CN107301544A - A kind of safe Wallet System of block chain - Google Patents
A kind of safe Wallet System of block chain Download PDFInfo
- Publication number
- CN107301544A CN107301544A CN201710491772.3A CN201710491772A CN107301544A CN 107301544 A CN107301544 A CN 107301544A CN 201710491772 A CN201710491772 A CN 201710491772A CN 107301544 A CN107301544 A CN 107301544A
- Authority
- CN
- China
- Prior art keywords
- module
- wallet
- block chain
- key
- safe
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000005516 engineering process Methods 0.000 claims abstract description 10
- 238000004891 communication Methods 0.000 claims abstract description 8
- 238000000034 method Methods 0.000 claims description 15
- 230000008569 process Effects 0.000 claims description 11
- 238000001914 filtration Methods 0.000 claims description 3
- 230000009897 systematic effect Effects 0.000 claims description 3
- 230000006870 function Effects 0.000 description 7
- 238000012544 monitoring process Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000010009 beating Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011217 control strategy Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000000465 moulding Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 239000013643 reference control Substances 0.000 description 1
- 230000003362 replicative effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of safe Wallet System of block chain, including:Web server, with key management module, key management module, to control to check, download key file, and can back up by setting access registrar and recover key file;Terminal, is connected by communication module with Web server, including interface module, security strategy setting module, wallet access control module, key file access control module, safety shield module and dynamic encryption and decryption module;Instruction setting strategy switch and policy content that wherein security strategy setting module can be transmitted according to interface module, and the state of key file access control module, file access logger module and dynamic encryption and decryption module is inquired about according to policy content and interface module is reported.By the safe Wallet System of block chain of the present invention by the dynamic encryption and decryption technology of operating system kernel level, the safe and reliable safe Wallet System of block chain can be obtained.
Description
Technical field
The present invention relates to a kind of Wallet System and method, more particularly to a kind of safe Wallet System of block chain.
Background technology
As the application of block chain technology is more and more extensive, the transaction based on block chain technology is more and more.Block chain key
It is uninscribed without certification, easily occur the phenomenons such as key file is stolen, password is cracked, key file can not be given for change after losing, cause
Irremediable loss.
At present, in existing a variety of Wallet Systems, these Wallet Systems, key file includes terminal storage, server storage
Two kinds of storage modes.During terminal storage, key file is easily copied, replicated, and key is present by Brute Force equivalent risk.Service
When device is stored, key must input trading password, trade center is existing during transaction every time typically all by trade center proxy management
Key file also has trading password, causes risk factor very big, is attacked once occurring trade center, closes equivalent risk, money
The possibility of packet loss is very big.
Although there is cold wallet processing scheme in the prior art, on the physically-isolated network that wallet is deposited, often
Online terminal is needed to use to be interacted with the multiple signature authentication of cold wallet during secondary transaction, this method can solve wallet by net
The problem of network is attacked.But this cold wallet processing scheme, process of exchange is complicated, and is not avoided that wallet is artificially copied
Replicate, crack equivalent risk.
The content of the invention
To solve above-mentioned the problems of the prior art, the invention provides a kind of safe Wallet System of block chain, user
During based on terminal (PC, APP) using block chain wallet, by the dynamic encryption and decryption technology of operating system kernel level, Hook technologies,
Safety shield control technology, realization is protected to block chain wallet password, key file, to avoid block chain key information from letting out
Dew, causes irremediable loss.
To achieve the above object, a kind of concrete technical scheme of safe Wallet System of block chain of the invention is as follows:
A kind of safe Wallet System of block chain, including:Web server, with key management module, key management module is led to
Setting access registrar crossed to control to check, download key file, and can multinode backup and to recover key file secret to ensure
Key file security;Terminal, is connected by communication module with Web server, including interface module, the safety being connected with interface module
Tactful setting module, and wallet access control module, the key file access control mould being connected with security strategy setting module
Block, safety shield module and dynamic encryption and decryption module;The instruction that wherein security strategy setting module can be transmitted according to interface module, if
Determine safe class, AES, key, associated program, strategy switch and policy content, and according to the description of policy content
To wallet access control module, key file access control module, safety shield module, key management module and dynamic encryption and decryption mould
Block sends instruction, to inquire about key file access control module, file access logger module and dynamic encryption and decryption module
State simultaneously reports interface module.
Further, dynamic encryption and decryption module is located at the inner nuclear layer of terminal operating system, and dynamic encryption and decryption module can be by connecing
The instruction that security strategy setting module is sent is received, realizes and encryption and decryption operation is carried out to key file.
Further, dynamic encryption and decryption module is embedded into file system by Hook Technique or filtration drive mode, so that
A part as file system.
Further, in dynamic encryption and decryption module, access control submodule is respectively provided with application layer and inner nuclear layer, to improve
The influence of security and reduction security system to systematic function.
Further, encrypting module is included in safety shield module, safety shield module can be by receiving security strategy setting module
The encrypting module that the instruction sent operations all to block chain wallet are authenticated in control, safety shield module can be encrypted to key
Storage.
Further, wallet access control module can be by receiving the instruction that security strategy setting module is sent, to access region
Whether operation during block chain wallet is controlled, to control wallet process to start and merchandise.
Further, key file access control module can be by receiving the instruction that security strategy setting module is sent, to money
The access operation of bag key file is controlled, to stop that illegal process accesses key file.
Further, the file access logger module being connected with security strategy setting module, file are also included in terminal
Access log logging modle monitors all operations of wallet and carried out in real time after the instruction of security strategy setting module is received
Log recording.
Further, log management module is also included in Web server, log management module can be by the day of wallet operation note
Will information is uploaded onto the server by network service.
By the safe Wallet System VAS application -to-terminal service of block chain (including PC terminals and the application program of mobile phone of the present invention
APP terminals) on when, by the dynamic encryption and decryption technology of operating system kernel level, the safe and reliable safe money of block chain can be obtained
Packet system.In the safe Wallet System of block chain of the present invention, by ensuring wallet safety in terms of three below:
1) only just allow to start wallet process when inserting safety shield, safety shield carries out authentication secret when accessing wallet, recognizes
Card is by can just use wallet;
2) key file is encrypted, when legal wallet process is accessed, dynamic encryption and decryption program is decrypted in internal memory,
Allow to access, and refuse other illegal processes and access, it is ensured that key file security;
3) backup of racking is entered to the key file of encryption, when key file is lost, can recovered from cloud platform, safety shield is lost
During mistake, new safety shield is remake.
Brief description of the drawings
Fig. 1 is the safe Wallet System of block chain of the invention;
Fig. 2 shows a kind of operating system storage device access model;
Fig. 3 is the flow chart of dynamic encryption and decryption.
Embodiment
In order to be best understood from the purpose of the present invention, structure and function, below in conjunction with the accompanying drawings, the block chain of the present invention is pacified
Full Wallet System does further detailed description.
As shown in figure 1, show the present invention the safe Wallet System of block chain, including Web server and pass through communication
The terminal that module is connected with Web server.Wherein Web server includes key management module and log management module.Terminal bag
Include interface module, security strategy setting module, wallet access control module, key file access control module, safety shield module,
File access logger module, dynamic encryption and decryption module.
In Web server, key management module can back up and recover key file by web interface multinode, by visiting
Asking certification can just check, download key file.The log information of wallet operation note can be passed through network by log management module
Communication is uploaded onto the server.Web interface shows log recording, the i.e. information such as show log information, logging time, action type.
In terminal, interface module can provide api interface (application programming interfaces), interface module and peace for security application
Full strategy setting module, wallet access control module, key file access control module, safety shield module, file access daily record
Logging modle and dynamic encryption and decryption module are connected.Api interface can be called by upper layer application, by interface module by data, refer to
Order passes to the security strategy setting module of lower floor;, can query safe strategy setting module, wallet access control by interface module
Molding block, key file access control module, safety shield module, key management module, file access logger module and dynamic
The state of state encryption/decryption module simultaneously reports application.
The instruction that security strategy setting module can be transmitted according to interface module, setting safe class, AES, key,
Associated program, strategy switch and policy content;Visited according to the description of security strategy to wallet access control module, key file
Ask that control module, safety shield module, key management module, file access logger module and dynamic encryption and decryption module are sent to refer to
Order;And the state of inquiry key file access control module, file access logger module and dynamic encryption and decryption module is simultaneously
Report interface module.
Wallet access control module can be realized to accessing block chain by receiving the instruction that security strategy setting module is sent
Operation during wallet is controlled, and realizes and operation when accessing block chain wallet is controlled, whether to control wallet process
Start and merchandise.That is, wallet access control module is after the instruction of security strategy setting module is received, according to security strategy
It is required that, in real time monitoring mobile terminal on it is all access Wallet Systems operations and be controlled.
Key file access control module can be by receiving the instruction that security strategy setting module is sent, according to security strategy
Requirement, realize and the access of wallet key file operation be controlled.Wherein, accessing operation includes beating file object
Open, create, deleting, renaming, replicating, moving, preserving, attribute sets operation.
Safety shield module can be realized to all behaviour of block chain wallet by receiving the instruction that security strategy setting module is sent
It is authenticated control, key encryption storage.
File access logger module is after the instruction of security strategy setting module is received, according to wanting for security strategy
Ask, all operations of monitoring wallet, and carry out log recording in real time.
Dynamic encryption and decryption module:Positioned at the inner nuclear layer of mobile terminal operating system, by receiving security strategy setting module
The instruction sent, realizes and carries out encryption and decryption operation to key file.For example, when valid application program reads encrypted data
When, operation is decrypted in dynamic encryption and decryption module, and valid application program then can normally use data;When valid application program is to text
When part carries out write operation, operation is encrypted in dynamic encryption and decryption module, and the file that valid application program is preserved is the text after encryption
Part;When unauthorized applications read encrypted data, dynamic encryption and decryption module is without decryption oprerations, unauthorized applications
It then can not normally use data;When unauthorized applications carry out write operation to file, dynamic encryption and decryption module is without any
Operation.
Dynamic encryption and decryption refers to that data data are encrypted or decryption oprerations automatically in use, dry without user
In advance, validated user is before using encryption file, it is not required that operation is decrypted and can be used, the text of encryption is apparently accessed
The file of part and unencryption is essentially identical, but for validated user, these encryption files are transparent, but for illegal
User by illegal means obtain encrypt file, encrypt, can not equally conduct interviews during due to file.Dynamic encryption and decryption is needed
Want real-time operation, it is necessary to which dynamic tracking needs the data flow encrypted and decrypted, and its implementation level is in the kernel of system.
Therefore, in terms of the technical standpoint of realization, realize that dynamic encryption and decryption is more much more difficult than static encryption and decryption.
Fig. 2 shows a kind of operating system storage device access model, for current operating system, only in inner nuclear layer
Various files or disk operating can just be intercepted.Therefore, dynamic encryption and decryption algorithm can only be realized in inner nuclear layer.File-level
, typically can (Hook technologies be also known as hook skill by Hook although dynamic encryption and decryption algorithm is relevant with specific operating system
Art, major function is capture systems recalls information, filters and handle the instruction set in security strategy) or the mode such as filtration drive
It is embedded into file system, becomes a part for file system.In a sense, dynamic encryption and decryption algorithm can be with
Regard the One function extension of file system as, this autgmentability often occurs, can entered as needed in a modular fashion
Row operation.
Fig. 3 shows the implementation process of dynamic encryption and decryption, and dynamic encryption and decryption is real in the way of file system filter driver
Existing, while being provided which access control function in application layer and inner nuclear layer.In addition, daily record and program behavior control are additionally provided
Function processed, this implementation cooperated by application layer and inner nuclear layer, can not only provide higher security, and
Help to reduce influence of the security system to systematic function.
Thus, in the safe Wallet System of block chain of the invention, what application program can be provided by calling interface module
Api interface carries out security strategy setting, and security strategy can be transmitted to security strategy setting module by interface module;Security strategy is set
Module is after security strategy is received, in setting safe class, AES, key, associated program, strategy switch and strategy
Hold, and according to the description of security strategy, to wallet access control module, key file access control module, safety shield module, secret
Key management module, file access logger module and dynamic encryption and decryption module send instruction.
Embodiment one
Server:HTTP, HTTPS server are built, mysql databases are connected.
Client:
Communication layers:It is mainly used in network request, response processing, carries out network data transmission, communication module belongs to this layer,
Communication module downloads security strategy, uploads client-side information, uploads file operation log information etc..
Application layer:Strategy setting module sets control strategy, control wallet access control module, file access control mould
Block, safety shield module, the execution of dynamic encryption and decryption module, protect wallet safety in terms of three.
Hook layers:Main capture systems recalls information, filters and handles the instruction set in security strategy.
Message reference control module, key file access control module and file download monitoring module are by changing operation system
System workflow, realizes the access control and log recording to file.The system of specific Hook operating systems is called:Open, read
Read, create, deleting and be mobile, determining whether file access operation to continue or block by logic (security policy information)
System is called.
Drive layer:Mainly by system drive, dynamic encryption and decryption processing is carried out to key file, notified by strategy setting
Layer is driven, control process is to the read-write operation of key file, so as to prevent operation of the illegal process to key file.
Moreover, it is achieved that system of the present invention is it is important that the setting of security strategy, security strategy includes following
Several contents:AES setting, cipher key setting, associated program setting, strategy switch, policy content.
During AES setting, different AESs can be set by application program, such as DES, 3DES, AES,
RC4 etc..During cipher key setting, different keys can be set by application program, the key of any length can be set.Association
During program setting, in order to realize that vertical application is decrypted, so as to set special reading program, the application journey authorized is obtained
Sequence can normally read file, and driving can be its transparent encryption and decryption, and can only read ciphertext for unauthorized application program,
It can not normally read and use file.The setting of strategy switch whether application strategy, or whether allow that specific file operation is passed through
Filter layer.Policy content setting strategy detailed content, such as specific file type (can use asterisk wildcard *,), specifically
File directory, policy content can specify any logic sector such as:@:* .*, be exactly the All Files under PC storage facilities
All it is encrypting storing.Including following content:
@:-- represent drive.
F:-- daily record switch setting, setting whether log.
G:-- access rights property control sets the file access control attribute of policy content defined, including:
READONLY、HIDDEN、NODELETE、NOOPEN、NOCOPY...。
It is appreciated that the present invention is described by some embodiments, and what those skilled in the art knew, do not taking off
In the case of from the spirit and scope of the present invention, various changes or equivalence replacement can be carried out to these features and embodiment.Separately
Outside, under the teachings of the present invention, these features and embodiment can be modified with adapt to particular situation and material without
The spirit and scope of the present invention can be departed from.Therefore, the present invention is not limited to the particular embodiment disclosed, and is fallen with
Embodiment in the range of claims hereof belong to the present invention protect in the range of.
Claims (9)
1. a kind of safe Wallet System of block chain, it is characterised in that including:
Web server, with key management module, key management module is by setting access registrar to control to check, download secret
Key file, and multinode backup and key file can be recovered to ensure key file security;
Terminal, is connected by communication module with Web server, including interface module, and the security strategy being connected with interface module is set
Cover half block, and be connected with security strategy setting module wallet access control module, key file access control module, safety
Shield module and dynamic encryption and decryption module;
The instruction that wherein security strategy setting module can be transmitted according to interface module, setting safe class, AES, key,
Associated program, strategy switch and policy content, and it is literary to wallet access control module, key according to the description of policy content
Part access control module, safety shield module, key management module and dynamic encryption and decryption module send instruction, to inquire about key file
Access control module, the state of file access logger module and dynamic encryption and decryption module simultaneously report interface module.
2. the safe Wallet System of block chain according to claim 1, it is characterised in that dynamic encryption and decryption module is located at terminal
The inner nuclear layer of operating system, dynamic encryption and decryption module can be realized to secret by receiving the instruction that security strategy setting module is sent
Key file carries out encryption and decryption operation.
3. the safe Wallet System of block chain according to claim 2, it is characterised in that dynamic encryption and decryption module passes through hook
Technology or filtration drive mode are embedded into file system, so that the part as file system.
4. the safe Wallet System of block chain according to claim 2, it is characterised in that in dynamic encryption and decryption module, is being answered
With access control submodule is respectively provided with layer and inner nuclear layer, to improve security and reduce shadow of the security system to systematic function
Ring.
5. the safe Wallet System of block chain according to claim 1, it is characterised in that include encryption mould in safety shield module
Block, the instruction operations all to block chain wallet that safety shield module can be sent by receiving security strategy setting module are authenticated
Encrypting module in control, safety shield module can be encrypted to key to be stored.
6. the safe Wallet System of block chain according to claim 1, it is characterised in that wallet access control module can pass through
The instruction that security strategy setting module is sent is received, operation when accessing block chain wallet is controlled, to control wallet to enter
Whether journey starts and merchandises.
7. the safe Wallet System of block chain according to claim 1, it is characterised in that key file access control module can
By receiving the instruction that security strategy setting module is sent, the access operation to wallet key file is controlled, non-to stop
Method process accesses key file.
8. the safe Wallet System of block chain according to any one of claim 1-7, it is characterised in that also include in terminal
The file access logger module being connected with security strategy setting module, file access logger module is receiving safe plan
All operations of wallet are slightly monitored after the instruction of setting module in real time and log recording is carried out.
9. the safe Wallet System of block chain according to claim 8, it is characterised in that also include daily record in Web server
Management module, log management module can be uploaded onto the server the log information of wallet operation note by network service.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710491772.3A CN107301544A (en) | 2017-06-26 | 2017-06-26 | A kind of safe Wallet System of block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710491772.3A CN107301544A (en) | 2017-06-26 | 2017-06-26 | A kind of safe Wallet System of block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107301544A true CN107301544A (en) | 2017-10-27 |
Family
ID=60134995
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710491772.3A Pending CN107301544A (en) | 2017-06-26 | 2017-06-26 | A kind of safe Wallet System of block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107301544A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108388806A (en) * | 2018-02-12 | 2018-08-10 | 徐正伟 | A kind of Internet of Things security hardening based on block chain and data Right protection device |
CN108921550A (en) * | 2018-06-29 | 2018-11-30 | 北京金山安全软件有限公司 | Management method and device of digital currency wallet, electronic equipment and storage medium |
CN109003081A (en) * | 2018-07-13 | 2018-12-14 | 北京创世智链信息技术研究院 | A kind of method of commerce and system based on block chain |
CN109040057A (en) * | 2018-07-26 | 2018-12-18 | 百色学院 | A kind of multi-key cipher cascade protection privacy system and method based on block chain |
CN109118187A (en) * | 2018-08-30 | 2019-01-01 | 杭州链汇通区块链科技有限公司 | Restoration methods, device and the computer readable storage medium of block chain wallet |
CN109474424A (en) * | 2018-12-17 | 2019-03-15 | 江苏恒宝智能系统技术有限公司 | Block chain account cipher key backup and method, the system of recovery |
CN109840435A (en) * | 2017-11-27 | 2019-06-04 | 深圳市朗科科技股份有限公司 | A kind of data guard method storing equipment |
CN109962952A (en) * | 2017-12-25 | 2019-07-02 | 联易软件有限公司 | Food and medicine information transferring method and system |
CN109978536A (en) * | 2019-04-03 | 2019-07-05 | 上海中商网络股份有限公司 | A kind of method, apparatus, storage medium and equipment by data deposit block chain |
CN110557439A (en) * | 2019-08-07 | 2019-12-10 | 中国联合网络通信集团有限公司 | Network content management method and block chain content network platform |
CN110557438A (en) * | 2019-08-07 | 2019-12-10 | 中国联合网络通信集团有限公司 | Network content management method and block chain content network platform |
CN110795765A (en) * | 2019-11-04 | 2020-02-14 | 厦门市锁链科技有限公司 | Personal mobile block chain operating system based on U shield |
KR20210077909A (en) * | 2019-12-18 | 2021-06-28 | 권오경 | Contents wallet apparutus and self-sovereign identity and copyright authentication system using the same |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102254124A (en) * | 2011-07-21 | 2011-11-23 | 周亮 | Information security protecting system and method of mobile terminal |
CN103716354A (en) * | 2012-10-09 | 2014-04-09 | 苏州慧盾信息安全科技有限公司 | Security protection system and method for information system |
US20150287026A1 (en) * | 2014-04-02 | 2015-10-08 | Modernity Financial Holdings, Ltd. | Data analytic and security mechanism for implementing a hot wallet service |
CN106503574A (en) * | 2016-09-13 | 2017-03-15 | 中国电子科技集团公司第三十二研究所 | Block chain safe storage method |
CN106537432A (en) * | 2014-07-17 | 2017-03-22 | 卓格莱特有限责任公司 | Method and device for securing access to wallets in which cryptocurrencies are stored |
CN106534092A (en) * | 2016-11-02 | 2017-03-22 | 西安电子科技大学 | Message-based and key-dependent privacy data encryption method |
CN106845960A (en) * | 2017-01-24 | 2017-06-13 | 上海亿账通区块链科技有限公司 | Method for secure transactions and system based on block chain |
CN106875171A (en) * | 2017-01-23 | 2017-06-20 | 无锡源锐电子商务有限公司 | A kind of micro- many block chain distribution credit investigation systems and reference method |
CN109104392A (en) * | 2017-06-21 | 2018-12-28 | 杨树桃 | A kind of safe Wallet System of block chain |
-
2017
- 2017-06-26 CN CN201710491772.3A patent/CN107301544A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102254124A (en) * | 2011-07-21 | 2011-11-23 | 周亮 | Information security protecting system and method of mobile terminal |
CN103716354A (en) * | 2012-10-09 | 2014-04-09 | 苏州慧盾信息安全科技有限公司 | Security protection system and method for information system |
US20150287026A1 (en) * | 2014-04-02 | 2015-10-08 | Modernity Financial Holdings, Ltd. | Data analytic and security mechanism for implementing a hot wallet service |
CN106537432A (en) * | 2014-07-17 | 2017-03-22 | 卓格莱特有限责任公司 | Method and device for securing access to wallets in which cryptocurrencies are stored |
CN106503574A (en) * | 2016-09-13 | 2017-03-15 | 中国电子科技集团公司第三十二研究所 | Block chain safe storage method |
CN106534092A (en) * | 2016-11-02 | 2017-03-22 | 西安电子科技大学 | Message-based and key-dependent privacy data encryption method |
CN106875171A (en) * | 2017-01-23 | 2017-06-20 | 无锡源锐电子商务有限公司 | A kind of micro- many block chain distribution credit investigation systems and reference method |
CN106845960A (en) * | 2017-01-24 | 2017-06-13 | 上海亿账通区块链科技有限公司 | Method for secure transactions and system based on block chain |
CN109104392A (en) * | 2017-06-21 | 2018-12-28 | 杨树桃 | A kind of safe Wallet System of block chain |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109840435A (en) * | 2017-11-27 | 2019-06-04 | 深圳市朗科科技股份有限公司 | A kind of data guard method storing equipment |
CN109962952A (en) * | 2017-12-25 | 2019-07-02 | 联易软件有限公司 | Food and medicine information transferring method and system |
CN108388806B (en) * | 2018-02-12 | 2020-10-20 | 徐正伟 | Thing networking safety is consolidated and data rights and interests protection device based on block chain |
CN108388806A (en) * | 2018-02-12 | 2018-08-10 | 徐正伟 | A kind of Internet of Things security hardening based on block chain and data Right protection device |
CN108921550A (en) * | 2018-06-29 | 2018-11-30 | 北京金山安全软件有限公司 | Management method and device of digital currency wallet, electronic equipment and storage medium |
CN108921550B (en) * | 2018-06-29 | 2022-02-18 | 北京金山安全软件有限公司 | Management method and device of digital currency wallet, electronic equipment and storage medium |
CN109003081A (en) * | 2018-07-13 | 2018-12-14 | 北京创世智链信息技术研究院 | A kind of method of commerce and system based on block chain |
CN109003081B (en) * | 2018-07-13 | 2021-11-02 | 北京创世智链信息技术研究院 | Transaction method, system and storage medium based on block chain |
CN109040057A (en) * | 2018-07-26 | 2018-12-18 | 百色学院 | A kind of multi-key cipher cascade protection privacy system and method based on block chain |
CN109040057B (en) * | 2018-07-26 | 2020-12-01 | 百色学院 | Multi-key hierarchical privacy protection system and method based on block chain |
CN109118187A (en) * | 2018-08-30 | 2019-01-01 | 杭州链汇通区块链科技有限公司 | Restoration methods, device and the computer readable storage medium of block chain wallet |
CN109118187B (en) * | 2018-08-30 | 2021-07-23 | 神州数码融信软件有限公司 | Block chain wallet recovery method and device and computer readable storage medium |
CN109474424A (en) * | 2018-12-17 | 2019-03-15 | 江苏恒宝智能系统技术有限公司 | Block chain account cipher key backup and method, the system of recovery |
CN109978536A (en) * | 2019-04-03 | 2019-07-05 | 上海中商网络股份有限公司 | A kind of method, apparatus, storage medium and equipment by data deposit block chain |
CN110557438A (en) * | 2019-08-07 | 2019-12-10 | 中国联合网络通信集团有限公司 | Network content management method and block chain content network platform |
CN110557439A (en) * | 2019-08-07 | 2019-12-10 | 中国联合网络通信集团有限公司 | Network content management method and block chain content network platform |
CN110557438B (en) * | 2019-08-07 | 2022-02-11 | 中国联合网络通信集团有限公司 | Network content management method and block chain content network platform |
CN110795765A (en) * | 2019-11-04 | 2020-02-14 | 厦门市锁链科技有限公司 | Personal mobile block chain operating system based on U shield |
CN110795765B (en) * | 2019-11-04 | 2021-09-10 | 厦门无链之链科技有限公司 | Personal mobile block chain operating system based on U shield |
KR20210077909A (en) * | 2019-12-18 | 2021-06-28 | 권오경 | Contents wallet apparutus and self-sovereign identity and copyright authentication system using the same |
KR102288971B1 (en) | 2019-12-18 | 2021-08-10 | 권오경 | Contents wallet apparutus and self-sovereign identity and copyright authentication system using the same |
US11386196B1 (en) | 2019-12-18 | 2022-07-12 | Oh Gyoung GWON | Content wallet device and self-sovereign identity and copyright authentication system using the same |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107301544A (en) | A kind of safe Wallet System of block chain | |
JP6609010B2 (en) | Multiple permission data security and access | |
US20190205317A1 (en) | Systems and methods for secure storage and retrieval of data objects | |
CN103530570B (en) | A kind of electronic document safety management system and method | |
US20190050598A1 (en) | Secure data storage | |
CN101729550B (en) | Digital content safeguard system based on transparent encryption and decryption, and encryption and decryption method thereof | |
CN106575342B (en) | Kernel program including relational database and the method and apparatus for performing described program | |
US10685141B2 (en) | Method for storing data blocks from client devices to a cloud storage system | |
CN107295002A (en) | The method and server of a kind of high in the clouds data storage | |
CN103716354A (en) | Security protection system and method for information system | |
US20180268159A1 (en) | Method and System for Policy Based Real Time Data File Access Control | |
CN101827101A (en) | Information asset protection method based on credible isolated operating environment | |
CN201682524U (en) | Document transfer authority control system based on document filtering driver | |
CN102693399B (en) | System and method for on-line separation and recovery of electronic documents | |
CN103581196A (en) | Distributed file transparent encryption method and transparent decryption method | |
US10043015B2 (en) | Method and apparatus for applying a customer owned encryption | |
CN108737079B (en) | Distributed quantum key management system and method | |
CN118260264A (en) | User-friendly encrypted storage system and method for distributed file system | |
CN108399341B (en) | Windows dual file management and control system based on mobile terminal | |
CN103379133A (en) | Safe and reliable cloud storage system | |
CN101243469A (en) | Digital license migration from first platform to second platform | |
CN109104392A (en) | A kind of safe Wallet System of block chain | |
CN101604296A (en) | Disk-data sector-level encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171027 |
|
RJ01 | Rejection of invention patent application after publication |