CN108985759A - A kind of address generating method and system, equipment and storage medium encrypting currency - Google Patents

A kind of address generating method and system, equipment and storage medium encrypting currency Download PDF

Info

Publication number
CN108985759A
CN108985759A CN201810621438.XA CN201810621438A CN108985759A CN 108985759 A CN108985759 A CN 108985759A CN 201810621438 A CN201810621438 A CN 201810621438A CN 108985759 A CN108985759 A CN 108985759A
Authority
CN
China
Prior art keywords
character
character string
address
title
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810621438.XA
Other languages
Chinese (zh)
Other versions
CN108985759B (en
Inventor
魏吉星
吴思进
王志文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN201810621438.XA priority Critical patent/CN108985759B/en
Publication of CN108985759A publication Critical patent/CN108985759A/en
Application granted granted Critical
Publication of CN108985759B publication Critical patent/CN108985759B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4018Transaction verification using the card verification value [CVV] associated with the card

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of address generating methods and system, equipment and storage medium for encrypting currency, comprising: according to the first title text string generation code character library of encryption currency;The first address character string of the encryption currency is generated by the code character library;Wherein the first address character string does not include each character included by the first title character string;The first title character string is added in the designated position of the first address character string to generate the second address character string.The present invention allows users to intuitively identify the address which encryption currency the second address character string is by obtaining the second final address character string in the name character that encryption currency is added in designated position on the basis of the first address character string generated without containing encryption monetary name character.

