CN107016272A - A kind of high anti-information of security performance loses telecommunications transaction login system - Google Patents
A kind of high anti-information of security performance loses telecommunications transaction login system Download PDFInfo
- Publication number
- CN107016272A CN107016272A CN201710193156.XA CN201710193156A CN107016272A CN 107016272 A CN107016272 A CN 107016272A CN 201710193156 A CN201710193156 A CN 201710193156A CN 107016272 A CN107016272 A CN 107016272A
- Authority
- CN
- China
- Prior art keywords
- module
- input
- output end
- electrically connected
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Life Sciences & Earth Sciences (AREA)
- General Business, Economics & Management (AREA)
- Software Systems (AREA)
- Collating Specific Patterns (AREA)
Abstract
The present invention relates to electronic communication technology field, and disclose a kind of high anti-information loss telecommunications transaction login system of security performance, including User logs in unit, the output end of the User logs in unit is electrically connected with the input of fingerprint collecting unit and image receiving unit, the output end of the fingerprint collecting unit is electrically connected with the input of single-chip microcomputer, the output end of the single-chip microcomputer is electrically connected with the input of fingerprint comparison unit, and the fingerprint comparison unit includes finger print information receiving module, finger print information comparing module and finger print information output module.By setting image receiving unit and fingerprint collecting unit, user can need not carry out the typing of password, directly being shot with video-corder by fingerprint and face can complete to log in, not only substantially increase security during user's login account, user is also convenient for simultaneously and carries out login account, substantially increases the practicality that the high anti-information of security performance loses telecommunications transaction login system.
Description
Technical field
The present invention relates to electronic communication technology field, the high anti-information of specially a kind of security performance is lost telecommunications and handed over
Easy login system.
Background technology
Electronic communications network (ECN)(Electronic Communication Network, hereinafter referred to as ECN)Refer to financial friendship
E-transaction platform easily between institute, stock broker business and their client.Now, this term, which is widely applied, is then
In computer network and communication network science.In financial industry, ECN refers to that one kind allows client in stock exchange
Outside transaction finance product computer system, most common products transactions are stock and foreign exchange.Initial ECN is in 1998
By U.S. Securities & Exchange Commission(SEC)Approval after set up.The characteristics of ECN, is, is used for carrying by reducing transaction fee
Degree of contention between high marketing business, the order ticket set that dealer may have access in system, in traditional transaction on exchange
It is dealer's trade matching etc. beyond time.
User often only needs to a login password i.e. when being logged in using existing telecommunications transaction system
It can be logged in, some criminals can be stolen using some assault softwares to password, so that can be to user
Serious property loss is caused, is logged in therefore, losing telecommunications transaction we have proposed a kind of high anti-information of security performance
System solves the above problems.
The content of the invention
(One)The technical problem of solution
In view of the shortcomings of the prior art, telecommunications transaction is lost the invention provides a kind of high anti-information of security performance to log in
System, possesses the high advantage of security performance, solves the problem of existing system security is not good.
(Two)Technical scheme
To realize purpose that above-mentioned security performance is high, the present invention provides following technical scheme:A kind of high anti-information of security performance
Telecommunications transaction login system, including User logs in unit are lost, the output end of the User logs in unit is electrically connected with finger
The input of line collecting unit and image receiving unit, the output end of the fingerprint collecting unit is electrically connected with the defeated of single-chip microcomputer
Enter end, the output end of the single-chip microcomputer is electrically connected with the input of fingerprint comparison unit, and the fingerprint comparison unit includes fingerprint
Information receiving module, finger print information comparing module and finger print information output module, the output end electricity of the fingerprint comparison unit
The input of finger print information feedback module is connected with, the output end of the finger print information feedback module is electrically connected with the defeated of single-chip microcomputer
Enter end, the output end of described image receiving unit is electrically connected with the input of single-chip microcomputer, the output end electrical connection of the single-chip microcomputer
There is the input of face identification unit, the face identification unit includes image receiver module, image comparison module, comparing result
Output module, the input of described image contrast module is electrically connected with the output end of memory module, and the comparing result exports mould
The output end of block is electrically connected with the input of image information feedback module, the output end electrical connection of described image information feedback module
There is the input of single-chip microcomputer, the output end of the single-chip microcomputer is electrically connected with the input of trusted servers, the trusted servers
Output end be electrically connected with the input of remote terminal, the output end of the trusted servers is electrically connected with generation block unit
Input, the output end of the generation block unit is electrically connected with the input of block chain, and the output end of the block chain is electrically connected
It is connected to the input of timestamp module, block chain network safe unit and mass file backup module.
It is preferred that, the output end of the single-chip microcomputer is electrically connected with finger print information receiving module, and the finger print information receives mould
The output end of block is electrically connected with the input of finger print information comparing module, the output end electrical connection of the finger print information comparing module
There is the input of finger print information output module, the output end of the finger print information output module is electrically connected with finger print information feedback mould
The input of block.
It is preferred that, described image receiving unit shoots with video-corder module, picture signal receiving module, picture signal including picture signal
Modular converter, picture signal amplification module and picture signal transport module.
It is preferred that, the fingerprint collecting unit includes fingerprint typing module, fingerprint receiving module and fingerprint transport module.
It is preferred that, the block chain network safe unit includes key management module, lock box mechanism and CA certificate.
It is preferred that, the memory module internal memory contains the human face image information that prestores.
It is preferred that, the block chain includes node one, node two, node three and node four.
It is preferred that, the information that the node one, node two, node three and node four are recorded is differed.
It is preferred that, the single-chip microcomputer use 80C51 single-chip microcomputers, 80C51 single-chip microcomputers using 40 pin dual inline type DIP,
Inside there are 128 ram cells and 4K ROM and there are two 16 bit timing counters, interrupt outside two, during two timings count
Disconnected and a serial interruption and 48 parallel-by-bit input ports.
It is preferred that, the lock box mechanism includes at least two key distribution schemes.
(Three)Beneficial effect
Compared with prior art, lose telecommunications transaction the invention provides a kind of high anti-information of security performance and log in system
System, possesses following beneficial effect:
1st, the high anti-information of the security performance loses telecommunications transaction login system, by setting image receiving unit and referring to
Line collecting unit, user can need not carry out the typing of password, and directly being shot with video-corder by fingerprint and face can complete to log in,
Security during user's login account is not only substantially increased, while being also convenient for user carries out login account, is greatly improved
The high anti-information of security performance is lost telecommunications and merchandised the practicality of login system.
2nd, the high anti-information of the security performance loses telecommunications transaction login system, by setting block chain network safety
Storage is encrypted by block chain safe unit in unit, all log-on messages by block chained record, and user is needed to logging in
When information is inquired about, user is inquired about log-on message using the key uniquely matched, so as to ensure that the security performance
High anti-information loses the security of telecommunications transaction login system.
3rd, the high anti-information of the security performance loses telecommunications transaction login system, by setting timestamp module, protects
The log-on message for having demonstrate,proved the unit generation of generation block is write in block chain together with corresponding login time information, is easy to use in the future
Person logs in situation to the account of user oneself and carries out understanding inquiry.
Brief description of the drawings
Fig. 1 is present system schematic diagram;
Fig. 2 is image receiving unit schematic diagram of the present invention;
Fig. 3 is fingerprint collecting unit schematic diagram of the present invention;
Fig. 4 is block chain network safe unit schematic diagram of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
Fig. 1-4 are referred to, a kind of high anti-information of security performance loses telecommunications transaction login system, including user steps on
Unit is recorded, the output end of User logs in unit is electrically connected with the input of fingerprint collecting unit and image receiving unit, image
Receiving unit shoots with video-corder module, picture signal receiving module, picture signal modular converter, picture signal amplification mould including picture signal
Block and picture signal transport module, fingerprint collecting unit include fingerprint typing module, fingerprint receiving module and fingerprint transmission
Module, by setting image receiving unit and fingerprint collecting unit, user can need not carry out the typing of password, directly lead to
Cross fingerprint and face is shot with video-corder and can complete to log in, not only substantially increase security during user's login account, also simultaneously
It is easy to user to carry out login account, substantially increases the high anti-information of security performance and lose telecommunications transaction login system
Practicality, the output end of fingerprint collecting unit is electrically connected with the input of single-chip microcomputer, and single-chip microcomputer uses 80C51 single-chip microcomputers, 80C51
Single-chip microcomputer using 40 pin dual inline type DIP, interior have 128 ram cells and 4K ROM and have two 16 bit timing meters
Number device, interrupt outside two, two timing numerations interrupt and one it is serial interrupt and 48 parallel-by-bit input ports, single-chip microcomputer it is defeated
Go out the input that end is electrically connected with fingerprint comparison unit, fingerprint comparison unit includes finger print information receiving module, finger print information ratio
To module and finger print information output module, the output end of fingerprint comparison unit is electrically connected with the input of finger print information feedback module
End, the output end of single-chip microcomputer is electrically connected with finger print information receiving module, and the output end of finger print information receiving module is electrically connected with finger
The input of line information comparison module, the output end of finger print information comparing module is electrically connected with the input of finger print information output module
End, the output end of finger print information output module is electrically connected with the input of finger print information feedback module, finger print information feedback module
Output end be electrically connected with the input of single-chip microcomputer, the output end of image receiving unit is electrically connected with the input of single-chip microcomputer, single
The output end of piece machine is electrically connected with the input of face identification unit, and face identification unit includes image receiver module, image pair
Than module, comparing result output module, the input of image comparison module is electrically connected with the output end of memory module, memory module
Internal memory contains the human face image information that prestores, and the output end of comparing result output module is electrically connected with the defeated of image information feedback module
Enter end, the output end of image information feedback module is electrically connected with the input of single-chip microcomputer, and the output end of single-chip microcomputer is electrically connected with can
The input of telecommunications services device, the output end of trusted servers is electrically connected with the input of remote terminal, the output of trusted servers
End is electrically connected with the input of generation block unit, and the output end of generation block unit is electrically connected with the input of block chain, area
Block chain includes node one, node two, node three and node four, the letter that node one, node two, node three and node four are recorded
Breath is differed, and it is standby that the output end of block chain is electrically connected with timestamp module, block chain network safe unit and mass file
The input of part module, block chain network safe unit includes key management module, lock box mechanism and CA certificate, lock box mechanism
Including at least two key distribution schemes, when user needs to carry out log-on message extraction, user is utilized in key management module only
The key and the CA certificate by checking of one pairing, the log-on message being stored in lock box mechanism are extracted, by setting
Put timestamp module, it is ensured that the log-on message of generation block unit generation writes block chain together with corresponding login time information
In, it is easy to account login situation progress understanding inquiry of the user to user oneself in the future, by setting block chain network to pacify
Storage is encrypted by block chain safe unit in full unit, all log-on messages by block chained record, and user is needed to stepping on
When record information is inquired about, user is inquired about log-on message using the key uniquely matched, so as to ensure that the security
The security of anti-information loss telecommunications transaction login system that can be high.
In summary, the high anti-information of the security performance loses telecommunications transaction login system, by setting image to connect
Unit and fingerprint collecting unit are received, user can need not carry out the typing of password, directly be shot with video-corder by fingerprint and face
It can complete to log in, not only substantially increase security during user's login account, logged in while being also convenient for user
Account, substantially increases the practicality that the high anti-information of security performance loses telecommunications transaction login system;
By setting block chain network safe unit, all log-on messages by block chained record are entered by block chain safe unit
Row encryption storage, when user needs to inquire about log-on message, user is carried out using the key uniquely matched to log-on message
Inquiry, so as to ensure that the high anti-information of the security performance loses the security of telecommunications transaction login system;
By setting timestamp module, it is ensured that the log-on message of generation block unit generation is together with corresponding login time information
Write in block chain, be easy to account login situation progress understanding inquiry of the user to user oneself in the future.
The correlation module being related in the system is hardware system module or is prior art Computer Software journey
The functional module that sequence or agreement are combined with hardware, computer software programs or agreement involved by the functional module itself
The technology being well known to those skilled in the art, it is not the improvements of the system;The system is improved between each module
Interaction relationship or annexation, be that the overall construction of system is improved, to be solved with solving the system
Relevant art problem.
Although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of changes, modification can be carried out to these embodiments, replace without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (10)
1. a kind of high anti-information of security performance loses telecommunications transaction login system, including User logs in unit, its feature
It is:The output end of the User logs in unit is electrically connected with the input of fingerprint collecting unit and image receiving unit, institute
The output end for stating fingerprint collecting unit is electrically connected with the input of single-chip microcomputer, and the output end of the single-chip microcomputer is electrically connected with fingerprint ratio
To the input of unit, the fingerprint comparison unit includes finger print information receiving module, finger print information comparing module and fingerprint
Message output module, the output end of the fingerprint comparison unit is electrically connected with the input of finger print information feedback module, the finger
The output end of line information feedback module is electrically connected with the input of single-chip microcomputer, and the output end of described image receiving unit is electrically connected with
The input of single-chip microcomputer, the output end of the single-chip microcomputer is electrically connected with the input of face identification unit, the recognition of face list
Member includes image receiver module, image comparison module, comparing result output module, and the input of described image contrast module is electrically connected
The output end of memory module is connected to, the output end of the comparing result output module is electrically connected with the defeated of image information feedback module
Enter end, the output end of described image information feedback module is electrically connected with the input of single-chip microcomputer, the output end electricity of the single-chip microcomputer
The input of trusted servers is connected with, the output end of the trusted servers is electrically connected with the input of remote terminal, described
The output end of trusted servers is electrically connected with the input of generation block unit, the output end electrical connection of the generation block unit
Have an input of block chain, the output end of the block chain be electrically connected with timestamp module, block chain network safe unit and
The input of mass file backup module.
2. a kind of high anti-information of security performance according to claim 1 loses telecommunications transaction login system, it is special
Levy and be:The output end of the single-chip microcomputer is electrically connected with finger print information receiving module, the output of the finger print information receiving module
End is electrically connected with the input of finger print information comparing module, and the output end of the finger print information comparing module is electrically connected with fingerprint letter
The input of output module is ceased, the output end of the finger print information output module is electrically connected with the input of finger print information feedback module
End.
3. a kind of high anti-information of security performance according to claim 1 loses telecommunications transaction login system, it is special
Levy and be:Described image receiving unit shoots with video-corder module, picture signal receiving module, picture signal modulus of conversion including picture signal
Block, picture signal amplification module and picture signal transport module.
4. a kind of high anti-information of security performance according to claim 1 loses telecommunications transaction login system, it is special
Levy and be:The fingerprint collecting unit includes fingerprint typing module, fingerprint receiving module and fingerprint transport module.
5. a kind of high anti-information of security performance according to claim 1 loses telecommunications transaction login system, it is special
Levy and be:The block chain network safe unit includes key management module, lock box mechanism and CA certificate.
6. a kind of high anti-information of security performance according to claim 1 loses telecommunications transaction login system, it is special
Levy and be:The memory module internal memory contains the human face image information that prestores.
7. a kind of high anti-information of security performance according to claim 1 loses telecommunications transaction login system, it is special
Levy and be:The block chain includes node one, node two, node three and node four.
8. a kind of high anti-information of security performance according to claim 7 loses telecommunications transaction login system, it is special
Levy and be:The information that the node one, node two, node three and node four are recorded is differed.
9. a kind of high anti-information of security performance according to claim 1 loses telecommunications transaction login system, it is special
Levy and be:The single-chip microcomputer uses 80C51 single-chip microcomputers, 80C51 single-chip microcomputers using 40 pin dual inline type DIP, interior have 128
Ram cell and 4K ROM and have two 16 bit timing counters, interrupt outside two, two timing numerations are interrupted and one
It is serial to interrupt and 48 parallel-by-bit input ports.
10. a kind of high anti-information of security performance according to claim 5 loses telecommunications transaction login system, it is special
Levy and be:The lock box mechanism includes at least two key distribution schemes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710193156.XA CN107016272A (en) | 2017-03-28 | 2017-03-28 | A kind of high anti-information of security performance loses telecommunications transaction login system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710193156.XA CN107016272A (en) | 2017-03-28 | 2017-03-28 | A kind of high anti-information of security performance loses telecommunications transaction login system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107016272A true CN107016272A (en) | 2017-08-04 |
Family
ID=59445881
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710193156.XA Pending CN107016272A (en) | 2017-03-28 | 2017-03-28 | A kind of high anti-information of security performance loses telecommunications transaction login system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107016272A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107967608A (en) * | 2017-12-21 | 2018-04-27 | 北京智帮帮科技有限公司 | A kind of intelligent contract system based on block chain technology |
CN108222692A (en) * | 2018-01-29 | 2018-06-29 | 郑州国大电子科技有限公司 | A kind of coded lock with fingerprint identification function |
CN108256865A (en) * | 2018-03-14 | 2018-07-06 | 北京智帮帮科技有限公司 | A kind of supervision record system based on block chain technology |
CN108965339A (en) * | 2018-09-25 | 2018-12-07 | 安徽灵图壹智能科技有限公司 | A kind of block chain school data access system |
CN108959911A (en) * | 2018-06-14 | 2018-12-07 | 联动优势科技有限公司 | A kind of key chain generates, verification method and its device |
CN109426950A (en) * | 2017-09-05 | 2019-03-05 | 湖南中南楷思科技发展有限公司 | A kind of member card charging system based on third party transaction platform |
CN112150150A (en) * | 2020-09-30 | 2020-12-29 | 重庆市科学技术研究院 | Block chain-based electronic ticket transaction system and method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110145580A1 (en) * | 2009-12-15 | 2011-06-16 | Microsoft Corporation | Trustworthy extensible markup language for trustworthy computing and data services |
CN106055993A (en) * | 2016-08-13 | 2016-10-26 | 深圳市樊溪电子有限公司 | Encryption storage system for block chains and method for applying encryption storage system |
-
2017
- 2017-03-28 CN CN201710193156.XA patent/CN107016272A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110145580A1 (en) * | 2009-12-15 | 2011-06-16 | Microsoft Corporation | Trustworthy extensible markup language for trustworthy computing and data services |
CN106055993A (en) * | 2016-08-13 | 2016-10-26 | 深圳市樊溪电子有限公司 | Encryption storage system for block chains and method for applying encryption storage system |
Non-Patent Citations (1)
Title |
---|
庄妍: "多生物特征认证平台的设计与实现", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109426950A (en) * | 2017-09-05 | 2019-03-05 | 湖南中南楷思科技发展有限公司 | A kind of member card charging system based on third party transaction platform |
CN107967608A (en) * | 2017-12-21 | 2018-04-27 | 北京智帮帮科技有限公司 | A kind of intelligent contract system based on block chain technology |
CN108222692A (en) * | 2018-01-29 | 2018-06-29 | 郑州国大电子科技有限公司 | A kind of coded lock with fingerprint identification function |
CN108256865A (en) * | 2018-03-14 | 2018-07-06 | 北京智帮帮科技有限公司 | A kind of supervision record system based on block chain technology |
CN108959911A (en) * | 2018-06-14 | 2018-12-07 | 联动优势科技有限公司 | A kind of key chain generates, verification method and its device |
CN108965339A (en) * | 2018-09-25 | 2018-12-07 | 安徽灵图壹智能科技有限公司 | A kind of block chain school data access system |
CN112150150A (en) * | 2020-09-30 | 2020-12-29 | 重庆市科学技术研究院 | Block chain-based electronic ticket transaction system and method |
CN112150150B (en) * | 2020-09-30 | 2023-08-08 | 重庆市科学技术研究院 | Electronic ticket transaction system and method based on blockchain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107016272A (en) | A kind of high anti-information of security performance loses telecommunications transaction login system | |
CN106022080B (en) | A kind of data ciphering method based on the cipher card of PCIe interface and the cipher card | |
WO2020107233A1 (en) | Blockchain-based wallet system, method of use of wallet and storage medium | |
CN108985773A (en) | A kind of payment accounts method for secure transactions and system based on block chain | |
CN102768744B (en) | A kind of remote safe payment method and system | |
CN107688944A (en) | A kind of power system method of commerce based on block chain | |
KR102119449B1 (en) | Aggregation open api platform system, method for prividing financial services using the same and computer program for the same | |
CN109728898A (en) | Internet-of-things terminal safety communicating method based on block chain technology | |
CN112367629B (en) | Financial big data processing method based on 5G and block chain and system platform thereof | |
KR102332226B1 (en) | Blockchain network system being capable of verifying a blockchain ledger and method for verifying a blockchain ledger | |
CN105337727B (en) | Quantum authentication method for access control among three elements of cloud computing | |
CN107592308A (en) | A kind of two server multiple-factor authentication method towards mobile payment scene | |
CN109242663A (en) | A kind of bookkeeping methods and system based on block chain technology | |
CN109102259B (en) | Block chain transaction method and block chain system supporting banking business | |
CN108346041A (en) | A kind of electronic cash system based on block chain technology | |
CN109741800A (en) | The method for security protection of medical data intranet and extranet interaction based on block chain technology | |
CN104079413A (en) | Enhancement type one-time dynamic password authentication method and system | |
CN108400962A (en) | A kind of Authentication and Key Agreement method under multiserver framework | |
CN102377573A (en) | Double-factor authentication method capable of securely updating password | |
CN101521576B (en) | Method and system for identity authentication of internet user | |
CN108449332A (en) | A kind of lightweight Mobile Payment Protocol design method based on double gateways | |
CN108566385A (en) | The mutual authentication method of efficient secret protection based on cloud | |
CN106921677A (en) | A kind of multiple encryption system of block chain houseclearing | |
CN106203188B (en) | A kind of Unilateral Data Transferring System and its method adding MAC based on dual processors | |
CN103051640A (en) | Bluetooth-based online banking safety equipment and data communication method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170804 |