CN107301544A - A kind of safe Wallet System of block chain - Google Patents

A kind of safe Wallet System of block chain Download PDF

Info

Publication number
CN107301544A
CN107301544A CN201710491772.3A CN201710491772A CN107301544A CN 107301544 A CN107301544 A CN 107301544A CN 201710491772 A CN201710491772 A CN 201710491772A CN 107301544 A CN107301544 A CN 107301544A
Authority
CN
China
Prior art keywords
module
wallet
block chain
key
safe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710491772.3A
Other languages
Chinese (zh)
Inventor
谭宜勇
王松山
江波涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Pan Finance Technology Co Ltd
Original Assignee
Beijing Pan Finance Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Pan Finance Technology Co Ltd filed Critical Beijing Pan Finance Technology Co Ltd
Priority to CN201710491772.3A priority Critical patent/CN107301544A/en
Publication of CN107301544A publication Critical patent/CN107301544A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of safe Wallet System of block chain, including:Web server, with key management module, key management module, to control to check, download key file, and can back up by setting access registrar and recover key file;Terminal, is connected by communication module with Web server, including interface module, security strategy setting module, wallet access control module, key file access control module, safety shield module and dynamic encryption and decryption module;Instruction setting strategy switch and policy content that wherein security strategy setting module can be transmitted according to interface module, and the state of key file access control module, file access logger module and dynamic encryption and decryption module is inquired about according to policy content and interface module is reported.By the safe Wallet System of block chain of the present invention by the dynamic encryption and decryption technology of operating system kernel level, the safe and reliable safe Wallet System of block chain can be obtained.

Description

A kind of safe Wallet System of block chain
Technical field
The present invention relates to a kind of Wallet System and method, more particularly to a kind of safe Wallet System of block chain.
Background technology
As the application of block chain technology is more and more extensive, the transaction based on block chain technology is more and more.Block chain key It is uninscribed without certification, easily occur the phenomenons such as key file is stolen, password is cracked, key file can not be given for change after losing, cause Irremediable loss.
At present, in existing a variety of Wallet Systems, these Wallet Systems, key file includes terminal storage, server storage Two kinds of storage modes.During terminal storage, key file is easily copied, replicated, and key is present by Brute Force equivalent risk.Service When device is stored, key must input trading password, trade center is existing during transaction every time typically all by trade center proxy management Key file also has trading password, causes risk factor very big, is attacked once occurring trade center, closes equivalent risk, money The possibility of packet loss is very big.
Although there is cold wallet processing scheme in the prior art, on the physically-isolated network that wallet is deposited, often Online terminal is needed to use to be interacted with the multiple signature authentication of cold wallet during secondary transaction, this method can solve wallet by net The problem of network is attacked.But this cold wallet processing scheme, process of exchange is complicated, and is not avoided that wallet is artificially copied Replicate, crack equivalent risk.
The content of the invention
To solve above-mentioned the problems of the prior art, the invention provides a kind of safe Wallet System of block chain, user During based on terminal (PC, APP) using block chain wallet, by the dynamic encryption and decryption technology of operating system kernel level, Hook technologies, Safety shield control technology, realization is protected to block chain wallet password, key file, to avoid block chain key information from letting out Dew, causes irremediable loss.
To achieve the above object, a kind of concrete technical scheme of safe Wallet System of block chain of the invention is as follows:
A kind of safe Wallet System of block chain, including:Web server, with key management module, key management module is led to Setting access registrar crossed to control to check, download key file, and can multinode backup and to recover key file secret to ensure Key file security;Terminal, is connected by communication module with Web server, including interface module, the safety being connected with interface module Tactful setting module, and wallet access control module, the key file access control mould being connected with security strategy setting module Block, safety shield module and dynamic encryption and decryption module;The instruction that wherein security strategy setting module can be transmitted according to interface module, if Determine safe class, AES, key, associated program, strategy switch and policy content, and according to the description of policy content To wallet access control module, key file access control module, safety shield module, key management module and dynamic encryption and decryption mould Block sends instruction, to inquire about key file access control module, file access logger module and dynamic encryption and decryption module State simultaneously reports interface module.
Further, dynamic encryption and decryption module is located at the inner nuclear layer of terminal operating system, and dynamic encryption and decryption module can be by connecing The instruction that security strategy setting module is sent is received, realizes and encryption and decryption operation is carried out to key file.
Further, dynamic encryption and decryption module is embedded into file system by Hook Technique or filtration drive mode, so that A part as file system.
Further, in dynamic encryption and decryption module, access control submodule is respectively provided with application layer and inner nuclear layer, to improve The influence of security and reduction security system to systematic function.
Further, encrypting module is included in safety shield module, safety shield module can be by receiving security strategy setting module The encrypting module that the instruction sent operations all to block chain wallet are authenticated in control, safety shield module can be encrypted to key Storage.
Further, wallet access control module can be by receiving the instruction that security strategy setting module is sent, to access region Whether operation during block chain wallet is controlled, to control wallet process to start and merchandise.
Further, key file access control module can be by receiving the instruction that security strategy setting module is sent, to money The access operation of bag key file is controlled, to stop that illegal process accesses key file.
Further, the file access logger module being connected with security strategy setting module, file are also included in terminal Access log logging modle monitors all operations of wallet and carried out in real time after the instruction of security strategy setting module is received Log recording.
Further, log management module is also included in Web server, log management module can be by the day of wallet operation note Will information is uploaded onto the server by network service.
By the safe Wallet System VAS application -to-terminal service of block chain (including PC terminals and the application program of mobile phone of the present invention APP terminals) on when, by the dynamic encryption and decryption technology of operating system kernel level, the safe and reliable safe money of block chain can be obtained Packet system.In the safe Wallet System of block chain of the present invention, by ensuring wallet safety in terms of three below:
1) only just allow to start wallet process when inserting safety shield, safety shield carries out authentication secret when accessing wallet, recognizes Card is by can just use wallet;
2) key file is encrypted, when legal wallet process is accessed, dynamic encryption and decryption program is decrypted in internal memory, Allow to access, and refuse other illegal processes and access, it is ensured that key file security;
3) backup of racking is entered to the key file of encryption, when key file is lost, can recovered from cloud platform, safety shield is lost During mistake, new safety shield is remake.
Brief description of the drawings
Fig. 1 is the safe Wallet System of block chain of the invention;
Fig. 2 shows a kind of operating system storage device access model;
Fig. 3 is the flow chart of dynamic encryption and decryption.
Embodiment
In order to be best understood from the purpose of the present invention, structure and function, below in conjunction with the accompanying drawings, the block chain of the present invention is pacified Full Wallet System does further detailed description.
As shown in figure 1, show the present invention the safe Wallet System of block chain, including Web server and pass through communication The terminal that module is connected with Web server.Wherein Web server includes key management module and log management module.Terminal bag Include interface module, security strategy setting module, wallet access control module, key file access control module, safety shield module, File access logger module, dynamic encryption and decryption module.
In Web server, key management module can back up and recover key file by web interface multinode, by visiting Asking certification can just check, download key file.The log information of wallet operation note can be passed through network by log management module Communication is uploaded onto the server.Web interface shows log recording, the i.e. information such as show log information, logging time, action type.
In terminal, interface module can provide api interface (application programming interfaces), interface module and peace for security application Full strategy setting module, wallet access control module, key file access control module, safety shield module, file access daily record Logging modle and dynamic encryption and decryption module are connected.Api interface can be called by upper layer application, by interface module by data, refer to Order passes to the security strategy setting module of lower floor;, can query safe strategy setting module, wallet access control by interface module Molding block, key file access control module, safety shield module, key management module, file access logger module and dynamic The state of state encryption/decryption module simultaneously reports application.
The instruction that security strategy setting module can be transmitted according to interface module, setting safe class, AES, key, Associated program, strategy switch and policy content;Visited according to the description of security strategy to wallet access control module, key file Ask that control module, safety shield module, key management module, file access logger module and dynamic encryption and decryption module are sent to refer to Order;And the state of inquiry key file access control module, file access logger module and dynamic encryption and decryption module is simultaneously Report interface module.
Wallet access control module can be realized to accessing block chain by receiving the instruction that security strategy setting module is sent Operation during wallet is controlled, and realizes and operation when accessing block chain wallet is controlled, whether to control wallet process Start and merchandise.That is, wallet access control module is after the instruction of security strategy setting module is received, according to security strategy It is required that, in real time monitoring mobile terminal on it is all access Wallet Systems operations and be controlled.
Key file access control module can be by receiving the instruction that security strategy setting module is sent, according to security strategy Requirement, realize and the access of wallet key file operation be controlled.Wherein, accessing operation includes beating file object Open, create, deleting, renaming, replicating, moving, preserving, attribute sets operation.
Safety shield module can be realized to all behaviour of block chain wallet by receiving the instruction that security strategy setting module is sent It is authenticated control, key encryption storage.
File access logger module is after the instruction of security strategy setting module is received, according to wanting for security strategy Ask, all operations of monitoring wallet, and carry out log recording in real time.
Dynamic encryption and decryption module:Positioned at the inner nuclear layer of mobile terminal operating system, by receiving security strategy setting module The instruction sent, realizes and carries out encryption and decryption operation to key file.For example, when valid application program reads encrypted data When, operation is decrypted in dynamic encryption and decryption module, and valid application program then can normally use data;When valid application program is to text When part carries out write operation, operation is encrypted in dynamic encryption and decryption module, and the file that valid application program is preserved is the text after encryption Part;When unauthorized applications read encrypted data, dynamic encryption and decryption module is without decryption oprerations, unauthorized applications It then can not normally use data;When unauthorized applications carry out write operation to file, dynamic encryption and decryption module is without any Operation.
Dynamic encryption and decryption refers to that data data are encrypted or decryption oprerations automatically in use, dry without user In advance, validated user is before using encryption file, it is not required that operation is decrypted and can be used, the text of encryption is apparently accessed The file of part and unencryption is essentially identical, but for validated user, these encryption files are transparent, but for illegal User by illegal means obtain encrypt file, encrypt, can not equally conduct interviews during due to file.Dynamic encryption and decryption is needed Want real-time operation, it is necessary to which dynamic tracking needs the data flow encrypted and decrypted, and its implementation level is in the kernel of system. Therefore, in terms of the technical standpoint of realization, realize that dynamic encryption and decryption is more much more difficult than static encryption and decryption.
Fig. 2 shows a kind of operating system storage device access model, for current operating system, only in inner nuclear layer Various files or disk operating can just be intercepted.Therefore, dynamic encryption and decryption algorithm can only be realized in inner nuclear layer.File-level , typically can (Hook technologies be also known as hook skill by Hook although dynamic encryption and decryption algorithm is relevant with specific operating system Art, major function is capture systems recalls information, filters and handle the instruction set in security strategy) or the mode such as filtration drive It is embedded into file system, becomes a part for file system.In a sense, dynamic encryption and decryption algorithm can be with Regard the One function extension of file system as, this autgmentability often occurs, can entered as needed in a modular fashion Row operation.
Fig. 3 shows the implementation process of dynamic encryption and decryption, and dynamic encryption and decryption is real in the way of file system filter driver Existing, while being provided which access control function in application layer and inner nuclear layer.In addition, daily record and program behavior control are additionally provided Function processed, this implementation cooperated by application layer and inner nuclear layer, can not only provide higher security, and Help to reduce influence of the security system to systematic function.
Thus, in the safe Wallet System of block chain of the invention, what application program can be provided by calling interface module Api interface carries out security strategy setting, and security strategy can be transmitted to security strategy setting module by interface module;Security strategy is set Module is after security strategy is received, in setting safe class, AES, key, associated program, strategy switch and strategy Hold, and according to the description of security strategy, to wallet access control module, key file access control module, safety shield module, secret Key management module, file access logger module and dynamic encryption and decryption module send instruction.
Embodiment one
Server:HTTP, HTTPS server are built, mysql databases are connected.
Client:
Communication layers:It is mainly used in network request, response processing, carries out network data transmission, communication module belongs to this layer, Communication module downloads security strategy, uploads client-side information, uploads file operation log information etc..
Application layer:Strategy setting module sets control strategy, control wallet access control module, file access control mould Block, safety shield module, the execution of dynamic encryption and decryption module, protect wallet safety in terms of three.
Hook layers:Main capture systems recalls information, filters and handles the instruction set in security strategy.
Message reference control module, key file access control module and file download monitoring module are by changing operation system System workflow, realizes the access control and log recording to file.The system of specific Hook operating systems is called:Open, read Read, create, deleting and be mobile, determining whether file access operation to continue or block by logic (security policy information) System is called.
Drive layer:Mainly by system drive, dynamic encryption and decryption processing is carried out to key file, notified by strategy setting Layer is driven, control process is to the read-write operation of key file, so as to prevent operation of the illegal process to key file.
Moreover, it is achieved that system of the present invention is it is important that the setting of security strategy, security strategy includes following Several contents:AES setting, cipher key setting, associated program setting, strategy switch, policy content.
During AES setting, different AESs can be set by application program, such as DES, 3DES, AES, RC4 etc..During cipher key setting, different keys can be set by application program, the key of any length can be set.Association During program setting, in order to realize that vertical application is decrypted, so as to set special reading program, the application journey authorized is obtained Sequence can normally read file, and driving can be its transparent encryption and decryption, and can only read ciphertext for unauthorized application program, It can not normally read and use file.The setting of strategy switch whether application strategy, or whether allow that specific file operation is passed through Filter layer.Policy content setting strategy detailed content, such as specific file type (can use asterisk wildcard *,), specifically File directory, policy content can specify any logic sector such as:@:* .*, be exactly the All Files under PC storage facilities All it is encrypting storing.Including following content:
@:-- represent drive.
F:-- daily record switch setting, setting whether log.
G:-- access rights property control sets the file access control attribute of policy content defined, including: READONLY、HIDDEN、NODELETE、NOOPEN、NOCOPY...。
It is appreciated that the present invention is described by some embodiments, and what those skilled in the art knew, do not taking off In the case of from the spirit and scope of the present invention, various changes or equivalence replacement can be carried out to these features and embodiment.Separately Outside, under the teachings of the present invention, these features and embodiment can be modified with adapt to particular situation and material without The spirit and scope of the present invention can be departed from.Therefore, the present invention is not limited to the particular embodiment disclosed, and is fallen with Embodiment in the range of claims hereof belong to the present invention protect in the range of.