Description

A kind of address generating method and system, equipment and storage medium encrypting currency
Technical field
This application involves field of computer technology, and in particular to a kind of address generating method for encrypting currency and system, sets Standby and storage medium.
Background technique
The currency address of currency is encrypted, personal bank card account, identification when being for trading with other people are similar to Information.Currently, the mode that encryption currency generallys use class bit coin generates currency address, i.e., by carrying out Hash operation to public key Afterwards, it then carries out BASE58 and encodes to obtain a character string, to represent an address.Currently, although the process for generating address guarantees The safety of address and machine readability, but for user's individual, there is a serious shortage of readability for such address, use Family can not intuitively distinguish that this address is the address of what type of encryption currency from a character string, it is also difficult to judge this Whether a character string is a sufficient address.
Summary of the invention
In view of drawbacks described above in the prior art or deficiency, being intended to provide one kind for a user being capable of more intuitive side Just know this currency address be it is any encryption currency address generating method and system, equipment and storage medium.
In a first aspect, the present invention provides a kind of address generating method for encrypting currency, comprising:
According to the first title text string generation code character library of encryption currency;
The first address character string of encryption currency is generated by code character library;Wherein the first address character string does not include the Each character included by one name character string;
The first title character string is added in the designated position of the first address character string to generate the second address character string.
Further, include any one of following according to the first title text string generation code character library of encryption currency:
Each character included by the first title character string is removed in default code character repertoire, generates code character library;
Each character included by the first title character string and corresponding size write characters are removed in default code character repertoire, Generate code character library.
Further, include: according to the first title text string generation code character library of encryption currency
According to the first title character string of encryption currency, inquiry whether there is the second title word in encryption monetary name library Symbol string:
It is then to remove each character included by the second title character string in default code character repertoire, generates code character Library;
Wherein, the second title character string is generated by adding several characters after the first title character string.
Further, designated position is at least at two.
Further, designated position includes at least one of following: the head of the first address character string, the first address character string Tail portion.
Second aspect, the present invention provide a kind of address generation system for encrypting currency, comprising:
Code character library generation unit is configured to the first title text string generation code character according to encryption currency Library;
First scalar/vector is configured to the first address character string that code character library generates encryption currency; Wherein the first address character string does not include each character included by the first title character string;
Second scalar/vector is configured to add the first title character string in the designated position of the first address character string To generate the second address character string.
Further, code character library generation unit includes:
First deletes subelement, is configured to remove in default code character repertoire each included by the first title character string Character generates code character library;Or,
Each character included by the first title character string and corresponding size write characters are removed in default code character repertoire, Generate code character library.
Further, code character library generation unit includes:
Second deletes subelement, is configured to the first title character string according to encryption currency in encryption monetary name library Inquiry whether there is the second title character string:
It is then to remove each character included by the second title character string in default code character repertoire, generates code character Library;Wherein, the second title character string is generated by adding several characters after the first title character string.
The third aspect, the present invention also provides a kind of equipment, including one or more processors and memory, wherein memory Comprising can by instruction that the one or more processors execute so that the one or more processors execute it is each according to the present invention The address generating method for the encryption currency that embodiment provides.
Fourth aspect, the present invention also provides a kind of storage medium for being stored with computer program, which makes to count Calculation machine executes the address generating method for the encryption currency that each embodiment according to the present invention provides.
The address generating method and system, equipment of a kind of encryption currency that many embodiments of the present invention provide and Jie can be stored Matter on the basis of first address character string generated without containing encryption monetary name character in designated position addition by adding The name character of close currency obtains the second final address character string, allows users to intuitively identify the second address character string It is the address of which encryption currency.
A kind of address generating method for encryption currency that some embodiments of the invention provide and system, equipment and Jie can be stored Matter optimizes the ground extremely, identify the address can not only intuitively further by the way that setting position is located at head and tail portion, Can also easily determine whether the duplication address is complete.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is the flow chart for the method that one embodiment of the invention provides.
Fig. 2 is the flow chart for the method that one embodiment of the invention provides.
Fig. 3 is the flow chart of step S1 in a kind of preferred embodiment of method shown in Fig. 1 of the present invention.
Fig. 4 is a kind of preferred embodiment flow chart of method shown in Fig. 1 of the present invention.
Fig. 5 is the flow chart of step S1 in another preferred embodiment of method shown in Fig. 1 of the present invention.
Fig. 6 is the flow chart of step S3 in a kind of preferred embodiment of method shown in Fig. 1 of the present invention.
Fig. 7 is the structural schematic diagram for the system that one embodiment of the invention provides
Fig. 8 is a kind of device structure schematic diagram provided by the invention.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, part relevant to invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is the flow chart for the method that a kind of encryption currency that one embodiment of the invention provides generates address.
As shown in Figure 1, in the present embodiment, the present invention provides a kind of method that encryption currency generates address, comprising:
S1, according to encryption currency the first title text string generation code character library;
S2, the first address character string that encryption currency is generated by code character library;Wherein the first address character string does not wrap Containing each character included by the first title character string;
S3, the first title character string is added to generate the second address character string in the designated position of the first address character string.
Specifically, by taking Fig. 2 as an example: after receiving encryption monetary name character " ABCD ", generating the first address character string, such as " 123456789EFGHIJK ", it is assumed that algorithm adds monetary name character " ABCD " after being set in third character, then last to compile Code after generate the second address character string " 123ABCD456789EFGHIJK " in this way, encryption currency address generate terminate, user It can be by seeing that the address is encryption currency " ABCD " to visual and clear the knowing of the monetary name character after third character Address, because the address only just has " ABCD " these characters in the position of this setting out, and being in other positions will not Occur.
Above-described embodiment is by first generating the address without the name character for encrypting currency, then again in the setting of the address The name character is added at position, and user is enable intuitively to know that the address is the ground of which kind of currency when seeing the address Location.
The embodiment is not limited by Fig. 2, and " ABCD " is only the expression way for representing the character string of certain encryption currency, and Do not refer to that encryption currency itself, diagrammatically shown first address character string, the second address character string are also one kind in order to better The expression way for understanding present embodiment, be not intended to limit present embodiment actually generate address character string as a result, setting Only one way in which is added also after being scheduled on third character, adds the similarly suitable the present embodiment institute of character string after other characters The method shown, and designated position is also not necessarily limited at one, the similar inventions of other a few place setting positions conceive equally applicable implementation Example.
Fig. 3 is the flow chart of step S1 in a kind of preferred embodiment of method shown in Fig. 1 of the present invention.
S11, after obtaining name character string, each character included by name character string is deleted from default code character repertoire,
S12, code character library is generated.
