CN107070896A - A kind of safe and efficient block chain customization login method and security hardening system - Google Patents

A kind of safe and efficient block chain customization login method and security hardening system Download PDF

Info

Publication number
CN107070896A
CN107070896A CN201710166211.6A CN201710166211A CN107070896A CN 107070896 A CN107070896 A CN 107070896A CN 201710166211 A CN201710166211 A CN 201710166211A CN 107070896 A CN107070896 A CN 107070896A
Authority
CN
China
Prior art keywords
block chain
character string
key
client
logged
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710166211.6A
Other languages
Chinese (zh)
Other versions
CN107070896B (en
Inventor
宋文鹏
高林挥
华正皓
迟祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Venture Capital Fund (pingtan) Partnership (limited Partnership)
Original Assignee
Venture Capital Fund (pingtan) Partnership (limited Partnership)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Venture Capital Fund (pingtan) Partnership (limited Partnership) filed Critical Venture Capital Fund (pingtan) Partnership (limited Partnership)
Priority to CN201710166211.6A priority Critical patent/CN107070896B/en
Publication of CN107070896A publication Critical patent/CN107070896A/en
Application granted granted Critical
Publication of CN107070896B publication Critical patent/CN107070896B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of safe and efficient block chain customization login method and security hardening system, block chain network is logged in, is comprised the following steps:According to basic agreement N are selected in original key M positions character string, client is back to as simple login key to be logged in, remaining (M N) position character string is encrypted and obtains encryption key value, the encrypted result of key is stored on data server again, when in use, the encryption key value is decrypted, obtain (M N) position character string, by inputting N character strings, complete M positions character string is constituted, to mutually confirmation.The client of the present invention is when logging in, and numerical digit is few, easy note, so as to facilitate customization.Character string is stored using sectional encryption simultaneously, and security performance is high, so as to solve the problem of existing block chain private key is easily lost, is stolen well.