Claims (9)

1. a kind of safe Wallet System of block chain, it is characterised in that including:
Web server, with key management module, key management module is by setting access registrar to control to check, download secret Key file, and multinode backup and key file can be recovered to ensure key file security;
Terminal, is connected by communication module with Web server, including interface module, and the security strategy being connected with interface module is set Cover half block, and be connected with security strategy setting module wallet access control module, key file access control module, safety Shield module and dynamic encryption and decryption module;
The instruction that wherein security strategy setting module can be transmitted according to interface module, setting safe class, AES, key, Associated program, strategy switch and policy content, and it is literary to wallet access control module, key according to the description of policy content Part access control module, safety shield module, key management module and dynamic encryption and decryption module send instruction, to inquire about key file Access control module, the state of file access logger module and dynamic encryption and decryption module simultaneously report interface module.
2. the safe Wallet System of block chain according to claim 1, it is characterised in that dynamic encryption and decryption module is located at terminal The inner nuclear layer of operating system, dynamic encryption and decryption module can be realized to secret by receiving the instruction that security strategy setting module is sent Key file carries out encryption and decryption operation.
3. the safe Wallet System of block chain according to claim 2, it is characterised in that dynamic encryption and decryption module passes through hook Technology or filtration drive mode are embedded into file system, so that the part as file system.
4. the safe Wallet System of block chain according to claim 2, it is characterised in that in dynamic encryption and decryption module, is being answered With access control submodule is respectively provided with layer and inner nuclear layer, to improve security and reduce shadow of the security system to systematic function Ring.
5. the safe Wallet System of block chain according to claim 1, it is characterised in that include encryption mould in safety shield module Block, the instruction operations all to block chain wallet that safety shield module can be sent by receiving security strategy setting module are authenticated Encrypting module in control, safety shield module can be encrypted to key to be stored.
6. the safe Wallet System of block chain according to claim 1, it is characterised in that wallet access control module can pass through The instruction that security strategy setting module is sent is received, operation when accessing block chain wallet is controlled, to control wallet to enter Whether journey starts and merchandises.
7. the safe Wallet System of block chain according to claim 1, it is characterised in that key file access control module can By receiving the instruction that security strategy setting module is sent, the access operation to wallet key file is controlled, non-to stop Method process accesses key file.
8. the safe Wallet System of block chain according to any one of claim 1-7, it is characterised in that also include in terminal The file access logger module being connected with security strategy setting module, file access logger module is receiving safe plan All operations of wallet are slightly monitored after the instruction of setting module in real time and log recording is carried out.
9. the safe Wallet System of block chain according to claim 8, it is characterised in that also include daily record in Web server Management module, log management module can be uploaded onto the server the log information of wallet operation note by network service.
CN201710491772.3A 2017-06-26 2017-06-26 A kind of safe Wallet System of block chain Pending CN107301544A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710491772.3A CN107301544A (en) 2017-06-26 2017-06-26 A kind of safe Wallet System of block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710491772.3A CN107301544A (en) 2017-06-26 2017-06-26 A kind of safe Wallet System of block chain

Publications (1)

Publication Number Publication Date
CN107301544A true CN107301544A (en) 2017-10-27

Family

ID=60134995

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710491772.3A Pending CN107301544A (en) 2017-06-26 2017-06-26 A kind of safe Wallet System of block chain

Country Status (1)

Country Link
CN (1) CN107301544A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108388806A (en) * 2018-02-12 2018-08-10 徐正伟 A kind of Internet of Things security hardening based on block chain and data Right protection device
CN108921550A (en) * 2018-06-29 2018-11-30 北京金山安全软件有限公司 Management method and device of digital currency wallet, electronic equipment and storage medium
CN109003081A (en) * 2018-07-13 2018-12-14 北京创世智链信息技术研究院 A kind of method of commerce and system based on block chain
CN109040057A (en) * 2018-07-26 2018-12-18 百色学院 A kind of multi-key cipher cascade protection privacy system and method based on block chain
CN109118187A (en) * 2018-08-30 2019-01-01 杭州链汇通区块链科技有限公司 Restoration methods, device and the computer readable storage medium of block chain wallet
CN109474424A (en) * 2018-12-17 2019-03-15 江苏恒宝智能系统技术有限公司 Block chain account cipher key backup and method, the system of recovery
CN109840435A (en) * 2017-11-27 2019-06-04 深圳市朗科科技股份有限公司 A kind of data guard method storing equipment
CN109962952A (en) * 2017-12-25 2019-07-02 联易软件有限公司 Food and medicine information transferring method and system
CN109978536A (en) * 2019-04-03 2019-07-05 上海中商网络股份有限公司 A kind of method, apparatus, storage medium and equipment by data deposit block chain
CN110557439A (en) * 2019-08-07 2019-12-10 中国联合网络通信集团有限公司 Network content management method and block chain content network platform
CN110557438A (en) * 2019-08-07 2019-12-10 中国联合网络通信集团有限公司 Network content management method and block chain content network platform
CN110795765A (en) * 2019-11-04 2020-02-14 厦门市锁链科技有限公司 Personal mobile block chain operating system based on U shield
KR20210077909A (en) * 2019-12-18 2021-06-28 권오경 Contents wallet apparutus and self-sovereign identity and copyright authentication system using the same

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254124A (en) * 2011-07-21 2011-11-23 周亮 Information security protecting system and method of mobile terminal
CN103716354A (en) * 2012-10-09 2014-04-09 苏州慧盾信息安全科技有限公司 Security protection system and method for information system
US20150287026A1 (en) * 2014-04-02 2015-10-08 Modernity Financial Holdings, Ltd. Data analytic and security mechanism for implementing a hot wallet service
CN106503574A (en) * 2016-09-13 2017-03-15 中国电子科技集团公司第三十二研究所 Block chain safe storage method
CN106537432A (en) * 2014-07-17 2017-03-22 卓格莱特有限责任公司 Method and device for securing access to wallets in which cryptocurrencies are stored
CN106534092A (en) * 2016-11-02 2017-03-22 西安电子科技大学 Message-based and key-dependent privacy data encryption method
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain
CN106875171A (en) * 2017-01-23 2017-06-20 无锡源锐电子商务有限公司 A kind of micro- many block chain distribution credit investigation systems and reference method
CN109104392A (en) * 2017-06-21 2018-12-28 杨树桃 A kind of safe Wallet System of block chain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254124A (en) * 2011-07-21 2011-11-23 周亮 Information security protecting system and method of mobile terminal
CN103716354A (en) * 2012-10-09 2014-04-09 苏州慧盾信息安全科技有限公司 Security protection system and method for information system
US20150287026A1 (en) * 2014-04-02 2015-10-08 Modernity Financial Holdings, Ltd. Data analytic and security mechanism for implementing a hot wallet service
CN106537432A (en) * 2014-07-17 2017-03-22 卓格莱特有限责任公司 Method and device for securing access to wallets in which cryptocurrencies are stored
CN106503574A (en) * 2016-09-13 2017-03-15 中国电子科技集团公司第三十二研究所 Block chain safe storage method
CN106534092A (en) * 2016-11-02 2017-03-22 西安电子科技大学 Message-based and key-dependent privacy data encryption method
CN106875171A (en) * 2017-01-23 2017-06-20 无锡源锐电子商务有限公司 A kind of micro- many block chain distribution credit investigation systems and reference method
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain
CN109104392A (en) * 2017-06-21 2018-12-28 杨树桃 A kind of safe Wallet System of block chain

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840435A (en) * 2017-11-27 2019-06-04 深圳市朗科科技股份有限公司 A kind of data guard method storing equipment
CN109962952A (en) * 2017-12-25 2019-07-02 联易软件有限公司 Food and medicine information transferring method and system
CN108388806B (en) * 2018-02-12 2020-10-20 徐正伟 Thing networking safety is consolidated and data rights and interests protection device based on block chain
CN108388806A (en) * 2018-02-12 2018-08-10 徐正伟 A kind of Internet of Things security hardening based on block chain and data Right protection device
CN108921550A (en) * 2018-06-29 2018-11-30 北京金山安全软件有限公司 Management method and device of digital currency wallet, electronic equipment and storage medium
CN108921550B (en) * 2018-06-29 2022-02-18 北京金山安全软件有限公司 Management method and device of digital currency wallet, electronic equipment and storage medium
CN109003081A (en) * 2018-07-13 2018-12-14 北京创世智链信息技术研究院 A kind of method of commerce and system based on block chain
CN109003081B (en) * 2018-07-13 2021-11-02 北京创世智链信息技术研究院 Transaction method, system and storage medium based on block chain
CN109040057A (en) * 2018-07-26 2018-12-18 百色学院 A kind of multi-key cipher cascade protection privacy system and method based on block chain
CN109040057B (en) * 2018-07-26 2020-12-01 百色学院 Multi-key hierarchical privacy protection system and method based on block chain
CN109118187A (en) * 2018-08-30 2019-01-01 杭州链汇通区块链科技有限公司 Restoration methods, device and the computer readable storage medium of block chain wallet
CN109118187B (en) * 2018-08-30 2021-07-23 神州数码融信软件有限公司 Block chain wallet recovery method and device and computer readable storage medium
CN109474424A (en) * 2018-12-17 2019-03-15 江苏恒宝智能系统技术有限公司 Block chain account cipher key backup and method, the system of recovery
CN109978536A (en) * 2019-04-03 2019-07-05 上海中商网络股份有限公司 A kind of method, apparatus, storage medium and equipment by data deposit block chain
CN110557438A (en) * 2019-08-07 2019-12-10 中国联合网络通信集团有限公司 Network content management method and block chain content network platform
CN110557439A (en) * 2019-08-07 2019-12-10 中国联合网络通信集团有限公司 Network content management method and block chain content network platform
CN110557438B (en) * 2019-08-07 2022-02-11 中国联合网络通信集团有限公司 Network content management method and block chain content network platform
CN110795765A (en) * 2019-11-04 2020-02-14 厦门市锁链科技有限公司 Personal mobile block chain operating system based on U shield
CN110795765B (en) * 2019-11-04 2021-09-10 厦门无链之链科技有限公司 Personal mobile block chain operating system based on U shield
KR20210077909A (en) * 2019-12-18 2021-06-28 권오경 Contents wallet apparutus and self-sovereign identity and copyright authentication system using the same
KR102288971B1 (en) 2019-12-18 2021-08-10 권오경 Contents wallet apparutus and self-sovereign identity and copyright authentication system using the same
US11386196B1 (en) 2019-12-18 2022-07-12 Oh Gyoung GWON Content wallet device and self-sovereign identity and copyright authentication system using the same

Similar Documents

Publication Publication Date Title
CN107301544A (en) A kind of safe Wallet System of block chain
JP6609010B2 (en) Multiple permission data security and access
US20190205317A1 (en) Systems and methods for secure storage and retrieval of data objects
CN103530570B (en) A kind of electronic document safety management system and method
US20190050598A1 (en) Secure data storage
CN101729550B (en) Digital content safeguard system based on transparent encryption and decryption, and encryption and decryption method thereof
CN106575342B (en) Kernel program including relational database and the method and apparatus for performing described program
US10685141B2 (en) Method for storing data blocks from client devices to a cloud storage system
CN107295002A (en) The method and server of a kind of high in the clouds data storage
CN103716354A (en) Security protection system and method for information system
US20180268159A1 (en) Method and System for Policy Based Real Time Data File Access Control
CN101827101A (en) Information asset protection method based on credible isolated operating environment
CN201682524U (en) Document transfer authority control system based on document filtering driver
CN102693399B (en) System and method for on-line separation and recovery of electronic documents
CN103581196A (en) Distributed file transparent encryption method and transparent decryption method
US10043015B2 (en) Method and apparatus for applying a customer owned encryption
CN108737079B (en) Distributed quantum key management system and method
CN118260264A (en) User-friendly encrypted storage system and method for distributed file system
CN108399341B (en) Windows dual file management and control system based on mobile terminal
CN103379133A (en) Safe and reliable cloud storage system
CN101243469A (en) Digital license migration from first platform to second platform
CN109104392A (en) A kind of safe Wallet System of block chain
CN101604296A (en) Disk-data sector-level encryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171027

RJ01 Rejection of invention patent application after publication