Specifically, currently, the address of encryption currency mostly uses the mode of class bit coin to generate currency address, that is, being used such as Fig. 4 BASE58 coding obtains currency address.The code character library of BASE58 is
" 123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwx yz ", this is default Code database deletes character " A " " B " " C " " D " from above-mentioned code database after receiving encryption monetary name character " ABCD ", generates Code character library " 123456789EFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz ", is existed by algorithm The first address character string is generated in the code character library such as " 123456789EFGHIJK ", is not contained in the first address character string Name character " ABCD ".
Above-described embodiment optimizes coding by deleting encryption monetary name character in original default code character repertoire The generating process of character repertoire.
The embodiment is not limited by Fig. 4, and default code library is not only the coded character set of BASE58, other characters yet Collect equally applicable this method, and the first address character string shown in this figure is only diagram effect, does not represent the first ground of generation Location character string is address character string shown in this figure, is repeated no more.
Fig. 5 is the flow chart of step S1 in another preferred embodiment of method shown in Fig. 1 of the present invention.
According to the first title character string of encryption currency, inquiry whether there is the second title word in encryption monetary name library Symbol string:
It is then to remove each character included by the second title character string in default code character repertoire, generates code character Library;
Wherein, the second title character string is generated by adding several characters after the first title character string.
Specifically, after receiving encryption currency character string " ABCD ", inquiry encryption monetary data library, if inquiring in the presence of encryption Currency " ABCDE " then removes in default code character repertoire character included by the character string " A " " B " " C " " D " " E ", generates Code character library without above-mentioned character, then coding generates the first address character string on this basis, then in the first address " ABCD " is added on the designated position of character string, is generated the second address word " * * * ABCD*** ", is generated to avoid the occurrence of coding " * * * ABCDE*** " is this to be possible to the case where being mistakenly considered the address of encryption currency ABCDE.
Above-mentioned preferred embodiment, it is excellent by removing there may be address character string similar with other currency type character strings The generating process in code character library is changed.
Wherein, " ABCD " or " ABCDE " is only the expression way for representing the character string of certain encryption currency, does not imply that encryption Currency itself, the first address character string, the expression of the second address character string are also only a kind of in order to better understand this embodiment party The expression way of formula is not intended to limit the address character string that present embodiment actually generates.
Fig. 6 is the flow chart of step S3 in a kind of preferred embodiment of method shown in Fig. 1 of the present invention.Assuming that encryption currency name The first address character string that character " ABCD " generates is referred to as " 123456789EFGHIJK ", then to the head of the first address character string Portion and tail portion add name character " ABCD " respectively and generate the second address character string " ABCD123456789EFGHIJKABCD " afterwards.
Above embodiment by adding name character, a side on the head of the first address character string and tail position respectively Face can be used family and intuitively find out that the address is the address of which kind of encryption currency, on the other hand, moreover it is possible to make user on duplication ground It oneself can discriminate whether replicated complete when location, avoid the unfavorable result of the imperfect bring of address reproduction.
Likewise, the embodiment is not limited by Fig. 6, as shown in the figure merely to more intuitive understand this embodiment party The particular content of formula.
Fig. 7 is that a kind of address for encryption currency that one embodiment of the invention provides generates the structural schematic diagram of system, such as Fig. 7 It is shown, it is a kind of encrypt currency address generate system 001 include: code character library generation unit 002, be configured to according to encryption First title text string generation code character library of currency,
First scalar/vector 003 concatenates into the first address character string of encryption currency according to the name character, this One address character string does not include each character included by the name character string;Second scalar/vector 004 is configured to The name character is added on the designated position of one address character string and generates the second address character string, and will not be gone out in other positions The now name character.
In a preferred embodiment, code character library generation unit includes the first deletion subelement, and the first deletion is single Member is configured to remove each character included by the first title character string in default code character repertoire, generates code character library; Or, removing each character included by the first title character string and corresponding size write characters in default code character repertoire, generate Code character library.
In another preferred embodiment, code character library generation unit includes the second deletion subelement, the second deletion Unit is configured to be inquired in encryption monetary name library with the presence or absence of second place according to the first title character string of encryption currency Claim character string: being then to remove each character included by the second title character string in default code character repertoire, generates coding Character repertoire;Wherein, the second title character string is generated by adding several characters after the first title character string.
When computer processing data, ignore the first title character string added on the second address character string designated position to obtain It takes the first address character string and carries out data processing.
Fig. 8 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
As shown in figure 8, present invention also provides a kind of equipment 10, including one or more centres as on the other hand Unit (CPU) 101 is managed, can be added according to the program being stored in read-only memory (ROM) 102 or from storage section 108 The program that is downloaded in random access storage device (RAM) 103 and execute various movements appropriate and processing.In RAM103, also deposit It contains equipment 10 and operates required various programs and data.CPU101, ROM102 and RAM103 pass through the phase each other of bus 104 Even.Input/output (I/O) interface 105 is also connected to bus 104.
I/O interface 105 is connected to lower component: the importation 106 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 107 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 108 including hard disk etc.; And the communications portion 109 of the network interface card including LAN card, modem etc..Communications portion 109 via such as because The network of spy's net executes communication process.Driver 110 is also connected to I/O interface 105 as needed.Detachable media 111, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 110, in order to read from thereon Computer program be mounted into storage section 108 as needed.
Particularly, in accordance with an embodiment of the present disclosure, a kind of encryption currency of any of the above-described embodiment description generates address Method may be implemented as computer software programs.For example, embodiment of the disclosure includes a kind of computer program product, packet The computer program being tangibly embodied on machine readable media is included, computer program includes raw for executing a kind of encryption currency At the program code of the method for address.In such embodiments, which can be by communications portion 109 from network On be downloaded and installed, and/or from detachable media 111 be mounted.
As another aspect, present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums Matter can be computer readable storage medium included in the device of above-described embodiment;It is also possible to individualism, it is unassembled Enter the computer readable storage medium in equipment.Computer-readable recording medium storage has one or more than one program, should Program is used to execute the side for being described in a kind of encryption currency generation address of the application by one or more than one processor Method.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depending on related function.Also it wants It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yitong The dedicated hardware based system of functions or operations as defined in executing is crossed to realize, or by specialized hardware and can be calculated The combination of machine instruction is realized.
Being described in the embodiment of the present application involved unit or module can be realized by way of software, can also be with It is realized by way of hardware.Described unit or module also can be set in the processor, for example, each unit can be Software program in computer or intelligent movable equipment is set, the hardware device being separately configured is also possible to.Wherein, these lists The title of member or module does not constitute the restriction to the unit or module itself under certain conditions.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from the application design, appointed by above-mentioned technical characteristic or its equivalent feature Other technical solutions of meaning combination and formation.Such as features described above and (but being not limited to) disclosed herein have similar functions Technical characteristic replaced mutually and the technical solution that is formed.

Claims (10)

1. a kind of address generating method for encrypting currency characterized by comprising
According to the first title text string generation code character library of encryption currency;
The first address character string of the encryption currency is generated by the code character library;Wherein the first address character string Not comprising each character included by the first title character string;
The first title character string is added in the designated position of the first address character string to generate the second address character string.
2. the method according to claim 1, wherein the first title text string generation according to encryption currency Code character library includes any one of following:
Each character included by the first title character string is removed in default code character repertoire, generates code character library;
Each character included by the first title character string and corresponding size write characters are removed in default code character repertoire, Generate code character library.
3. the method according to claim 1, wherein being encoded according to the first title text string generation of encryption currency Character repertoire includes:
According to the first title character string of encryption currency, inquiry whether there is the second title character string in encryption monetary name library:
It is then to remove each character included by the second title character string in default code character repertoire, generates code character Library;
Wherein, the second title character string is generated by adding several characters after the first title character string.
4. -3 any method according to claim 1, which is characterized in that the designated position is at least at two.
5. -3 any method according to claim 1, which is characterized in that the designated position includes at least one of following: The head of the first address character string, the tail portion of the first address character string.
6. a kind of address for encrypting currency generates system characterized by comprising
Code character library generation unit is configured to the first title text string generation code character library according to encryption currency;
First scalar/vector is configured to the first address character that the code character library generates the encryption currency String;Wherein the first address character string does not include each character included by the first title character string;
Second scalar/vector is configured to add the first title word in the designated position of the first address character string Symbol string is to generate the second address character string.
7. system according to claim 6, which is characterized in that code character library generation unit includes:
First deletes subelement, is configured to remove in default code character repertoire each included by the first title character string Character generates code character library;Or,
Each character included by the first title character string and corresponding size write characters are removed in default code character repertoire, Generate code character library.
8. system according to claim 6, which is characterized in that code character library generation unit includes:
Second deletes subelement, is configured to be inquired in encryption monetary name library according to the first title character string of encryption currency With the presence or absence of the second title character string:
It is then to remove each character included by the second title character string in default code character repertoire, generates code character Library;Wherein, the second title character string is generated by adding several characters after the first title character string.
9. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors Execute method according to any one of claims 1 to 5.
10. a kind of storage medium for being stored with computer program, which is characterized in that realize when the program is executed by processor as weighed Benefit requires method described in any one of 1-5.
CN201810621438.XA 2018-06-15 2018-06-15 Address generating method, system, equipment and storage medium for cryptocurrency Active CN108985759B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810621438.XA CN108985759B (en) 2018-06-15 2018-06-15 Address generating method, system, equipment and storage medium for cryptocurrency

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810621438.XA CN108985759B (en) 2018-06-15 2018-06-15 Address generating method, system, equipment and storage medium for cryptocurrency

Publications (2)

Publication Number Publication Date
CN108985759A true CN108985759A (en) 2018-12-11
CN108985759B CN108985759B (en) 2020-10-23

Family

ID=64541334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810621438.XA Active CN108985759B (en) 2018-06-15 2018-06-15 Address generating method, system, equipment and storage medium for cryptocurrency

Country Status (1)

Country Link
CN (1) CN108985759B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177259A (en) * 2019-12-13 2020-05-19 杭州复杂美科技有限公司 Parallel chain transaction encryption method, device and storage medium
CN112039661A (en) * 2020-08-20 2020-12-04 上海简苏网络科技有限公司 Address coding method and device carrying designated information

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095526A (en) * 2015-09-29 2015-11-25 中企动力科技股份有限公司 URL (uniform resource locator) structural processing method, device and system
WO2017148527A1 (en) * 2016-03-03 2017-09-08 Nec Europe Ltd. Method for managing data in a network of nodes
CN107613039A (en) * 2017-09-19 2018-01-19 北京小米移动软件有限公司 IP address attribution inquiry method, device, system and storage medium
WO2018043865A2 (en) * 2016-08-31 2018-03-08 서강대학교 산학협력단 Blockchain-based file management/search system and file management/search method
CN107832275A (en) * 2017-11-29 2018-03-23 北京欧链科技有限公司 The generation method of intelligent Contract ID, apparatus and system in block chain
CN107844527A (en) * 2017-10-13 2018-03-27 平安科技(深圳)有限公司 Web page address De-weight method, electronic equipment and computer-readable recording medium
CN107992923A (en) * 2017-12-22 2018-05-04 北京中星仝创科技有限公司 A kind of QR Quick Response Codes generation and the method read

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095526A (en) * 2015-09-29 2015-11-25 中企动力科技股份有限公司 URL (uniform resource locator) structural processing method, device and system
WO2017148527A1 (en) * 2016-03-03 2017-09-08 Nec Europe Ltd. Method for managing data in a network of nodes
WO2018043865A2 (en) * 2016-08-31 2018-03-08 서강대학교 산학협력단 Blockchain-based file management/search system and file management/search method
CN107613039A (en) * 2017-09-19 2018-01-19 北京小米移动软件有限公司 IP address attribution inquiry method, device, system and storage medium
CN107844527A (en) * 2017-10-13 2018-03-27 平安科技(深圳)有限公司 Web page address De-weight method, electronic equipment and computer-readable recording medium
CN107832275A (en) * 2017-11-29 2018-03-23 北京欧链科技有限公司 The generation method of intelligent Contract ID, apparatus and system in block chain
CN107992923A (en) * 2017-12-22 2018-05-04 北京中星仝创科技有限公司 A kind of QR Quick Response Codes generation and the method read

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111177259A (en) * 2019-12-13 2020-05-19 杭州复杂美科技有限公司 Parallel chain transaction encryption method, device and storage medium
CN112039661A (en) * 2020-08-20 2020-12-04 上海简苏网络科技有限公司 Address coding method and device carrying designated information

Also Published As

Publication number Publication date
CN108985759B (en) 2020-10-23

Similar Documents

Publication Publication Date Title
CN110447035B (en) User content obfuscation in structured user data files
US7950064B2 (en) System and method for controlling comments in a collaborative document
CN109740317A (en) A kind of digital finger-print based on block chain deposits card method and device
CN109992998A (en) A kind of information storage means and system, equipment and storage medium
CN112073807B (en) Video data processing method and device based on block chain
US10706160B1 (en) Methods, systems, and articles of manufacture for protecting data in an electronic document using steganography techniques
Khadam et al. Text data security and privacy in the internet of things: threats, challenges, and future directions
CN113032001B (en) Intelligent contract classification method and device
CN112925954A (en) Method and apparatus for querying data in a graph database
CN110221956A (en) Method and apparatus for generating the test case of block chain intelligence contract
CN108777685A (en) Method and apparatus for handling information
CN108985759A (en) A kind of address generating method and system, equipment and storage medium encrypting currency
Iftikhar et al. A reversible watermarking technique for social network data sets for enabling data trust in cyber, physical, and social computing
KR101220254B1 (en) Searchable color encoded file composing method and searchable color encoded file system
CN113609846B (en) Method and device for extracting entity relationship in statement
Shekhawat et al. A secured steganography algorithm for hiding an image and data in an image using LSB technique
JP4281561B2 (en) Document publication method
CN110069907A (en) Big data source tracing method and system based on digital watermarking
Gaur et al. A new PDAC (parallel encryption with digit arithmetic of cover text) based text steganography approach for cloud data security
CN105354506B (en) The method and apparatus of hidden file
CN109964445A (en) For protection (anti-clone) method and system of unwarranted duplication
Lin et al. A copyright protection scheme based on PDF
Boulesnane et al. A new steganography technique based on dotted Arabic letters features
CN112287658A (en) Business data processing method and device, electronic equipment and medium
CN110008663A (en) A method of the information protected for PDF document and distribute tracking is quickly embedded in and extracts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant