CN107070896A - A kind of safe and efficient block chain customization login method and security hardening system - Google Patents
A kind of safe and efficient block chain customization login method and security hardening system Download PDFInfo
- Publication number
- CN107070896A CN107070896A CN201710166211.6A CN201710166211A CN107070896A CN 107070896 A CN107070896 A CN 107070896A CN 201710166211 A CN201710166211 A CN 201710166211A CN 107070896 A CN107070896 A CN 107070896A
- Authority
- CN
- China
- Prior art keywords
- block chain
- character string
- key
- client
- logged
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of safe and efficient block chain customization login method and security hardening system, block chain network is logged in, is comprised the following steps:According to basic agreement N are selected in original key M positions character string, client is back to as simple login key to be logged in, remaining (M N) position character string is encrypted and obtains encryption key value, the encrypted result of key is stored on data server again, when in use, the encryption key value is decrypted, obtain (M N) position character string, by inputting N character strings, complete M positions character string is constituted, to mutually confirmation.The client of the present invention is when logging in, and numerical digit is few, easy note, so as to facilitate customization.Character string is stored using sectional encryption simultaneously, and security performance is high, so as to solve the problem of existing block chain private key is easily lost, is stolen well.
Description
Technical field
The present invention relates to block chain field, more particularly to safe and efficient block chain customization login method and security hardening
System.
Background technology
The big data epoch, All Around The World digitlization, and by internet enter data sea.This not only makes our life
It is living more to facilitate, also provide the chance created the wealth.But problem of data safety should not be underestimated.Block chain is expected in future solution
Certainly this problem.The similar open network account book of block chain.It originates from bit coin, is the Floor layer Technology of bit coin,
The full detail of transaction record can be packaged into one " block " and be stored, with the expansion of information interchange, one by one area
Block is connected with each other, and is formed block chain.Digital cash using bit coin as representative is a kind of point-to-point electronic cash system,
Transaction can be all broadcasted participant all in network every time, and is just recorded to after repeatedly confirming in account book,
This account book is exactly " block chain ".Each participant can have the account book of oneself, so when deceptive information occurs, it is possible to logical
Cross mutually verification to abolish, so as to ensure network security.Each node is equality in block chain, in the absence of centralization
The characteristics of management organization, this " decentralization ", causes block chain to rely on third party, and it, which is operated, does not need anyone intervention,
Self-authentication can independently be carried out.In addition, the network of block chain is opened to the whole world, anyone can pass through open port
Data query, thus whole system highly transparent are carried out, in a word, block chain is a believable database, is one reliable
" account book ", future in terms of cross-border payment, security, loan, ballot, all can all be applied.Such as in cross-border payment, have
Block chain provides safety guarantee, it is possible to is remitted money whenever and wherever possible to the whole world, thus eliminates many intermediate links and high
Service charge.
Generally speaking, block chain, Block Chain technologies are that occur in recent years in financial technology (FinTech) field
A kind of emerging technology, its unique decentralization, information can not be distorted, multinode collective maintainability, publicity, secret protection etc.
Attribute, in based on incredible internet, can record the believable trading information data of offer.Block chain mainly includes P2P
Network, cryptography, common recognition mechanism, intelligence and about four parts, ensure that its is exclusive by the Technology Integration in four fields
Characteristic, block chain technology is currently the only just to can be used for recording and proving that trade identity and Corporate Finance are accurate without third party
The instrument of true property, can meet to audit validity, accuracy and ageing requirement, have in financial field before wide application
Scape.The technology will influence the financial infrastructures such as payment system, security clearing system, transaction data base first, while may also
General financial business is further expanded to, such as credit system, anti money washing.
But, in the basic agreement of current block chain, so that Key is the character string of 128 as an example, due to digit it is numerous from
And problems with can be caused:
1) digit is numerous, is unfavorable for customization login;
2) it is stored entirely on data server, there is security risk.
The content of the invention
The technical problem to be solved in the present invention is, the safety encryption of safe and efficient block chain Key keys.
Above-mentioned technical problem is solved, the invention provides a kind of safe and efficient block chain customization login method, is logged in
Block chain network, comprises the following steps:
N are selected in original key M positions character string according to basic agreement, visitor is back to as the simple key that logs in
Family end is logged in,
Remaining (M-N) position character string is encrypted and obtains encryption key value, then the encrypted result of key is stored in
On data server,
When in use, the encryption key value is decrypted, obtains (M-N) position character string,
By inputting N character strings, complete M positions character string is constituted, to mutually confirmation.
Further, described M is:128 or 256.
Further, described N is:The last positions of 3-8 of whole character string.
Further, the cipher mode is symmetric cryptography.
Further, the client includes:Page end, desktop application end and mobile phone mobile terminal.
Further, authentication mechanism is carried out in the block of block chain using rivest, shamir, adelman.
A kind of safe and efficient security hardening system is additionally provided based on the invention described above, including:Block chain, client,
Data server,
The block chain, is configured as selecting N in original key M positions character string according to basic agreement, is used as letter
Easily login key is back to the client and logged in, and remaining (M-N) position character string is encrypted and obtains encryption key
Value, then the encrypted result of key is stored on data server,
And, the encryption key value is decrypted, (M-N) position character string is obtained, by inputting N character strings, group
Into complete M positions character string,
The data server, is configured as depositing the encrypted result of the key.
Further, the block chain is deployed as the distributed frame of P2P networks.
Further, the client is also to receive simple login key, and logged in.
Beneficial effects of the present invention:
1) due to selecting N in original key M positions character string according to basic agreement in the present invention, as simply stepping on
Record key is back to client and logged in, therefore few to the numerical digit logged in, and easily note, is also convenient for customization.
2) encryption key value is obtained due to remaining (M-N) position character string being encrypted, then by the encrypted result of key
It is stored in sectional encryption on data server to store, security performance is high.
3) due to when in use, the encryption key value being decrypted, (M-N) position character string is obtained, by inputting N
Character string, constitutes complete M positions character string, to mutually confirmation.Solve well existing block chain private key be easily lost, quilt
Steal, it is excessively complicated and to user it is unfriendly the problems such as.
4) in the system of block chain, participant need not understand other people background information, it is not required that by third party
The guarantee or guarantee of mechanism, activity of the block chain technical guarantee system to value Transfer are recorded, transmitted, stored, and it is most
Result afterwards must be believable.
Brief description of the drawings
Fig. 1 is the interaction schematic diagram of block chain in the prior art;
Fig. 2 is the broadcast authentication schematic diagram of block chain in the prior art;
Fig. 3 is the method flow schematic diagram in one embodiment of the invention;
Fig. 4 is the system structure diagram in one embodiment of the invention;
Fig. 5 is the specific implementation schematic diagram in one embodiment of the invention.
Embodiment
The principle of the disclosure is described referring now to some example embodiments.It is appreciated that these embodiments are merely for saying
It is bright and help it will be understood by those skilled in the art that with the purpose of the embodiment disclosure and describe, rather than advise model of this disclosure
Any limitation enclosed.Content of this disclosure described here can be implemented in the various modes outside mode described below.
As described herein, term " comprising " and its various variants are construed as open-ended term, it means that " bag
Include but be not limited to ".Term "based" is construed as " being based at least partially on ".Term " one embodiment " it is understood that
For " at least one embodiment ".Term " another embodiment " is construed as " at least one other embodiment ".
Fig. 1 is the interaction schematic diagram of block chain in the prior art, and Fig. 2 is the broadcast authentication signal of block chain in the prior art
Figure;Block chain in this application be a kind of distributed data base (or for Distributed sharing general ledger,
DistributedShared Ledger), " distribution " here is not only presented as the distributed storage of data, is also embodied in number
According to distributed recording (i.e. by system participant come collective safeguard).Briefly, block chain can realize global metadata information
Distributed recording and distributed storage, as shown in Figure 1.In addition, block chain can generate it is a set of record time order and function, can not usurp
Database changing, trusty, this sets of data storehouse is decentralization storage and data safety can be effectively ensured.It please join
Fig. 2 is examined, block chain is a kind of data structure that block is combined in the way of chain, it is adapted to, and storage is simple, have elder generation
Afterwards relation, the data that can verify and (be verified by the form of broadcast) in system, ensure that data not with cryptography
It can distort and can not forge.It can make participant build a consensus the event sequence and current state of the whole network transaction record.
In this application, block chain technology uses distribution collection under the distributed p 2 p without central control point
The method of body running, constructs P2P self-organizing network.By complicated verification scheme, block chain database can be protected
Integrality, continuity and uniformity are held, the integrality of block chain can not also be changed by being played tricks even if subparticipation people, can not more be distorted
Data in block chain.
Refer to Fig. 3 is the method flow schematic diagram in one embodiment of the invention, based on the basic agreement of block chain, including
Following steps:
Step S100 selects N according to basic agreement in original key M positions character string, and key is logged in as simple
Client is back to be logged in,
Step S101 is encrypted to remaining (M-N) position character string and obtains encryption key value, then by the encryption knot of key
Fruit is stored on data server,
When in use, the encryption key value is decrypted by step S102, obtains (M-N) position character string,
Step S103 constitutes complete M positions character string by inputting N character strings, to mutually confirmation.
As preferred in the present embodiment, described M is:128.
As preferred in the present embodiment, described N is:The last positions of the 3-8 of whole character string, be easy in client memory and
It is convenient to log in.
As preferred in the present embodiment, the key is:Private key.The cipher mode is symmetric cryptography.
As preferred in the present embodiment, the client includes:Page end, desktop application end and mobile phone mobile terminal.
As preferred in the present embodiment, using symmetric cryptography, input key keys verified in block chain network and
Log in.
As preferred in the present embodiment, the cryptographic Hash of the wound generation block in the client is:
000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b6 0a8ce26f, if objective
Family end is used as bit coin, then the first of block chain block, referred to as creates generation block.It is all areas in bit coin block chain
The common ancestor of block, from either block, follows chain leading after backtracking, finally will all reach and creates generation block.Each node " knowing "
Create a transaction of cryptographic Hash, structure, the time being created and the inside of generation block.Therefore, each node makees the block
For the first block of block chain, so as to construct safety, believable block chain root.
It is a kind of safe and efficient in the system structure diagram in one embodiment of the invention, the present embodiment for refer to Fig. 4
Block chain key security hardening system, including:Block chain 3, client 1, data server 2, the block chain 3, are configured
To select N in original key M positions character string according to basic agreement, the client is back to as the simple key that logs in
End 1 is logged in, and remaining (M-N) position character string is encrypted and obtains encryption key value, then the encrypted result of key is stored up
Exist on data server, and, the encryption key value is decrypted, (M-N) position character string is obtained, by inputting N
Character string, constitutes complete M positions character string, and the data server 2 is configured as depositing the encryption knot of the key
Really.Preferably, the block chain 3 is deployed as the distributed frame of P2P networks.Preferably, the client 1 is also to receive letter
Key is easily logged in, and is logged in, the numerical digit to log in is few, easily note, is also convenient for customization.
Refer to Fig. 5 is the specific implementation schematic diagram in one embodiment of the invention, and it is chosen in 128 character strings
In X positions, X is arbitrary value, it is proposed that X is defined between 3-8;Remaining 128-X character string is encrypted and obtained
Encryped Key values, Encryped Key values are present in data server;When needing, Encryped Key values are solved
It is close, obtain (128-X) character string;X characters are inputted afterwards, constitute complete 128 Key.In the present embodiment, 128 are selected
X positions in character are used as the simple Key of login;In the present embodiment, it is encrypted for remaining character string (128-X), and
It is stored on data server;In the present embodiment, it is necessary to when transfer encryption (128-X) value, after decryption, input X
Position character string, 128 complete character strings of composition.Encryped Key values specifically refer to the character after the encryption of (128-X) position
Value, can not only turn into the value of (128-X) after the glyphed of (128-X), and decryption can also turn into plain text.Operation when needing
Including but not limited to:Input after X character keys, it will (128-X) character after whole encryption is associated, then used
Symmetric cryptography mode is parsed, and 128 complete character keys are obtained after mapping.
Such as, new cross-border direct connection system for settling account of the system in the present embodiment based on block chain has shown its height
Efficiency, goes behind center, and message passing time foreshortened to second level by 6 minutes;Simultaneously as message is recorded in a privately owned chain
In the network environment of closing, it is to avoid the possibility arbitrarily distorted and forged, so as to ensure information security.In addition, it is also
Possess high availability and high scalability, distributed framework causes one node of any of which breaks down whole all without influence
The normal operation of system, and new participant quickly and conveniently can also be added in system.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned
In embodiment, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage
Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware
Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal
Discrete logic, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means to combine specific features, structure, material or the spy that the embodiment or example are described
Point is contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not
Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any
One or more embodiments or example in combine in an appropriate manner.
In general, the various embodiments of the disclosure can be with hardware or special circuit, software, logic or its any combination
Implement.Some aspects can be implemented with hardware, and some other aspect can be with firmware or software implementation, and the firmware or software can
With by controller, microprocessor or other computing devices.Although the various aspects of the disclosure be shown and described as block diagram,
Flow chart is represented using some other drawing, but it is understood that frame described herein, equipment, system, techniques or methods can
With in a non limiting manner with hardware, software, firmware, special circuit or logic, common hardware or controller or other calculating
Equipment or some of combination are implemented.
In addition, although operation is described with particular order, but this is understood not to require this generic operation with shown suitable
Sequence is performed or performed with generic sequence, or requires that all shown operations are performed to realize expected result.In some feelings
Under shape, multitask or parallel processing can be favourable.Similarly, although the details of some specific implementations is superincumbent to beg for
By comprising but these are not necessarily to be construed as any limitation of scope of this disclosure, but the description of feature is only pin in
To specific embodiment.Some features described in some embodiments of separation can also in combination be held in single embodiment
OK.Mutually oppose, the various features described in single embodiment can also be implemented separately or to appoint in various embodiments
The mode of what suitable sub-portfolio is implemented.
Claims (9)
1. a kind of safe and efficient block chain customization login method, logs in block chain network, it is characterised in that including following step
Suddenly:
N are selected in original key M positions character string according to basic agreement, client is back to as the simple key that logs in
Logged in,
Remaining (M-N) position character string is encrypted and obtains encryption key value, then the encrypted result of key is stored in data
On server,
When in use, the encryption key value is decrypted, obtains (M-N) position character string,
By inputting N character strings, complete M positions character string is constituted, to mutually confirmation.
2. safety encryption according to claim 1, it is characterised in that described M is:128 or 256.
3. block chain customization login method according to claim 1, it is characterised in that described N is:Whole character string
The last positions of 3-8.
4. block chain customization login method according to claim 1, it is characterised in that the cipher mode adds to be symmetrical
It is close.
5. block chain customization login method according to claim 1, it is characterised in that the client includes:Webpage
End, desktop application end and mobile phone mobile terminal.
6. block chain customization login method according to claim 1, it is characterised in that input key is in block chain network
It is middle to be verified and logged in.
7. a kind of safe and efficient security hardening system, it is characterised in that including:Block chain, client, data server,
The block chain, is configured as selecting N in original key M positions character string according to basic agreement, as simply stepping on
Record key is back to the client and logged in, and remaining (M-N) position character string is encrypted and obtains encryption key value, then
The encrypted result of key is stored on data server,
And, the encryption key value is decrypted, (M-N) position character string is obtained, by inputting N character strings, has constituted
Whole M positions character string,
The data server, is configured as depositing the encrypted result of the key.
8. security hardening system according to claim 7, it is characterised in that the block chain is deployed as point of P2P networks
Cloth structure.
9. security hardening system according to claim 7, it is characterised in that the client is also to receive simple login
Key, and logged in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710166211.6A CN107070896B (en) | 2017-03-20 | 2017-03-20 | Safe and efficient block chain network customized login method and safe reinforcement system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710166211.6A CN107070896B (en) | 2017-03-20 | 2017-03-20 | Safe and efficient block chain network customized login method and safe reinforcement system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107070896A true CN107070896A (en) | 2017-08-18 |
CN107070896B CN107070896B (en) | 2020-03-20 |
Family
ID=59620214
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710166211.6A Active CN107070896B (en) | 2017-03-20 | 2017-03-20 | Safe and efficient block chain network customized login method and safe reinforcement system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107070896B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108021808A (en) * | 2017-11-30 | 2018-05-11 | 北京博晨技术有限公司 | Account book safety encryption, device and electronic equipment |
CN108922007A (en) * | 2018-05-02 | 2018-11-30 | 深圳圣马歌科技有限公司 | Electronic voting method, system and computer program product based on block chain |
CN109510820A (en) * | 2018-11-01 | 2019-03-22 | 浙江仙草世家生物科技有限公司 | A kind of block chain cryptographic methods that decentralization can customize |
CN109547428A (en) * | 2018-11-14 | 2019-03-29 | 深圳市云歌人工智能技术有限公司 | It verifies password and accesses method, system and the storage medium of server |
CN111835872A (en) * | 2020-09-14 | 2020-10-27 | 江苏开博科技有限公司 | Method for realizing decentralized distributed process daemon based on ad hoc network technology |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2501315A (en) * | 2012-04-20 | 2013-10-23 | David Sallis | Generation of ciphertext using cipher block chaining (CBC) with padding |
CN104283668A (en) * | 2014-07-24 | 2015-01-14 | 山东大学(威海) | Method and device for obtaining application password based on mobile terminal |
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN105827412A (en) * | 2016-03-14 | 2016-08-03 | 中金金融认证中心有限公司 | Authentication method, server and client |
US20160330035A1 (en) * | 2015-05-05 | 2016-11-10 | ShoCard, Inc. | User Identification Management System and Method |
CN106161031A (en) * | 2015-04-23 | 2016-11-23 | 腾讯科技(深圳)有限公司 | Server password generates method, verification method and device |
CN106357640A (en) * | 2016-09-18 | 2017-01-25 | 江苏通付盾科技有限公司 | Method, system and server for authenticating identities on basis of block chain networks |
US20170046693A1 (en) * | 2015-08-13 | 2017-02-16 | The Toronto-Dominion Bank | Systems and methods for detecting and resolving data inconsistencies among networked devices using hybrid private-public blockchain ledgers |
CN106452731A (en) * | 2016-09-18 | 2017-02-22 | 四川长虹电器股份有限公司 | Fragmented secret key storage system and storage method thereof |
-
2017
- 2017-03-20 CN CN201710166211.6A patent/CN107070896B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2501315A (en) * | 2012-04-20 | 2013-10-23 | David Sallis | Generation of ciphertext using cipher block chaining (CBC) with padding |
CN104283668A (en) * | 2014-07-24 | 2015-01-14 | 山东大学(威海) | Method and device for obtaining application password based on mobile terminal |
CN106161031A (en) * | 2015-04-23 | 2016-11-23 | 腾讯科技(深圳)有限公司 | Server password generates method, verification method and device |
US20160330035A1 (en) * | 2015-05-05 | 2016-11-10 | ShoCard, Inc. | User Identification Management System and Method |
US20170046693A1 (en) * | 2015-08-13 | 2017-02-16 | The Toronto-Dominion Bank | Systems and methods for detecting and resolving data inconsistencies among networked devices using hybrid private-public blockchain ledgers |
CN105701372A (en) * | 2015-12-18 | 2016-06-22 | 布比(北京)网络技术有限公司 | Block chain identity construction and verification method |
CN105827412A (en) * | 2016-03-14 | 2016-08-03 | 中金金融认证中心有限公司 | Authentication method, server and client |
CN106357640A (en) * | 2016-09-18 | 2017-01-25 | 江苏通付盾科技有限公司 | Method, system and server for authenticating identities on basis of block chain networks |
CN106452731A (en) * | 2016-09-18 | 2017-02-22 | 四川长虹电器股份有限公司 | Fragmented secret key storage system and storage method thereof |
Non-Patent Citations (4)
Title |
---|
宋文鹏等: "区块链在众筹平台中的应用", 《信息技术与标准化》 * |
朱岩等: "区块链关键技术中的安全性研究", 《信息安全研究》 * |
马骏等: "可证明安全的智能移动终端私钥保护方案", 《通信学报》 * |
魏尚北等: "密码学的区块链技术在电子货币交易中的应用研究", 《科技创新与生产力》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108021808A (en) * | 2017-11-30 | 2018-05-11 | 北京博晨技术有限公司 | Account book safety encryption, device and electronic equipment |
CN108021808B (en) * | 2017-11-30 | 2020-04-21 | 北京博晨技术有限公司 | Account book security reinforcing method and device and electronic equipment |
CN108922007A (en) * | 2018-05-02 | 2018-11-30 | 深圳圣马歌科技有限公司 | Electronic voting method, system and computer program product based on block chain |
CN109510820A (en) * | 2018-11-01 | 2019-03-22 | 浙江仙草世家生物科技有限公司 | A kind of block chain cryptographic methods that decentralization can customize |
CN109547428A (en) * | 2018-11-14 | 2019-03-29 | 深圳市云歌人工智能技术有限公司 | It verifies password and accesses method, system and the storage medium of server |
CN111835872A (en) * | 2020-09-14 | 2020-10-27 | 江苏开博科技有限公司 | Method for realizing decentralized distributed process daemon based on ad hoc network technology |
Also Published As
Publication number | Publication date |
---|---|
CN107070896B (en) | 2020-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11900368B2 (en) | Method and system for zero-knowledge and identity based key management for decentralized applications | |
US11379263B2 (en) | Systems, devices, and methods for selecting a distributed framework | |
JP6592621B2 (en) | Authentication network | |
US10958418B2 (en) | System and method for a blockchain network with heterogeneous privacy | |
US10121143B1 (en) | Method and system for blockchain-based combined identity, ownership, integrity and custody management | |
KR102665645B1 (en) | Techniques to improve anonymity and traceability of digital asset transactions in a distributed transaction consensus network | |
Mukhopadhyay et al. | A brief survey of cryptocurrency systems | |
CN102932136B (en) | Systems and methods for managing cryptographic keys | |
US20170250796A1 (en) | Trans Vernam Cryptography: Round One | |
CN107070896A (en) | A kind of safe and efficient block chain customization login method and security hardening system | |
WO2018168723A1 (en) | Technology for authenticating device on network | |
CN110147994A (en) | A kind of instant execution method of the block chain based on homomorphic cryptography | |
CN109417478A (en) | Multilink cryptologic block chain | |
CN116670673A (en) | Transferring cryptocurrency from a remote limited access wallet | |
US20150207621A1 (en) | Method for creating asymmetrical cryptographic key pairs | |
Xie et al. | Blockchain‐Based Cloud Data Integrity Verification Scheme with High Efficiency | |
CN110445840A (en) | A method of file storage and reading based on block chain technology | |
Homoliak et al. | An air-gapped 2-factor authentication for smart-contract wallets | |
Hameed | Blockchain and Cryptocurrencies Technology: a survey | |
Bilal et al. | Blockchain technology: Opportunities & challenges | |
Schnell et al. | Hardening encrypted patient names against cryptographic attacks using cellular automata | |
Ruan et al. | Efficient Private Set Intersection Using Point‐Value Polynomial Representation | |
Maram | Bitcoin generation using Blockchain technology | |
Mi et al. | [Retracted] Privacy‐Oriented Transaction for Public Blockchain via Secret Sharing | |
Li et al. | Post‐Quantum Privacy‐Preserving Provable Data Possession Scheme Based on Smart Contracts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |