment of the invention provides, including:
S1:User account, user cipher and contract number are got, by md5 encryption algorithm according to the user account, institute State user cipher and the contract number generates the first character string, the second character string and the 3rd character string;
S2:First character string, second character string and the 3rd character string are merged into the 4th character string;
S3:The difference L between presetting cipher length and preset character types quantity is calculated, is taken in the 4th character string The character string of preceding L character is the character string of L in the 4th character string intercepted length as password initial value, obtains the 5th Character string;
S4:Judge whether the character types that the password initial value is included meet preset character types condition, if it is not satisfied, time The 5th character string is gone through, first character for meeting preset character types condition in the 5th character string is chosen, will be met The character of preset character types condition is put into the password initial value, and re-executes S4, if meeting, by the beginning of the password Value performs S5 as password;
S5:Judge whether the length of the password is equal to the presetting cipher length, if being equal to, terminate, if being not equal to, First character for meeting preset character types condition in the 5th character string is then chosen, preset character types condition will be met The character be put into the password, and S5 is re-executed, until the length of the password is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
Preferably, first character string is corresponding with the user account, the contract number.
Preferably, second character string is corresponding with the user cipher, the contract number.
Preferably, the 3rd character string is corresponding with the contract number.
Preferably, the presetting cipher length is 6 or 8 or 10 or 16.
Preferably, the embodiment of the present invention additionally provides a kind of intelligent contract encryption device based on triple md5 encryption algorithms, Including:
Generation unit, for getting user account, user cipher and contract number, by md5 encryption algorithm according to User account, the user cipher and the contract number generate the first character string, the second character string and the 3rd character string;
Combining unit, for first character string, second character string and the 3rd character string to be merged into Four character strings;
Computing unit, for calculating the difference L between presetting cipher length and preset character types quantity, the described 4th The character string of preceding L character is taken in character string as password initial value, and is the character of L in the 4th character string intercepted length String, obtains the 5th character string;
First judging unit, for judging whether the character types that the password initial value is included meet preset character types bar Part, if it is not satisfied, traversal the 5th character string, first meets preset character types condition in selection the 5th character string Character, the character that will meet preset character types condition is put into the password initial value, and retriggered first judges Unit, if meeting, using the password initial value as password, and triggers the second judging unit;
Whether the second judging unit, the length for judging the password is equal to the presetting cipher length, if being equal to, Terminate, if being not equal to, choose first character for meeting preset character types condition in the 5th character string, it is pre- by meeting The character for putting character types condition is put into the password, and the judging unit of retriggered second, until the password Length is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
Preferably, first character string is corresponding with the user account, the contract number.
Preferably, second character string is corresponding with the user cipher, the contract number.
Preferably, the 3rd character string is corresponding with the contract number.
Preferably, the presetting cipher length is 6 or 8 or 10 or 16.
As can be seen from the above technical solutions, the embodiment of the present invention has advantages below:
A kind of intelligent contract encryption method and device based on triple md5 encryption algorithms are the embodiment of the invention provides, its In, the intelligent contract encryption method that should be based on triple md5 encryption algorithms includes:S1:Get user account, user cipher and conjunction Jack per line, by md5 encryption algorithm according to the user account, the user cipher and the contract number generate the first character string, Second character string and the 3rd character string;S2:First character string, second character string and the 3rd character string are merged Into the 4th character string;S3:The difference L between presetting cipher length and preset character types quantity is calculated, in the 4th character The character string of preceding L character is taken in string as password initial value, and is the character string of L in the 4th character string intercepted length, obtained To the 5th character string;S4:Judge whether the character types that the password initial value is included meet preset character types condition, if discontented Foot, travels through the 5th character string, chooses first character for meeting preset character types condition in the 5th character string, will The character for meeting preset character types condition is put into the password initial value, and re-executes S4, if meeting, will be described close Code initial value performs S5 as password;S5:Judge whether the length of the password is equal to the presetting cipher length, if being equal to, Then terminate, if being not equal to, choose first character for meeting preset character types condition in the 5th character string, will meet The character of preset character types condition is put into the password, and re-executes S5, until the length of the password is equal to The presetting cipher length;Wherein, L=1,2,3 ... n.
A kind of intelligent contract encryption method and device based on triple md5 encryption algorithms provided in an embodiment of the present invention are used for The encryption of electronic contract, can reduce transaction cost, make signer be one-to-one relationship, Wai Renwu with the encryption of electronic contract Method is distorted, and I cannot break the promise, and can be applied in block chain technology in future, and can be used in much based on internet Transaction in.Specifically, md5 encryption algorithm has preferable security, apply in electronic contract, achievable digital signature, The aspect such as file integrality checking and password encryption.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also Other accompanying drawings are obtained with according to these accompanying drawings.
Fig. 1 is a kind of stream of intelligent contract encryption method based on triple md5 encryption algorithms provided in an embodiment of the present invention Journey schematic diagram;
Fig. 2 is a kind of knot of intelligent contract encryption device based on triple md5 encryption algorithms provided in an embodiment of the present invention Structure schematic diagram.
Specific embodiment
A kind of intelligent contract encryption method and device based on triple md5 encryption algorithms are the embodiment of the invention provides, can So that contractor cannot deny contracted electronic contract, and other people are made to pretend to be my signature, therefore electronic contract It is one-to-one relationship with contractor, so that intelligent contract comes into force.
To enable that goal of the invention of the invention, feature, advantage are more obvious and understandable, below in conjunction with the present invention Accompanying drawing in embodiment, is clearly and completely described, it is clear that disclosed below to the technical scheme in the embodiment of the present invention Embodiment be only a part of embodiment of the invention, and not all embodiment.Based on the embodiment in the present invention, this area All other embodiment that those of ordinary skill is obtained under the premise of creative work is not made, belongs to protection of the present invention Scope.
Refer to Fig. 1, a kind of intelligent contract encryption method based on triple md5 encryption algorithms provided in an embodiment of the present invention One embodiment, including:
101st, user account, user cipher and contract number are got, by md5 encryption algorithm according to user account, user Password and contract number generate the first character string, the second character string and the 3rd character string;
Get user account, user cipher and contract number, by call for three times md5 encryption algorithm according to user account, User cipher and contract number generate the first character string, the second character string and the 3rd character string.
Further, the first character string is corresponding with user account, contract number.
Further, the second character string is corresponding with user cipher, contract number.
Further, the 3rd character string is corresponding with contract number.
102nd, the first character string, the second character string and the 3rd character string are merged into the 4th character string;
After the first character string, the second character string and the 3rd character string is obtained, by the first character string, the second character string and Three character strings are merged into the 4th character string.
103rd, the difference L between presetting cipher length and preset character types quantity is calculated, L before taking in the 4th character string The character string of individual character is the character string of L in the 4th character string intercepted length as password initial value, obtains the 5th character string;
After the 4th character string is obtained, the difference L between presetting cipher length and preset character types quantity is calculated, the The character string of preceding L character is taken in four character strings as password initial value, and is the character string of L in the 4th character string intercepted length, The 5th character string is obtained, wherein, L=1,2,3 ... n.
In the present embodiment, presetting cipher length is 6 or 8 or 10 or 16, is not limited herein.
104th, judge whether the character types that password initial value is included meet preset character types condition, if it is not satisfied, traversal 5th character string, chooses first character for meeting preset character types condition in the 5th character string, will meet preset character type The character of type condition is put into password initial value, and re-executes 104, if meeting, using password initial value as password, and performs 105;
After obtaining the 5th character string, judge whether the character types that password initial value is included meet preset character types condition, If it is not satisfied, the 5th character string of traversal, chooses first character for meeting preset character types condition in the 5th character string, will be full The character of the preset character types condition of foot is put into password initial value, and re-executes step 104, if meeting, password initial value is made It is password, and performs step 105.
105th, judge whether the length of password is equal to presetting cipher length, if being equal to, terminate, if being not equal to, choose First character for meeting preset character types condition in 5th character string, the character that will meet preset character types condition is put into In password, and 105 are re-executed, until the length of password is equal to presetting cipher length.
Judge whether the length of password is equal to presetting cipher length, if being equal to, terminate, if being not equal to, choose the 5th First character for meeting preset character types condition in character string, the character that will meet preset character types condition is put into password In, and step 105 is re-executed, until the length of password is equal to presetting cipher length.
The above is the detailed description carried out to a kind of intelligent contract encryption method based on triple md5 encryption algorithms, is just In understanding, below by the answering to a kind of intelligent contract encryption method based on triple md5 encryption algorithms with a concrete application scene With illustrating, application examples includes:
(1) input user uses account and password.
(2) user to him each need generate Crypted password contract, be input into contract number.
(3) Crypted password of selection generation, digit N in need, usually 6,8,10,16 length.
Generate the requirement of password, general capitalization in need, need small letter, need numeral, need special, we are for selecting Selecting needs generation number of types to be designated as n.
(4) algorithm:
X=md5 (account+contract number);
X1=md5 (password+contract number);
X2=md5 (contract number).
One section of character string s=x [0,1] of generation, x1 [0,1], x2 [0,1], x [2,3] ....
(5) L=N-n, L is made to represent length, N is exactly the length for needing to generate password, and n is exactly Selective type number, using must There need be type, if the character for taking out does not have type selecting, then finally adding type.
(6) password k=s [0, L] is taken, k=S [0, L] represents that the L substring of character is used as password initial value before taking character string S. If k has the type not comprising selection, then continuation is looked in s [L], first type of selection is found, be put into k, Zhi Daosuo There is type to be all found, S [L] represents that interception character string S length is the character string of L.
Wherein, the character in password string need to finally have n types, but initial value K may not include n types, So end plus comprising type character, so travel through in the S [L] finding first and different types of character It is added to the end of k character strings, is mainly found with the method for traversal.
(7) if at this moment the length of password is less than N, then down take the character of s [L], until Password Length is N.
The embodiment of the present invention is based on the password and account and contract number of contractor, and N character string password of generation has Uniqueness, and have one-to-one relation with the account and password and contract number of contractor.Contractor generally uses oneself note Account firmly and password are signed to electronic contract, are so encrypted using the intelligent contract based on triple md5 encryption algorithms The N character string that technology is generated is encrypted to contract, and the encryption of the first contract is high;Second contractor cannot deny and be signed Contract about, so as to prevent fraud.
The application example is carried out by following core code:
Refer to Fig. 2, a kind of intelligent contract encryption device based on triple md5 encryption algorithms provided in an embodiment of the present invention One embodiment, including:
Generation unit 201, for getting user account, user cipher and contract number, by md5 encryption algorithm according to Family account, user cipher and contract number generate the first character string, the second character string and the 3rd character string;
Combining unit 202, for the first character string, the second character string and the 3rd character string to be merged into the 4th character string;
Computing unit 203, for calculating the difference L between presetting cipher length and preset character types quantity, the 4th The character string of preceding L character is taken in character string as password initial value, and is the character string of L in the 4th character string intercepted length, obtained To the 5th character string;
First judging unit 204, for judging whether the character types that password initial value is included meet preset character types bar Part, if it is not satisfied, the 5th character string of traversal, chooses first character for meeting preset character types condition in the 5th character string, The character that preset character types condition will be met is put into password initial value, and the first judging unit of retriggered 204, if meeting, Using password initial value as password, and trigger the second judging unit 205;
Whether the second judging unit 205, the length for judging password is equal to presetting cipher length, if being equal to, terminates, If being not equal to, first character for meeting preset character types condition in the 5th character string is chosen, preset character type will be met The character of type condition is put into password, and the second judging unit of retriggered 205, until the length of password is long equal to presetting cipher Degree;
Wherein, L=1,2,3 ... n.
Further, the first character string is corresponding with user account, contract number.
Further, the second character string is corresponding with user cipher, contract number.
Further, the 3rd character string is corresponding with contract number.
Further, presetting cipher length is 6 or 8 or 10 or 16, is not limited herein.
The design cycle of the embodiment of the present invention is as follows:
The account of user input oneself, password, contract number first;Then md5 encryption algorithm is called three times, parameter is respectively Account+contract number, password+contract number, contract number, it is respectively X, X1, X2, i.e. X=MD5 (accounts+contract to obtain three character strings Number), X1=MD5 (password+contract number), X2=MD5 (contract number);Then one section of character string S=X [0,1] X1 [0,1] X2 is synthesized [0,1] X [2,3] X1 [2,3] X2 [2,3] ..., takes L=N-n, and wherein N is final digit, and n is character types;Note K=S [0, L], if K has the type not comprising selection, then continuation is looked in S [L], the type for finding first selection is put into K In, until all of type is all found.If at this moment the length of password is less than N, then down take the character of S [L], Zhi Daomi Code length is N.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, for example multiple units or component Can combine or be desirably integrated into another system, or some features can be ignored, or do not perform.It is another, it is shown or The coupling each other for discussing or direct-coupling or communication connection can be the indirect couplings of device or unit by some interfaces Close or communicate to connect, can be electrical, mechanical or other forms.
The unit that is illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be according to the actual needs selected to realize the mesh of this embodiment scheme 's.
In addition, during each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is to realize in the form of SFU software functional unit and as independent production marketing or use When, can store in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part for being contributed to prior art in other words or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a storage medium, including some instructions are used to so that a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to preceding Embodiment is stated to be described in detail the present invention, it will be understood by those within the art that:It still can be to preceding State the technical scheme described in each embodiment to modify, or equivalent is carried out to which part technical characteristic;And these Modification is replaced, and does not make the spirit and scope of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution.

Claims (10)

1. a kind of intelligent contract encryption method based on triple md5 encryption algorithms, it is characterised in that including:
S1:User account, user cipher and contract number are got, by md5 encryption algorithm according to the user account, the use Family password and the contract number generate the first character string, the second character string and the 3rd character string;
S2:First character string, second character string and the 3rd character string are merged into the 4th character string;
S3:The difference L between presetting cipher length and preset character types quantity is calculated, L before taking in the 4th character string The character string of individual character is the character string of L in the 4th character string intercepted length as password initial value, obtains the 5th character String;
S4:Judge whether the character types that the password initial value is included meet preset character types condition, if it is not satisfied, traversal institute The 5th character string is stated, first character for meeting preset character types condition in the 5th character string is chosen, will be met preset The character of character types condition is put into the password initial value, and re-executes S4, if meeting, the password initial value is made It is password, and performs S5;
S5:Judge whether the length of the password is equal to the presetting cipher length, if being equal to, terminate, if being not equal to, select First character for meeting preset character types condition in the 5th character string is taken, the institute of preset character types condition will be met State character to be put into the password, and re-execute S5, until the length of the password is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
2. the intelligent contract encryption method based on triple md5 encryption algorithms according to claim 1, it is characterised in that institute State the first character string corresponding with the user account, the contract number.
3. the intelligent contract encryption method based on triple md5 encryption algorithms according to claim 2, it is characterised in that institute State the second character string corresponding with the user cipher, the contract number.
4. the intelligent contract encryption method based on triple md5 encryption algorithms according to claim 3, it is characterised in that institute State the 3rd character string corresponding with the contract number.
5. the intelligent contract encryption method based on triple md5 encryption algorithms according to claim 1, it is characterised in that institute It is 6 or 8 or 10 or 16 to state presetting cipher length.
6. a kind of intelligent contract encryption device based on triple md5 encryption algorithms, it is characterised in that including:
Generation unit, for getting user account, user cipher and contract number, by md5 encryption algorithm according to the user Account, the user cipher and the contract number generate the first character string, the second character string and the 3rd character string;
Combining unit, for first character string, second character string and the 3rd character string to be merged into the 4th word Symbol string;
Computing unit, for calculating the difference L between presetting cipher length and preset character types quantity, in the 4th character The character string of preceding L character is taken in string as password initial value, and is the character string of L in the 4th character string intercepted length, obtained To the 5th character string;
First judging unit, for judging whether the character types that the password initial value is included meet preset character types condition, If it is not satisfied, traversal the 5th character string, first meets preset character types condition in selection the 5th character string Character, the character that will meet preset character types condition is put into the password initial value, and retriggered first judges list Unit, if meeting, using the password initial value as password, and triggers the second judging unit;
Whether the second judging unit, the length for judging the password is equal to the presetting cipher length, if being equal to, ties Beam, if being not equal to, chooses first character for meeting preset character types condition in the 5th character string, will meet preset The character of character types condition is put into the password, and the judging unit of retriggered second, until the length of the password Degree is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
7. the intelligent contract encryption device based on triple md5 encryption algorithms according to claim 6, it is characterised in that institute State the first character string corresponding with the user account, the contract number.
8. the intelligent contract encryption device based on triple md5 encryption algorithms according to claim 7, it is characterised in that institute State the second character string corresponding with the user cipher, the contract number.
9. the intelligent contract encryption device based on triple md5 encryption algorithms according to claim 8, it is characterised in that institute State the 3rd character string corresponding with the contract number.
10. the intelligent contract encryption device based on triple md5 encryption algorithms according to claim 6, it is characterised in that institute It is 6 or 8 or 10 or 16 to state presetting cipher length.
CN201710129301.8A 2017-03-06 2017-03-06 Intelligent contract encryption method and device based on triple md5 encryption algorithms Expired - Fee Related CN106909852B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710129301.8A CN106909852B (en) 2017-03-06 2017-03-06 Intelligent contract encryption method and device based on triple md5 encryption algorithms

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710129301.8A CN106909852B (en) 2017-03-06 2017-03-06 Intelligent contract encryption method and device based on triple md5 encryption algorithms

Publications (2)

Publication Number Publication Date
CN106909852A true CN106909852A (en) 2017-06-30
CN106909852B CN106909852B (en) 2019-11-08

Family

ID=59187018

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710129301.8A Expired - Fee Related CN106909852B (en) 2017-03-06 2017-03-06 Intelligent contract encryption method and device based on triple md5 encryption algorithms

Country Status (1)

Country Link
CN (1) CN106909852B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107342858A (en) * 2017-07-05 2017-11-10 武汉凤链科技有限公司 A kind of intelligent contract guard method and system based on trusted context
CN109428722A (en) * 2017-08-30 2019-03-05 上海策赢网络科技有限公司 A kind of content delivery method and device
CN110020855A (en) * 2019-01-31 2019-07-16 阿里巴巴集团控股有限公司 Method, the node, storage medium of secret protection are realized in block chain
CN110096901A (en) * 2019-05-08 2019-08-06 北京智签科技有限公司 Electronic contract data encryption storage method and signed client end
WO2020233632A1 (en) * 2019-05-20 2020-11-26 创新先进技术有限公司 Receipt storage method and node based on event function type

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101199160A (en) * 2005-04-15 2008-06-11 朱利叶斯·穆瓦勒 Method and system for string-based biometric authentication
US20090217035A1 (en) * 2004-07-12 2009-08-27 Abdul Hameed Khan Abdul Rahman Bilaterally Generated Encryption Key System
CN101593332A (en) * 2008-05-28 2009-12-02 北京邮电大学 A kind of electronic contract management system and its implementation
CN102983967A (en) * 2012-12-06 2013-03-20 厦门市美亚柏科信息股份有限公司 Quick traversal algorithm and device for complicated password
CN103326991A (en) * 2012-03-20 2013-09-25 北京聚宝网络科技有限公司 Method for password encrypted storage and password authentication
CN103684758A (en) * 2013-11-05 2014-03-26 广东全通教育股份有限公司 User password mixing encryption method and system
US20150033014A1 (en) * 2013-07-24 2015-01-29 Cisco Technology, Inc. Compact and Efficient Communication Security through Combining Anti-Replay with Encryption
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090217035A1 (en) * 2004-07-12 2009-08-27 Abdul Hameed Khan Abdul Rahman Bilaterally Generated Encryption Key System
CN101199160A (en) * 2005-04-15 2008-06-11 朱利叶斯·穆瓦勒 Method and system for string-based biometric authentication
CN101593332A (en) * 2008-05-28 2009-12-02 北京邮电大学 A kind of electronic contract management system and its implementation
CN103326991A (en) * 2012-03-20 2013-09-25 北京聚宝网络科技有限公司 Method for password encrypted storage and password authentication
CN102983967A (en) * 2012-12-06 2013-03-20 厦门市美亚柏科信息股份有限公司 Quick traversal algorithm and device for complicated password
US20150033014A1 (en) * 2013-07-24 2015-01-29 Cisco Technology, Inc. Compact and Efficient Communication Security through Combining Anti-Replay with Encryption
CN103684758A (en) * 2013-11-05 2014-03-26 广东全通教育股份有限公司 User password mixing encryption method and system
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李灿丽: "电子签章在电子政务中的应用研究", 《中国优秀硕士学位论文全文数据库》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107342858A (en) * 2017-07-05 2017-11-10 武汉凤链科技有限公司 A kind of intelligent contract guard method and system based on trusted context
CN107342858B (en) * 2017-07-05 2019-09-10 武汉凤链科技有限公司 A kind of intelligent contract guard method and system based on trusted context
CN109428722A (en) * 2017-08-30 2019-03-05 上海策赢网络科技有限公司 A kind of content delivery method and device
CN110020855A (en) * 2019-01-31 2019-07-16 阿里巴巴集团控股有限公司 Method, the node, storage medium of secret protection are realized in block chain
CN110020855B (en) * 2019-01-31 2020-05-29 阿里巴巴集团控股有限公司 Method, node and storage medium for realizing privacy protection in block chain
CN110096901A (en) * 2019-05-08 2019-08-06 北京智签科技有限公司 Electronic contract data encryption storage method and signed client end
WO2020233632A1 (en) * 2019-05-20 2020-11-26 创新先进技术有限公司 Receipt storage method and node based on event function type

Also Published As

Publication number Publication date
CN106909852B (en) 2019-11-08

Similar Documents

Publication Publication Date Title
Singh et al. Blockchain: Future of financial and cyber security
US10560451B2 (en) Table-connected tokenization
CN106909852B (en) Intelligent contract encryption method and device based on triple md5 encryption algorithms
CN109074562B (en) Combined data transmission control method and system based on block chain
CN109919756A (en) Fund transfer system, checking method and method of commerce based on Merkle tree backtracking location technology
CN110709871A (en) Parameterizable intelligent contracts
US10068106B2 (en) Tokenization column replacement
US20220138740A1 (en) Computer-implemented method, a computer system and a cryptocurrency depository for enabling secure escrow and safekeeping of a cryptocurrency
US20200082388A1 (en) Authenticating server and method for transactions on blockchain
CN107070896A (en) A kind of safe and efficient block chain customization login method and security hardening system
Hameed Blockchain and Cryptocurrencies Technology: a survey
CN111597167A (en) Big data management system and method applying block chain technology
KR20190093011A (en) The block-chain system with enhanced security and the method of generating a data block using a double block-chain structure
KR102181098B1 (en) System and method for distributed database using block chain
Khangura et al. A study on security threats to blockchain & cryptocurrencies
Chhabra et al. An overview of blockchain technology and comparison between various cryptocurrencies
Agrawal et al. A role of blockchain in IoT and financial applications
Pestunov Cryptocurrencies and Blockchain: Potential Applications in Government and Business
RU2686818C1 (en) Method for scaling distributed information system
CN116547944A (en) Signature generation device, authentication device, and program
Nath et al. Impact of Blockchain to Secure E-Banking Transaction
Lukina et al. Electronic payment systems and blockchain as a constituent part
Zhang et al. Anonymous hidden transaction model for blockchain systems
Sirohi Relevance of Blockchain Technology in The Scenario of Escalating Cybercrime in Banking Sector in the UK
Zhang et al. Occupation mechanism for eliminating double-spending attacks on trusted transaction blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191108

Termination date: 20200306

CF01 Termination of patent right due to non-payment of annual fee