CN106909852A - Intelligent contract encryption method and device based on triple md5 encryption algorithms - Google Patents
Intelligent contract encryption method and device based on triple md5 encryption algorithms Download PDFInfo
- Publication number
- CN106909852A CN106909852A CN201710129301.8A CN201710129301A CN106909852A CN 106909852 A CN106909852 A CN 106909852A CN 201710129301 A CN201710129301 A CN 201710129301A CN 106909852 A CN106909852 A CN 106909852A
- Authority
- CN
- China
- Prior art keywords
- character string
- character
- password
- encryption
- length
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services; Handling legal documents
- G06Q50/188—Electronic negotiation
Abstract
The embodiment of the invention discloses a kind of intelligent contract encryption method and device based on triple md5 encryption algorithms, the embodiment of the present invention is used for the encryption of electronic contract, transaction cost can be reduced, signer is set to be one-to-one relationship with the encryption of electronic contract, stranger cannot distort, I cannot break the promise, and can be applied in block chain technology in future, and can be used in many transaction based on internet.Specifically, md5 encryption algorithm has preferable security, apply in electronic contract, be capable of achieving the aspects such as digital signature, file integrality checking and password encryption.
Description
Technical field
The present invention relates to intelligent contract field of encryption, more particularly to a kind of intelligent contract based on triple md5 encryption algorithms
Encryption method and device.
Background technology
Into after 21 century, Internet technology is propagated its belief on a large scale, and is set up on internet and digital-scrambling techniques basis
Digital cash rises, some associated Floor layer Technologies, and such as block chain technology and distributed bookkeeping methods comes one after the other.Number
Word currency not only has public credibility as bank note, and can further reduce operating cost, and it all runs in going behind
Heart mechanism, it is main that trust systems are set up by distributed bookkeeping methods.One complete block chain application, contains super account
This, intelligent contract, secret protection and common recognition algorithm this four key technologies, it is ensured that the safe transfer of commercial assets, ensures
Enterprise core business, contract is properly stored, and has high secret protection technology, can guarantee that any data are not blocked halfway
Cut, reduce hacker attacks to the potential security risk of system failure.
Block chain is a kind of digital account book, and for recording the transaction on internet or other data, it has unusual
The characteristics of:First, Encryption Design causes that the record in block chain can not be eliminated;Secondly, block chain can be by one group of company or individual
People carries out sharing operation together, and this causes that some significant datas are no longer controlled by single entity or system.Many governments and grand duke
Block chain technology is currently explored by department, and this is not because wanting using bit coin, and because the excellent data of block chain are closed
Make mode.Block chain can make financial transaction, digital health record and manufacturing supply chain become more efficient and powerful.
Block chain can make the cooperation between company highly efficient and safe, data safely can be placed on into one and shared
Neutral Systems on, rather than being locked in certain private system.
The rise of mobile Internet, greatly facilitates the life of people, from ecommerce, mobile social, then in life
Clothing, food, lodging and transportion -- basic necessities of life, internet is further overturned and impacted to traditional industries.In Internet world, people can be mutual
Oneself unnecessary thing or exhaustless thing are traded, such as in energy internet, it is renewable that everyone produces
If the energy cannots be used up, can be traded with others, the process of transaction is stored in block chain node.Since having transaction, just
The bargain transaction having in contract, and reality also has contract.In order to reduce the cost of Contract Signing, the electricity based on intelligent contract
Sub- contract is expected in popularization and application in future.
Intelligent contract is that a kind of computer language substitution legal language goes to record the contract of clause.Intelligent contract can be by
One computing system is performed automatically.If block chain is a database, intelligent contract can exactly make block chain technology application
Application layer in the middle of to reality.Traditional contract does not join directly typically with the computer code for performing treaty content
System.Papery contract is in most cases archived, and software understands the contract bar that object computer code form is write
Money.The potential benefit of intelligent contract includes reducing the cost signed in terms of contract, execution and supervision;Therefore, to many low values
Conclude the business for related contract, this can greatly reduce human cost.
Therefore it provides a kind of the contractor can be made cannot to deny contracted electronic contract, and other people is pretended to be
I signs, and then causes that electronic contract and contractor are one-to-one relationships, and the encryption method for making intelligent contract come into force is this
Art personnel's technical issues that need to address.
The content of the invention
A kind of intelligent contract encryption method and device based on triple md5 encryption algorithms are the embodiment of the invention provides, can
So that contractor cannot deny contracted electronic contract, and other people are made to pretend to be my signature, therefore electronic contract
It is one-to-one relationship with contractor, so that intelligent contract comes into force.
A kind of intelligent contract encryption method based on triple md5 encryption algorithms is the embodiment of the invention provides, including:
S1:User account, user cipher and contract number are got, by md5 encryption algorithm according to the user account, institute
State user cipher and the contract number generates the first character string, the second character string and the 3rd character string;
S2:First character string, second character string and the 3rd character string are merged into the 4th character string;
S3:The difference L between presetting cipher length and preset character types quantity is calculated, is taken in the 4th character string
The character string of preceding L character is the character string of L in the 4th character string intercepted length as password initial value, obtains the 5th
Character string;
S4:Judge whether the character types that the password initial value is included meet preset character types condition, if it is not satisfied, time
The 5th character string is gone through, first character for meeting preset character types condition in the 5th character string is chosen, will be met
The character of preset character types condition is put into the password initial value, and re-executes S4, if meeting, by the beginning of the password
Value performs S5 as password;
S5:Judge whether the length of the password is equal to the presetting cipher length, if being equal to, terminate, if being not equal to,
First character for meeting preset character types condition in the 5th character string is then chosen, preset character types condition will be met
The character be put into the password, and S5 is re-executed, until the length of the password is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
Preferably, first character string is corresponding with the user account, the contract number.
Preferably, second character string is corresponding with the user cipher, the contract number.
Preferably, the 3rd character string is corresponding with the contract number.
Preferably, the presetting cipher length is 6 or 8 or 10 or 16.
Preferably, the embodiment of the present invention additionally provides a kind of intelligent contract encryption device based on triple md5 encryption algorithms,
Including:
Generation unit, for getting user account, user cipher and contract number, by md5 encryption algorithm according to
User account, the user cipher and the contract number generate the first character string, the second character string and the 3rd character string;
Combining unit, for first character string, second character string and the 3rd character string to be merged into
Four character strings;
Computing unit, for calculating the difference L between presetting cipher length and preset character types quantity, the described 4th
The character string of preceding L character is taken in character string as password initial value, and is the character of L in the 4th character string intercepted length
String, obtains the 5th character string;
First judging unit, for judging whether the character types that the password initial value is included meet preset character types bar
Part, if it is not satisfied, traversal the 5th character string, first meets preset character types condition in selection the 5th character string
Character, the character that will meet preset character types condition is put into the password initial value, and retriggered first judges
Unit, if meeting, using the password initial value as password, and triggers the second judging unit;
Whether the second judging unit, the length for judging the password is equal to the presetting cipher length, if being equal to,
Terminate, if being not equal to, choose first character for meeting preset character types condition in the 5th character string, it is pre- by meeting
The character for putting character types condition is put into the password, and the judging unit of retriggered second, until the password
Length is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
Preferably, first character string is corresponding with the user account, the contract number.
Preferably, second character string is corresponding with the user cipher, the contract number.
Preferably, the 3rd character string is corresponding with the contract number.
Preferably, the presetting cipher length is 6 or 8 or 10 or 16.
As can be seen from the above technical solutions, the embodiment of the present invention has advantages below:
A kind of intelligent contract encryption method and device based on triple md5 encryption algorithms are the embodiment of the invention provides, its
In, the intelligent contract encryption method that should be based on triple md5 encryption algorithms includes:S1:Get user account, user cipher and conjunction
Jack per line, by md5 encryption algorithm according to the user account, the user cipher and the contract number generate the first character string,
Second character string and the 3rd character string;S2:First character string, second character string and the 3rd character string are merged
Into the 4th character string;S3:The difference L between presetting cipher length and preset character types quantity is calculated, in the 4th character
The character string of preceding L character is taken in string as password initial value, and is the character string of L in the 4th character string intercepted length, obtained
To the 5th character string;S4:Judge whether the character types that the password initial value is included meet preset character types condition, if discontented
Foot, travels through the 5th character string, chooses first character for meeting preset character types condition in the 5th character string, will
The character for meeting preset character types condition is put into the password initial value, and re-executes S4, if meeting, will be described close
Code initial value performs S5 as password;S5:Judge whether the length of the password is equal to the presetting cipher length, if being equal to,
Then terminate, if being not equal to, choose first character for meeting preset character types condition in the 5th character string, will meet
The character of preset character types condition is put into the password, and re-executes S5, until the length of the password is equal to
The presetting cipher length;Wherein, L=1,2,3 ... n.
A kind of intelligent contract encryption method and device based on triple md5 encryption algorithms provided in an embodiment of the present invention are used for
The encryption of electronic contract, can reduce transaction cost, make signer be one-to-one relationship, Wai Renwu with the encryption of electronic contract
Method is distorted, and I cannot break the promise, and can be applied in block chain technology in future, and can be used in much based on internet
Transaction in.Specifically, md5 encryption algorithm has preferable security, apply in electronic contract, achievable digital signature,
The aspect such as file integrality checking and password encryption.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also
Other accompanying drawings are obtained with according to these accompanying drawings.
Fig. 1 is a kind of stream of intelligent contract encryption method based on triple md5 encryption algorithms provided in an embodiment of the present invention
Journey schematic diagram;
Fig. 2 is a kind of knot of intelligent contract encryption device based on triple md5 encryption algorithms provided in an embodiment of the present invention
Structure schematic diagram.
Specific embodiment
A kind of intelligent contract encryption method and device based on triple md5 encryption algorithms are the embodiment of the invention provides, can
So that contractor cannot deny contracted electronic contract, and other people are made to pretend to be my signature, therefore electronic contract
It is one-to-one relationship with contractor, so that intelligent contract comes into force.
To enable that goal of the invention of the invention, feature, advantage are more obvious and understandable, below in conjunction with the present invention
Accompanying drawing in embodiment, is clearly and completely described, it is clear that disclosed below to the technical scheme in the embodiment of the present invention
Embodiment be only a part of embodiment of the invention, and not all embodiment.Based on the embodiment in the present invention, this area
All other embodiment that those of ordinary skill is obtained under the premise of creative work is not made, belongs to protection of the present invention
Scope.
Refer to Fig. 1, a kind of intelligent contract encryption method based on triple md5 encryption algorithms provided in an embodiment of the present invention
One embodiment, including:
101st, user account, user cipher and contract number are got, by md5 encryption algorithm according to user account, user
Password and contract number generate the first character string, the second character string and the 3rd character string;
Get user account, user cipher and contract number, by call for three times md5 encryption algorithm according to user account,
User cipher and contract number generate the first character string, the second character string and the 3rd character string.
Further, the first character string is corresponding with user account, contract number.
Further, the second character string is corresponding with user cipher, contract number.
Further, the 3rd character string is corresponding with contract number.
102nd, the first character string, the second character string and the 3rd character string are merged into the 4th character string;
After the first character string, the second character string and the 3rd character string is obtained, by the first character string, the second character string and
Three character strings are merged into the 4th character string.
103rd, the difference L between presetting cipher length and preset character types quantity is calculated, L before taking in the 4th character string
The character string of individual character is the character string of L in the 4th character string intercepted length as password initial value, obtains the 5th character string;
After the 4th character string is obtained, the difference L between presetting cipher length and preset character types quantity is calculated, the
The character string of preceding L character is taken in four character strings as password initial value, and is the character string of L in the 4th character string intercepted length,
The 5th character string is obtained, wherein, L=1,2,3 ... n.
In the present embodiment, presetting cipher length is 6 or 8 or 10 or 16, is not limited herein.
104th, judge whether the character types that password initial value is included meet preset character types condition, if it is not satisfied, traversal
5th character string, chooses first character for meeting preset character types condition in the 5th character string, will meet preset character type
The character of type condition is put into password initial value, and re-executes 104, if meeting, using password initial value as password, and performs 105;
After obtaining the 5th character string, judge whether the character types that password initial value is included meet preset character types condition,
If it is not satisfied, the 5th character string of traversal, chooses first character for meeting preset character types condition in the 5th character string, will be full
The character of the preset character types condition of foot is put into password initial value, and re-executes step 104, if meeting, password initial value is made
It is password, and performs step 105.
105th, judge whether the length of password is equal to presetting cipher length, if being equal to, terminate, if being not equal to, choose
First character for meeting preset character types condition in 5th character string, the character that will meet preset character types condition is put into
In password, and 105 are re-executed, until the length of password is equal to presetting cipher length.
Judge whether the length of password is equal to presetting cipher length, if being equal to, terminate, if being not equal to, choose the 5th
First character for meeting preset character types condition in character string, the character that will meet preset character types condition is put into password
In, and step 105 is re-executed, until the length of password is equal to presetting cipher length.
The above is the detailed description carried out to a kind of intelligent contract encryption method based on triple md5 encryption algorithms, is just
In understanding, below by the answering to a kind of intelligent contract encryption method based on triple md5 encryption algorithms with a concrete application scene
With illustrating, application examples includes:
(1) input user uses account and password.
(2) user to him each need generate Crypted password contract, be input into contract number.
(3) Crypted password of selection generation, digit N in need, usually 6,8,10,16 length.
Generate the requirement of password, general capitalization in need, need small letter, need numeral, need special, we are for selecting
Selecting needs generation number of types to be designated as n.
(4) algorithm:
X=md5 (account+contract number);
X1=md5 (password+contract number);
X2=md5 (contract number).
One section of character string s=x [0,1] of generation, x1 [0,1], x2 [0,1], x [2,3] ....
(5) L=N-n, L is made to represent length, N is exactly the length for needing to generate password, and n is exactly Selective type number, using must
There need be type, if the character for taking out does not have type selecting, then finally adding type.
(6) password k=s [0, L] is taken, k=S [0, L] represents that the L substring of character is used as password initial value before taking character string S.
If k has the type not comprising selection, then continuation is looked in s [L], first type of selection is found, be put into k, Zhi Daosuo
There is type to be all found, S [L] represents that interception character string S length is the character string of L.
Wherein, the character in password string need to finally have n types, but initial value K may not include n types,
So end plus comprising type character, so travel through in the S [L] finding first and different types of character
It is added to the end of k character strings, is mainly found with the method for traversal.
(7) if at this moment the length of password is less than N, then down take the character of s [L], until Password Length is N.
The embodiment of the present invention is based on the password and account and contract number of contractor, and N character string password of generation has
Uniqueness, and have one-to-one relation with the account and password and contract number of contractor.Contractor generally uses oneself note
Account firmly and password are signed to electronic contract, are so encrypted using the intelligent contract based on triple md5 encryption algorithms
The N character string that technology is generated is encrypted to contract, and the encryption of the first contract is high;Second contractor cannot deny and be signed
Contract about, so as to prevent fraud.
The application example is carried out by following core code:
Refer to Fig. 2, a kind of intelligent contract encryption device based on triple md5 encryption algorithms provided in an embodiment of the present invention
One embodiment, including:
Generation unit 201, for getting user account, user cipher and contract number, by md5 encryption algorithm according to
Family account, user cipher and contract number generate the first character string, the second character string and the 3rd character string;
Combining unit 202, for the first character string, the second character string and the 3rd character string to be merged into the 4th character string;
Computing unit 203, for calculating the difference L between presetting cipher length and preset character types quantity, the 4th
The character string of preceding L character is taken in character string as password initial value, and is the character string of L in the 4th character string intercepted length, obtained
To the 5th character string;
First judging unit 204, for judging whether the character types that password initial value is included meet preset character types bar
Part, if it is not satisfied, the 5th character string of traversal, chooses first character for meeting preset character types condition in the 5th character string,
The character that preset character types condition will be met is put into password initial value, and the first judging unit of retriggered 204, if meeting,
Using password initial value as password, and trigger the second judging unit 205;
Whether the second judging unit 205, the length for judging password is equal to presetting cipher length, if being equal to, terminates,
If being not equal to, first character for meeting preset character types condition in the 5th character string is chosen, preset character type will be met
The character of type condition is put into password, and the second judging unit of retriggered 205, until the length of password is long equal to presetting cipher
Degree;
Wherein, L=1,2,3 ... n.
Further, the first character string is corresponding with user account, contract number.
Further, the second character string is corresponding with user cipher, contract number.
Further, the 3rd character string is corresponding with contract number.
Further, presetting cipher length is 6 or 8 or 10 or 16, is not limited herein.
The design cycle of the embodiment of the present invention is as follows:
The account of user input oneself, password, contract number first;Then md5 encryption algorithm is called three times, parameter is respectively
Account+contract number, password+contract number, contract number, it is respectively X, X1, X2, i.e. X=MD5 (accounts+contract to obtain three character strings
Number), X1=MD5 (password+contract number), X2=MD5 (contract number);Then one section of character string S=X [0,1] X1 [0,1] X2 is synthesized
[0,1] X [2,3] X1 [2,3] X2 [2,3] ..., takes L=N-n, and wherein N is final digit, and n is character types;Note K=S
[0, L], if K has the type not comprising selection, then continuation is looked in S [L], the type for finding first selection is put into K
In, until all of type is all found.If at this moment the length of password is less than N, then down take the character of S [L], Zhi Daomi
Code length is N.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematical, for example, the unit
Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, for example multiple units or component
Can combine or be desirably integrated into another system, or some features can be ignored, or do not perform.It is another, it is shown or
The coupling each other for discussing or direct-coupling or communication connection can be the indirect couplings of device or unit by some interfaces
Close or communicate to connect, can be electrical, mechanical or other forms.
The unit that is illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be according to the actual needs selected to realize the mesh of this embodiment scheme
's.
In addition, during each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list
Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is to realize in the form of SFU software functional unit and as independent production marketing or use
When, can store in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part for being contributed to prior art in other words or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are used to so that a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to preceding
Embodiment is stated to be described in detail the present invention, it will be understood by those within the art that:It still can be to preceding
State the technical scheme described in each embodiment to modify, or equivalent is carried out to which part technical characteristic;And these
Modification is replaced, and does not make the spirit and scope of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution.
Claims (10)
1. a kind of intelligent contract encryption method based on triple md5 encryption algorithms, it is characterised in that including:
S1:User account, user cipher and contract number are got, by md5 encryption algorithm according to the user account, the use
Family password and the contract number generate the first character string, the second character string and the 3rd character string;
S2:First character string, second character string and the 3rd character string are merged into the 4th character string;
S3:The difference L between presetting cipher length and preset character types quantity is calculated, L before taking in the 4th character string
The character string of individual character is the character string of L in the 4th character string intercepted length as password initial value, obtains the 5th character
String;
S4:Judge whether the character types that the password initial value is included meet preset character types condition, if it is not satisfied, traversal institute
The 5th character string is stated, first character for meeting preset character types condition in the 5th character string is chosen, will be met preset
The character of character types condition is put into the password initial value, and re-executes S4, if meeting, the password initial value is made
It is password, and performs S5;
S5:Judge whether the length of the password is equal to the presetting cipher length, if being equal to, terminate, if being not equal to, select
First character for meeting preset character types condition in the 5th character string is taken, the institute of preset character types condition will be met
State character to be put into the password, and re-execute S5, until the length of the password is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
2. the intelligent contract encryption method based on triple md5 encryption algorithms according to claim 1, it is characterised in that institute
State the first character string corresponding with the user account, the contract number.
3. the intelligent contract encryption method based on triple md5 encryption algorithms according to claim 2, it is characterised in that institute
State the second character string corresponding with the user cipher, the contract number.
4. the intelligent contract encryption method based on triple md5 encryption algorithms according to claim 3, it is characterised in that institute
State the 3rd character string corresponding with the contract number.
5. the intelligent contract encryption method based on triple md5 encryption algorithms according to claim 1, it is characterised in that institute
It is 6 or 8 or 10 or 16 to state presetting cipher length.
6. a kind of intelligent contract encryption device based on triple md5 encryption algorithms, it is characterised in that including:
Generation unit, for getting user account, user cipher and contract number, by md5 encryption algorithm according to the user
Account, the user cipher and the contract number generate the first character string, the second character string and the 3rd character string;
Combining unit, for first character string, second character string and the 3rd character string to be merged into the 4th word
Symbol string;
Computing unit, for calculating the difference L between presetting cipher length and preset character types quantity, in the 4th character
The character string of preceding L character is taken in string as password initial value, and is the character string of L in the 4th character string intercepted length, obtained
To the 5th character string;
First judging unit, for judging whether the character types that the password initial value is included meet preset character types condition,
If it is not satisfied, traversal the 5th character string, first meets preset character types condition in selection the 5th character string
Character, the character that will meet preset character types condition is put into the password initial value, and retriggered first judges list
Unit, if meeting, using the password initial value as password, and triggers the second judging unit;
Whether the second judging unit, the length for judging the password is equal to the presetting cipher length, if being equal to, ties
Beam, if being not equal to, chooses first character for meeting preset character types condition in the 5th character string, will meet preset
The character of character types condition is put into the password, and the judging unit of retriggered second, until the length of the password
Degree is equal to the presetting cipher length;
Wherein, L=1,2,3 ... n.
7. the intelligent contract encryption device based on triple md5 encryption algorithms according to claim 6, it is characterised in that institute
State the first character string corresponding with the user account, the contract number.
8. the intelligent contract encryption device based on triple md5 encryption algorithms according to claim 7, it is characterised in that institute
State the second character string corresponding with the user cipher, the contract number.
9. the intelligent contract encryption device based on triple md5 encryption algorithms according to claim 8, it is characterised in that institute
State the 3rd character string corresponding with the contract number.
10. the intelligent contract encryption device based on triple md5 encryption algorithms according to claim 6, it is characterised in that institute
It is 6 or 8 or 10 or 16 to state presetting cipher length.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710129301.8A CN106909852B (en) | 2017-03-06 | 2017-03-06 | Intelligent contract encryption method and device based on triple md5 encryption algorithms |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710129301.8A CN106909852B (en) | 2017-03-06 | 2017-03-06 | Intelligent contract encryption method and device based on triple md5 encryption algorithms |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106909852A true CN106909852A (en) | 2017-06-30 |
CN106909852B CN106909852B (en) | 2019-11-08 |
Family
ID=59187018
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710129301.8A Expired - Fee Related CN106909852B (en) | 2017-03-06 | 2017-03-06 | Intelligent contract encryption method and device based on triple md5 encryption algorithms |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106909852B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107342858A (en) * | 2017-07-05 | 2017-11-10 | 武汉凤链科技有限公司 | A kind of intelligent contract guard method and system based on trusted context |
CN109428722A (en) * | 2017-08-30 | 2019-03-05 | 上海策赢网络科技有限公司 | A kind of content delivery method and device |
CN110020855A (en) * | 2019-01-31 | 2019-07-16 | 阿里巴巴集团控股有限公司 | Method, the node, storage medium of secret protection are realized in block chain |
CN110096901A (en) * | 2019-05-08 | 2019-08-06 | 北京智签科技有限公司 | Electronic contract data encryption storage method and signed client end |
WO2020233632A1 (en) * | 2019-05-20 | 2020-11-26 | 创新先进技术有限公司 | Receipt storage method and node based on event function type |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101199160A (en) * | 2005-04-15 | 2008-06-11 | 朱利叶斯·穆瓦勒 | Method and system for string-based biometric authentication |
US20090217035A1 (en) * | 2004-07-12 | 2009-08-27 | Abdul Hameed Khan Abdul Rahman | Bilaterally Generated Encryption Key System |
CN101593332A (en) * | 2008-05-28 | 2009-12-02 | 北京邮电大学 | A kind of electronic contract management system and its implementation |
CN102983967A (en) * | 2012-12-06 | 2013-03-20 | 厦门市美亚柏科信息股份有限公司 | Quick traversal algorithm and device for complicated password |
CN103326991A (en) * | 2012-03-20 | 2013-09-25 | 北京聚宝网络科技有限公司 | Method for password encrypted storage and password authentication |
CN103684758A (en) * | 2013-11-05 | 2014-03-26 | 广东全通教育股份有限公司 | User password mixing encryption method and system |
US20150033014A1 (en) * | 2013-07-24 | 2015-01-29 | Cisco Technology, Inc. | Compact and Efficient Communication Security through Combining Anti-Replay with Encryption |
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
-
2017
- 2017-03-06 CN CN201710129301.8A patent/CN106909852B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090217035A1 (en) * | 2004-07-12 | 2009-08-27 | Abdul Hameed Khan Abdul Rahman | Bilaterally Generated Encryption Key System |
CN101199160A (en) * | 2005-04-15 | 2008-06-11 | 朱利叶斯·穆瓦勒 | Method and system for string-based biometric authentication |
CN101593332A (en) * | 2008-05-28 | 2009-12-02 | 北京邮电大学 | A kind of electronic contract management system and its implementation |
CN103326991A (en) * | 2012-03-20 | 2013-09-25 | 北京聚宝网络科技有限公司 | Method for password encrypted storage and password authentication |
CN102983967A (en) * | 2012-12-06 | 2013-03-20 | 厦门市美亚柏科信息股份有限公司 | Quick traversal algorithm and device for complicated password |
US20150033014A1 (en) * | 2013-07-24 | 2015-01-29 | Cisco Technology, Inc. | Compact and Efficient Communication Security through Combining Anti-Replay with Encryption |
CN103684758A (en) * | 2013-11-05 | 2014-03-26 | 广东全通教育股份有限公司 | User password mixing encryption method and system |
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
Non-Patent Citations (1)
Title |
---|
李灿丽: "电子签章在电子政务中的应用研究", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107342858A (en) * | 2017-07-05 | 2017-11-10 | 武汉凤链科技有限公司 | A kind of intelligent contract guard method and system based on trusted context |
CN107342858B (en) * | 2017-07-05 | 2019-09-10 | 武汉凤链科技有限公司 | A kind of intelligent contract guard method and system based on trusted context |
CN109428722A (en) * | 2017-08-30 | 2019-03-05 | 上海策赢网络科技有限公司 | A kind of content delivery method and device |
CN110020855A (en) * | 2019-01-31 | 2019-07-16 | 阿里巴巴集团控股有限公司 | Method, the node, storage medium of secret protection are realized in block chain |
CN110020855B (en) * | 2019-01-31 | 2020-05-29 | 阿里巴巴集团控股有限公司 | Method, node and storage medium for realizing privacy protection in block chain |
CN110096901A (en) * | 2019-05-08 | 2019-08-06 | 北京智签科技有限公司 | Electronic contract data encryption storage method and signed client end |
WO2020233632A1 (en) * | 2019-05-20 | 2020-11-26 | 创新先进技术有限公司 | Receipt storage method and node based on event function type |
Also Published As
Publication number | Publication date |
---|---|
CN106909852B (en) | 2019-11-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Singh et al. | Blockchain: Future of financial and cyber security | |
US10560451B2 (en) | Table-connected tokenization | |
CN106909852B (en) | Intelligent contract encryption method and device based on triple md5 encryption algorithms | |
CN109074562B (en) | Combined data transmission control method and system based on block chain | |
CN109919756A (en) | Fund transfer system, checking method and method of commerce based on Merkle tree backtracking location technology | |
CN110709871A (en) | Parameterizable intelligent contracts | |
US10068106B2 (en) | Tokenization column replacement | |
US20220138740A1 (en) | Computer-implemented method, a computer system and a cryptocurrency depository for enabling secure escrow and safekeeping of a cryptocurrency | |
US20200082388A1 (en) | Authenticating server and method for transactions on blockchain | |
CN107070896A (en) | A kind of safe and efficient block chain customization login method and security hardening system | |
Hameed | Blockchain and Cryptocurrencies Technology: a survey | |
CN111597167A (en) | Big data management system and method applying block chain technology | |
KR20190093011A (en) | The block-chain system with enhanced security and the method of generating a data block using a double block-chain structure | |
KR102181098B1 (en) | System and method for distributed database using block chain | |
Khangura et al. | A study on security threats to blockchain & cryptocurrencies | |
Chhabra et al. | An overview of blockchain technology and comparison between various cryptocurrencies | |
Agrawal et al. | A role of blockchain in IoT and financial applications | |
Pestunov | Cryptocurrencies and Blockchain: Potential Applications in Government and Business | |
RU2686818C1 (en) | Method for scaling distributed information system | |
CN116547944A (en) | Signature generation device, authentication device, and program | |
Nath et al. | Impact of Blockchain to Secure E-Banking Transaction | |
Lukina et al. | Electronic payment systems and blockchain as a constituent part | |
Zhang et al. | Anonymous hidden transaction model for blockchain systems | |
Sirohi | Relevance of Blockchain Technology in The Scenario of Escalating Cybercrime in Banking Sector in the UK | |
Zhang et al. | Occupation mechanism for eliminating double-spending attacks on trusted transaction blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20191108 Termination date: 20200306 |
|
CF01 | Termination of patent right due to non-payment of annual fee |