Description

A kind of safe and efficient block chain customization login method and security hardening system
Technical field
The present invention relates to block chain field, more particularly to safe and efficient block chain customization login method and security hardening System.
Background technology
The big data epoch, All Around The World digitlization, and by internet enter data sea.This not only makes our life It is living more to facilitate, also provide the chance created the wealth.But problem of data safety should not be underestimated.Block chain is expected in future solution Certainly this problem.The similar open network account book of block chain.It originates from bit coin, is the Floor layer Technology of bit coin, The full detail of transaction record can be packaged into one " block " and be stored, with the expansion of information interchange, one by one area Block is connected with each other, and is formed block chain.Digital cash using bit coin as representative is a kind of point-to-point electronic cash system, Transaction can be all broadcasted participant all in network every time, and is just recorded to after repeatedly confirming in account book, This account book is exactly " block chain ".Each participant can have the account book of oneself, so when deceptive information occurs, it is possible to logical Cross mutually verification to abolish, so as to ensure network security.Each node is equality in block chain, in the absence of centralization The characteristics of management organization, this " decentralization ", causes block chain to rely on third party, and it, which is operated, does not need anyone intervention, Self-authentication can independently be carried out.In addition, the network of block chain is opened to the whole world, anyone can pass through open port Data query, thus whole system highly transparent are carried out, in a word, block chain is a believable database, is one reliable " account book ", future in terms of cross-border payment, security, loan, ballot, all can all be applied.Such as in cross-border payment, have Block chain provides safety guarantee, it is possible to is remitted money whenever and wherever possible to the whole world, thus eliminates many intermediate links and high Service charge.
Generally speaking, block chain, Block Chain technologies are that occur in recent years in financial technology (FinTech) field A kind of emerging technology, its unique decentralization, information can not be distorted, multinode collective maintainability, publicity, secret protection etc. Attribute, in based on incredible internet, can record the believable trading information data of offer.Block chain mainly includes P2P Network, cryptography, common recognition mechanism, intelligence and about four parts, ensure that its is exclusive by the Technology Integration in four fields Characteristic, block chain technology is currently the only just to can be used for recording and proving that trade identity and Corporate Finance are accurate without third party The instrument of true property, can meet to audit validity, accuracy and ageing requirement, have in financial field before wide application Scape.The technology will influence the financial infrastructures such as payment system, security clearing system, transaction data base first, while may also General financial business is further expanded to, such as credit system, anti money washing.
But, in the basic agreement of current block chain, so that Key is the character string of 128 as an example, due to digit it is numerous from And problems with can be caused:
1) digit is numerous, is unfavorable for customization login;
2) it is stored entirely on data server, there is security risk.
The content of the invention
The technical problem to be solved in the present invention is, the safety encryption of safe and efficient block chain Key keys.
Above-mentioned technical problem is solved, the invention provides a kind of safe and efficient block chain customization login method, is logged in Block chain network, comprises the following steps:
N are selected in original key M positions character string according to basic agreement, visitor is back to as the simple key that logs in Family end is logged in,
Remaining (M-N) position character string is encrypted and obtains encryption key value, then the encrypted result of key is stored in On data server,
When in use, the encryption key value is decrypted, obtains (M-N) position character string,
By inputting N character strings, complete M positions character string is constituted, to mutually confirmation.
Further, described M is:128 or 256.
Further, described N is:The last positions of 3-8 of whole character string.
Further, the cipher mode is symmetric cryptography.
Further, the client includes:Page end, desktop application end and mobile phone mobile terminal.
Further, authentication mechanism is carried out in the block of block chain using rivest, shamir, adelman.
A kind of safe and efficient security hardening system is additionally provided based on the invention described above, including:Block chain, client, Data server,
The block chain, is configured as selecting N in original key M positions character string according to basic agreement, is used as letter Easily login key is back to the client and logged in, and remaining (M-N) position character string is encrypted and obtains encryption key Value, then the encrypted result of key is stored on data server,
And, the encryption key value is decrypted, (M-N) position character string is obtained, by inputting N character strings, group Into complete M positions character string,
The data server, is configured as depositing the encrypted result of the key.
Further, the block chain is deployed as the distributed frame of P2P networks.
Further, the client is also to receive simple login key, and logged in.
Beneficial effects of the present invention:
1) due to selecting N in original key M positions character string according to basic agreement in the present invention, as simply stepping on Record key is back to client and logged in, therefore few to the numerical digit logged in, and easily note, is also convenient for customization.
2) encryption key value is obtained due to remaining (M-N) position character string being encrypted, then by the encrypted result of key It is stored in sectional encryption on data server to store, security performance is high.
3) due to when in use, the encryption key value being decrypted, (M-N) position character string is obtained, by inputting N Character string, constitutes complete M positions character string, to mutually confirmation.Solve well existing block chain private key be easily lost, quilt Steal, it is excessively complicated and to user it is unfriendly the problems such as.
4) in the system of block chain, participant need not understand other people background information, it is not required that by third party The guarantee or guarantee of mechanism, activity of the block chain technical guarantee system to value Transfer are recorded, transmitted, stored, and it is most Result afterwards must be believable.
Brief description of the drawings
Fig. 1 is the interaction schematic diagram of block chain in the prior art;
Fig. 2 is the broadcast authentication schematic diagram of block chain in the prior art;
Fig. 3 is the method flow schematic diagram in one embodiment of the invention;
Fig. 4 is the system structure diagram in one embodiment of the invention;
Fig. 5 is the specific implementation schematic diagram in one embodiment of the invention.
Embodiment
The principle of the disclosure is described referring now to some example embodiments.It is appreciated that these embodiments are merely for saying It is bright and help it will be understood by those skilled in the art that with the purpose of the embodiment disclosure and describe, rather than advise model of this disclosure Any limitation enclosed.Content of this disclosure described here can be implemented in the various modes outside mode described below.
As described herein, term " comprising " and its various variants are construed as open-ended term, it means that " bag Include but be not limited to ".Term "based" is construed as " being based at least partially on ".Term " one embodiment " it is understood that For " at least one embodiment ".Term " another embodiment " is construed as " at least one other embodiment ".
Fig. 1 is the interaction schematic diagram of block chain in the prior art, and Fig. 2 is the broadcast authentication signal of block chain in the prior art Figure;Block chain in this application be a kind of distributed data base (or for Distributed sharing general ledger, DistributedShared Ledger), " distribution " here is not only presented as the distributed storage of data, is also embodied in number According to distributed recording (i.e. by system participant come collective safeguard).Briefly, block chain can realize global metadata information Distributed recording and distributed storage, as shown in Figure 1.In addition, block chain can generate it is a set of record time order and function, can not usurp Database changing, trusty, this sets of data storehouse is decentralization storage and data safety can be effectively ensured.It please join Fig. 2 is examined, block chain is a kind of data structure that block is combined in the way of chain, it is adapted to, and storage is simple, have elder generation Afterwards relation, the data that can verify and (be verified by the form of broadcast) in system, ensure that data not with cryptography It can distort and can not forge.It can make participant build a consensus the event sequence and current state of the whole network transaction record.
In this application, block chain technology uses distribution collection under the distributed p 2 p without central control point The method of body running, constructs P2P self-organizing network.By complicated verification scheme, block chain database can be protected Integrality, continuity and uniformity are held, the integrality of block chain can not also be changed by being played tricks even if subparticipation people, can not more be distorted Data in block chain.
Refer to Fig. 3 is the method flow schematic diagram in one embodiment of the invention, based on the basic agreement of block chain, including Following steps:
Step S100 selects N according to basic agreement in original key M positions character string, and key is logged in as simple Client is back to be logged in,
Step S101 is encrypted to remaining (M-N) position character string and obtains encryption key value, then by the encryption knot of key Fruit is stored on data server,
When in use, the encryption key value is decrypted by step S102, obtains (M-N) position character string,
Step S103 constitutes complete M positions character string by inputting N character strings, to mutually confirmation.
As preferred in the present embodiment, described M is:128.
As preferred in the present embodiment, described N is:The last positions of the 3-8 of whole character string, be easy in client memory and It is convenient to log in.
As preferred in the present embodiment, the key is:Private key.The cipher mode is symmetric cryptography.
As preferred in the present embodiment, the client includes:Page end, desktop application end and mobile phone mobile terminal.
As preferred in the present embodiment, using symmetric cryptography, input key keys verified in block chain network and Log in.
As preferred in the present embodiment, the cryptographic Hash of the wound generation block in the client is:
000000000019d6689c085ae165831e934ff763ae46a2a6c172b3f1b6 0a8ce26f, if objective Family end is used as bit coin, then the first of block chain block, referred to as creates generation block.It is all areas in bit coin block chain The common ancestor of block, from either block, follows chain leading after backtracking, finally will all reach and creates generation block.Each node " knowing " Create a transaction of cryptographic Hash, structure, the time being created and the inside of generation block.Therefore, each node makees the block For the first block of block chain, so as to construct safety, believable block chain root.
It is a kind of safe and efficient in the system structure diagram in one embodiment of the invention, the present embodiment for refer to Fig. 4 Block chain key security hardening system, including:Block chain 3, client 1, data server 2, the block chain 3, are configured To select N in original key M positions character string according to basic agreement, the client is back to as the simple key that logs in End 1 is logged in, and remaining (M-N) position character string is encrypted and obtains encryption key value, then the encrypted result of key is stored up Exist on data server, and, the encryption key value is decrypted, (M-N) position character string is obtained, by inputting N Character string, constitutes complete M positions character string, and the data server 2 is configured as depositing the encryption knot of the key Really.Preferably, the block chain 3 is deployed as the distributed frame of P2P networks.Preferably, the client 1 is also to receive letter Key is easily logged in, and is logged in, the numerical digit to log in is few, easily note, is also convenient for customization.
Refer to Fig. 5 is the specific implementation schematic diagram in one embodiment of the invention, and it is chosen in 128 character strings In X positions, X is arbitrary value, it is proposed that X is defined between 3-8;Remaining 128-X character string is encrypted and obtained Encryped Key values, Encryped Key values are present in data server;When needing, Encryped Key values are solved It is close, obtain (128-X) character string;X characters are inputted afterwards, constitute complete 128 Key.In the present embodiment, 128 are selected X positions in character are used as the simple Key of login;In the present embodiment, it is encrypted for remaining character string (128-X), and It is stored on data server;In the present embodiment, it is necessary to when transfer encryption (128-X) value, after decryption, input X Position character string, 128 complete character strings of composition.Encryped Key values specifically refer to the character after the encryption of (128-X) position Value, can not only turn into the value of (128-X) after the glyphed of (128-X), and decryption can also turn into plain text.Operation when needing Including but not limited to:Input after X character keys, it will (128-X) character after whole encryption is associated, then used Symmetric cryptography mode is parsed, and 128 complete character keys are obtained after mapping.
Such as, new cross-border direct connection system for settling account of the system in the present embodiment based on block chain has shown its height Efficiency, goes behind center, and message passing time foreshortened to second level by 6 minutes;Simultaneously as message is recorded in a privately owned chain In the network environment of closing, it is to avoid the possibility arbitrarily distorted and forged, so as to ensure information security.In addition, it is also Possess high availability and high scalability, distributed framework causes one node of any of which breaks down whole all without influence The normal operation of system, and new participant quickly and conveniently can also be added in system.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal Discrete logic, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means to combine specific features, structure, material or the spy that the embodiment or example are described Point is contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.Moreover, specific features, structure, material or the feature of description can be any One or more embodiments or example in combine in an appropriate manner.
In general, the various embodiments of the disclosure can be with hardware or special circuit, software, logic or its any combination Implement.Some aspects can be implemented with hardware, and some other aspect can be with firmware or software implementation, and the firmware or software can With by controller, microprocessor or other computing devices.Although the various aspects of the disclosure be shown and described as block diagram, Flow chart is represented using some other drawing, but it is understood that frame described herein, equipment, system, techniques or methods can With in a non limiting manner with hardware, software, firmware, special circuit or logic, common hardware or controller or other calculating Equipment or some of combination are implemented.
In addition, although operation is described with particular order, but this is understood not to require this generic operation with shown suitable Sequence is performed or performed with generic sequence, or requires that all shown operations are performed to realize expected result.In some feelings Under shape, multitask or parallel processing can be favourable.Similarly, although the details of some specific implementations is superincumbent to beg for By comprising but these are not necessarily to be construed as any limitation of scope of this disclosure, but the description of feature is only pin in To specific embodiment.Some features described in some embodiments of separation can also in combination be held in single embodiment OK.Mutually oppose, the various features described in single embodiment can also be implemented separately or to appoint in various embodiments The mode of what suitable sub-portfolio is implemented.

Claims (9)

1. a kind of safe and efficient block chain customization login method, logs in block chain network, it is characterised in that including following step Suddenly:
N are selected in original key M positions character string according to basic agreement, client is back to as the simple key that logs in Logged in,
Remaining (M-N) position character string is encrypted and obtains encryption key value, then the encrypted result of key is stored in data On server,
When in use, the encryption key value is decrypted, obtains (M-N) position character string,
By inputting N character strings, complete M positions character string is constituted, to mutually confirmation.
2. safety encryption according to claim 1, it is characterised in that described M is:128 or 256.
3. block chain customization login method according to claim 1, it is characterised in that described N is:Whole character string The last positions of 3-8.
4. block chain customization login method according to claim 1, it is characterised in that the cipher mode adds to be symmetrical It is close.
5. block chain customization login method according to claim 1, it is characterised in that the client includes:Webpage End, desktop application end and mobile phone mobile terminal.
6. block chain customization login method according to claim 1, it is characterised in that input key is in block chain network It is middle to be verified and logged in.
7. a kind of safe and efficient security hardening system, it is characterised in that including:Block chain, client, data server,
The block chain, is configured as selecting N in original key M positions character string according to basic agreement, as simply stepping on Record key is back to the client and logged in, and remaining (M-N) position character string is encrypted and obtains encryption key value, then The encrypted result of key is stored on data server,
And, the encryption key value is decrypted, (M-N) position character string is obtained, by inputting N character strings, has constituted Whole M positions character string,
The data server, is configured as depositing the encrypted result of the key.
8. security hardening system according to claim 7, it is characterised in that the block chain is deployed as point of P2P networks Cloth structure.
9. security hardening system according to claim 7, it is characterised in that the client is also to receive simple login Key, and logged in.
CN201710166211.6A 2017-03-20 2017-03-20 Safe and efficient block chain network customized login method and safe reinforcement system Active CN107070896B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710166211.6A CN107070896B (en) 2017-03-20 2017-03-20 Safe and efficient block chain network customized login method and safe reinforcement system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710166211.6A CN107070896B (en) 2017-03-20 2017-03-20 Safe and efficient block chain network customized login method and safe reinforcement system

Publications (2)

Publication Number Publication Date
CN107070896A true CN107070896A (en) 2017-08-18
CN107070896B CN107070896B (en) 2020-03-20

Family

ID=59620214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710166211.6A Active CN107070896B (en) 2017-03-20 2017-03-20 Safe and efficient block chain network customized login method and safe reinforcement system

Country Status (1)

Country Link
CN (1) CN107070896B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108021808A (en) * 2017-11-30 2018-05-11 北京博晨技术有限公司 Account book safety encryption, device and electronic equipment
CN108922007A (en) * 2018-05-02 2018-11-30 深圳圣马歌科技有限公司 Electronic voting method, system and computer program product based on block chain
CN109510820A (en) * 2018-11-01 2019-03-22 浙江仙草世家生物科技有限公司 A kind of block chain cryptographic methods that decentralization can customize
CN109547428A (en) * 2018-11-14 2019-03-29 深圳市云歌人工智能技术有限公司 It verifies password and accesses method, system and the storage medium of server
CN111835872A (en) * 2020-09-14 2020-10-27 江苏开博科技有限公司 Method for realizing decentralized distributed process daemon based on ad hoc network technology

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2501315A (en) * 2012-04-20 2013-10-23 David Sallis Generation of ciphertext using cipher block chaining (CBC) with padding
CN104283668A (en) * 2014-07-24 2015-01-14 山东大学(威海) Method and device for obtaining application password based on mobile terminal
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN105827412A (en) * 2016-03-14 2016-08-03 中金金融认证中心有限公司 Authentication method, server and client
US20160330035A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. User Identification Management System and Method
CN106161031A (en) * 2015-04-23 2016-11-23 腾讯科技(深圳)有限公司 Server password generates method, verification method and device
CN106357640A (en) * 2016-09-18 2017-01-25 江苏通付盾科技有限公司 Method, system and server for authenticating identities on basis of block chain networks
US20170046693A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and methods for detecting and resolving data inconsistencies among networked devices using hybrid private-public blockchain ledgers
CN106452731A (en) * 2016-09-18 2017-02-22 四川长虹电器股份有限公司 Fragmented secret key storage system and storage method thereof

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2501315A (en) * 2012-04-20 2013-10-23 David Sallis Generation of ciphertext using cipher block chaining (CBC) with padding
CN104283668A (en) * 2014-07-24 2015-01-14 山东大学(威海) Method and device for obtaining application password based on mobile terminal
CN106161031A (en) * 2015-04-23 2016-11-23 腾讯科技(深圳)有限公司 Server password generates method, verification method and device
US20160330035A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. User Identification Management System and Method
US20170046693A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and methods for detecting and resolving data inconsistencies among networked devices using hybrid private-public blockchain ledgers
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN105827412A (en) * 2016-03-14 2016-08-03 中金金融认证中心有限公司 Authentication method, server and client
CN106357640A (en) * 2016-09-18 2017-01-25 江苏通付盾科技有限公司 Method, system and server for authenticating identities on basis of block chain networks
CN106452731A (en) * 2016-09-18 2017-02-22 四川长虹电器股份有限公司 Fragmented secret key storage system and storage method thereof

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
宋文鹏等: "区块链在众筹平台中的应用", 《信息技术与标准化》 *
朱岩等: "区块链关键技术中的安全性研究", 《信息安全研究》 *
马骏等: "可证明安全的智能移动终端私钥保护方案", 《通信学报》 *
魏尚北等: "密码学的区块链技术在电子货币交易中的应用研究", 《科技创新与生产力》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108021808A (en) * 2017-11-30 2018-05-11 北京博晨技术有限公司 Account book safety encryption, device and electronic equipment
CN108021808B (en) * 2017-11-30 2020-04-21 北京博晨技术有限公司 Account book security reinforcing method and device and electronic equipment
CN108922007A (en) * 2018-05-02 2018-11-30 深圳圣马歌科技有限公司 Electronic voting method, system and computer program product based on block chain
CN109510820A (en) * 2018-11-01 2019-03-22 浙江仙草世家生物科技有限公司 A kind of block chain cryptographic methods that decentralization can customize
CN109547428A (en) * 2018-11-14 2019-03-29 深圳市云歌人工智能技术有限公司 It verifies password and accesses method, system and the storage medium of server
CN111835872A (en) * 2020-09-14 2020-10-27 江苏开博科技有限公司 Method for realizing decentralized distributed process daemon based on ad hoc network technology

Also Published As

Publication number Publication date
CN107070896B (en) 2020-03-20

Similar Documents

Publication Publication Date Title
US11900368B2 (en) Method and system for zero-knowledge and identity based key management for decentralized applications
US11379263B2 (en) Systems, devices, and methods for selecting a distributed framework
JP6592621B2 (en) Authentication network
US10958418B2 (en) System and method for a blockchain network with heterogeneous privacy
US10121143B1 (en) Method and system for blockchain-based combined identity, ownership, integrity and custody management
KR102665645B1 (en) Techniques to improve anonymity and traceability of digital asset transactions in a distributed transaction consensus network
Mukhopadhyay et al. A brief survey of cryptocurrency systems
CN102932136B (en) Systems and methods for managing cryptographic keys
US20170250796A1 (en) Trans Vernam Cryptography: Round One
CN107070896A (en) A kind of safe and efficient block chain customization login method and security hardening system
WO2018168723A1 (en) Technology for authenticating device on network
CN110147994A (en) A kind of instant execution method of the block chain based on homomorphic cryptography
CN109417478A (en) Multilink cryptologic block chain
CN116670673A (en) Transferring cryptocurrency from a remote limited access wallet
US20150207621A1 (en) Method for creating asymmetrical cryptographic key pairs
Xie et al. Blockchain‐Based Cloud Data Integrity Verification Scheme with High Efficiency
CN110445840A (en) A method of file storage and reading based on block chain technology
Homoliak et al. An air-gapped 2-factor authentication for smart-contract wallets
Hameed Blockchain and Cryptocurrencies Technology: a survey
Bilal et al. Blockchain technology: Opportunities & challenges
Schnell et al. Hardening encrypted patient names against cryptographic attacks using cellular automata
Ruan et al. Efficient Private Set Intersection Using Point‐Value Polynomial Representation
Maram Bitcoin generation using Blockchain technology
Mi et al. [Retracted] Privacy‐Oriented Transaction for Public Blockchain via Secret Sharing
Li et al. Post‐Quantum Privacy‐Preserving Provable Data Possession Scheme Based on Smart Contracts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant